


default search action
Mingyang Li 0005
Person information
- affiliation: Chinese Academy of Sciences, Institute of Software, State Key Laboratory of Intelligent Game, Beijing, China
Other persons with the same name
- Mingyang Li — disambiguation page
- Mingyang Li 0001
— Alibaba Group, AI Lab, Hangzhou, China (and 2 more) - Mingyang Li 0002
— University of South Florida, Department of Industrial and Management Systems Engineering, Tampa, FL, USA (and 1 more) - Mingyang Li 0003 — Northwestern Polytechnical Univ, Xi'an, China
- Mingyang Li 0004
— Harbin Engineering University, Department of Automation, China - Mingyang Li 0006
— Jilin University, Department of Communication Engineering, Changchun, China - Mingyang Li 0007 — Stanford University, Bioengineering Department, Stanford, CA, USA (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j5]Qing Wang
, Junjie Wang
, Mingyang Li
, Yawen Wang
, Zhe Liu
:
A Roadmap for Software Testing in Open-Collaborative and AI-Powered Era. ACM Trans. Softw. Eng. Methodol. 34(5): 148:1-148:17 (2025)
[j4]Yuchao Huang
, Junjie Wang
, Zhe Liu
, Mingyang Li
, Song Wang
, Chunyang Chen
, Yuanzhe Hu
, Qing Wang
:
One Sentence Can Kill the Bug: Auto-Replay Mobile App Crashes From One-Sentence Overviews. IEEE Trans. Software Eng. 51(4): 975-989 (2025)
[c16]Ziyou Jiang, Mingyang Li, Guowei Yang, Junjie Wang, Yuekai Huang, Zhiyuan Chang, Qing Wang:
Mimicking the Familiar: Dynamic Command Generation for Information Theft Attacks in LLM Tool-Learning System. ACL (1) 2025: 13677-13693
[c15]Rupeng Zhang, Haowei Wang, Junjie Wang, Mingyang Li, Yuekai Huang, Dandan Wang, Qing Wang:
From Allies to Adversaries: Manipulating LLM Tool-Calling through Adversarial Injection. NAACL (Long Papers) 2025: 2009-2028
[i17]Ziyou Jiang, Mingyang Li, Guowei Yang, Junjie Wang, Yuekai Huang, Zhiyuan Chang, Qing Wang:
Mimicking the Familiar: Dynamic Command Generation for Information Theft Attacks in LLM Tool-Learning System. CoRR abs/2502.11358 (2025)
[i16]Zhiyuan Chang, Mingyang Li, Xiaojun Jia, Junjie Wang, Yuekai Huang, Ziyou Jiang, Yang Liu, Qing Wang:
One Shot Dominance: Knowledge Poisoning Attack on Retrieval-Augmented Generation Systems. CoRR abs/2505.11548 (2025)
[i15]Haowei Wang, Junjie Wang, Xiaojun Jia, Rupeng Zhang, Mingyang Li, Zhe Liu, Yang Liu, Qing Wang:
AdInject: Real-World Black-Box Attacks on Web Agents via Advertising Delivery. CoRR abs/2505.21499 (2025)
[i14]Haowei Wang, Rupeng Zhang, Junjie Wang, Mingyang Li, Yuekai Huang, Dandan Wang, Qing Wang:
Joint-GCG: Unified Gradient-Based Poisoning Attacks on Retrieval-Augmented Generation Systems. CoRR abs/2506.06151 (2025)
[i13]Ziyou Jiang, Mingyang Li, Guowei Yang, Lin Shi, Qing Wang:
VulRTex: A Reasoning-Guided Approach to Identify Vulnerabilities from Rich-Text Issue Report. CoRR abs/2509.03875 (2025)
[i12]Xuyan Ma, Xiaofei Xie, Yawen Wang, Junjie Wang, Boyu Wu, Mingyang Li, Qing Wang:
Diagnosing Failure Root Causes in Platform-Orchestrated Agentic Systems: Dataset, Taxonomy, and Benchmark. CoRR abs/2509.23735 (2025)- 2024
[c14]Zhiyuan Chang, Mingyang Li, Yi Liu, Junjie Wang, Qing Wang, Yang Liu:
Play Guessing Game with LLM: Indirect Jailbreak Attack with Implicit Clues. ACL (Findings) 2024: 5135-5147
[c13]Zhangchi Gao, Shoubin Li, Yangyang Liu
, Mingyang Li, Kai Huang, Yi Ren:
LD-DOC: Light-Weight Domain-Adaptive Document Layout Analysis. DAS 2024: 124-141
[c12]Zhiyuan Chang, Mingyang Li, Junjie Wang, Yi Liu, Qing Wang, Yang Liu:
Repairing Catastrophic-Neglect in Text-to-Image Diffusion Models via Attention-Guided Feature Enhancement. EMNLP (Findings) 2024: 11379-11390
[c11]Xuran Ming, Shoubin Li, Mingyang Li, Lvlong He, Qing Wang:
AutoLabel: Automated Textual Data Annotation Method Based on Active Learning and Large Language Model. KSEM (4) 2024: 400-411
[i11]Zhiyuan Chang, Mingyang Li, Yi Liu, Junjie Wang, Qing Wang, Yang Liu
:
Play Guessing Game with LLM: Indirect Jailbreak Attack with Implicit Clues. CoRR abs/2402.09091 (2024)
[i10]Zhiyuan Chang, Mingyang Li, Junjie Wang, Cheng Li, Boyu Wu, Fanjiang Xu, Qing Wang:
Adversarial Testing for Visual Grounding via Image-Aware Property Reduction. CoRR abs/2403.01118 (2024)
[i9]Zhiyuan Chang, Mingyang Li, Junjie Wang, Cheng Li, Qing Wang:
VEglue: Testing Visual Entailment Systems via Object-Aligned Joint Erasing. CoRR abs/2403.02581 (2024)
[i8]Qing Wang, Junjie Wang, Mingyang Li, Yawen Wang, Zhe Liu:
A Roadmap for Software Testing in Open Collaborative Development Environments. CoRR abs/2406.05438 (2024)
[i7]Zhiyuan Chang, Mingyang Li, Junjie Wang, Yi Liu, Qing Wang, Yang Liu
:
Repairing Catastrophic-Neglect in Text-to-Image Diffusion Models via Attention-Guided Feature Enhancement. CoRR abs/2406.16272 (2024)
[i6]Hao Qin, Mingyang Li, Junjie Wang, Qing Wang:
Adversarial Robustness of Open-source Text Classification Models and Fine-Tuning Chains. CoRR abs/2408.02963 (2024)
[i5]Fangwen Mu, Junjie Wang, Zhuohao Yu, Lin Shi, Song Wang, Mingyang Li, Qing Wang:
CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification. CoRR abs/2410.20136 (2024)
[i4]Haowei Wang, Rupeng Zhang, Junjie Wang, Mingyang Li, Yuekai Huang, Dandan Wang, Qing Wang:
From Allies to Adversaries: Manipulating LLM Tool-Calling through Adversarial Injection. CoRR abs/2412.10198 (2024)
[i3]Zhiyuan Chang, Mingyang Li, Xiaojun Jia, Junjie Wang, Yuekai Huang, Qing Wang, Yihao Huang, Yang Liu:
What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context. CoRR abs/2412.12632 (2024)- 2023
[c10]Zhiyuan Chang, Mingyang Li, Qing Wang, Shoubin Li, Junjie Wang:
Cross-Domain Requirements Linking via Adversarial-based Domain Adaptation. ICSE 2023: 1596-1608
[c9]Yuchao Huang, Junjie Wang, Zhe Liu, Song Wang, Chunyang Chen, Mingyang Li, Qing Wang:
Context-aware Bug Reproduction for Mobile Apps. ICSE 2023: 2336-2348- 2022
[j3]Mingyang Li, Lin Shi
, Yawen Wang
, Junjie Wang, Qing Wang, Jun Hu, Xinhua Peng, Weimin Liao, Guizhen Pi:
Automated data function extraction from textual requirements by leveraging semi-supervised CRF and language model. Inf. Softw. Technol. 143: 106770 (2022)
[j2]Yawen Wang
, Lin Shi
, Mingyang Li, Qing Wang, Yun Yang:
Detecting coreferent entities in natural language requirements. Requir. Eng. 27(3): 351-373 (2022)
[c8]Zhiyuan Chang, Mingyang Li, Junjie Wang, Qing Wang, Shoubin Li:
Putting them under microscope: a fine-grained approach for detecting redundant test cases in natural language. ESEC/SIGSOFT FSE 2022: 1161-1172
[i2]Zhiyuan Chang, Mingyang Li, Junjie Wang, Qing Wang, Shoubin Li:
Putting Them under Microscope: A Fine-Grained Approach for Detecting Redundant Test Cases in Natural Language. CoRR abs/2210.01661 (2022)- 2021
[c7]Dongsheng Jin, Zhi Wang, Mingyang Li, Xinjie Zhu:
Construction and application of knowledge graph of domestic operating system testing. CSSE 2021: 268-273- 2020
[c6]Lin Shi
, Mingzhe Xing, Mingyang Li, Yawen Wang
, Shoubin Li, Qing Wang:
Detection of hidden feature requests from massive chat messages via deep siamese network. ICSE 2020: 641-653
[c5]Mingyang Li, Ye Yang, Lin Shi
, Qing Wang, Jun Hu, Xinhua Peng, Weimin Liao, Guizhen Pi:
Automated Extraction of Requirement Entities by Leveraging LSTM-CRF and Transfer Learning. ICSME 2020: 208-219
[c4]Mingyang Li, Lin Shi
, Ye Yang, Qing Wang:
A Deep Multitask Learning Approach for Requirements Discovery and Annotation from Open Forum. ASE 2020: 336-348
[c3]Yawen Wang
, Lin Shi
, Mingyang Li, Qing Wang, Yun Yang:
A Deep Context-wise Method for Coreference Detection in Natural Language Requirements. RE 2020: 180-191
[c2]Lin Shi
, Mingyang Li, Mingzhe Xing, Yawen Wang
, Qing Wang, Xinhua Peng, Weimin Liao, Guizhen Pi, Haiqing Wang:
Learning to extract transaction function from requirements: an industrial case on financial software. ESEC/SIGSOFT FSE 2020: 1444-1454
2010 – 2019
- 2019
[j1]Junjie Wang
, Mingyang Li, Song Wang
, Tim Menzies
, Qing Wang:
Images don't lie: Duplicate crowdtesting reports detection with screenshot information. Inf. Softw. Technol. 110: 139-155 (2019)
[c1]Mingyang Li, Lin Shi
, Qing Wang:
Are All Duplicates Value-Neutral? An Empirical Analysis of Duplicate Issue Reports. QRS 2019: 272-279- 2018
[i1]Junjie Wang, Mingyang Li, Song Wang, Tim Menzies, Qing Wang:
Cutting Away the Confusion From Crowdtesting. CoRR abs/1805.02763 (2018)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-23 19:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







