Yeting Li

ORCID: 0000-0003-0991-4231
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Algorithms and Data Compression
  • Natural Language Processing Techniques
  • Machine Learning and Algorithms
  • Software Testing and Debugging Techniques
  • Advanced Malware Detection Techniques
  • Advanced Database Systems and Queries
  • Software Engineering Research
  • Semantic Web and Ontologies
  • Topic Modeling
  • Web Data Mining and Analysis
  • semigroups and automata theory
  • Data Mining Algorithms and Applications
  • Web Application Security Vulnerabilities
  • Concrete and Cement Materials Research
  • Concrete Corrosion and Durability
  • Network Security and Intrusion Detection
  • Stuttering Research and Treatment
  • Speech and dialogue systems
  • Formal Methods in Verification
  • Speech Recognition and Synthesis
  • Magnesium Oxide Properties and Applications
  • Inflammatory Biomarkers in Disease Prognosis
  • Innovative concrete reinforcement materials
  • Information and Cyber Security
  • Adversarial Robustness in Machine Learning

Institute of Information Engineering
2023-2024

University of Chinese Academy of Sciences
2016-2024

The New Press
2024

Nanyang Technological University
2024

Wenzhou Medical University
2024

Chinese Academy of Sciences
2018-2024

Dongyang People's Hospital
2024

Singapore Management University
2023

Institute of Software
2018-2022

Shenzhen University
2022

Machine translation has wide applications in daily life. In mission-critical such as translating official documents, incorrect can have unpleasant or sometimes catastrophic consequences. This motivates recent research on the testing methodologies for machine systems. Existing mostly rely metamorphic relations designed at textual level (e.g., Levenshtein distance) syntactic distance between grammar structures) to determine correctness of results. However, these do not consider whether...

10.1145/3490488 article EN ACM Transactions on Software Engineering and Methodology 2022-04-01

Deep learning (DL) applications are prevalent nowadays as they can help with multiple tasks. DL libraries essential for building applications. Furthermore, operators the important blocks of libraries, that compute multi-dimensional data (tensors). Therefore, bugs in have great impacts. Testing is a practical approach detecting operators. In order to test effectively, it cases pass input validity check and able reach core function logic Hence, extracting validation constraints required...

10.1145/3597926.3598088 preprint EN 2023-07-12

Fuzz drivers are essential for library API fuzzing.However, automatically generating fuzz is a complex task, as it demands the creation of high-quality, correct, and robust usage code.An LLM-based (Large Language Model) approach promising area research.Unlike traditional program analysis-based generators, this text-based more generalized capable harnessing variety information, resulting in code that friendly human readers.However, there still lack understanding regarding fundamental issues...

10.1145/3650212.3680355 article EN 2024-09-11

LLM-based (Large Language Model) fuzz driver generation is a promising research area. Unlike traditional program analysis-based method, this text-based approach more general and capable of harnessing variety API usage information, resulting in code that friendly for human readers. However, there still lack understanding regarding the fundamental issues on direction, such as its effectiveness potential challenges. To bridge gap, we conducted first in-depth study targeting important using LLMs...

10.48550/arxiv.2307.12469 preprint EN cc-by arXiv (Cornell University) 2023-01-01

Communication protocols form the bedrock of our interconnected world, yet vulnerabilities within their implementations pose significant security threats. Recent developments have seen a surge in fuzzing-based research dedicated to uncovering these protocol implementations. However, there still lacks systematic overview fuzzing for answering essential questions such as what unique challenges are, how existing works solve them, etc. To bridge this gap, we conducted comprehensive investigation...

10.48550/arxiv.2401.01568 preprint EN other-oa arXiv (Cornell University) 2024-01-01

In recent years, increasing attention has been focused on the impact of red blood cell indices (RCIs) disease prognosis. We aimed to investigate association mean corpuscular hemoglobin (MCH), concentration (MCHC), and volume (MCV) with mortality.

10.1371/journal.pone.0307609 article EN cc-by PLoS ONE 2024-08-02

Regular expressions (regexes) are widely used in different fields of computer science such as programming languages, string processing and databases. However, existing tools for synthesizing or repairing regexes were not designed to be resilient Regex Denial Service (ReDoS) attacks. Specifically, if a regex has super-linear (SL) worst-case complexity, an attacker could provide carefully-crafted inputs launch ReDoS Therefore, this paper, we propose programming-by-example framework,...

10.1145/3324884.3416556 article EN 2020-12-21

Since regular expressions (abbrev. regexes) are difficult to understand and compose, automatically generating regexes has been an important research problem. This paper introduces TransRegex, for constructing from both natural language descriptions examples. To the best of our knowledge, TransRegex is first treat NLP-and-example-based regex synthesis problem as NLP-based with repair. For this purpose, we present novel algorithms We evaluate ten relevant state-of-the-art tools on three...

10.1109/icse43902.2021.00111 article EN 2021-05-01

Regular expressions are a fundamental concept in computer science and widely used various applications. In this paper we focused on deterministic regular (DREs). Considering that researchers did not have large datasets as evidence before, first harvested corpus of real data from the Web then conducted practical study to investigate usage DREs. One feature our work is set sufficiently compared with previous work, which obtained using several collection strategies proposed. The results show...

10.1145/3216122.3216126 article EN 2018-01-01

Regular expression Denial-of-Service (ReDoS) is one kind of algorithmic complexity attack. For a vulnerable regex, attackers can craft certain strings to trigger the super-linear worst-case matching time, which causes denial-of-service regex engines. Various ReDoS detection approaches have been proposed recently. Among them, hybrid absorb advantages both static and dynamic shown their performance superiority. However, two key challenges still hinder effectiveness detection: 1) Existing...

10.1109/sp46215.2023.10179328 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2023-05-01

This paper examines the random variation of residual radius along length both naturally corroded and artificially rebars. The rebars are washed to remove rust, their area is measured by water volume method for every 20-mm long segment each rebar. Tests carried out determine stationarity or non-stationarity stochastic field used model specimens. Then, autocorrelation function, power spectrum marginal probability distribution function specimen estimated. It found that with mean corrosion...

10.1080/15732479.2022.2027471 article EN Structure and Infrastructure Engineering 2022-02-01

The popularity of automatic speech recognition (ASR) systems nowadays leads to an increasing need for improving their accessibility. Handling stuttering is important feature accessible ASR systems. To improve the accessibility stutterers, we expose and analyze failures on speech. datasets recorded from stutterers are not diverse enough most failures. Furthermore, these lack ground truth information about non-stuttered text, rendering them unsuitable as comprehensive test suites. Therefore, a...

10.1109/ase56229.2023.00107 article EN 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2023-09-11

Abstract Background The incidence and mortality rate of rectal cancer are still high, the metastasis main causes death. control distant is one concerns in treatment locally advanced cancer, but there few studies on predicting synchronous (SDM) cancer. Method data patients with adenocarcinoma confirmed by endoscopic biopsy or postoperative pathology from September 2015 to May 2020 hospital A (center 1) B 2) were analyzed retrospectively, including age, sex, carcinoembryonic antigen,...

10.1186/s12885-022-10022-7 article EN cc-by BMC Cancer 2022-08-25

The advantages offered by the presence of a schema are numerous. However, many XML documents in practice not accompanied (valid) schema, making inference an attractive research problem. fundamental task learning is inferring restricted subclasses regular expressions. Most previous work either lacks support for interleaving or only has limited interleaving. In this paper, we first propose new subclass Single Occurrence Regular Expressions with Interleaving (SOIRE), which unrestricted Then,...

10.1145/3331076.3331100 article EN 2019-01-01
Coming Soon ...