default search action
Yun Lin 0001
Person information
- affiliation: Shanghai Jiao Tong University, China
- affiliation (former): National University of Singapore, School of Computing, Singapore
- unicode name: 林云
Other persons with the same name
- Yun Lin (aka: Lin Yun) — disambiguation page
- Yun Lin 0002 — North China University of Technology, School of Electronic Information Engineering, Beijing, China (and 1 more)
- Yun Lin 0003 — University of South Florida, Tampa, FL, USA
- Yun Lin 0004 — Norwegian University of Science and Technology, Trondheim, Norway
- Yun Lin 0005 — Harbin Engineering University, College of Information and Communication Engineering, China
- Yun Lin 0006 — Central South University, School of Resources and Safety Engineering, Changsha, China
- Yun Lin 0007 — Norwegian University of Science and Technology, Trondheim, Norway
- Yun Lin 0009 — Chongqing University, School of Management Science and Real Estate, China (and 1 more)
- Yun Lin 0010 — Southeast University, School of Mechanical Engineering, Nanjing, China
- Yun Lin 0011 — University of Kentucky, Computer Science Department, Lexington, KY, USA
- Yun Lin 0012 — Chinese Academy of Sciences, Chengdu Institute of Computer Applications, Computer Control College, China
- Yun Lin 0013 — Chongqing University of Posts and Telecommunications, Chongqing Key Lab of Mobile Communications Technology, China
- Yun Lin 0014 — Institute of High Performance Computing, Fusionopolis, Singapore
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Yuting Yang, Pei Huang, Juan Cao, Jintao Li, Yun Lin, Feifei Ma:
A prompt-based approach to adversarial example generation and robustness enhancement. Frontiers Comput. Sci. 18(4) (2024) - [c41]Xuezhi Song, Yijian Wu, Shuning Liu, Bihuan Chen, Yun Lin, Xin Peng:
C2D2: Extracting Critical Changes for Real-World Bugs with Dependency-Sensitive Delta Debugging. ISSTA 2024: 300-312 - [c40]Chenyan Liu, Yufan Cai, Yun Lin, Yuhuan Huang, Yunrui Pei, Bo Jiang, Ping Yang, Jin Song Dong, Hong Mei:
CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature. ISSTA 2024: 466-478 - [c39]Ruofan Liu, Yun Lin, Xiwen Teoh, Gongshen Liu, Zhiyong Huang, Jin Song Dong:
Less Defined Knowledge and More True Alarms: Reference-based Phishing Detection without a Pre-defined Reference List. USENIX Security Symposium 2024 - [c38]Xiwen Teoh, Yun Lin, Ruofan Liu, Zhiyong Huang, Jin Song Dong:
PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive Models. USENIX Security Symposium 2024 - [c37]Yudai Pan, Jun Liu, Tianzhe Zhao, Lingling Zhang, Yun Lin, Jin Song Dong:
A Symbolic Rule Integration Framework with Logic Transformer for Inductive Relation Prediction. WWW 2024: 2181-2192 - [i14]Nhat Minh Chung, Sensen Gao, Tuan-Anh Vu, Jie Zhang, Aishan Liu, Yun Lin, Jin Song Dong, Qing Guo:
Towards Transferable Attacks Against Vision-LLMs in Autonomous Driving with Typography. CoRR abs/2405.14169 (2024) - [i13]Yufan Cai, Zhe Hou, Xiaokun Luan, David Sanán, Yun Lin, Jun Sun, Jin Song Dong:
Towards Large Language Model Aided Program Refinement. CoRR abs/2406.18616 (2024) - [i12]Qi Guo, Minghao Yao, Zhen Tian, Saiyu Qi, Yong Qi, Yun Lin, Jin Song Dong:
Contribution Evaluation of Heterogeneous Participants in Federated Learning via Prototypical Representations. CoRR abs/2407.02073 (2024) - [i11]Chenyan Liu, Yufan Cai, Yun Lin, Yuhuan Huang, Yunrui Pei, Bo Jiang, Ping Yang, Jin Song Dong, Hong Mei:
CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature. CoRR abs/2408.01733 (2024) - [i10]Yakun Zhang, Chen Liu, Xiaofei Xie, Yun Lin, Jin Song Dong, Dan Hao, Lu Zhang:
LLM-based Abstraction and Concretization for GUI Test Migration. CoRR abs/2409.05028 (2024) - 2023
- [j6]Yao Zhang, Xiaofei Xie, Yi Li, Yun Lin, Sen Chen, Yang Liu, Xiaohong Li:
Demystifying Performance Regressions in String Solvers. IEEE Trans. Software Eng. 49(3): 947-961 (2023) - [c36]Zhaoyu Liu, Kan Jiang, Zhe Hou, Yun Lin, Jin Song Dong:
Insight Analysis for Tennis Strategy and Tactics. ICDM 2023: 1169-1174 - [c35]Jin Song Dong, Kan Jiang, Zhaoyu Liu, Chen Dong, Zhe Hou, Rajdeep Singh Hundal, Jingyu Guo, Yun Lin:
Sports Analytics Using Probabilistic Model Checking and Deep Learning. ICECCS 2023: 7-11 - [c34]Xiaoning Ren, Yun Lin, Yinxing Xue, Ruofan Liu, Jun Sun, Zhiyong Feng, Jin Song Dong:
DeepArc: Modularizing Neural Networks for the Model Maintenance. ICSE 2023: 1008-1019 - [c33]Xuezhi Song, Yijian Wu, Junming Cao, Bihuan Chen, Yun Lin, Zhengjie Lu, Dingji Wang, Xin Peng:
BugMiner: Automating Precise Bug Dataset Construction by Code Evolution History Mining. ASE 2023: 1919-1929 - [c32]Mengyue Liu, Yun Lin, Jun Liu, Bohao Liu, Qinghua Zheng, Jin Song Dong:
B2-Sampling: Fusing Balanced and Biased Sampling for Graph Contrastive Learning. KDD 2023: 1489-1500 - [c31]Jihong Wang, Minnan Luo, Jundong Li, Yun Lin, Yushun Dong, Jin Song Dong, Qinghua Zheng:
Empower Post-hoc Graph Explanations with Information Bottleneck: A Pre-training and Fine-tuning Perspective. KDD 2023: 2349-2360 - [c30]Yufan Cai, Yun Lin, Chenyan Liu, Jinglian Wu, Yifan Zhang, Yiming Liu, Yeyun Gong, Jin Song Dong:
On-the-Fly Adapting Code Summarization on Trainable Cost-Effective Language Models. NeurIPS 2023 - [c29]Xianglin Yang, Yun Lin, Yifan Zhang, Linpeng Huang, Jin Song Dong, Hong Mei:
DeepDebugger: An Interactive Time-Travelling Debugging Approach for Deep Classifiers. ESEC/SIGSOFT FSE 2023: 973-985 - [c28]Xiaoxue Ren, Xinyuan Ye, Yun Lin, Zhenchang Xing, Shuqing Li, Michael R. Lyu:
API-Knowledge Aware Search-Based Software Testing: Where, What, and How. ESEC/SIGSOFT FSE 2023: 1320-1332 - [c27]Ruofan Liu, Yun Lin, Yifan Zhang, Penn Han Lee, Jin Song Dong:
Knowledge Expansion and Counterfactual Interaction for Reference-Based Phishing Detection. USENIX Security Symposium 2023: 4139-4156 - 2022
- [j5]Jiaming Ye, Mingliang Ma, Yun Lin, Lei Ma, Yinxing Xue, Jianjun Zhao:
Vulpedia: Detecting vulnerable ethereum smart contracts via abstracted vulnerability signatures. J. Syst. Softw. 192: 111410 (2022) - [j4]Qian Li, Qingyuan Hu, Saiyu Qi, Yong Qi, Di Wu, Yun Lin, Jin Song Dong:
Stochastic Ghost Batch for Self-distillation with Dynamic Soft Label. Knowl. Based Syst. 241: 107936 (2022) - [c26]Xianglin Yang, Yun Lin, Ruofan Liu, Zhenfeng He, Chao Wang, Jin Song Dong, Hong Mei:
DeepVisualInsight: Time-Travelling Visualization for Spatio-Temporal Causality of Deep Classification Training. AAAI 2022: 5359-5366 - [c25]Yunkai Liang, Yun Lin, Xuezhi Song, Jun Sun, Zhiyong Feng, Jin Song Dong:
gDefects4DL: A Dataset of General Real-World Deep Learning Program Defects. ICSE-Companion 2022: 90-94 - [c24]Xianglin Yang, Yun Lin, Ruofan Liu, Jin Song Dong:
Temporality Spatialization: A Scalable and Faithful Time-Travelling Visualization for Deep Classifier Training. IJCAI 2022: 4022-4028 - [c23]Xuezhi Song, Yun Lin, Siang Hwee Ng, Yijian Wu, Xin Peng, Jin Song Dong, Hong Mei:
RegMiner: towards constructing a large regression dataset from code evolution history. ISSTA 2022: 314-326 - [c22]Yan Xiao, Yun Lin, Ivan Beschastnikh, Changsheng Sun, David S. Rosenblum, Jin Song Dong:
Repairing Failure-inducing Inputs with Input Reflection. ASE 2022: 85:1-85:13 - [c21]Ruofan Liu, Yun Lin, Xianglin Yang, Jin Song Dong:
Debugging and Explaining Metric Learning Approaches: An Influence Function Based Perspective. NeurIPS 2022 - [c20]Xuezhi Song, Yun Lin, Yijian Wu, Yifan Zhang, Siang Hwee Ng, Xin Peng, Jin Song Dong, Hong Mei:
RegMiner: mining replicable regression dataset from code repositories. ESEC/SIGSOFT FSE 2022: 1711-1715 - [c19]Ruofan Liu, Yun Lin, Xianglin Yang, Siang Hwee Ng, Dinil Mon Divakaran, Jin Song Dong:
Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach. USENIX Security Symposium 2022: 1633-1650 - [i9]Xianglin Yang, Yun Lin, Ruofan Liu, Zhenfeng He, Chao Wang, Jin Song Dong, Hong Mei:
DeepVisualInsight: Time-Travelling Visualization for Spatio-Temporal Causality of Deep Classification Training. CoRR abs/2201.01155 (2022) - [i8]Yuting Yang, Pei Huang, Juan Cao, Jintao Li, Yun Lin, Jin Song Dong, Feifei Ma, Jian Zhang:
A Prompting-based Approach for Adversarial Example Generation and Robustness Enhancement. CoRR abs/2203.10714 (2022) - [i7]Mark Huasong Meng, Guangdong Bai, Sin Gee Teo, Zhe Hou, Yan Xiao, Yun Lin, Jin Song Dong:
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective. CoRR abs/2206.12227 (2022) - 2021
- [j3]Qian Li, Yong Qi, Qingyuan Hu, Saiyu Qi, Yun Lin, Jin Song Dong:
Adversarial Adaptive Neighborhood With Feature Importance-Aware Convex Interpolation. IEEE Trans. Inf. Forensics Secur. 16: 2447-2460 (2021) - [j2]Haijun Wang, Yun Lin, Zijiang Yang, Jun Sun, Yang Liu, Jin Song Dong, Qinghua Zheng, Ting Liu:
Explaining Regressions via Alignment Slicing and Mending. IEEE Trans. Software Eng. 47(11): 2421-2437 (2021) - [c18]Yan Xiao, Ivan Beschastnikh, David S. Rosenblum, Changsheng Sun, Sebastian G. Elbaum, Yun Lin, Jin Song Dong:
Self-Checking Deep Neural Networks in Deployment. ICSE 2021: 372-384 - [c17]Siqi Li, Yun Lin, Xiaofei Xie, Yuekang Li, Xiaohong Li, Weimin Ge, Yang Liu, Jin Song Dong:
A First Look at the Effect of Deep Learning in Coverage-guided Fuzzing. ASE 2021: 1186-1189 - [c16]Yun Lin, You Sheng Ong, Jun Sun, Gordon Fraser, Jin Song Dong:
Graph-based seed object synthesis for search-based unit testing. ESEC/SIGSOFT FSE 2021: 1068-1080 - [c15]Yun Lin, Ruofan Liu, Dinil Mon Divakaran, Jun Yang Ng, Qing Zhou Chan, Yiwen Lu, Yuxuan Si, Fan Zhang, Jin Song Dong:
Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages. USENIX Security Symposium 2021: 3793-3810 - [i6]Yan Xiao, Ivan Beschastnikh, David S. Rosenblum, Changsheng Sun, Sebastian G. Elbaum, Yun Lin, Jin Song Dong:
Self-Checking Deep Neural Networks in Deployment. CoRR abs/2103.02371 (2021) - [i5]Xuezhi Song, Yun Lin, Siang Hwee Ng, Ping Yu, Xin Peng, Jin Song Dong:
Constructing Regression Dataset from Code Evolution History. CoRR abs/2109.12389 (2021) - [i4]Yan Xiao, Yun Lin, Ivan Beschastnikh, Changsheng Sun, David S. Rosenblum, Jin Song Dong:
Generalizing Neural Networks by Reflecting Deviating Data in Production. CoRR abs/2110.02718 (2021) - 2020
- [c14]Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun:
CoinWatch: A Clone-Based Approach For Detecting Vulnerabilities in Cryptocurrencies. Blockchain 2020: 17-25 - [c13]Jiaming Ye, Mingliang Ma, Yun Lin, Yulei Sui, Yinxing Xue:
Clairvoyance: cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts. ICSE (Companion Volume) 2020: 274-275 - [c12]Tai D. Nguyen, Long H. Pham, Jun Sun, Yun Lin, Quang Tran Minh:
sFuzz: an efficient adaptive fuzzer for solidity smart contracts. ICSE 2020: 778-788 - [c11]Yun Lin, Jun Sun, Gordon Fraser, Ziheng Xiu, Ting Liu, Jin Song Dong:
Recovering fitness gradients for interprocedural Boolean flags in search-based testing. ISSTA 2020: 440-451 - [c10]Yinxing Xue, Mingliang Ma, Yun Lin, Yulei Sui, Jiaming Ye, Tianyong Peng:
Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts. ASE 2020: 1029-1040 - [i3]Tai D. Nguyen, Long H. Pham, Jun Sun, Yun Lin, Quang Tran Minh:
sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart Contracts. CoRR abs/2004.08563 (2020) - [i2]Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun:
CoinWatch: A Clone-Based Approach For Detecting Vulnerabilities in Cryptocurrencies. CoRR abs/2006.10280 (2020)
2010 – 2019
- 2019
- [j1]Pardeep Kumar, Yun Lin, Guangdong Bai, Andrew Paverd, Jin Song Dong, Andrew P. Martin:
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues. IEEE Commun. Surv. Tutorials 21(3): 2886-2927 (2019) - [c9]Haijun Wang, Xiaofei Xie, Shang-Wei Lin, Yun Lin, Yuekang Li, Shengchao Qin, Yang Liu, Ting Liu:
Locating vulnerabilities in binaries via memory layout recovering. ESEC/SIGSOFT FSE 2019: 718-728 - [i1]Yinxing Xue, Jiaming Ye, Mingliang Ma, Lei Ma, Yi Li, Haijun Wang, Yun Lin, Tianyong Peng, Yang Liu:
Doublade: Unknown Vulnerability Detection in Smart Contracts Via Abstract Signature Matching and Refined Detection Rules. CoRR abs/1912.04466 (2019) - 2018
- [c8]Xinyu Wang, Jun Sun, Zhenbang Chen, Peixin Zhang, Jingyi Wang, Yun Lin:
Towards optimal concolic testing. ICSE 2018: 291-302 - [c7]Yun Lin, Jun Sun, Lyly Tran, Guangdong Bai, Haijun Wang, Jin Song Dong:
Break the dead end of dynamic slicing: localizing data and control omission bug. ASE 2018: 509-519 - 2017
- [c6]Yun Lin, Jun Sun, Yinxing Xue, Yang Liu, Jin Song Dong:
Feedback-based debugging. ICSE 2017: 393-403 - [c5]Yun Lin, Guozhu Meng, Yinxing Xue, Zhenchang Xing, Jun Sun, Xin Peng, Yang Liu, Wenyun Zhao, Jin Song Dong:
Mining implicit design templates for actionable code reuse. ASE 2017: 394-404 - 2016
- [c4]Yun Lin, Xin Peng, Yuanfang Cai, Danny Dig, Diwen Zheng, Wenyun Zhao:
Interactive and guided architectural refactoring with search-based recommendation. SIGSOFT FSE 2016: 535-546 - 2015
- [c3]Yun Lin, Xin Peng, Zhenchang Xing, Diwen Zheng, Wenyun Zhao:
Clone-based and interactive recommendation for modifying pasted code. ESEC/SIGSOFT FSE 2015: 520-531 - 2014
- [c2]Yun Lin, Zhenchang Xing, Yinxing Xue, Yang Liu, Xin Peng, Jun Sun, Wenyun Zhao:
Detecting differences across multiple instances of code clones. ICSE 2014: 164-174 - [c1]Yun Lin, Zhenchang Xing, Xin Peng, Yang Liu, Jun Sun, Wenyun Zhao, Jin Song Dong:
Clonepedia: Summarizing Code Clones by Common Syntactic Context for Software Maintenance. ICSME 2014: 341-350
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint