


default search action
Yanjie Zhao 0001
Person information
- affiliation: Huazhong University of Science and Technology, Wuhan, China
- affiliation (PhD 2023): Monash University, Melbourne, VIC, Australia
Other persons with the same name
- Yanjie Zhao — disambiguation page
- Yanjie Zhao 0002
— Huazhong University of Science and Technology, Tongji Medical College, Wuhan, China
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j17]Chao Wang, Tianming Liu, Yanjie Zhao, Lin Zhang, Xiaoning Du, Li Li
, Haoyu Wang:
The arts and crafts of android adware across a decade. Autom. Softw. Eng. 33(1): 30 (2026)
[j16]Xinyi Hou, Jiahao Han, Yanjie Zhao, Shenao Wang, Haoyu Wang:
Mapping the Landscape of LLM Deployment in the Wild: Prevalence, Patterns, and Perils. Proc. ACM Meas. Anal. Comput. Syst. 10(1): 15:1-15:26 (2026)
[j15]Xinyu She
, Yue Liu
, Yanjie Zhao
, Yiling He
, Li Li
, Chakkrit Tantithamthavorn
, Zhan Qin
, Haoyu Wang
:
Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey. ACM Trans. Softw. Eng. Methodol. 35(3): 86:1-86:42 (2026)
[i49]Yayi Wang, Shenao Wang, Jian Zhao, Shaosen Shi, Ting Li, Yan Cheng, Lizhong Bian, Kan Yu, Yanjie Zhao, Haoyu Wang:
YASA: Scalable Multi-Language Taint Analysis on the Unified AST at Ant Group. CoRR abs/2601.17390 (2026)
[i48]Xinyi Hou, Shenao Wang, Yifan Zhang, Ziluo Xue, Yanjie Zhao, Cai Fu, Haoyu Wang:
SMCP: Secure Model Context Protocol. CoRR abs/2602.01129 (2026)
[i47]Zhaonan Wu, Yanjie Zhao, Zhenpeng Chen, Zheng Wang, Haoyu Wang:
Agent-Based Software Artifact Evaluation. CoRR abs/2602.02235 (2026)
[i46]Bin Liu, Yanjie Zhao, Zhenpeng Chen, Guoai Xu, Haoyu Wang:
A Dual-Loop Agent Framework for Automated Vulnerability Reproduction. CoRR abs/2602.05721 (2026)
[i45]Shenao Wang, Junjie He, Yanjie Zhao, Yayi Wang, Kan Yu, Haoyu Wang:
"Elementary, My Dear Watson." Detecting Malicious Skills via Neuro-Symbolic Reasoning across Heterogeneous Artifacts. CoRR abs/2603.27204 (2026)
[i44]Yue Liu, Ratnadira Widyasari, Yanjie Zhao, Ivana Clairine Irsan, David Lo:
Debt Behind the AI Boom: A Large-Scale Empirical Study of AI-Generated Code in the Wild. CoRR abs/2603.28592 (2026)- 2025
[j14]Ting Zhou
, Yanjie Zhao
, Xinyi Hou
, Xiaoyu Sun
, Kai Chen
, Haoyu Wang
:
DeclarUI: Bridging Design and Development with Automated Declarative UI Code Generation. Proc. ACM Softw. Eng. 2(FSE): 219-241 (2025)
[j13]Chenxu Wang
, Tianming Liu
, Yanjie Zhao
, Minghui Yang
, Haoyu Wang
:
LLMDroid: Enhancing Automated Mobile App GUI Testing Coverage with Large Language Model Guidance. Proc. ACM Softw. Eng. 2(FSE): 1001-1022 (2025)
[j12]Haodong Li
, Xiao Cheng
, Yanjie Zhao
, Guosheng Xu
, Guoai Xu
, Haoyu Wang
:
Understanding Model Weaknesses: A Path to Strengthening DNN-Based Android Malware Detection. Proc. ACM Softw. Eng. 2(ISSTA): 320-342 (2025)
[j11]Jiapeng Deng
, Tianming Liu
, Yanjie Zhao
, Chao Wang
, Lin Zhang
, Haoyu Wang
:
Walls Have Ears: Demystifying Notification Listener Usage in Android Apps. Proc. ACM Softw. Eng. 2(ISSTA): 434-456 (2025)
[j10]Yanjie Zhao
, Xinyi Hou
, Shenao Wang
, Haoyu Wang
:
LLM App Store Analysis: A Vision and Roadmap. ACM Trans. Softw. Eng. Methodol. 34(5): 125:1-125:25 (2025)
[j9]Daihang Chen
, Yonghui Liu
, Mingyi Zhou
, Yanjie Zhao
, Haoyu Wang
, Shuai Wang
, Xiao Chen
, Tegawendé F. Bissyandé
, Jacques Klein
, Li Li
:
LLM for Mobile: An Initial Roadmap. ACM Trans. Softw. Eng. Methodol. 34(5): 128:1-128:29 (2025)
[j8]Shenao Wang
, Yanjie Zhao
, Xinyi Hou
, Haoyu Wang
:
Large Language Model Supply Chain: A Research Agenda. ACM Trans. Softw. Eng. Methodol. 34(5): 147:1-147:46 (2025)
[c38]Sheng Cao
, Hao Zhou
, Songzhou Shi
, Yanjie Zhao
, Haoyu Wang
:
Parcel Mismatch Demystified: Addressing a Decade-Old Security Challenge in Android. CCS 2025: 2683-2698
[c37]Hanxiang Xu, Wei Ma, Ting Zhou, Yanjie Zhao, Kai Chen, Qiang Hu, Yang Liu, Haoyu Wang:
CKGFuzzer: LLM-Based Fuzz Driver Generation Enhanced By Code Knowledge Graph. ICSE Companion 2025: 243-254
[c36]Qiang Ke
, Xinyi Hou, Yanjie Zhao, Haoyu Wang:
ClauseBench: Enhancing Software License Analysis with Clause-Level Benchmarking. ICSE Companion 2025: 255-266
[c35]Hongzhou Rao, Yanjie Zhao, Wenjie Zhu, Ling Xiao, Meizhen Wang, Haoyu Wang:
CODEMORPH: Mitigating Data Leakage in Large Language Model Assessment. ICSE Companion 2025: 267-278
[c34]Zhaonan Wu, Yanjie Zhao, Chen Wei, Zirui Wan, Yue Liu, Haoyu Wang:
COmmitSHield: Tracking Vulnerability Introduction and Fix in Version Control Systems. ICSE Companion 2025: 279-290
[c33]Dongxun Su
, Yanjie Zhao
, Xinyi Hou
, Shenao Wang
, Haoyu Wang
:
GPT Store Mining and Analysis. Internetware 2025: 344-354
[c32]Ningyuan Li
, Yanjie Zhao
, Shenao Wang
, Zehao Wu
, Haoyu Wang
:
Exploring Typo Squatting Threats in the Hugging Face Ecosystem. Internetware 2025: 498-509
[c31]Wangchenlu Huang
, Shenao Wang
, Yanjie Zhao
, Tianxiang Wang
, Yuhao Gao
, Guosheng Xu
, Haoyu Wang
:
Seeing is (Not) Believing: The Mirage Card Attack Targeting Online Social Networks. Internetware 2025: 522-532
[c30]Zehao Wu, Yanjie Zhao, Haoyu Wang:
TensorGuard: Gradient-Based Model Fingerprinting for LLM Similarity Detection and Family Classification. ASE 2025: 445-456
[c29]Miao Zhang, Shenao Wang, Guilin Zheng, Yanjie Zhao, Haoyu Wang:
Demystifying Cookie Sharing Risks in WebView-based Mobile App-in-app Ecosystems. ASE 2025: 1693-1704
[c28]Ziluo Xue, Yanjie Zhao, Shenao Wang, Kai Chen, Haoyu Wang:
A Characterization Study of Bugs in LLM Agent Workflow Orchestration Frameworks. ASE 2025: 3369-3380
[c27]Yinglin Xie
, Xinyi Hou
, Yanjie Zhao
, Kai Chen
, Haoyu Wang
:
LLM App Squatting and Cloning. SIGSOFT FSE Companion 2025: 64-74
[c26]Tianming Liu
, Jiapeng Deng
, Yanjie Zhao
, Xiao Chen
, Xiaoning Du
, Li Li
, Haoyu Wang
:
Are iOS Apps Immune to Abusive Advertising Practices? SIGSOFT FSE Companion 2025: 491-502
[c25]Yanjie Zhao
, Haoyu Wang
:
AI Model Genome. SIGSOFT FSE Companion 2025: 1768-1773
[c24]Xinyi Hou, Yanjie Zhao, Haoyu Wang:
On the (In)Security of LLM App Stores. SP 2025: 317-335
[c23]Chao Wang, Yanjie Zhao, Jiapeng Deng, Haoyu Wang:
Born with a Silver Spoon: On the (In)Security of Native Granted App Privileges in Custom Android ROMs. SP 2025: 4267-4283
[c22]Ziwei Yan, Yanjie Zhao, Haoyu Wang:
VoiceWukong: Benchmarking Deepfake Voice Detection. USENIX Security Symposium 2025: 4561-4580
[i43]Zhaonan Wu, Yanjie Zhao, Chen Wei, Zirui Wan, Yue Liu, Haoyu Wang:
CommitShield: Tracking Vulnerability Introduction and Fix in Version Control Systems. CoRR abs/2501.03626 (2025)
[i42]Shenao Wang, Yanjie Zhao, Zhao Liu, Quanchen Zou, Haoyu Wang:
SoK: Understanding Vulnerabilities in the Large Language Model Supply Chain. CoRR abs/2502.12497 (2025)
[i41]Shenao Wang, Yanjie Zhao, Yinglin Xie, Zhao Liu, Xinyi Hou, Quanchen Zou, Haoyu Wang:
Towards Reliable Vector Database Management Systems: A Software Testing Roadmap for 2030. CoRR abs/2502.20812 (2025)
[i40]Xinyi Hou, Yanjie Zhao, Haoyu Wang:
The Next Frontier of LLM Applications: Open Ecosystems and Hardware Synergy. CoRR abs/2503.04596 (2025)
[i39]Xinyi Hou, Yanjie Zhao, Shenao Wang, Haoyu Wang:
Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions. CoRR abs/2503.23278 (2025)
[i38]Yanzhe Hu, Shenao Wang, Tianyuan Nie, Yanjie Zhao, Haoyu Wang:
Understanding Large Language Model Supply Chain: Structure, Domain, and Vulnerabilities. CoRR abs/2504.20763 (2025)
[i37]Xinyi Hou, Jiahao Han, Yanjie Zhao, Haoyu Wang:
Unveiling the Landscape of LLM Deployment in the Wild: An Empirical Study. CoRR abs/2505.02502 (2025)
[i36]Hanxiang Xu, Yanjie Zhao, Haoyu Wang:
Directed Greybox Fuzzing via Large Language Model. CoRR abs/2505.03425 (2025)
[i35]Liangxuan Wu, Chao Wang, Tianming Liu, Yanjie Zhao, Haoyu Wang:
From Assistants to Adversaries: Exploring the Security Risks of Mobile LLM Agents. CoRR abs/2505.12981 (2025)
[i34]Zehao Wu, Yanjie Zhao, Haoyu Wang:
Gradient-Based Model Fingerprinting for LLM Similarity Detection and Family Classification. CoRR abs/2506.01631 (2025)
[i33]Yinglin Xie, Xinyi Hou, Yanjie Zhao, Shenao Wang, Kai Chen, Haoyu Wang:
Toward Understanding Bugs in Vector Database Management Systems. CoRR abs/2506.02617 (2025)
[i32]Hongzhou Rao, Yanjie Zhao, Wenjie Zhu, Ling Xiao, Meizhen Wang, Haoyu Wang:
CodeMorph: Mitigating Data Leakage in Large Language Model Assessment. CoRR abs/2506.17627 (2025)
[i31]Hongzhou Rao, Yanjie Zhao, Xinyi Hou, Shenao Wang, Haoyu Wang:
Software Engineering for Large Language Models: Research Status, Challenges and the Road Ahead. CoRR abs/2506.23762 (2025)
[i30]Yan Wang, Xinyi Hou, Yanjie Zhao, Weiguo Lin, Haoyu Wang, Junjun Si:
LaQual: A Novel Framework for Automated Evaluation of LLM App Quality. CoRR abs/2508.18636 (2025)
[i29]Yue Liu, Yanjie Zhao, Yunbo Lyu, Ting Zhang
, Haoyu Wang, David Lo:
"Your AI, My Shell": Demystifying Prompt Injection Attacks on Agentic AI Coding Editors. CoRR abs/2509.22040 (2025)
[i28]Bin Liu, Yanjie Zhao, Guoai Xu, Haoyu Wang:
LLM Agents for Automated Web Vulnerability Reproduction: Are We There Yet? CoRR abs/2510.14700 (2025)
[i27]Miao Zhang, Shenao Wang, Guilin Zheng, Yanjie Zhao, Haoyu Wang:
Demystifying Cookie Sharing Risks in WebView-based Mobile App-in-app Ecosystems. CoRR abs/2510.24141 (2025)- 2024
[j7]Juncai Guo
, Jin Liu, Xiao Liu, Yao Wan, Yanjie Zhao, Li Li
, Kui Liu, Jacques Klein
, Tegawendé F. Bissyandé:
PyScribe-Learning to describe python code. Softw. Pract. Exp. 54(3): 501-527 (2024)
[j6]Pei Liu
, Yanjie Zhao
, Mattia Fazzini
, Haipeng Cai
, John Grundy
, Li Li
:
Automatically Detecting Incompatible Android APIs. ACM Trans. Softw. Eng. Methodol. 33(1): 15:1-15:33 (2024)
[j5]Xinyi Hou
, Yanjie Zhao
, Yue Liu
, Zhou Yang
, Kailong Wang
, Li Li
, Xiapu Luo
, David Lo
, John Grundy
, Haoyu Wang:
Large Language Models for Software Engineering: A Systematic Literature Review. ACM Trans. Softw. Eng. Methodol. 33(8): 220:1-220:79 (2024)
[c21]Kai Ma
, Zhuo Wang
, Yanjie Zhao
, Haoyu Wang
:
Decoding Web3: In-depth Analysis of the Third-Party Package Supply Chain. Internetware 2024
[c20]Chao Wang
, Tianming Liu
, Yanjie Zhao
, Lin Zhang
, Xiaoning Du
, Li Li
, Haoyu Wang
:
Towards Demystifying Android Adware: Dataset and Payload Location. ASE Workshops 2024: 167-175
[c19]Liangxuan Wu
, Yanjie Zhao
, Chao Wang
, Tianming Liu
, Haoyu Wang
:
A First Look at LLM-powered Smartphones. ASE Workshops 2024: 208-217
[c18]Xinyu She
, Yanjie Zhao
, Haoyu Wang:
WaDec: Decompiling WebAssembly Using Large Language Model. ASE 2024: 481-492
[c17]Xinyi Zheng
, Chen Wei
, Shenao Wang
, Yanjie Zhao
, Peiming Gao
, Yuanchao Zhang
, Kailong Wang
, Haoyu Wang
:
Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments. ASE 2024: 1990-2001
[c16]Jian Zhao
, Shenao Wang
, Yanjie Zhao
, Xinyi Hou, Kailong Wang
, Peiming Gao
, Yuanchao Zhang, Chen Wei
, Haoyu Wang:
Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs. ASE 2024: 2087-2098
[c15]Zikan Dong
, Yanjie Zhao
, Tianming Liu
, Chao Wang
, Guosheng Xu, Guoai Xu, Lin Zhang, Haoyu Wang:
Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android Apps. ASE 2024: 2099-2109
[c14]Xinyi Hou, Yanjie Zhao
, Shenao Wang
, Haoyu Wang:
GPTZoo: A Large-scale Dataset of GPTs for the Research Community. ASE 2024: 2329-2333
[c13]Liangxuan Wu
, Yanjie Zhao
, Xinyi Hou
, Tianming Liu
, Haoyu Wang
:
ChatGPT Chats Decoded: Uncovering Prompt Patterns for Superior Solutions in Software Development Lifecycle. MSR 2024: 142-146
[i26]Shenao Wang, Yanjie Zhao, Xinyi Hou, Haoyu Wang:
Large Language Model Supply Chain: A Research Agenda. CoRR abs/2404.12736 (2024)
[i25]Yanjie Zhao, Xinyi Hou, Shenao Wang, Haoyu Wang:
LLM App Store Analysis: A Vision and Roadmap. CoRR abs/2404.12737 (2024)
[i24]Hanxiang Xu, Shenao Wang
, Ningke Li, Kailong Wang
, Yanjie Zhao, Kai Chen, Ting Yu, Yang Liu
, Haoyu Wang:
Large Language Models for Cyber Security: A Systematic Literature Review. CoRR abs/2405.04760 (2024)
[i23]Dongxun Su, Yanjie Zhao, Xinyi Hou, Shenao Wang
, Haoyu Wang:
GPT Store Mining and Analysis. CoRR abs/2405.10210 (2024)
[i22]Wangchenlu Huang, Shenao Wang
, Yanjie Zhao, Guosheng Xu, Haoyu Wang:
Seeing is (Not) Believing: Practical Phishing Attacks Targeting Social Media Sharing Cards. CoRR abs/2405.10758 (2024)
[i21]Xinyi Hou, Yanjie Zhao, Shenao Wang, Haoyu Wang:
GPTZoo: A Large-scale Dataset of GPTs for the Research Community. CoRR abs/2405.15630 (2024)
[i20]Zikan Dong, Yanjie Zhao, Tianming Liu, Chao Wang, Guosheng Xu, Guoai Xu, Haoyu Wang:
Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android Apps. CoRR abs/2406.09807 (2024)
[i19]Xinyu She, Yanjie Zhao, Haoyu Wang:
WaDec: Decompile WebAssembly Using Large Language Model. CoRR abs/2406.11346 (2024)
[i18]Dianshu Liao, Shidong Pan, Siyuan Yang, Yitong Wang, Yanjie Zhao, Zhenchang Xing, Xiaoyu Sun:
Automatically Analyzing Performance Issues in Android Apps: How Far Are We? CoRR abs/2407.05090 (2024)
[i17]Daihang Chen, Yonghui Liu, Mingyi Zhou, Yanjie Zhao, Haoyu Wang, Shuai Wang, Xiao Chen, Tegawendé F. Bissyandé, Jacques Klein, Li Li
:
LLM for Mobile: An Initial Roadmap. CoRR abs/2407.06573 (2024)
[i16]Xinyi Hou, Yanjie Zhao, Haoyu Wang:
On the (In)Security of LLM App Stores. CoRR abs/2407.08422 (2024)
[i15]Xinyi Hou, Yanjie Zhao, Haoyu Wang:
Voices from the Frontier: A Comprehensive Analysis of the OpenAI Developer Forum. CoRR abs/2408.01687 (2024)
[i14]Ziwei Yan, Yanjie Zhao, Haoyu Wang:
VoiceWukong: Benchmarking Deepfake Voice Detection. CoRR abs/2409.06348 (2024)
[i13]Xinyi Zheng, Chen Wei, Shenao Wang, Yanjie Zhao, Peiming Gao, Yuanchao Zhang, Kailong Wang
, Haoyu Wang:
Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments. CoRR abs/2409.09356 (2024)
[i12]Jian Zhao, Shenao Wang, Yanjie Zhao, Xinyi Hou, Kailong Wang
, Peiming Gao, Yuanchao Zhang, Chen Wei, Haoyu Wang:
Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs. CoRR abs/2409.09368 (2024)
[i11]Ting Zhou, Yanjie Zhao, Xinyi Hou, Xiaoyu Sun, Kai Chen, Haoyu Wang:
Bridging Design and Development with Automated Declarative UI Code Generation. CoRR abs/2409.11667 (2024)
[i10]Shidong Pan, Litian Wang, Tianyi Zhang, Zhenchang Xing, Yanjie Zhao, Qinghua Lu, Xiaoyu Sun:
"I Don't Use AI for Everything": Exploring Utility, Attitude, and Responsibility of AI-empowered Tools in Software Development. CoRR abs/2409.13343 (2024)
[i9]Zhihao Lin, Wei Ma, Mingyi Zhou, Yanjie Zhao, Haoyu Wang, Yang Liu
, Jun Wang, Li Li
:
PathSeeker: Exploring LLM Security Vulnerabilities with a Reinforcement Learning-Based Jailbreak Approach. CoRR abs/2409.14177 (2024)
[i8]Yinglin Xie, Xinyi Hou, Yanjie Zhao, Kai Chen, Haoyu Wang:
LLM App Squatting and Cloning. CoRR abs/2411.07518 (2024)
[i7]Hanxiang Xu, Wei Ma, Ting Zhou, Yanjie Zhao, Kai Chen, Qiang Hu, Yang Liu, Haoyu Wang:
A Code Knowledge Graph-Enhanced System for LLM-Based Fuzz Driver Generation. CoRR abs/2411.11532 (2024)- 2023
[j4]Yanjie Zhao
, Li Li
, Haoyu Wang, Qiang He
, John C. Grundy
:
APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps. IEEE Trans. Software Eng. 49(1): 113-130 (2023)
[c12]Haonan Hu, Yue Liu, Yanjie Zhao, Yonghui Liu
, Xiaoyu Sun, Chakkrit Tantithamthavorn, Li Li
:
Detecting Temporal Inconsistency in Biased Datasets for Android Malware Detection. ASEW 2023: 17-23
[c11]Tianzhi Ma, Yanjie Zhao, Li Li
, Liang Liu:
CiD4HMOS: A Solution to HarmonyOS Compatibility Issues. ASE 2023: 2006-2017
[c10]Shenao Wang
, Yanjie Zhao
, Kailong Wang
, Haoyu Wang
:
On the Usage-scenario-based Data Minimization in Mini Programs. SaTS@CCS 2023: 29-32
[c9]Yanjie Zhao
, Yue Zhang
, Haoyu Wang
:
Potential Risks Arising from the Absence of Signature Verification in Miniapp Plugins. SaTS@CCS 2023: 59-64
[c8]Yanjie Zhao
, Tianming Liu
, Haoyu Wang
, Yepang Liu
, John C. Grundy
, Li Li
:
Are Mobile Advertisements in Compliance with App's Age Group? WWW 2023: 3132-3141
[i6]Xinyi Hou, Yanjie Zhao, Yue Liu, Zhou Yang, Kailong Wang
, Li Li
, Xiapu Luo, David Lo, John C. Grundy, Haoyu Wang:
Large Language Models for Software Engineering: A Systematic Literature Review. CoRR abs/2308.10620 (2023)
[i5]Xinyu She, Yue Liu, Yanjie Zhao, Yiling He, Li Li
, Chakkrit Tantithamthavorn, Zhan Qin
, Haoyu Wang:
Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey. CoRR abs/2310.17903 (2023)- 2022
[c7]Yanjie Zhao
, Li Li
, Xiaoyu Sun
, Pei Liu, John Grundy:
Code Implementation Recommendation for Android GUI Components. ICSE-Companion 2022: 31-35
[c6]Yanjie Zhao, Li Li
, Kui Liu
, John C. Grundy:
Towards Automatically Repairing Compatibility Issues in Published Android Apps. ICSE 2022: 2142-2153
[c5]Pei Liu, Yanjie Zhao
, Haipeng Cai
, Mattia Fazzini
, John C. Grundy, Li Li
:
Automatically detecting API-induced compatibility issues in Android apps: a comparative analysis (replicability study). ISSTA 2022: 617-628
[c4]Xiaoyu Sun
, Xiao Chen, Yanjie Zhao, Pei Liu, John Grundy, Li Li
:
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues. ASE 2022: 70:1-70:13
[c3]Pei Liu, Xiaoyu Sun
, Yanjie Zhao, Yonghui Liu
, John Grundy, Li Li
:
A First Look at CI/CD Adoptions in Open-Source Android Apps. ASE 2022: 201:1-201:6
[i4]Pei Liu, Yanjie Zhao, Haipeng Cai
, Mattia Fazzini, John C. Grundy, Li Li
:
Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study). CoRR abs/2205.15561 (2022)
[i3]Xiaoyu Sun, Xiao Chen, Yanjie Zhao, Pei Liu, John C. Grundy, Li Li
:
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues. CoRR abs/2208.13417 (2022)
[i2]Pei Liu, Xiaoyu Sun, Yanjie Zhao, Yonghui Liu, John C. Grundy, Li Li
:
A First Look at CI/CD Adoptions in Open-Source Android Apps. CoRR abs/2210.12581 (2022)- 2021
[j3]Pingfan Kong, Li Li
, Jun Gao, Timothée Riom, Yanjie Zhao, Tegawendé F. Bissyandé, Jacques Klein
:
ANCHOR: locating android framework-specific crashing faults. Autom. Softw. Eng. 28(2): 10 (2021)
[j2]Yanjie Zhao
, Li Li
, Xiaoyu Sun
, Pei Liu, John C. Grundy
:
Icon2Code: Recommending code implementations for Android GUI components. Inf. Softw. Technol. 138: 106619 (2021)
[j1]Yanjie Zhao
, Li Li
, Haoyu Wang, Haipeng Cai
, Tegawendé F. Bissyandé
, Jacques Klein
, John C. Grundy:
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection. ACM Trans. Softw. Eng. Methodol. 30(3): 40:1-40:38 (2021)- 2020
[c2]Pei Liu, Li Li
, Yanjie Zhao
, Xiaoyu Sun
, John Grundy
:
AndroZooOpen: Collecting Large-scale Open Source Android Apps for the Research Community. MSR 2020: 548-552
[i1]Pingfan Kong, Li Li, Jun Gao, Timothée Riom, Yanjie Zhao, Tegawendé F. Bissyandé, Jacques Klein:
Anchor: Locating Android Framework-specific Crashing Faults. CoRR abs/2008.01676 (2020)
2010 – 2019
- 2019
[c1]Yanjie Zhao, Haoyu Wang, Lei Ma, Yuxin Liu, Li Li
, John Grundy:
Knowledge Graphing Git Repositories: A Preliminary Study. SANER 2019: 599-603
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-23 00:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







