default search action
Lin Tan 0001
Person information
- affiliation: Purdue University, West Lafayette, IN, USA
Other persons with the same name
- Lin Tan — disambiguation page
- Lin Tan 0002 — The University of Texas MD Anderson Cancer Center, Houston, TX, USA
- Lin Tan 0003 — Information Engineering University, Zhengzhou, China (and 1 more)
- Lin Tan 0004 — First Research Institute of the Ministry of Public Security, Beijing, China
- Lin Tan 0005 — Virginia Tech, Blacksburg, VA, USA
- Lin Tan 0006 — West Chester University, West Chester, PA, USA
- Lin Tan 0007 — Shandong Jianzhu University, Jinan, China
- Lin Tan 0008 — Nanjing University, Jiangsu, China
- Lin Tan 0009 — University of Electronic Science and Technology of China, Chengdu, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c53]Danning Xie, Jiannan Wang, Hung Viet Pham, Lin Tan, Yu Guo, Adnan Aziz, Erik Meijer:
CEDAR: Continuous Testing of Deep Learning Libraries. SANER 2024: 371-382 - [i12]Shanchao Liang, Nan Jiang, Shangshu Qian, Lin Tan:
WAFFLE: Multi-Modal Model for Automated Front-End Development. CoRR abs/2410.18362 (2024) - 2023
- [c52]Jonathan Rosenthal, Eric Enouen, Hung Viet Pham, Lin Tan:
DisGUIDE: Disagreement-Guided Data-Free Model Extraction. AAAI 2023: 9614-9622 - [c51]Jinhao Dong, Yiling Lou, Dan Hao, Lin Tan:
Revisiting Learning-based Commit Message Generation. ICSE 2023: 794-805 - [c50]Nan Jiang, Thibaud Lutellier, Yiling Lou, Lin Tan, Dan Goldwasser, Xiangyu Zhang:
KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair. ICSE 2023: 1251-1263 - [c49]Nan Jiang, Kevin Liu, Thibaud Lutellier, Lin Tan:
Impact of Code Language Models on Automated Program Repair. ICSE 2023: 1430-1442 - [c48]Yi Wu, Nan Jiang, Hung Viet Pham, Thibaud Lutellier, Jordan Davis, Lin Tan, Petr Babkin, Sameena Shah:
How Effective Are Neural Networks for Fixing Security Vulnerabilities. ISSTA 2023: 1282-1294 - [c47]Shangshu Qian, Wen Fan, Lin Tan, Yongle Zhang:
Vicious Cycles in Distributed Software Systems. ASE 2023: 91-103 - [i11]Nan Jiang, Thibaud Lutellier, Yiling Lou, Lin Tan, Dan Goldwasser, Xiangyu Zhang:
KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair. CoRR abs/2302.01857 (2023) - [i10]Nan Jiang, Kevin Liu, Thibaud Lutellier, Lin Tan:
Impact of Code Language Models on Automated Program Repair. CoRR abs/2302.05020 (2023) - [i9]Yi Wu, Nan Jiang, Hung Viet Pham, Thibaud Lutellier, Jordan Davis, Lin Tan, Petr Babkin, Sameena Shah:
How Effective Are Neural Networks for Fixing Security Vulnerabilities. CoRR abs/2305.18607 (2023) - [i8]Xiangzhe Xu, Zhuo Zhang, Shiwei Feng, Yapeng Ye, Zian Su, Nan Jiang, Siyuan Cheng, Lin Tan, Xiangyu Zhang:
LmPa: Improving Decompilation by Synergy of Large Language Model and Program Analysis. CoRR abs/2306.02546 (2023) - [i7]Danning Xie, Byungwoo Yoo, Nan Jiang, Mijung Kim, Lin Tan, Xiangyu Zhang, Judy S. Lee:
Impact of Large Language Models on Generating Software Specifications. CoRR abs/2306.03324 (2023) - [i6]Nan Jiang, Chengxiao Wang, Kevin Liu, Xiangzhe Xu, Lin Tan, Xiangyu Zhang:
Nova+: Generative Language Models for Binaries. CoRR abs/2311.13721 (2023) - 2022
- [c46]Jiannan Wang, Thibaud Lutellier, Shangshu Qian, Hung Viet Pham, Lin Tan:
EAGLE: Creating Equivalent Graphs to Test Deep Learning Libraries. ICSE 2022: 798-810 - [c45]Danning Xie, Yitong Li, Mijung Kim, Hung Viet Pham, Lin Tan, Xiangyu Zhang, Michael W. Godfrey:
DocTer: documentation-guided fuzzing for testing deep learning API functions. ISSTA 2022: 176-188 - 2021
- [c44]Nan Jiang, Thibaud Lutellier, Lin Tan:
CURE: Code-Aware Neural Machine Translation for Automatic Program Repair. ICSE 2021: 1161-1173 - [c43]Hung Viet Pham, Mijung Kim, Lin Tan, Yaoliang Yu, Nachiappan Nagappan:
DEVIATE: A Deep Learning Variance Testing Framework. ASE 2021: 1286-1290 - [c42]Shangshu Qian, Hung Viet Pham, Thibaud Lutellier, Zeou Hu, Jungwon Kim, Lin Tan, Yaoliang Yu, Jiahao Chen, Sameena Shah:
Are My Deep Learning Systems Fair? An Empirical Study of Fixed-Seed Training. NeurIPS 2021: 30211-30227 - [c41]Ming Yan, Junjie Chen, Xiangyu Zhang, Lin Tan, Gan Wang, Zan Wang:
Exposing numerical bugs in deep learning via gradient back-propagation. ESEC/SIGSOFT FSE 2021: 627-638 - [i5]Nan Jiang, Thibaud Lutellier, Lin Tan:
CURE: Code-Aware Neural Machine Translation for Automatic Program Repair. CoRR abs/2103.00073 (2021) - [i4]Danning Xie, Yitong Li, Mijung Kim, Hung Viet Pham, Lin Tan, Xiangyu Zhang, Michael W. Godfrey:
Leveraging Documentation to Test Deep Learning Library Functions. CoRR abs/2109.01002 (2021) - 2020
- [j11]Song Wang, Taiyue Liu, Jaechang Nam, Lin Tan:
Deep Semantic Feature Learning for Software Defect Prediction. IEEE Trans. Software Eng. 46(12): 1267-1293 (2020) - [c40]Juan Zhai, Xiangzhe Xu, Yu Shi, Guanhong Tao, Minxue Pan, Shiqing Ma, Lei Xu, Weifeng Zhang, Lin Tan, Xiangyu Zhang:
CPC: automatically classifying and propagating natural language comments via program analysis. ICSE 2020: 1359-1371 - [c39]Thibaud Lutellier, Hung Viet Pham, Lawrence Pang, Yitong Li, Moshi Wei, Lin Tan:
CoCoNuT: combining context-aware neural translation models using ensemble for program repair. ISSTA 2020: 101-114 - [c38]Hung Viet Pham, Shangshu Qian, Jiannan Wang, Thibaud Lutellier, Jonathan Rosenthal, Lin Tan, Yaoliang Yu, Nachiappan Nagappan:
Problems and Opportunities in Training Deep Learning Software Systems: An Analysis of Variance. ASE 2020: 771-783 - [c37]Juan Zhai, Yu Shi, Minxue Pan, Guian Zhou, Yongxiang Liu, Chunrong Fang, Shiqing Ma, Lin Tan, Xiangyu Zhang:
C2S: translating natural language comments to formal program specifications. ESEC/SIGSOFT FSE 2020: 25-37 - [i3]Qiuling Xu, Guanhong Tao, Siyuan Cheng, Lin Tan, Xiangyu Zhang:
Towards Feature Space Adversarial Attack. CoRR abs/2004.12385 (2020)
2010 – 2019
- 2019
- [j10]Lin Tan, Abram Hindle:
Guest Editorial: Special Section on Mining Software Repositories. Empir. Softw. Eng. 24(3): 1458-1460 (2019) - [j9]Jaechang Nam, Song Wang, Yuan Xi, Lin Tan:
A bug finder refined by a large set of open-source projects. Inf. Softw. Technol. 112: 164-175 (2019) - [c36]Jinqiu Yang, Lin Tan, John Peyton, Kristofer A. Duer:
Towards better utilizing static application security testing. ICSE (SEIP) 2019: 51-60 - [c35]Hung Viet Pham, Thibaud Lutellier, Weizhen Qi, Lin Tan:
CRADLE: cross-backend validation to detect and localize bugs in deep learning libraries. ICSE 2019: 1027-1038 - [i2]Thibaud Lutellier, Lawrence Pang, Hung Viet Pham, Moshi Wei, Lin Tan:
ENCORE: Ensemble Learning using Convolution Neural Machine Translation for Automatic Program Repair. CoRR abs/1906.08691 (2019) - 2018
- [j8]Tomasz Kuchta, Thibaud Lutellier, Edmund Wong, Lin Tan, Cristian Cadar:
On the correctness of electronic documents: studying, finding, and localizing inconsistency bugs in PDF readers and files. Empir. Softw. Eng. 23(6): 3187-3220 (2018) - [j7]Thibaud Lutellier, Devin Chollak, Joshua Garcia, Lin Tan, Derek Rayside, Nenad Medvidovic, Robert Kroeger:
Measuring the Impact of Code Dependencies on Software Architecture Recovery Techniques. IEEE Trans. Software Eng. 44(2): 159-181 (2018) - [j6]Jaechang Nam, Wei Fu, Sunghun Kim, Tim Menzies, Lin Tan:
Heterogeneous Defect Prediction. IEEE Trans. Software Eng. 44(9): 874-896 (2018) - [c34]Jaechang Nam, Song Wang, Yuan Xi, Lin Tan:
Designing bug detection rules for fewer false alarms. ICSE (Companion Volume) 2018: 315-316 - [c33]Jinqiu Yang, Erik Wittern, Annie T. T. Ying, Julian Dolby, Lin Tan:
Towards extracting web API specifications from documentation. MSR 2018: 454-464 - [i1]Jinqiu Yang, Erik Wittern, Annie T. T. Ying, Julian Dolby, Lin Tan:
Automatically Extracting Web API Specifications from HTML Documentation. CoRR abs/1801.08928 (2018) - 2017
- [c32]Song Wang, Jaechang Nam, Lin Tan:
QTEP: quality-aware test case prioritization. ESEC/SIGSOFT FSE 2017: 523-534 - [c31]Jinqiu Yang, Alexey Zhikhartsev, Yuefei Liu, Lin Tan:
Better test cases for better automated program repair. ESEC/SIGSOFT FSE 2017: 831-841 - [e1]Jesús M. González-Barahona, Abram Hindle, Lin Tan:
Proceedings of the 14th International Conference on Mining Software Repositories, MSR 2017, Buenos Aires, Argentina, May 20-28, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1544-7 [contents] - 2016
- [c30]Song Wang, Taiyue Liu, Lin Tan:
Automatically learning semantic features for defect prediction. ICSE 2016: 297-308 - [c29]Juan Zhai, Jianjun Huang, Shiqing Ma, Xiangyu Zhang, Lin Tan, Jianhua Zhao, Feng Qin:
Automatic model generation from documentation for Java API functions. ICSE 2016: 380-391 - [c28]Song Wang, Devin Chollak, Dana Movshovitz-Attias, Lin Tan:
Bugram: bug detection with n-gram language models. ASE 2016: 708-719 - [c27]Jianjun Huang, Xiangyu Zhang, Lin Tan:
Detecting sensitive data disclosure via bi-directional text correlation analysis. SIGSOFT FSE 2016: 169-180 - 2015
- [c26]Guy-Vincent Jourdan, Gregor von Bochmann, Ettore Merlo, James Miller, Vio Onut, Lin Tan:
Workshop on the application of security and testing to rich internet applications. CASCON 2015: 320-322 - [c25]Thibaud Lutellier, Devin Chollak, Joshua Garcia, Lin Tan, Derek Rayside, Nenad Medvidovic, Robert Kroeger:
Comparing Software Architecture Recovery Techniques Using Accurate Dependencies. ICSE (2) 2015: 69-78 - [c24]Ming Tan, Lin Tan, Sashank Dara, Caleb Mayeux:
Online Defect Prediction for Imbalanced Data. ICSE (2) 2015: 99-108 - [c23]Edmund Wong, Lei Zhang, Song Wang, Taiyue Liu, Lin Tan:
DASE: Document-Assisted Symbolic Execution for Improving Automated Software Testing. ICSE (1) 2015: 620-631 - [c22]Edmund Wong, Taiyue Liu, Lin Tan:
CloCom: Mining existing source code for automatic comment generation. SANER 2015: 380-389 - [p1]Lin Tan:
Code Comment Analysis for Improving Software Quality. The Art and Science of Analyzing Software Data 2015: 493-517 - 2014
- [j5]Jon Eyolfson, Lin Tan, Patrick Lam:
Correlations between bugginess and time-based commit characteristics. Empir. Softw. Eng. 19(4): 1009-1039 (2014) - [j4]Lin Tan, Chen Liu, Zhenmin Li, Xuanhui Wang, Yuanyuan Zhou, ChengXiang Zhai:
Bug characteristics in open source software. Empir. Softw. Eng. 19(6): 1665-1705 (2014) - [j3]Jinqiu Yang, Lin Tan:
SWordNet: Inferring semantically related words from software context. Empir. Softw. Eng. 19(6): 1856-1886 (2014) - [c21]Jianjun Huang, Xiangyu Zhang, Lin Tan, Peng Wang, Bin Liang:
AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction. ICSE 2014: 1036-1046 - [c20]Sandeep Chaudhary, Sebastian Fischmeister, Lin Tan:
em-SPADE: a compiler extension for checking rules extracted from processor specifications. LCTES 2014: 105-114 - [c19]Quinn Hanam, Lin Tan, Reid Holmes, Patrick Lam:
Finding patterns in static analysis alerts: improving actionable alert ranking. MSR 2014: 152-161 - 2013
- [c18]Pei Wang, Jinqiu Yang, Lin Tan, Robert Kroeger, J. David Morgenthaler:
Generating precise dependencies for large software. MTD@ICSE 2013: 47-50 - [c17]Chen Liu, Jinqiu Yang, Lin Tan, Munawar Hafiz:
R2Fix: Automatically Generating Bug Fixes from Bug Reports. ICST 2013: 282-291 - [c16]Tian Jiang, Lin Tan, Sunghun Kim:
Personalized defect prediction. ASE 2013: 279-289 - [c15]Edmund Wong, Jinqiu Yang, Lin Tan:
AutoComment: Mining question and answer sites for automatic comment generation. ASE 2013: 562-567 - [c14]Adrian Nistor, Tian Jiang, Lin Tan:
Discovering, reporting, and fixing performance bugs. MSR 2013: 237-246 - 2012
- [c13]Shin Hwei Tan, Darko Marinov, Lin Tan, Gary T. Leavens:
@tComment: Testing Javadoc Comments to Detect Comment-Code Inconsistencies. ICST 2012: 260-269 - [c12]Jinqiu Yang, Lin Tan:
Inferring semantically related words from software context. MSR 2012: 161-170 - 2011
- [c11]Lin Tan, Yuanyuan Zhou, Yoann Padioleau:
aComment: mining annotations from comments and code to detect interrupt related concurrency bugs. ICSE 2011: 11-20 - [c10]Jon Eyolfson, Lin Tan, Patrick Lam:
Do time of day and developer experience affect commit bugginess. MSR 2011: 153-162 - 2010
- [c9]Ding Yuan, Haohui Mai, Weiwei Xiong, Lin Tan, Yuanyuan Zhou, Shankar Pasupathy:
SherLog: error diagnosis by connecting clues from run-time logs. ASPLOS 2010: 143-154
2000 – 2009
- 2009
- [c8]Yoann Padioleau, Lin Tan, Yuanyuan Zhou:
Listening to programmers - Taxonomies and characteristics of comments in operating system code. ICSE 2009: 331-341 - 2008
- [c7]Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou:
AutoISES: Automatically Inferring Security Specification and Detecting Violations. USENIX Security Symposium 2008: 379-394 - 2007
- [c6]Lin Tan, Ellick Chan, Reza Farivar, Nevedita Mallick, Jeffrey C. Carlyle, Francis M. David, Roy H. Campbell:
iKernel: Isolating Buggy and Malicious Device Drivers Using Hardware Virtualization Support. DASC 2007: 134-144 - [c5]Lin Tan, Ding Yuan, Yuanyuan Zhou:
HotComments: How to Make Program Comments More Useful? HotOS 2007 - [c4]Lin Tan, Ding Yuan, Gopal Krishna, Yuanyuan Zhou:
/*icomment: bugs or bad comments?*/. SOSP 2007: 145-158 - 2006
- [j2]Lin Tan, Timothy Sherwood:
Architectures for Bit-Split String Scanning in Intrusion Detection. IEEE Micro 26(1): 110-117 (2006) - [j1]Lin Tan, Brett Brotherton, Timothy Sherwood:
Bit-split string-matching engines for intrusion detection and prevention. ACM Trans. Archit. Code Optim. 3(1): 3-34 (2006) - [c3]Zhenmin Li, Lin Tan, Xuanhui Wang, Shan Lu, Yuanyuan Zhou, Chengxiang Zhai:
Have things changed now?: an empirical study of bug characteristics in modern open source software. ASID 2006: 25-33 - 2005
- [c2]Lin Tan, Timothy Sherwood:
A High Throughput String Matching Architecture for Intrusion Detection and Prevention. ISCA 2005: 112-122 - [c1]Qingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, Kimberly Keeton, John Wilkes:
Hibernator: helping disk arrays sleep through the winter. SOSP 2005: 177-190
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint