Follow
JIE LU
JIE LU
The Institute of Computing Technology of the Chinese Academy of Sciences
Verified email at ict.ac.cn - Homepage
Title
Cited by
Cited by
Year
Cloudraid: hunting concurrency bugs in the cloud via log-mining
J Lu, F Li, L Li, X Feng
Proceedings of the 2018 26th ACM joint meeting on European software …, 2018
302018
Gobench: A benchmark suite of real-world go concurrency bugs
T Yuan, G Li, J Lu, C Liu, L Li, J Xue
2021 IEEE/ACM International Symposium on Code Generation and Optimization …, 2021
272021
Crashtuner: Detecting crash-recovery bugs in cloud systems via meta-info analysis
J Lu, C Liu, L Li, X Feng, F Tan, J Yang, L You
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 114-130, 2019
272019
Detecting TensorFlow program bugs in real-world industrial environment
C Liu, J Lu, G Li, T Yuan, L Li, F Tan, J Yang, L You, J Xue
2021 36th IEEE/ACM International Conference on Automated Software …, 2021
172021
Scaling up the IFDS algorithm with efficient disk-assisted computing
H Li, H Meng, H Zheng, L Cao, J Lu, L Li, L Gao
2021 IEEE/ACM International Symposium on Code Generation and Optimization …, 2021
112021
CloudRaid: Detecting distributed concurrency bugs via log mining and enhancement
J Lu, F Li, C Liu, L Li, X Feng, J Xue
IEEE Transactions on Software Engineering 48 (2), 662-677, 2020
92020
Understanding node change bugs for distributed systems
J Lu, L Chen, L Li, X Feng
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
72019
Generic sensitivity: customizing context-sensitive pointer analysis for generics
H Li, J Lu, H Meng, L Cao, Y Huang, L Li, L Gao
Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022
42022
Detecting Missing-Permission-Check Vulnerabilities in Distributed Cloud Systems
J Lu, H Li, C Liu, L Li, K Cheng
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
22022
Generic Sensitivity: Generics-Guided Context Sensitivity for Pointer Analysis
H Li, T Tan, Y Li, J Lu, H Meng, L Cao, Y Huang, L Li, L Gao, P Di, L Lin, ...
IEEE Transactions on Software Engineering, 2024
2024
Boosting the Performance of Multi-Solver IFDS Algorithms with Flow-Sensitivity Optimizations
H Li, J Lu, H Meng, L Cao, L Li, L Gao
2024 IEEE/ACM International Symposium on Code Generation and Optimization …, 2024
2024
Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis
C Shi, H Li, Y Sui, J Lu, L Li, J Xue
2023 38th IEEE/ACM International Conference on Automated Software …, 2023
2023
Exposing Vulnerable Paths: Enhance Static Analysis with Lightweight Symbolic Execution
G Li, T Yuan, J Lu, L Li, X Zhang, X Song, K Zhang
2021 28th Asia-Pacific Software Engineering Conference (APSEC), 441-451, 2021
2021
AgamottoEye: Recovering Request Flow for Cloud Systems via Log Analysis
J Lu, F Li, L Li
Journal of Computer Science Research 1 (2), 30-34, 2019
2019
File Hijacking Vulnerability: The Elephant in the Room
C Yu, Y Xiao, J Lu, Y Li, Y Li, L Li, Y Dong, J Wang, J Shi, D Bo, W Huo
The system can't perform the operation now. Try again later.
Articles 1–15