default search action
Hong Jin Kang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Zhen Lu, Imran Afridi, Hong Jin Kang, Ivan Ruchkin, Xi Zheng:
Surveying neuro-symbolic approaches for reliable artificial intelligence of things. J. Reliab. Intell. Environ. 10(3): 257-279 (2024) - [j10]Tim Menzies, Bowen Xu, Hong Jin Kang, Jie M. Zhang, Jiri Gesi, Sagar Sen, Beatriz Cassoli, Nicolas Jourdan, Jieke Shi, Phu Hong Nguyen, Valentina Golendukhina:
SEA4DQ 2024 Workshop Summary. ACM SIGSOFT Softw. Eng. Notes 49(4): 29-30 (2024) - [j9]Zhou Yang, Bowen Xu, Jie M. Zhang, Hong Jin Kang, Jieke Shi, Junda He, David Lo:
Stealthy Backdoor Attack for Code Models. IEEE Trans. Software Eng. 50(4): 721-741 (2024) - [j8]Yunbo Lyu, Hong Jin Kang, Ratnadira Widyasari, Julia Lawall, David Lo:
Evaluating SZZ Implementations: An Empirical Study on the Linux Kernel. IEEE Trans. Software Eng. 50(9): 2219-2239 (2024) - [c21]Jieke Shi, Zhou Yang, Hong Jin Kang, Bowen Xu, Junda He, David Lo:
Greening Large Language Models of Code. ICSE (SEIS) 2024: 142-153 - [c20]Hong Jin Kang, Kevin Wang, Miryung Kim:
Scaling Code Pattern Inference with Interactive What-If Analysis. ICSE 2024: 234:1-234:12 - [c19]Hong Jin Kang, Fabrice Harel-Canada, Muhammad Ali Gulzar, Nanyun Peng, Miryung Kim:
Human-in-the-Loop Synthetic Text Data Inspection with Provenance Tracking. NAACL-HLT (Findings) 2024: 3118-3129 - [e1]Tim Menzies, Bowen Xu, Hong Jin Kang, Jie M. Zhang:
Proceedings of the 4th International Workshop on Software Engineering and AI for Data Quality in Cyber-Physical Systems/Internet of Things, SEA4DQ 2024, Porto de Galinhas, Brazil, 15 July 2024. ACM 2024 [contents] - [i23]Ratnadira Widyasari, Sheng Qin Sim, Camellia Lok, Haodi Qi, Jack Phan, Qijin Tay, Constance Tan, Fiona Wee, Jodie Ethelda Tan, Yuheng Yieh, Brian Goh, Ferdian Thung, Hong Jin Kang, Thong Hoang, David Lo, Eng Lieh Ouh:
BugsInPy: A Database of Existing Bugs in Python Programs to Enable Controlled Testing and Debugging Studies. CoRR abs/2401.15481 (2024) - [i22]Ben Limpanukorn, Jiyuan Wang, Hong Jin Kang, Eric Zitong Zhou, Miryung Kim:
Fuzzing MLIR by Synthesizing Custom Mutations. CoRR abs/2404.16947 (2024) - [i21]Hong Jin Kang, Fabrice Harel-Canada, Muhammad Ali Gulzar, Violet Peng, Miryung Kim:
Human-in-the-Loop Synthetic Text Data Inspection with Provenance Tracking. CoRR abs/2404.18881 (2024) - [i20]Tan Bui, Yan Naing Tun, Yiran Cheng, Ivana Clairine Irsan, Ting Zhang, Hong Jin Kang:
JavaVFC: Java Vulnerability Fixing Commits from Open-source Software. CoRR abs/2409.05576 (2024) - 2023
- [j7]Rahul Yedida, Hong Jin Kang, Huy Tu, Xueqi Yang, David Lo, Tim Menzies:
How to Find Actionable Static Analysis Warnings: A Case Study With FindBugs. IEEE Trans. Software Eng. 49(4): 2856-2872 (2023) - [j6]Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Ratnadira Widyasari, Chengran Yang, Zhipeng Zhao, Bowen Xu, Jiayuan Zhou, Xin Xia, Ahmed E. Hassan, Xuan-Bach Dinh Le, David Lo:
Multi-Granularity Detector for Vulnerability Fixes. IEEE Trans. Software Eng. 49(8): 4035-4057 (2023) - [c18]Yunbo Lyu, Thanh Le-Cong, Hong Jin Kang, Ratnadira Widyasari, Zhipeng Zhao, Xuan-Bach Dinh Le, Ming Li, David Lo:
CHRONOS: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports. ICSE 2023: 1033-1045 - [c17]Ratnadira Widyasari, Zhipeng Zhao, Thanh Le-Cong, Hong Jin Kang, David Lo:
Topic Recommendation for GitHub Repositories: How Far Can Extreme Multi-Label Learning Go? SANER 2023: 167-178 - [i19]Zhou Yang, Bowen Xu, Jie M. Zhang, Hong Jin Kang, Jieke Shi, Junda He, David Lo:
Stealthy Backdoor Attack for Code Models. CoRR abs/2301.02496 (2023) - [i18]Yunbo Lyu, Thanh Le-Cong, Hong Jin Kang, Ratnadira Widyasari, Zhipeng Zhao, Xuan-Bach Dinh Le, Ming Li, David Lo:
CHRONOS: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports. CoRR abs/2301.03944 (2023) - [i17]Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Ratnadira Widyasari, Chengran Yang, Zhipeng Zhao, Bowen Xu, Jiayuan Zhou, Xin Xia, Ahmed E. Hassan, Xuan-Bach Dinh Le, David Lo:
Multi-Granularity Detector for Vulnerability Fixes. CoRR abs/2305.13884 (2023) - [i16]Yunbo Lyu, Hong Jin Kang, Ratnadira Widyasari, Julia Lawall, David Lo:
Evaluating SZZ Implementations: An Empirical Study on the Linux Kernel. CoRR abs/2308.05060 (2023) - [i15]Jieke Shi, Zhou Yang, Hong Jin Kang, Bowen Xu, Junda He, David Lo:
Towards Smaller, Faster, and Greener Language Models of Code. CoRR abs/2309.04076 (2023) - 2022
- [j5]Stefanus A. Haryono, Ferdian Thung, David Lo, Lingxiao Jiang, Julia Lawall, Hong Jin Kang, Lucas Serrano, Gilles Muller:
AndroEvolve: automated Android API update with data flow analysis and variable denormalization. Empir. Softw. Eng. 27(3): 73 (2022) - [j4]Hong Jin Kang, David Lo:
Active Learning of Discriminative Subgraph Patterns for API Misuse Detection. IEEE Trans. Software Eng. 48(8): 2761-2783 (2022) - [j3]Muhammad Hilmi Asyrofi, Zhou Yang, Imam Nur Bani Yusuf, Hong Jin Kang, Ferdian Thung, David Lo:
BiasFinder: Metamorphic Test Generation to Uncover Bias for Sentiment Analysis Systems. IEEE Trans. Software Eng. 48(12): 5087-5101 (2022) - [c16]Hong Jin Kang, Khai Loong Aw, David Lo:
Detecting False Alarms from Automatic Static Analysis Tools: How Far are We? ICSE 2022: 698-709 - [c15]Hong Jin Kang, Truong Giang Nguyen, Xuan-Bach Dinh Le, Corina S. Pasareanu, David Lo:
Test mimicry to assess the exploitability of library vulnerabilities. ISSTA 2022: 276-288 - [c14]Stefanus A. Haryono, Hong Jin Kang, Abhishek Sharma, Asankhaya Sharma, Andrew E. Santosa, Ming Yi Ang, David Lo:
Automated identification of libraries from vulnerability data: can we do better? ICPC 2022: 178-189 - [c13]Jieke Shi, Zhou Yang, Bowen Xu, Hong Jin Kang, David Lo:
Compressing Pre-trained Models of Code into 3 MB. ASE 2022: 24:1-24:12 - [c12]Thanh Le-Cong, Hong Jin Kang, Truong Giang Nguyen, Stefanus Agus Haryono, David Lo, Xuan-Bach Dinh Le, Huynh Quyet Thang:
AutoPruner: transformer-based call graph pruning. ESEC/SIGSOFT FSE 2022: 520-532 - [c11]Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Xuan-Bach Dinh Le, David Lo:
VulCurator: a vulnerability-fixing commit detector. ESEC/SIGSOFT FSE 2022: 1726-1730 - [c10]Giang Nguyen-Truong, Hong Jin Kang, David Lo, Abhishek Sharma, Andrew E. Santosa, Asankhaya Sharma, Ming Yi Ang:
HERMES: Using Commit-Issue Linking to Detect Vulnerability-Fixing Commits. SANER 2022: 51-62 - [i14]Hong Jin Kang, Khai Loong Aw, David Lo:
Detecting False Alarms from Automatic Static Analysis Tools: How Far are We? CoRR abs/2202.05982 (2022) - [i13]Hong Jin Kang, David Lo:
Active Learning of Discriminative Subgraph Patterns for API Misuse Detection. CoRR abs/2204.09945 (2022) - [i12]Rahul Yedida, Hong Jin Kang, Huy Tu, Xueqi Yang, David Lo, Tim Menzies:
How to Find Actionable Static Analysis Warnings. CoRR abs/2205.10504 (2022) - [i11]Jieke Shi, Zhou Yang, Bowen Xu, Hong Jin Kang, David Lo:
Compressing Pre-trained Models of Code into 3 MB. CoRR abs/2208.07120 (2022) - [i10]Thanh Le-Cong, Hong Jin Kang, Truong Giang Nguyen, Stefanus Agus Haryono, David Lo, Xuan-Bach Dinh Le, Huynh Quyet Thang:
AutoPruner: Transformer-Based Call Graph Pruning. CoRR abs/2209.03230 (2022) - [i9]Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Xuan-Bach Dinh Le, David Lo:
VulCurator: A Vulnerability-Fixing Commit Detector. CoRR abs/2209.03260 (2022) - [i8]Hong Jin Kang, Pattarakrit Rattanukul, Stefanus Agus Haryono, Truong Giang Nguyen, Chaiyong Ragkhitwetsagul, Corina S. Pasareanu, David Lo:
SkipFuzz: Active Learning-based Input Selection for Fuzzing Deep Learning Libraries. CoRR abs/2212.04038 (2022) - 2021
- [j2]Hong Jin Kang, David Lo:
Adversarial Specification Mining. ACM Trans. Softw. Eng. Methodol. 30(2): 16:1-16:40 (2021) - [c9]Stefanus A. Haryono, Ferdian Thung, David Lo, Lingxiao Jiang, Julia Lawall, Hong Jin Kang, Lucas Serrano, Gilles Muller:
AndroEvolve: Automated Update for Android Deprecated-API Usages. ICSE (Companion Volume) 2021: 1-4 - [c8]Hong Jin Kang, Sheng Qin Sim, David Lo:
IoTBox: Sandbox Mining to Prevent Interaction Threats in IoT Systems. ICST 2021: 182-193 - [i7]Muhammad Hilmi Asyrofi, Imam Nur Bani Yusuf, Hong Jin Kang, Ferdian Thung, Zhou Yang, David Lo:
BiasFinder: Metamorphic Test Generation to Uncover Bias for Sentiment Analysis Systems. CoRR abs/2102.01859 (2021) - [i6]Hong Jin Kang, David Lo:
Adversarial Specification Mining. CoRR abs/2103.15350 (2021) - 2020
- [c7]Thong Hoang, Hong Jin Kang, David Lo, Julia Lawall:
CC2Vec: distributed representations of code changes. ICSE 2020: 518-529 - [c6]Stefanus A. Haryono, Ferdian Thung, Hong Jin Kang, Lucas Serrano, Gilles Muller, Julia Lawall, David Lo, Lingxiao Jiang:
Automatic Android Deprecated-API Usage Update by Learning from Single Updated Example. ICPC 2020: 401-405 - [c5]Ratnadira Widyasari, Sheng Qin Sim, Camellia Lok, Haodi Qi, Jack Phan, Qijin Tay, Constance Tan, Fiona Wee, Jodie Ethelda Tan, Yuheng Yieh, Brian Goh, Ferdian Thung, Hong Jin Kang, Thong Hoang, David Lo, Eng Lieh Ouh:
BugsInPy: a database of existing bugs in Python programs to enable controlled testing and debugging studies. ESEC/SIGSOFT FSE 2020: 1556-1560 - [i5]Thong Hoang, Hong Jin Kang, Julia Lawall, David Lo:
CC2Vec: Distributed Representations of Code Changes. CoRR abs/2003.05620 (2020) - [i4]Stefanus Agus Haryono, Ferdian Thung, Hong Jin Kang, Lucas Serrano, Gilles Muller, Julia Lawall, David Lo, Lingxiao Jiang:
Automatic Android Deprecated-API Usage Update by Learning from Single Updated Example. CoRR abs/2005.13220 (2020) - [i3]Stefanus A. Haryono, Ferdian Thung, David Lo, Lingxiao Jiang, Julia Lawall, Hong Jin Kang, Lucas Serrano, Gilles Muller:
AndroEvolve: Automated Android API Update with Data Flow Analysis and Variable Denormalization. CoRR abs/2011.05020 (2020) - [i2]Stefanus Agus Haryono, Ferdian Thung, David Lo, Lingxiao Jiang, Julia Lawall, Hong Jin Kang, Lucas Serrano, Gilles Muller:
AndroEvolve: Automated Update for Android Deprecated-API Usages. CoRR abs/2012.07259 (2020)
2010 – 2019
- 2019
- [j1]Hong Jin Kang, Ferdian Thung, Julia Lawall, Gilles Muller, Lingxiao Jiang, David Lo:
Semantic Patches for Java Program Transformation (Artifact). Dagstuhl Artifacts Ser. 5(2): 10:1-10:3 (2019) - [c4]Hong Jin Kang, Ferdian Thung, Julia Lawall, Gilles Muller, Lingxiao Jiang, David Lo:
Semantic Patches for Java Program Transformation (Experience Report). ECOOP 2019: 22:1-22:27 - [c3]Ferdian Thung, Hong Jin Kang, Lingxiao Jiang, David Lo:
Towards Generating Transformation Rules without Examples for Android API Replacement. ICSME 2019: 213-217 - [c2]Hong Jin Kang, Tegawendé F. Bissyandé, David Lo:
Assessing the Generalizability of Code2vec Token Embeddings. ASE 2019: 1-12 - 2016
- [c1]Hong Jin Kang, Tao Chen, Muthu Kumar Chandrasekaran, Min-Yen Kan:
A Comparison of Word Embeddings for English and Cross-Lingual Chinese Word Sense Disambiguation. NLP-TEA@COLING 2016: 30-39 - [i1]Hong Jin Kang, Tao Chen, Muthu Kumar Chandrasekaran, Min-Yen Kan:
A Comparison of Word Embeddings for English and Cross-Lingual Chinese Word Sense Disambiguation. CoRR abs/1611.02956 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint