default search action
Wei Le
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j6]Xiaoyang Yao, Enmeng Liu, Xiaolei Sun, Wei Le, Jianping Li:
Integrating external representations and internal patterns into dynamic multiple-criteria decision making. Ann. Oper. Res. 341(1): 149-172 (2024) - 2023
- [j5]Taghreed Bagies, Wei Le, Jeremy Sheaffer, Ali Jannesari:
Reducing branch divergence to speed up parallel execution of unit testing on GPUs. J. Supercomput. 79(16): 18340-18374 (2023) - 2021
- [j4]Danilo Dominguez Perez, Wei Le:
Specifying Callback Control Flow of Mobile Apps Using Finite Automata. IEEE Trans. Software Eng. 47(2): 379-392 (2021) - 2019
- [j3]Xiaofei Xie, Bihuan Chen, Liang Zou, Yang Liu, Wei Le, Xiaohong Li:
Automatic Loop Summarization via Path Dependency Analysis. IEEE Trans. Software Eng. 45(6): 537-557 (2019) - 2013
- [j2]Wei Le, Mary Lou Soffa:
Marple: Detecting faults in path segments using automatically generated analyses. ACM Trans. Softw. Eng. Methodol. 22(3): 18:1-18:38 (2013) - 2005
- [j1]David Coppit, Jinlin Yang, Sarfraz Khurshid, Wei Le, Kevin J. Sullivan:
Software Assurance by Bounded Exhaustive Testing. IEEE Trans. Software Eng. 31(4): 328-339 (2005)
Conference and Workshop Papers
- 2024
- [c31]Benjamin Steenhoek, Hongyang Gao, Wei Le:
Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection. ICSE 2024: 16:1-16:13 - [c30]Yangruibo Ding, Benjamin Steenhoek, Kexin Pei, Gail E. Kaiser, Wei Le, Baishakhi Ray:
TRACED: Execution-aware Pre-training for Source Code. ICSE 2024: 36:1-36:12 - [c29]Md Mahbubur Rahman, Ira Ceka, Chengzhi Mao, Saikat Chakraborty, Baishakhi Ray, Wei Le:
Towards Causal Deep Learning for Vulnerability Detection. ICSE 2024: 153:1-153:11 - [c28]Zhenghan Fang, Lirida Naviner, Wen Wang, Wei Le, Hao Cai:
Towards Reliability MRAM for Energy-Efficient Spin-orbit Torque Switching. SBCCI 2024: 1-5 - 2023
- [c27]Eliska Kloberdanz, Wei Le:
Block-Level Stiffness Analysis of Residual Networks. ICANN (10) 2023: 61-73 - [c26]Eliska Kloberdanz, Wei Le:
S-SOLVER: Numerically Stable Adaptive Step Size Solver for Neural ODEs. ICANN (9) 2023: 388-400 - [c25]Wanqing Liu, Wei Le:
Enterprise Digital Transformation Risk Identification and Dynamic Assessment Model under Big Data Perspective. ICBAR 2023: 714-719 - [c24]Jiongchi Yu, Yuechen Wu, Xiaofei Xie, Wei Le, Lei Ma, Yingfeng Chen, Jingyu Hu, Fan Zhang:
GameRTS: A Regression Testing Framework for Video Games. ICSE 2023: 1393-1404 - [c23]Benjamin Steenhoek, Md Mahbubur Rahman, Richard Jiles, Wei Le:
An Empirical Study of Deep Learning Models for Vulnerability Detection. ICSE 2023: 2237-2248 - [c22]Wei Qian, Chenxu Zhao, Wei Le, Meiyi Ma, Mengdi Huai:
Towards Understanding and Enhancing Robustness of Deep Learning Models against Malicious Unlearning Attacks. KDD 2023: 1932-1942 - 2022
- [c21]Mohammad Wardat, Breno Dantas Cruz, Wei Le, Hridesh Rajan:
DeepDiagnosis: Automatically Diagnosing Faults and Recommending Actionable Fixes in Deep Learning Programs. ICSE 2022: 561-572 - [c20]Eliska Kloberdanz, Kyle G. Kloberdanz, Wei Le:
DeepStability: A Study of Unstable Numerical Methods and Their Solutions in Deep Learning. ICSE 2022: 586-597 - [c19]Ashwin Kallingal Joshy, Wei Le:
FuzzerAid: Grouping Fuzzed Crashes Based On Fault Signatures. ASE 2022: 44:1-44:12 - 2021
- [c18]Eliska Kloberdanz, Jin Tian, Wei Le:
An Improved (Adversarial) Reprogramming Technique for Neural Networks. ICANN (1) 2021: 3-15 - [c17]Xiaofei Xie, Wenbo Guo, Lei Ma, Wei Le, Jian Wang, Lingjun Zhou, Yang Liu, Xinyu Xing:
RNNRepair: Automatic RNN Repair via Model-based Analysis. ICML 2021: 11383-11392 - [c16]Mohammad Wardat, Wei Le, Hridesh Rajan:
DeepLocalize: Fault Localization for Deep Neural Networks. ICSE 2021: 251-262 - [c15]Ashwin Kallingal Joshy, Xueyuan Chen, Benjamin Steenhoek, Wei Le:
Validating static warnings via testing code fragments. ISSTA 2021: 540-552 - 2019
- [c14]Donghui He, Wei Le, Benhai Guo, Hongjuan Yin:
Research on the Influence of Airline Service Factors on Purchase Intention: Based on Emotional Perspective. ICMSS 2019: 258-262 - 2017
- [c13]Danilo Dominguez Perez, Wei Le:
Generating Predicate Callback Summaries for the Android Framework. MOBILESoft@ICSE 2017: 68-78 - [c12]Danilo Dominguez Perez, Wei Le:
Predicate callback summaries. ICSE (Companion Volume) 2017: 291-293 - 2016
- [c11]Bihuan Chen, Yang Liu, Wei Le:
Generating performance distributions via probabilistic symbolic execution. ICSE 2016: 49-60 - [c10]Xiaofei Xie, Bihuan Chen, Yang Liu, Wei Le, Xiaohong Li:
Proteus: computing disjunctive loop summary via path dependency analysis. SIGSOFT FSE 2016: 61-72 - 2015
- [c9]Xiaofei Xie, Yang Liu, Wei Le, Xiaohong Li, Hongxu Chen:
S-looper: automatic summarization for multipath string loops. ISSTA 2015: 188-198 - 2014
- [c8]Wei Le, Shannon D. Pattison:
Patch verification via multiversion interprocedural control flow graphs. ICSE 2014: 1047-1058 - [c7]Daniel E. Krutz, Wei Le:
A code clone oracle. MSR 2014: 388-391 - 2013
- [c6]Wei Le:
Segmented symbolic analysis. ICSE 2013: 212-221 - 2011
- [c5]Wei Le, Jing Yang, Mary Lou Soffa, Kamin Whitehouse:
Lazy preemption to enable path-based analysis of interrupt-driven code. SESENA@ICSE 2011: 43-48 - [c4]Wei Le, Mary Lou Soffa:
Generating analyses for detecting faults in path segments. ISSTA 2011: 320-330 - 2010
- [c3]Wei Le, Mary Lou Soffa:
Path-based fault correlations. SIGSOFT FSE 2010: 307-316 - 2008
- [c2]Wei Le, Mary Lou Soffa:
Marple: a demand-driven path-sensitive buffer overflow detector. SIGSOFT FSE 2008: 272-282 - 2007
- [c1]Wei Le, Mary Lou Soffa:
Refining buffer overflow detection via demand-driven path-sensitive analysis. PASTE 2007: 63-68
Informal and Other Publications
- 2024
- [i20]Benjamin Steenhoek, Md Mahbubur Rahman, Monoshi Kumar Roy, Mirza Sanjida Alam, Earl T. Barr, Wei Le:
A Comprehensive Study of the Capabilities of Large Language Models for Vulnerability Detection. CoRR abs/2403.17218 (2024) - 2023
- [i19]Xiuyuan Guo, Ashwin Kallingal Joshy, Benjamin Steenhoek, Wei Le, Lori Flynn:
A Study of Static Warning Cascading Tools (Experience Paper). CoRR abs/2305.02515 (2023) - [i18]Adithya Kulkarni, Mohna Chakraborty, Yonas Sium, Sai Charishma Valluri, Wei Le, Qi Li:
Beryllium: Neural Search for Algorithm Implementations. CoRR abs/2305.15690 (2023) - [i17]Yangruibo Ding, Benjamin Steenhoek, Kexin Pei, Gail E. Kaiser, Wei Le, Baishakhi Ray:
TRACED: Execution-aware Pre-training for Source Code. CoRR abs/2306.07487 (2023) - [i16]Mohammad Wardat, Breno Dantas Cruz, Wei Le, Hridesh Rajan:
An Effective Data-Driven Approach for Localizing Deep Learning Faults. CoRR abs/2307.08947 (2023) - [i15]Ashwin Kallingal Joshy, Benjamin Steenhoek, Xiuyuan Guo, Wei Le:
Reproducing Failures in Fault Signatures. CoRR abs/2309.11004 (2023) - [i14]Eliska Kloberdanz, Wei Le:
MixQuant: Mixed Precision Quantization with a Bit-width Optimization Search. CoRR abs/2309.17341 (2023) - [i13]Md Mahbubur Rahman, Ira Ceka, Chengzhi Mao, Saikat Chakraborty, Baishakhi Ray, Wei Le:
Towards Causal Deep Learning for Vulnerability Detection. CoRR abs/2310.07958 (2023) - [i12]Benjamin Steenhoek, Md Mahbubur Rahman, Shaila Sharmin, Wei Le:
Do Language Models Learn Semantics of Code? A Case Study in Vulnerability Detection. CoRR abs/2311.04109 (2023) - [i11]Ashwin Kallingal Joshy, Mirza Sanjida Alam, Shaila Sharmin, Qi Li, Wei Le:
ActiveClean: Generating Line-Level Vulnerability Data via Active Learning. CoRR abs/2312.01588 (2023) - 2022
- [i10]Eliska Kloberdanz, Kyle G. Kloberdanz, Wei Le:
DeepStability: A Study of Unstable Numerical Methods and Their Solutions in Deep Learning. CoRR abs/2202.03493 (2022) - [i9]Ashwin Kallingal Joshy, Wei Le:
FuzzerAid: Grouping Fuzzed Crashes Based On Fault Signatures. CoRR abs/2209.01244 (2022) - [i8]Benjamin Steenhoek, Wei Le, Hongyang Gao:
DeepDFA: Dataflow Analysis-Guided Efficient Graph Learning for Vulnerability Detection. CoRR abs/2212.08108 (2022) - [i7]Benjamin Steenhoek, Md Mahbubur Rahman, Richard Jiles, Wei Le:
An Empirical Study of Deep Learning Models for Vulnerability Detection. CoRR abs/2212.08109 (2022) - 2021
- [i6]Mohammad Wardat, Wei Le, Hridesh Rajan:
DeepLocalize: Fault Localization for Deep Neural Networks. CoRR abs/2103.03376 (2021) - [i5]Ashwin Kallingal Joshy, Xueyuan Chen, Benjamin Steenhoek, Wei Le:
Validating Static Warnings via Testing Code Fragments. CoRR abs/2106.04735 (2021) - [i4]Mohammad Wardat, Breno Dantas Cruz, Wei Le, Hridesh Rajan:
DeepDiagnosis: Automatically Diagnosing Faults and Recommending Actionable Fixes in Deep Learning Programs. CoRR abs/2112.04036 (2021) - 2019
- [i3]Ashwin Kallingal Joshy, Wei Le:
Invariant Diffs. CoRR abs/1911.07988 (2019) - [i2]Danilo Dominguez Perez, Wei Le:
Testing Criteria for Mobile Apps Based on Callback Sequences. CoRR abs/1911.09201 (2019) - 2017
- [i1]Danilo Dominguez Perez, Wei Le:
Generating Predicate Callback Summaries for the Android Framework. CoRR abs/1703.08902 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint