default search action
Yeting Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j4]Xiaohan Zhang, Cen Zhang, Xinghua Li, Zhengjie Du, Bing Mao, Yuekang Li, Yaowen Zheng, Yeting Li, Li Pan, Yang Liu, Robert H. Deng:
A Survey of Protocol Fuzzing. ACM Comput. Surv. 57(2): 35:1-35:36 (2025) - 2024
- [j3]Danilo R. Diedrichs, Avyi Hill, Yeting Li, Amelia Miller Schubert:
Dynamical simulation of the Syrian refugee crisis: quantifying the driving factors of forced migration. Simul. 100(2): 157-170 (2024) - [c26]Yiming Liu, Cen Zhang, Feng Li, Yeting Li, Jianhua Zhou, Jian Wang, Lanlan Zhan, Yang Liu, Wei Huo:
Semantic-Enhanced Static Vulnerability Detection in Baseband Firmware. ICSE 2024: 173:1-173:12 - [c25]Cen Zhang, Yaowen Zheng, Mingqiang Bai, Yeting Li, Wei Ma, Xiaofei Xie, Yuekang Li, Limin Sun, Yang Liu:
How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation. ISSTA 2024: 1223-1235 - [c24]Chendong Yu, Yang Xiao, Jie Lu, Yuekang Li, Yeting Li, Lian Li, Yifan Dong, Jian Wang, Jingyi Shi, Defang Bo, Wei Huo:
File Hijacking Vulnerability: The Elephant in the Room. NDSS 2024 - [c23]Kunpeng Jian, Yanyan Zou, Yeting Li, Jialun Cao, Menghao Li, Jian Sun, Jingyi Shi, Wei Huo:
Fuzzing for Stateful Protocol Implementations: Are We There Yet? TASE 2024: 186-204 - [c22]Jiaxu Zhao, Yuekang Li, Yanyan Zou, Zhaohui Liang, Yang Xiao, Yeting Li, Bingwei Peng, Nanyu Zhong, Xinyi Wang, Wei Wang, Wei Huo:
Leveraging Semantic Relations in Code and Data to Enhance Taint Analysis of Embedded Systems. USENIX Security Symposium 2024 - [i9]Xiaohan Zhang, Cen Zhang, Xinghua Li, Zhengjie Du, Yuekang Li, Yaowen Zheng, Yeting Li, Bing Mao, Yang Liu, Robert H. Deng:
A Survey of Protocol Fuzzing. CoRR abs/2401.01568 (2024) - 2023
- [j2]Yeting Li, Haiming Chen, Zixuan Chen:
Learning Disjunctive Multiplicity Expressions and Disjunctive Generalize Multiplicity Expressions From Both Positive and Negative Examples. Comput. J. 66(7): 1733-1748 (2023) - [c21]Jingyi Shi, Yang Xiao, Yuekang Li, Yeting Li, Dongsong Yu, Chendong Yu, Hui Su, Yufeng Chen, Wei Huo:
ACETest: Automated Constraint Extraction for Testing Deep Learning Operators. ISSTA 2023: 690-702 - [c20]Yi Liu, Yuekang Li, Gelei Deng, Felix Juefei-Xu, Yao Du, Cen Zhang, Chengwei Liu, Yeting Li, Lei Ma, Yang Liu:
ASTER: Automatic Speech Recognition System Accessibility Testing for Stutterers. ASE 2023: 510-521 - [c19]Xinyi Wang, Cen Zhang, Yeting Li, Zhiwu Xu, Shuailin Huang, Yi Liu, Yican Yao, Yang Xiao, Yanyan Zou, Yang Liu, Wei Huo:
Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation. SP 2023: 2427-2443 - [i8]Jingyi Shi, Yang Xiao, Yuekang Li, Yeting Li, Dongsong Yu, Chendong Yu, Hui Su, Yufeng Chen, Wei Huo:
ACETest: Automated Constraint Extraction for Testing Deep Learning Operators. CoRR abs/2305.17914 (2023) - [i7]Cen Zhang, Mingqiang Bai, Yaowen Zheng, Yeting Li, Xiaofei Xie, Yuekang Li, Wei Ma, Limin Sun, Yang Liu:
Understanding Large Language Model Based Fuzz Driver Generation. CoRR abs/2307.12469 (2023) - [i6]Yi Liu, Yuekang Li, Gelei Deng, Felix Juefei-Xu, Yao Du, Cen Zhang, Chengwei Liu, Yeting Li, Lei Ma, Yang Liu:
ASTER: Automatic Speech Recognition System Accessibility Testing for Stutterers. CoRR abs/2308.15742 (2023) - 2022
- [j1]Jialun Cao, Meiziniu Li, Yeting Li, Ming Wen, Shing-Chi Cheung, Haiming Chen:
SemMT: A Semantic-Based Testing Approach for Machine Translation Systems. ACM Trans. Softw. Eng. Methodol. 31(2): 34e:1-34e:36 (2022) - [c18]Yeting Li, Yecheng Sun, Zhiwu Xu, Jialun Cao, Yuekang Li, Rongchen Li, Haiming Chen, Shing-Chi Cheung, Yang Liu, Yang Xiao:
RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-Fix. USENIX Security Symposium 2022: 4183-4200 - 2021
- [c17]Yeting Li, Shuaimin Li, Zhiwu Xu, Jialun Cao, Zixuan Chen, Yun Hu, Haiming Chen, Shing-Chi Cheung:
TRANSREGEX: Multi-modal Regular Expression Synthesis by Generate-and-Repair. ICSE 2021: 1210-1222 - [c16]Yeting Li, Zixuan Chen, Jialun Cao, Zhiwu Xu, Qiancheng Peng, Haiming Chen, Liyuan Chen, Shing-Chi Cheung:
ReDoSHunter: A Combined Static and Dynamic Approach for Regular Expression DoS Detection. USENIX Security Symposium 2021: 3847-3864 - 2020
- [c15]Yeting Li, Jialun Cao, Haiming Chen, Tingjian Ge, Zhiwu Xu, Qiancheng Peng:
FlashSchema: Achieving High Quality XML Schemas with Powerful Inference Algorithms and Large-scale Schema Data. ICDE 2020: 1962-1965 - [c14]Yeting Li, Zhiwu Xu, Jialun Cao, Haiming Chen, Tingjian Ge, Shing-Chi Cheung, Haoren Zhao:
FlashRegex: Deducing Anti-ReDoS Regexes from Examples. ASE 2020: 659-671 - [c13]Yeting Li, Haiming Chen, Lingqi Zhang, Bo Huang, Jianzhao Zhang:
Inferring Restricted Regular Expressions with Interleaving from Positive and Negative Samples. PAKDD (2) 2020: 769-781 - [i5]Jialun Cao, Meiziniu Li, Yeting Li, Ming Wen, Shing-Chi Cheung:
SemMT: A Semantic-based Testing Approach for Machine Translation Systems. CoRR abs/2012.01815 (2020) - [i4]Yeting Li, Shuaimin Li, Zhiwu Xu, Jialun Cao, Zixuan Chen, Yun Hu, Haiming Chen, Shing-Chi Cheung:
TransRegex: Multi-modal Regular Expression Synthesis by Generate-and-Repair. CoRR abs/2012.15489 (2020)
2010 – 2019
- 2019
- [c12]Yeting Li, Xiaolan Zhang, Jialun Cao, Haiming Chen, Chong Gao:
Learning k-Occurrence Regular Expressions with Interleaving. DASFAA (2) 2019: 70-85 - [c11]Yeting Li, Chunmei Dong, Xinyu Chu, Haiming Chen:
Learning DMEs from Positive and Negative Examples. DASFAA (3) 2019: 434-438 - [c10]Yeting Li, Xiaoying Mou, Haiming Chen:
Learning k-Occurrence Regular Expressions from Positive and Negative Samples. ER 2019: 264-272 - [c9]Xiaoying Mou, Haiming Chen, Yeting Li:
Context-Free Grammars for Deterministic Regular Expressions with Interleaving. ICTAC 2019: 235-252 - [c8]Yeting Li, Haiming Chen, Xiaolan Zhang, Lingqi Zhang:
An effective algorithm for learning single occurrence regular expressions with interleaving. IDEAS 2019: 24:1-24:10 - [c7]Haiming Chen, Yeting Li, Chunmei Dong, Xinyu Chu, Xiaoying Mou, Weidong Min:
A Large-Scale Repository of Deterministic Regular Expression Patterns and Its Applications. PAKDD (3) 2019: 249-261 - [i3]Chunmei Dong, Yeting Li, Haiming Chen:
Learning Restricted Regular Expressions with Interleaving. CoRR abs/1904.13164 (2019) - [i2]Yeting Li, Haiming Chen, Xiaolan Zhang, Lingqi Zhang:
An Effective Algorithm for Learning Single Occurrence Regular Expressions with Interleaving. CoRR abs/1906.02074 (2019) - 2018
- [c6]Yeting Li, Xiaoying Mou, Haiming Chen:
Learning Concise Relax NG Schemas Supporting Interleaving from XML Documents. ADMA 2018: 303-317 - [c5]Xiaolan Zhang, Yeting Li, Fei Tian, Fanlin Cui, Chunmei Dong, Haiming Chen:
Inferring Regular Expressions with Interleaving from XML Data. APWeb/WAIM (2) 2018: 44-52 - [c4]Yeting Li, Xiaolan Zhang, Han Xu, Xiaoying Mou, Haiming Chen:
Learning Restricted Regular Expressions with Interleaving from XML Data. ER 2018: 586-593 - [c3]Yeting Li, Xinyu Chu, Xiaoying Mou, Chunmei Dong, Haiming Chen:
Practical Study of Deterministic Regular Expressions from Large-scale XML and Schema Data. IDEAS 2018: 45-53 - [c2]Xiaolan Zhang, Yeting Li, Fanlin Cui, Chunmei Dong, Haiming Chen:
Inference of a Concise Regular Expression Considering Interleaving from XML Documents. PAKDD (2) 2018: 389-401 - [i1]Yeting Li, Xinyu Chu, Xiaoying Mou, Chunmei Dong, Haiming Chen:
Practical Study of Deterministic Regular Expressions from Large-scale XML and Schema Data. CoRR abs/1805.12503 (2018) - 2016
- [c1]Yeting Li, Xiaolan Zhang, Feifei Peng, Haiming Chen:
Practical Study of Subclasses of Regular Expressions in DTD and XML Schema. APWeb (2) 2016: 368-382
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint