[go: up one dir, main page]

Follow
Wei Le
Wei Le
Associate Professor of Computer Science, Iowa State University
Verified email at iastate.edu - Homepage
Title
Cited by
Cited by
Year
An empirical study of deep learning models for vulnerability detection
B Steenhoek, MM Rahman, R Jiles, W Le
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
1562023
Deeplocalize: Fault localization for deep neural networks
M Wardat, W Le, H Rajan
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
1392021
Marple, A Demand-Driven Path-Sensitive Buffer Overflow Detector
W Le, ML Soffa
16th International Symposium on the Foundation of Softwa re Engineering, 272-282, 2008
1002008
Dataflow analysis-inspired deep learning for efficient vulnerability detection
B Steenhoek, H Gao, W Le
Proceedings of the 46th ieee/acm international conference on software …, 2024
932024
Deepdiagnosis: automatically diagnosing faults and recommending actionable fixes in deep learning programs
M Wardat, BD Cruz, W Le, H Rajan
Proceedings of the 44th international conference on software engineering …, 2022
802022
Proteus: Computing Disjunctive Loop Summary via Path Dependency Analysis
X Xie, B Chen, Y Liu, W Le, X Li
FSE, 2016
802016
Generating Performance Distributions via Probabilistic Symbolic Execution
WL Bihuan Chen, Yang Liu
ICSE '16 Proceedings of the 38th International Conference on Software …, 2016
80*2016
A comprehensive study of the capabilities of large language models for vulnerability detection
B Steenhoek, MM Rahman, MK Roy, MS Alam, ET Barr, W Le
CoRR, 2024
752024
Traced: Execution-aware pre-training for source code
Y Ding, B Steenhoek, K Pei, G Kaiser, W Le, B Ray
Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024
692024
Path-based fault correlations
W Le, ML Soffa
18th International Symposium on the Foundation of Software Engineering, 307-316, 2010
622010
Software Assurance by Bounded Exhaustive Testing
D Coppit, J Yang, S Khurshid, W Le, Kevin Sullivan
IEEE Transactions on So ftware Engineering 31 (4), 328-339, 2005
612005
Patch Verification via Multiversion Interprocedural Control Flow Graphs
W Le, SD Pattison
36th International Conference on Software Engineering, 1047-1058, 2014
562014
A Comparison of Energy Bugs for Smartphone Platforms
J Zhang, A Musa, W Le
1st International Workshop on the Engineering of Mobile-Enabled Systems, 25-30, 2013
512013
S-looper: Automatic summarization for multipath string loops
X Xie, Y Liu, W Le, X Li, H Chen
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
502015
Towards causal deep learning for vulnerability detection
MM Rahman, I Ceka, C Mao, S Chakraborty, B Ray, W Le
Proceedings of the IEEE/ACM 46th international conference on software …, 2024
492024
Automatic loop summarization via path dependency analysis
X Xie, B Chen, L Zou, Y Liu, W Le, X Li
IEEE Transactions on Software Engineering 45 (6), 537-557, 2017
412017
Towards understanding and enhancing robustness of deep learning models against malicious unlearning attacks
W Qian, C Zhao, W Le, M Ma, M Huai
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and …, 2023
402023
An empirical study of deep learning models for vulnerability detection. In 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE)
B Steenhoek, MM Rahman, R Jiles, W Le
Los Alamitos, CA, USA, may, 2237-2248, 2023
392023
A Code Clone Oracle
DE Krutz, W Le
11th Working Conference on Mining Software Repositories, 388-391, 2014
312014
Generating Analyses for Detecting Faults in Path Segments
W Le, ML Soffa
International Symposium on Software Testing and Ana lysis, 320-330, 2011
302011
The system can't perform the operation now. Try again later.
Articles 1–20