| An empirical study of deep learning models for vulnerability detection B Steenhoek, MM Rahman, R Jiles, W Le 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023 | 156 | 2023 |
| Deeplocalize: Fault localization for deep neural networks M Wardat, W Le, H Rajan 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 139 | 2021 |
| Marple, A Demand-Driven Path-Sensitive Buffer Overflow Detector W Le, ML Soffa 16th International Symposium on the Foundation of Softwa re Engineering, 272-282, 2008 | 100 | 2008 |
| Dataflow analysis-inspired deep learning for efficient vulnerability detection B Steenhoek, H Gao, W Le Proceedings of the 46th ieee/acm international conference on software …, 2024 | 93 | 2024 |
| Deepdiagnosis: automatically diagnosing faults and recommending actionable fixes in deep learning programs M Wardat, BD Cruz, W Le, H Rajan Proceedings of the 44th international conference on software engineering …, 2022 | 80 | 2022 |
| Proteus: Computing Disjunctive Loop Summary via Path Dependency Analysis X Xie, B Chen, Y Liu, W Le, X Li FSE, 2016 | 80 | 2016 |
| Generating Performance Distributions via Probabilistic Symbolic Execution WL Bihuan Chen, Yang Liu ICSE '16 Proceedings of the 38th International Conference on Software …, 2016 | 80* | 2016 |
| A comprehensive study of the capabilities of large language models for vulnerability detection B Steenhoek, MM Rahman, MK Roy, MS Alam, ET Barr, W Le CoRR, 2024 | 75 | 2024 |
| Traced: Execution-aware pre-training for source code Y Ding, B Steenhoek, K Pei, G Kaiser, W Le, B Ray Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024 | 69 | 2024 |
| Path-based fault correlations W Le, ML Soffa 18th International Symposium on the Foundation of Software Engineering, 307-316, 2010 | 62 | 2010 |
| Software Assurance by Bounded Exhaustive Testing D Coppit, J Yang, S Khurshid, W Le, Kevin Sullivan IEEE Transactions on So ftware Engineering 31 (4), 328-339, 2005 | 61 | 2005 |
| Patch Verification via Multiversion Interprocedural Control Flow Graphs W Le, SD Pattison 36th International Conference on Software Engineering, 1047-1058, 2014 | 56 | 2014 |
| A Comparison of Energy Bugs for Smartphone Platforms J Zhang, A Musa, W Le 1st International Workshop on the Engineering of Mobile-Enabled Systems, 25-30, 2013 | 51 | 2013 |
| S-looper: Automatic summarization for multipath string loops X Xie, Y Liu, W Le, X Li, H Chen Proceedings of the 2015 International Symposium on Software Testing and …, 2015 | 50 | 2015 |
| Towards causal deep learning for vulnerability detection MM Rahman, I Ceka, C Mao, S Chakraborty, B Ray, W Le Proceedings of the IEEE/ACM 46th international conference on software …, 2024 | 49 | 2024 |
| Automatic loop summarization via path dependency analysis X Xie, B Chen, L Zou, Y Liu, W Le, X Li IEEE Transactions on Software Engineering 45 (6), 537-557, 2017 | 41 | 2017 |
| Towards understanding and enhancing robustness of deep learning models against malicious unlearning attacks W Qian, C Zhao, W Le, M Ma, M Huai Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and …, 2023 | 40 | 2023 |
| An empirical study of deep learning models for vulnerability detection. In 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE) B Steenhoek, MM Rahman, R Jiles, W Le Los Alamitos, CA, USA, may, 2237-2248, 2023 | 39 | 2023 |
| A Code Clone Oracle DE Krutz, W Le 11th Working Conference on Mining Software Repositories, 388-391, 2014 | 31 | 2014 |
| Generating Analyses for Detecting Faults in Path Segments W Le, ML Soffa International Symposium on Software Testing and Ana lysis, 320-330, 2011 | 30 | 2011 |