default search action
Guangtai Liang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Xin Xia, Zhi Jin, Marco Aiello, Dongmei Zhang, Guangtai Liang, Xing Hu:
Software Service Engineering in the Era of Large Language Models. SSE 2024: xxiii - [c24]Tianyu Chen, Lin Li, ZhuLiuchuan ZhuLiuchuan, Zongyang Li, Xueqing Liu, Guangtai Liang, Qianxiang Wang, Tao Xie:
VulLibGen: Generating Names of Vulnerability-Affected Packages via a Large Language Model. ACL (1) 2024: 9767-9780 - [c23]Hao Yu, Bo Shen, Dezhi Ran, Jiaxin Zhang, Qi Zhang, Yuchi Ma, Guangtai Liang, Ying Li, Qianxiang Wang, Tao Xie:
CoderEval: A Benchmark of Pragmatic Code Generation with Generative Pre-trained Models. ICSE 2024: 37:1-37:12 - [c22]Xiaohu Song, Ying Wang, Xiao Cheng, Guangtai Liang, Qianxiang Wang, Zhiliang Zhu:
Efficiently Trimming the Fat: Streamlining Software Dependencies with Java Reflection and Dependency Analysis. ICSE 2024: 103:1-103:12 - [i9]Dong Chen, Shaoxin Lin, Muhan Zeng, Daoguang Zan, Jian-Gang Wang, Anton Cheshkov, Jun Sun, Hao Yu, Guoliang Dong, Artem Aliev, Jie Wang, Xiao Cheng, Guangtai Liang, Yuchi Ma, Pan Bian, Tao Xie, Qianxiang Wang:
CodeR: Issue Resolving with Multi-Agent and Task Graphs. CoRR abs/2406.01304 (2024) - [i8]Lin Yang, Chen Yang, Shutao Gao, Weijing Wang, Bo Wang, Qihao Zhu, Xiao Chu, Jianyi Zhou, Guangtai Liang, Qianxiang Wang, Junjie Chen:
An Empirical Study of Unit Test Generation with Large Language Models. CoRR abs/2406.18181 (2024) - [i7]Daoguang Zan, Zhirong Huang, Ailun Yu, Shaoxin Lin, Yifan Shi, Wei Liu, Dong Chen, Zongshuai Qi, Hao Yu, Lei Yu, Dezhi Ran, Muhan Zeng, Bo Shen, Pan Bian, Guangtai Liang, Bei Guan, Pengjie Huang, Tao Xie, Yongji Wang, Qianxiang Wang:
SWE-bench-java: A GitHub Issue Resolving Benchmark for Java. CoRR abs/2408.14354 (2024) - 2023
- [c21]Ningyu He, Zhehao Zhao, Jikai Wang, Yubin Hu, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, Yao Guo:
Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries. ISSTA 2023: 385-397 - [i6]Hao Yu, Bo Shen, Dezhi Ran, Jiaxin Zhang, Qi Zhang, Yuchi Ma, Guangtai Liang, Ying Li, Tao Xie, Qianxiang Wang:
CoderEval: A Benchmark of Pragmatic Code Generation with Generative Pre-trained Models. CoRR abs/2302.00288 (2023) - [i5]Ningyu He, Zhehao Zhao, Jikai Wang, Yubin Hu, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, Yao Guo:
Eunomia: Enabling User-specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries. CoRR abs/2304.07204 (2023) - [i4]Tianyu Chen, Lin Li, Bingjie Shan, Guangtai Liang, Ding Li, Qianxiang Wang, Tao Xie:
Identifying Vulnerable Third-Party Libraries from Textual Descriptions of Vulnerabilities and Libraries. CoRR abs/2307.08206 (2023) - [i3]Tianyu Chen, Lin Li, Liuchuan Zhu, Zongyang Li, Guangtai Liang, Ding Li, Qianxiang Wang, Tao Xie:
VulLibGen: Identifying Vulnerable Third-Party Libraries via Generative Pre-Trained Model. CoRR abs/2308.04662 (2023) - [i2]Tianyu Chen, Lin Li, Taotao Qian, Zeyu Wang, Guangtai Liang, Ding Li, Qianxiang Wang, Tao Xie:
Identifying Vulnerability Patches by Comprehending Code Commits with Comprehensive Change Contexts. CoRR abs/2310.02530 (2023) - 2022
- [i1]Fenia Christopoulou, Gerasimos Lampouras, Milan Gritta, Guchun Zhang, Yinpeng Guo, Zhongqi Li, Qi Zhang, Meng Xiao, Bo Shen, Lin Li, Hao Yu, Li Yan, Pingyi Zhou, Xin Wang, Yuchi Ma, Ignacio Iacobacci, Yasheng Wang, Guangtai Liang, Jiansheng Wei, Xin Jiang, Qianxiang Wang, Qun Liu:
PanGu-Coder: Program Synthesis with Function-Level Language Modeling. CoRR abs/2207.11280 (2022) - 2021
- [c20]Hao He, Yulin Xu, Xiao Cheng, Guangtai Liang, Minghui Zhou:
MigrationAdvisor: Recommending Library Migrations from Large-Scale Open-Source Data. ICSE (Companion Volume) 2021: 9-12 - [c19]Bo Shen, Wei Zhang, Ailun Yu, Zhao Wei, Guangtai Liang, Haiyan Zhao, Zhi Jin:
Cross-language Code Coupling Detection: A Preliminary Study on Android Applications. ICSME 2021: 378-388 - [c18]Ekaterina Blech, Andrey Grishchenko, Ivan Kniazkov, Guangtai Liang, Oleg Serebrennikov, Andrei Tatarnikov, Polina Volkhontseva, Kuzma Yakimets:
Patternika: A Pattern-Mining-Based Tool For Automatic Library Migration. ISSRE Workshops 2021: 333-338 - [c17]Andrey Kuleshov, Petr Trifanov, Vladislav Frolov, Guangtai Liang:
Diktat: Lightweight Static Analysis for Kotlin. ISSRE Workshops 2021: 365-370 - [c16]Bo Shen, Wei Zhang, Christian Kästner, Haiyan Zhao, Zhao Wei, Guangtai Liang, Zhi Jin:
SmartCommit: a graph-based interactive assistant for activity-oriented commits. ESEC/SIGSOFT FSE 2021: 379-390 - [c15]Hao He, Yulin Xu, Yixiao Ma, Yifei Xu, Guangtai Liang, Minghui Zhou:
A Multi-Metric Ranking Approach for Library Migration Recommendations. SANER 2021: 72-83
2010 – 2019
- 2019
- [j2]Bo Shen, Wei Zhang, Haiyan Zhao, Guangtai Liang, Zhi Jin, Qianxiang Wang:
IntelliMerge: a refactoring-aware software merging technique. Proc. ACM Program. Lang. 3(OOPSLA): 170:1-170:28 (2019) - 2016
- [c14]Guangtai Liang, Yabin Dang, Hao Chen, Lijun Mei, Shaochun Li, Yi-Min Chee:
What Code Implements Such Service? A Behavior Model Based Feature Location Approach. SCC 2016: 122-129 - 2015
- [c13]Ling Wu, Qian Wu, Guangtai Liang, Qianxiang Wang, Zhi Jin:
Transforming Code with Compositional Mappings for API-Library Switching. COMPSAC 2015: 316-325 - [c12]Lijun Mei, Hao Chen, Shaochun Li, Qicheng Li, Guangtai Liang, Jeaha Yang:
A Service-Based Framework for Mobile Social Messaging in PaaS Systems. ICWS 2015: 751-754 - [c11]Guangtai Liang, Lijun Mei, Shaochun Li, Liang Chen:
Exploiting Unique Characteristics of Mobile Backend Services to Recommend Right Ones. IEEE MS 2015: 464-467 - [c10]Guangtai Liang, Shaochun Li:
An energy-saving framework for mobile devices based on crowdsourcing intelligences. MobileDeLi 2015: 5-6 - 2014
- [c9]Guangtai Liang, Jian Wang, Shaochun Li, Rong N. Chang:
PatBugs: A Pattern-Based Bug Detector for Cross-platform Mobile Applications. IEEE MS 2014: 84-91 - [c8]Xin Zhou, Feng Li, Yabin Dang, Hao Chen, Shaochun Li, Guangtai Liang:
Collaborative change impact analysis for enterprise application evolution. SOLI 2014: 6-11 - 2013
- [c7]Guangtai Liang, Qianxiang Wang, Tao Xie, Hong Mei:
Inferring project-specific bug patterns for detecting sibling bugs. ESEC/SIGSOFT FSE 2013: 565-575 - [c6]Qian Wu, Ling Wu, Guangtai Liang, Qianxiang Wang, Tao Xie, Hong Mei:
Inferring dependency constraints on parameters for web services. WWW 2013: 1421-1432 - 2012
- [c5]Guangtai Liang, Qian Wu, Qianxiang Wang, Hong Mei:
An Effective Defect Detection and Warning Prioritization Approach for Resource Leaks. COMPSAC 2012: 119-128 - [c4]Ling Wu, Guangtai Liang, Qianxiang Wang:
Program Behavior Analysis and Control for Online IDE. COMPSAC Workshops 2012: 182-187 - 2011
- [j1]Qian Wu, Guangtai Liang, Qianxiang Wang, Hong Mei:
Mining Effective Temporal Specifications from Heterogeneous API Data. J. Comput. Sci. Technol. 26(6): 1061-1075 (2011) - [c3]Qian Wu, Guangtai Liang, Qianxiang Wang, Tao Xie, Hong Mei:
Iterative mining of resource-releasing specifications. ASE 2011: 233-242 - [c2]Ling Wu, Guangtai Liang, Shi Kui, Qianxiang Wang:
CEclipse: An Online IDE for Programing in the Cloud. SERVICES 2011: 45-52 - 2010
- [c1]Guangtai Liang, Ling Wu, Qian Wu, Qianxiang Wang, Tao Xie, Hong Mei:
Automatic construction of an effective training set for prioritizing static analysis warnings. ASE 2010: 93-102
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint