default search action
Na Meng 0001
Person information
- affiliation: Virginia Tech, Blacksburg, VA, USA
- affiliation (PhD 2014): University of Texas at Austin, USA
Other persons with the same name
- Na Meng 0002 — Northwest University, School of Information Science and Technology, Xi'an, China (and 1 more)
- Na Meng 0003 — Beijing University of Posts and Telecommunications, School of Information and Communication Engineering, Beijing, China
- Na Meng 0004 — Jinling Institute of Technology, Nanjing, China
- Na Meng 0005 — Open University of Shaanxi, China
- Na Meng 0006 — Beijing Jiaotong University, Key Lab of Traffic Data Analysis and Mining, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Bowen Shen, Na Meng:
ConflictBench: A benchmark to evaluate software merge tools. J. Syst. Softw. 214: 112084 (2024) - [j16]Ya Xiao, Wenjia Song, Salman Ahmed, Xinyang Ge, Bimal Viswanath, Na Meng, Danfeng (Daphne) Yao:
Measurement of Embedding Choices on Cryptographic API Completion Tasks. ACM Trans. Softw. Eng. Methodol. 33(3): 56:1-56:30 (2024) - [j15]Wen Li, Austin Marino, Haoran Yang, Na Meng, Li Li, Haipeng Cai:
How Are Multilingual Systems Constructed: Characterizing Language Use and Selection in Open-Source Multilingual Software. ACM Trans. Softw. Eng. Methodol. 33(3): 63:1-63:46 (2024) - [j14]Miles Frantz, Ya Xiao, Tanmoy Sarkar Pias, Na Meng, Danfeng Yao:
Methods and Benchmark for Detecting Cryptographic API Misuses in Python. IEEE Trans. Software Eng. 50(5): 1118-1129 (2024) - [c50]Hao Zhong, Na Meng:
Compiler-directed Migrating API Callsite of Client Code. ICSE 2024: 226:1-226:12 - [c49]Ying Zhang, Peng Li, Yu Ding, Lingxiang Wang, Dan Williams, Na Meng:
Broadly Enabling KLEE to Effortlessly Find Unrecoverable Errors in Rust. ICSE-SEIP 2024: 441-451 - [c48]Waad Aldndni, Francisco Servant, Na Meng:
Understanding the Impact of Branch Edit Features for the Automatic Prediction of Merge Conflict Resolutions. ICPC 2024: 149-160 - [c47]Juntong Chen, Yan Zhao, Na Meng:
How Do Developers Reuse StackOverflow Answers in Their GitHub Projects? ASE Workshops 2024: 146-155 - [i20]Sheik Murad Hassan Anik, Xinghua Gao, Hao Zhong, Xiaoyin Wang, Na Meng:
Automation Configuration in Smart Home Systems: Challenges and Opportunities. CoRR abs/2408.04755 (2024) - [i19]Sajib Acharjee Dip, Kazi Hasan Ibn Arif, Uddip Acharjee Shuvo, Ishtiaque Ahmed Khan, Na Meng:
Equitable Skin Disease Prediction Using Transfer Learning and Domain Adaptation. CoRR abs/2409.00873 (2024) - 2023
- [j13]Fengmin Zhu, Xingyu Xie, Dongyu Feng, Na Meng, Fei He:
On the methodology of three-way structured merge in version control systems: Top-down, bottom-up, or both. J. Syst. Archit. 145: 103011 (2023) - [j12]Waad Aldndni, Na Meng, Francisco Servant:
Automatic prediction of developers' resolutions for software merge conflicts. J. Syst. Softw. 206: 111836 (2023) - [j11]Bowen Shen, Muhammad Ali Gulzar, Fei He, Na Meng:
A Characterization Study of Merge Conflicts in Java Projects. ACM Trans. Softw. Eng. Methodol. 32(2): 40:1-40:28 (2023) - [j10]Foyzul Hassan, Na Meng, Xiaoyin Wang:
UniLoc: Unified Fault Localization of Continuous Integration Failures. ACM Trans. Softw. Eng. Methodol. 32(6): 136:1-136:31 (2023) - [j9]Ying Zhang, Md Mahir Asef Kabir, Ya Xiao, Danfeng Yao, Na Meng:
Automatic Detection of Java Cryptographic API Misuses: Are We There Yet? IEEE Trans. Software Eng. 49(1): 288-303 (2023) - [c46]Xiaoyin Wang, Tahmid Rafi, Na Meng:
VRGuide: Efficient Testing of Virtual Reality Scenes via Dynamic Cut Coverage. ASE 2023: 951-962 - [c45]Tung Dao, Na Meng, ThanhVu Nguyen:
Triggering Modes in Spectrum-Based Multi-location Fault Localization. ESEC/SIGSOFT FSE 2023: 1774-1785 - [i18]Wenjia Song, Sanjula Karanam, Ya Xiao, Jingyuan Qi, Nathan Dautenhahn, Na Meng, Danfeng Yao:
Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling. CoRR abs/2306.02270 (2023) - [i17]Juntong Chen, Kulendra Kumar Kaushal, Rutwik Kulkarni, Na Meng:
How Do Java Developers Reuse StackOverflow Answers in Their GitHub Projects? CoRR abs/2308.09573 (2023) - [i16]Ying Zhang, Wenjia Song, Zhengjie Ji, Danfeng Yao, Na Meng:
How well does LLM generate security tests? CoRR abs/2310.00710 (2023) - [i15]Md Mahir Asef Kabir, Sk Adnan Hassan, Xiaoyin Wang, Ying Wang, Hai Yu, Na Meng:
An empirical study of ChatGPT-3.5 on question answering and code maintenance. CoRR abs/2310.02104 (2023) - 2022
- [j8]Xiao He, Zhenjiang Hu, Na Meng:
A theoretic framework of bidirectional transformation between systems and models. Sci. China Inf. Sci. 65(10) (2022) - [j7]Danfeng Daphne Yao, Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Miles Frantz, Ke Tian, Na Meng, Cristina Cifuentes, Yang Zhao, Nicholas Allen, Nathan Keynes, Barton P. Miller, Elisa Heymann, Murat Kantarcioglu, Fahad Shaon:
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding. IEEE Secur. Priv. 20(6): 43-52 (2022) - [c44]Ya Xiao, Salman Ahmed, Xinyang Ge, Bimal Viswanath, Na Meng, Danfeng Daphne Yao:
Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion. ICSE-Companion 2022: 360-361 - [c43]Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Danfeng (Daphne) Yao, Na Meng:
Example-based vulnerability detection and repair in Java code. ICPC 2022: 190-201 - [c42]Sheikh Shadab Towqir, Bowen Shen, Muhammad Ali Gulzar, Na Meng:
Detecting Build Conflicts in Software Merge for Java Programs via Static Analysis. ASE 2022: 33:1-33:13 - [c41]Md Mahir Asef Kabir, Ying Wang, Danfeng Yao, Na Meng:
How Do Developers Follow Security-Relevant Best Practices When Using NPM Packages? SecDev 2022: 77-83 - [c40]Fengmin Zhu, Xingyu Xie, Dongyu Feng, Na Meng, Fei He:
Mastery: Shifted-Code-Aware Structured Merging. SETTA 2022: 70-87 - [c39]Yan Zhao, Enyi Tang, Haipeng Cai, Xi Guo, Xiaoyin Wang, Na Meng:
A Lightweight Approach of Human-Like Playtest for Android Apps. SANER 2022: 309-320 - [i14]Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Danfeng Yao, Na Meng:
Example-Based Vulnerability Detection and Repair in Java Code. CoRR abs/2203.09009 (2022) - [i13]Sheik Murad Hassan Anik, Xinghua Gao, Na Meng:
Machine learning approach in the development of building occupant personas. CoRR abs/2207.11239 (2022) - 2021
- [j6]Zijian Jiang, Hao Zhong, Na Meng:
Investigating and recommending co-changed entities for JavaScript programs. J. Syst. Softw. 180: 111027 (2021) - [j5]Shaikh Mostafa, Bridgette Findley, Na Meng, Xiaoyin Wang:
Sais: Self-Adaptive Identification of Security Bug Reports. IEEE Trans. Dependable Secur. Comput. 18(4): 1779-1792 (2021) - [c38]Ying Wang, Liang Qiao, Chang Xu, Yepang Liu, Shing-Chi Cheung, Na Meng, Hai Yu, Zhiliang Zhu:
HERO: On the Chaos When PATH Meets Modules. ICSE 2021: 99-111 - [c37]Wen Li, Na Meng, Li Li, Haipeng Cai:
Understanding Language Selection in Multi-language Software Projects on GitHub. ICSE (Companion Volume) 2021: 256-257 - [c36]Tung Dao, Max Wang, Na Meng:
Exploring the Triggering Modes of Spectrum-Based Fault Localization: An Industrial Case. ICST 2021: 406-416 - [c35]Na Meng, Zijian Jiang, Hao Zhong:
Classifying Code Commits with Convolutional Neural Networks. IJCNN 2021: 1-8 - [c34]Shu Lin, Na Meng, Dennis G. Kafura, Wenxin Li:
PDL: Scaffolding Problem Solving in Programming Courses. ITiCSE (1) 2021: 185-191 - [c33]Shu Lin, Na Meng, Wenxin Li:
Generating efficient solvers from constraint models. ESEC/SIGSOFT FSE 2021: 956-967 - [p3]Liuqing Li, He Feng, Na Meng, Barbara G. Ryder:
CCLearner: Clone Detection via Deep Learning. Code Clone Analysis 2021: 75-89 - [i12]Ying Zhang, Mahir Kabir, Ya Xiao, Danfeng Yao, Na Meng:
Data-Driven Vulnerability Detection and Repair in Java Code. CoRR abs/2102.06994 (2021) - [i11]Zijian Jiang, Hao Zhong, Na Meng:
Investigating and Recommending Co-Changed Entities for JavaScript Programs. CoRR abs/2102.07877 (2021) - [i10]Bowen Shen, Cihan Xiao, Na Meng, Fei He:
Automatic Detection and Resolution of Software Merge Conflicts: Are We There Yet? CoRR abs/2102.11307 (2021) - [i9]Ying Wang, Liang Qiao, Chang Xu, Yepang Liu, Shing-Chi Cheung, Na Meng, Hai Yu, Zhiliang Zhu:
Hero: On the Chaos When PATH Meets Modules. CoRR abs/2102.12105 (2021) - [i8]Yan Zhao, Weihao Zhang, Enyi Tang, Haipeng Cai, Xi Guo, Na Meng:
A Lightweight Approach of Human-Like Playtesting. CoRR abs/2102.13026 (2021) - [i7]Hao Zhong, Na Meng:
Migrating Client Code without Change Examples. CoRR abs/2105.02389 (2021) - [i6]Yunlong Lu, Na Meng, Wenxin Li:
FAPR: Fast and Accurate Program Repair for Introductory Programming Courses. CoRR abs/2107.06550 (2021) - [i5]Sheik Anik, Xinghua Gao, Na Meng, Philip Agee, Andrew McCoy:
A Cost-Effective, Scalable, and Portable IoT Data Infrastructure for Indoor Environment Sensing. CoRR abs/2110.14042 (2021) - 2020
- [j4]Zijian Jiang, Ye Wang, Hao Zhong, Na Meng:
Automatic method change suggestion to complement multi-entity edits. J. Syst. Softw. 159 (2020) - [c32]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao:
Deployment-quality and Accessible Solutions for Cryptography Code Development. CODASPY 2020: 174-176 - [c31]Hao Zhong, Na Meng, Zexuan Li, Li Jia:
An empirical study on API parameter rules. ICSE 2020: 899-911 - [c30]Pronnoy Goswami, Saksham Gupta, Zhiyuan Li, Na Meng, Danfeng Daphne Yao:
Investigating The Reproducibility of NPM Packages. ICSME 2020: 677-681 - [c29]Chengyuan Wen, Yaxuan Zhang, Xiao He, Na Meng:
Inferring and Applying Def-Use Like Configuration Couplings in Deployment Descriptors. ASE 2020: 672-683 - [c28]Mazharul Islam, Sazzadur Rahaman, Na Meng, Behnaz Hassanshahi, Padmanabhan Krishnan, Danfeng Daphne Yao:
Coding Practices and Recommendations of Spring Security for Enterprise Applications. SecDev 2020: 49-57 - [i4]Mazharul Islam, Sazzadur Rahaman, Na Meng, Behnaz Hassanshahi, Padmanabhan Krishnan, Danfeng Yao:
Coding Practices and Recommendations of Spring Security for Enterprise Applications. CoRR abs/2007.14319 (2020)
2010 – 2019
- 2019
- [j3]Haipeng Cai, Na Meng, Barbara G. Ryder, Danfeng Yao:
DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling. IEEE Trans. Inf. Forensics Secur. 14(6): 1455-1470 (2019) - [c27]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao:
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development. CCS 2019: 2545-2547 - [c26]Mengsu Chen, Felix Fischer, Na Meng, Xiaoyin Wang, Jens Grossklags:
How reliable is the crowdsourced knowledge of security implementation? ICSE 2019: 536-547 - [c25]Shu Lin, Na Meng, Wenxin Li:
Optimizing Constraint Solving via Dynamic Programming. IJCAI 2019: 1146-1154 - [c24]Shengzhe Xu, Ziqi Dong, Na Meng:
Meditor: inference and application of API migration edits. ICPC 2019: 335-346 - [c23]Mostafa Mohammed, Haipeng Cai, Na Meng:
An empirical comparison between monkey testing and human testing (WIP paper). LCTES 2019: 188-192 - [p2]Miryung Kim, Na Meng, Tianyi Zhang:
Software Evolution. Handbook of Software Engineering 2019: 223-284 - [i3]Mengsu Chen, Felix Fischer, Na Meng, Xiaoyin Wang, Jens Grossklags:
How Reliable is the Crowdsourced Knowledge of Security Implementation? CoRR abs/1901.01327 (2019) - 2018
- [j2]Hao Zhong, Na Meng:
Towards reusing hints from past fixes - An exploratory study on thousands of real samples. Empir. Softw. Eng. 23(5): 2521-2549 (2018) - [j1]Doaa Altarawy, Hossameldin Shahin, Ayat Mohammed, Na Meng:
Lascad : Language-agnostic software categorization and similar application detection. J. Syst. Softw. 142: 21-34 (2018) - [c22]Kijin An, Na Meng, Eli Tilevich:
Automatic inference of Java-to-swift translation rules for porting mobile applications. MOBILESoft@ICSE 2018: 180-190 - [c21]Na Meng, Stefan Nagy, Danfeng (Daphne) Yao, Wenjie Zhuang, Gustavo A. Arango-Argoty:
Secure coding practices in Java: challenges and vulnerabilities. ICSE 2018: 372-383 - [c20]Hao Zhong, Na Meng:
Towards reusing hints from past fixes: an exploratory study on thousands of real samples. ICSE 2018: 885 - [c19]Ruru Yue, Zhe Gao, Na Meng, Yingfei Xiong, Xiaoyin Wang, J. David Morgenthaler:
Automatic Clone Recommendation for Refactoring Based on the Present and the Past. ICSME 2018: 115-126 - [c18]Ye Wang, Na Meng, Hao Zhong:
An Empirical Study of Multi-entity Changes in Real Bug Fixes. ICSME 2018: 287-298 - [c17]Swapna Thorve, Chandani Sreshtha, Na Meng:
An Empirical Study of Flaky Tests in Android Apps. ICSME 2018: 534-538 - [c16]Ye Wang, Na Meng, Hao Zhong:
CMSuggester: Method Change Suggestion to Complement Multi-entity Edits. SATE 2018: 137-153 - [c15]Sazzadur Rahaman, Na Meng, Danfeng Yao:
Tutorial: Principles and Practices of Secure Crypto Coding in Java. SecDev 2018: 122-123 - [i2]Ruru Yue, Zhe Gao, Na Meng, Yingfei Xiong, Xiaoyin Wang, J. David Morgenthaler:
Automatic Clone Recommendation for Refactoring Based on the Present and the Past. CoRR abs/1807.11184 (2018) - 2017
- [c14]Hao Zhong, Na Meng:
An empirical study on using hints from past fixes: poster. ICSE (Companion Volume) 2017: 144-145 - [c13]Liuqing Li, He Feng, Wenjie Zhuang, Na Meng, Barbara G. Ryder:
CCLearner: A Deep Learning-Based Clone Detection Approach. ICSME 2017: 249-260 - [c12]Ruru Yue, Na Meng, Qianxiang Wang:
A Characterization Study of Repeated Bug Fixes. ICSME 2017: 422-432 - [c11]Tung Dao, Lingming Zhang, Na Meng:
How does execution information help with information-retrieval based bug localization? ICPC 2017: 241-250 - [i1]Na Meng, Stefan Nagy, Danfeng Daphne Yao, Wenjie Zhuang, Gustavo A. Arango-Argoty:
Secure Coding Practices in Java: Challenges and Vulnerabilities. CoRR abs/1709.09970 (2017) - 2015
- [c10]Na Meng, Lisa Hua, Miryung Kim, Kathryn S. McKinley:
Does Automated Refactoring Obviate Systematic Editing? ICSE (1) 2015: 392-402 - 2014
- [c9]John Jacobellis, Na Meng, Miryung Kim:
Cookbook: in situ code completion using edit recipes learned from examples. ICSE Companion 2014: 584-587 - [p1]Miryung Kim, Na Meng:
Recommending Program Transformations - Automating Repetitive Software Changes. Recommendation Systems in Software Engineering 2014: 421-453 - 2013
- [c8]Na Meng, Miryung Kim, Kathryn S. McKinley:
LASE: locating and applying systematic edits by learning from examples. ICSE 2013: 502-511 - [c7]John Jacobellis, Na Meng, Miryung Kim:
LASE: an example-based program transformation tool for locating and applying systematic edits. ICSE 2013: 1319-1322 - 2011
- [c6]Na Meng, Miryung Kim, Kathryn S. McKinley:
Systematic editing: generating program transformations from an example. PLDI 2011: 329-342 - [c5]Na Meng, Miryung Kim, Kathryn S. McKinley:
Sydit: creating and applying a program transformation from an example. SIGSOFT FSE 2011: 440-443
2000 – 2009
- 2008
- [c4]Na Meng, Qianxiang Wang, Qian Wu, Hong Mei:
An Approach to Merge Results of Multiple Static Analysis Tools (Short Paper). QSIC 2008: 169-174 - [c3]Qianxiang Wang, Na Meng, Zhiyi Zhou, Jinhui Li, Hong Mei:
Towards SOA-Based Code Defect Analysis. SOSE 2008: 269-274 - 2007
- [c2]Qianxiang Wang, Min Li, Na Meng, Yonggang Liu, Hong Mei:
A Pattern-Based Constraint Description Approach for Web Services. QSIC 2007: 60-69 - 2006
- [c1]Qianxiang Wang, Min Li, Na Meng:
A Visual Constraint Specifying Approach for Adaptive Software. COMPSAC (2) 2006: 252-257
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint