default search action
Yi Li 0008
Person information
- affiliation: Nanyang Technological University, Singapore
- affiliation (former): University of Toronto, Department of Computer Science, Canada
- not to be confused with: Yi Li 0002
Other persons with the same name
- Yi Li — disambiguation page
- Yi Li 0001 (aka: Henry Yi Li) — University of Manchester, School of Materials, UK (and 1 more)
- Yi Li 0002 — Nanyang Technological University, Singapore (and 2 more)
- Yi Li 0003 — University of Iowa, Department of Mathematics, Iowa City, IA, USA
- Yi Li 0004 — Queen Mary University of London, Computer Vision Lab, UK
- Yi Li 0005 — Tsinghua University, Institute for Interdisciplinary Information Sciences, Beijing, China
- Yi Li 0006 — Beijing University of Posts and Telecommunications, Ministry of Education, Key Laboratory of Universal Wireless Communication, China
- Yi Li 0007 — Syracuse University, Department of Electrical Engineering and Computer Science, NY, USA
- Yi Li 0009 — Southwest Jiaotong University, Key Laboratory of Information Coding and Transmission, Chengdu, China
- Yi Li 0010 — Peking University, School of Mathematical Science, LMAM / Department of Informatics, Beijing, China
- Yi Li 0011 — Tianjin Polytechnic University, School of Electronics and Information Engineering, China
- Yi Li 0012 — University of Texas at Austin, Department of Computer Sciences, TX, USA
- Yi Li 0013 — Zhejiang University, Department of Computer Science, Hangzhou, China
- Yi Li 0014 — High School Affiliated to Renmin University of China, Beijing, China (and 1 more)
- Yi Li 0015 — Beijing Powerinfo Co., Ltd., China (and 1 more)
- Yi Li 0016 — National Measurement Institute Australia, Lindfield, NSW, Australia (and 1 more)
- Yi Li 0017 — Harbin Institute of Technology, Institute of Electromagnetic and Electronic Technology, China
- Yi Li 0018 — Chinese Academy of Sciences, Institute of Automation, National Laboratory of Pattern Recognition / Center for Research on Intelligent Perception and Computing, Beijing, China (and 1 more)
- Yi Li 0019 — University of Michigan, School of Public Health, Department of Biostatistics, MI, USA (and 1 more)
- Yi Li 0020 — Liaoning University of Technology, College of Science, Jinzhou, China (and 1 more)
- Yi Li 0021 — University of California, Irvine, USA
- Yi Li 0022 — University of Hong Kong, Pokfulam, Hong Kong
- Yi Li 0023 — University of South Florida, Florida Center for Cybersecurity, Tampa, FL, USA
- Yi Li 0024 — Chinese Academy of Sciences, Institute of Remote Sensing and Digital Earth, Beijing, China (and 1 more)
- Yi Li 0025 — Google Brain, Mountain View, CA, USA (and 3 more)
- Yi Li 0026 — University of Jinan, School of Electrical Engineering, China
- Yi Li 0027 — Xi'an University of Science and Technology, College of Humanities and Foreign Language Studies, China
- Yi Li 0028 — Wuhan University, School of Electrical Engineering, China
- Yi Li 0029 — GreyBird Ventures LLC, Concord, USA
- Yi Li 0030 — University of Texas at Tyler, Department of Computer Science, TX, USA (and 1 more)
- Yi Li 0031 — Qingdao University, College of Data Science Software Engineering, China
- Yi Li 0032 — Tsinghua University, Graduate School at Shenzhen, China (and 1 more)
- Yi Li 0033 — Huazhong University of Science and Technology, School of Artificial Intelligence and Automation, National Key Laboratory of Science and Technology on Multispectral Information Processing, Wuhan, China
- Yi Li 0034 — Northwestern Polytechnical University, School of Computer Science, Xi'an, China
- Yi Li 0035 — Xi'an Jiaotong University, Department of Management Sciences, China (and 1 more)
- Yi Li 0036 — Guangdong University of Technology, School of Automation, Guangzhou, China
- Yi Li 0037 — Hubei University of Technology, Hubei Key Laboratory for High-Efficiency Utilization of Solar Energy and Operation Control of Energy Storage System, Wuhan, China
- Yi Li 0038 — University of Washington, Seattle, WA, USA (and 2 more)
- Yi Li 0039 — Beihang University, School of Automation Science and Electrical Engineering, Beijing, China
- Yi Li 0040 — Sun Yat-sen University, Guangdong Provincial Key Laboratory of Biomedical Imaging, Zhuhai, China
- Yi Li 0041 — Xi'an Jiaotong University, School of Mathematics and Statistics, Xi'an, China
- Yi Li 0042 — Harbin Institute of Technology, Shenzhen Graduate School, School of Computer Science and Technology, Harbin, China
- Yi Li 0043 — Chinese Academy of Sciences, State Key Laboratory of Computer Architecture, CAS, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Jacob Krüger, Yi Li, Kirill Lossev, Chenguang Zhu, Marsha Chechik, Thorsten Berger, Julia Rubin:
A Meta-Study of Software-Change Intentions. ACM Comput. Surv. 56(12): 300:1-300:41 (2024) - [j8]Zhiyang Chen, Ye Liu, Sidi Mohamed Beillahi, Yi Li, Fan Long:
Demystifying Invariant Effectiveness for Securing Smart Contracts. Proc. ACM Softw. Eng. 1(FSE): 1772-1795 (2024) - [i20]Ye Liu, Chengxuan Zhang, Yi Li:
Automated Invariant Generation for Solidity Smart Contracts. CoRR abs/2401.00650 (2024) - [i19]Lezhi Ma, Shangqing Liu, Yi Li, Xiaofei Xie, Lei Bu:
SpecGen: Automated Generation of Formal Program Specifications via Large Language Models. CoRR abs/2401.08807 (2024) - [i18]Ye Liu, Yi Li, Cyrille Artho, Yixuan Liu:
Specification Mining for Smart Contracts with Trace Slicing and Predicate Abstraction. CoRR abs/2403.13279 (2024) - [i17]Zhiyang Chen, Ye Liu, Sidi Mohamed Beillahi, Yi Li, Fan Long:
Demystifying Invariant Effectiveness for Securing Smart Contracts. CoRR abs/2404.14580 (2024) - [i16]Ye Liu, Yue Xue, Daoyuan Wu, Yuqiang Sun, Yi Li, Miaolei Shi, Yang Liu:
PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation. CoRR abs/2405.02580 (2024) - [i15]Ye Liu, Shuo Li, Xiuheng Wu, Yi Li, Zhiyang Chen, David Lo:
Demystifying the Characteristics for Smart Contract Upgrades. CoRR abs/2406.05712 (2024) - [i14]Zhiyang Chen, Ye Liu, Sidi Mohamed Beillahi, Yi Li, Fan Long:
OpenTracer: A Dynamic Transaction Trace Analyzer for Smart Contract Invariant Generation and Beyond. CoRR abs/2407.10039 (2024) - 2023
- [j7]Chenguang Zhu, Mengshi Zhang, Xiuheng Wu, Xiufeng Xu, Yi Li:
Client-Specific Upgrade Compatibility Checking via Knowledge-Guided Discovery. ACM Trans. Softw. Eng. Methodol. 32(4): 98:1-98:31 (2023) - [j6]Yao Zhang, Xiaofei Xie, Yi Li, Yun Lin, Sen Chen, Yang Liu, Xiaohong Li:
Demystifying Performance Regressions in String Solvers. IEEE Trans. Software Eng. 49(3): 947-961 (2023) - [c45]Sahar Badihi, Khaled Ahmed, Yi Li, Julia Rubin:
Responsibility in Context: On Applicability of Slicing in Semantic Regression Analysis. ICSE 2023: 563-575 - [c44]Yao Zhang, Xiaofei Xie, Yi Li, Sen Chen, Cen Zhang, Xiaohong Li:
EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software. ASE 2023: 686-697 - [c43]Xiufeng Xu, Chenguang Zhu, Yi Li:
Compsuite: A Dataset of Java Library Upgrade Incompatibility Issues. ASE 2023: 2098-2101 - [c42]Jacob Krüger, Yi Li, Chenguang Zhu, Marsha Chechik, Thorsten Berger, Julia Rubin:
A Vision on Intentions in Software Engineering. ESEC/SIGSOFT FSE 2023: 2117-2121 - [p1]Yi Li, Julia Rubin, Marsha Chechik:
Semantic History Slicing. Handbook of Re-Engineering Software Intensive Systems into Software Product Lines 2023: 53-77 - [e2]Yi Li, Sofiène Tahar:
Formal Methods and Software Engineering - 24th International Conference on Formal Engineering Methods, ICFEM 2023, Brisbane, QLD, Australia, November 21-24, 2023, Proceedings. Lecture Notes in Computer Science 14308, Springer 2023, ISBN 978-981-99-7583-9 [contents] - [i13]Jian Wang, Shangqing Liu, Xiaofei Xie, Yi Li:
Evaluating AIGC Detectors on Code Content. CoRR abs/2304.05193 (2023) - [i12]Xiufeng Xu, Chenguang Zhu, Yi Li:
CompSuite: A Dataset of Java Library Upgrade Incompatibility Issues. CoRR abs/2305.08671 (2023) - [i11]Wei Ma, Chenguang Zhu, Ye Liu, Xiaofei Xie, Yi Li:
A Comprehensive Study of Governance Issues in Decentralized Finance Applications. CoRR abs/2311.01433 (2023) - [i10]Yao Zhang, Xiaofei Xie, Yi Li, Sen Chen, Cen Zhang, Xiaohong Li:
EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software. CoRR abs/2312.03335 (2023) - 2022
- [j5]Palina Tolmach, Yi Li, Shangwei Lin, Yang Liu, Zengxiang Li:
A Survey of Smart Contract Formal Specification and Verification. ACM Comput. Surv. 54(7): 148:1-148:38 (2022) - [j4]Haijun Wang, Ye Liu, Yi Li, Shangwei Lin, Cyrille Artho, Lei Ma, Yang Liu:
Oracle-Supported Dynamic Exploit Generation for Smart Contracts. IEEE Trans. Dependable Secur. Comput. 19(3): 1795-1809 (2022) - [c41]Zhiming Li, Xiaofei Xie, Haoliang Li, Zhengzi Xu, Yi Li, Yang Liu:
Cross-lingual transfer learning for statistical type inference. ISSTA 2022: 239-250 - [c40]Ye Liu, Yi Li, Shang-Wei Lin, Cyrille Artho:
Finding permission bugs in smart contracts with role mining. ISSTA 2022: 716-727 - [c39]Chenguang Zhu, Ye Liu, Xiuheng Wu, Yi Li:
Identifying Solidity Smart Contract API Documentation Errors. ASE 2022: 56:1-56:13 - [c38]Wei Tang, Zhengzi Xu, Chengwei Liu, Jiahui Wu, Shouguo Yang, Yi Li, Ping Luo, Yang Liu:
Towards Understanding Third-party Library Dependency in C/C++ Ecosystem. ASE 2022: 106:1-106:12 - [c37]Ye Liu, Yi Li:
InvCon: A Dynamic Invariant Detector for Ethereum Smart Contracts. ASE 2022: 160:1-160:4 - [c36]Palina Tolmach, Yi Li, Shang-Wei Lin:
Property-Based Automated Repair of DeFi Protocols. ASE 2022: 184:1-184:5 - [c35]Yushi Cao, Zhiming Li, Tianpei Yang, Hao Zhang, Yan Zheng, Yi Li, Jianye Hao, Yang Liu:
GALOIS: Boosting Deep Reinforcement Learning via Generalizable Logic Synthesis. NeurIPS 2022 - [c34]Xiuhan Shi, Xiaofei Xie, Yi Li, Yao Zhang, Sen Chen, Xiaohong Li:
Large-scale analysis of non-termination bugs in real-world OSS projects. ESEC/SIGSOFT FSE 2022: 256-268 - [c33]Shang-Wei Lin, Palina Tolmach, Ye Liu, Yi Li:
SolSEE: a source-level symbolic execution engine for solidity. ESEC/SIGSOFT FSE 2022: 1687-1691 - [i9]Zhiming Li, Yanzhou Li, Tianlin Li, Mengnan Du, Bozhi Wu, Yushi Cao, Xiaofei Xie, Yi Li, Yang Liu:
Unveiling Project-Specific Bias in Neural Code Models. CoRR abs/2201.07381 (2022) - [i8]Yushi Cao, Zhiming Li, Tianpei Yang, Hao Zhang, Yan Zheng, Yi Li, Jianye Hao, Yang Liu:
GALOIS: Boosting Deep Reinforcement Learning via Generalizable Logic Synthesis. CoRR abs/2205.13728 (2022) - [i7]Wei Tang, Zhengzi Xu, Chengwei Liu, Jiahui Wu, Shouguo Yang, Yi Li, Ping Luo, Yang Liu:
Towards Understanding Third-party Library Dependency in C/C++ Ecosystem. CoRR abs/2209.02575 (2022) - 2021
- [c32]Palina Tolmach, Yi Li, Shang-Wei Lin, Yang Liu:
Formal Analysis of Composable DeFi Protocols. Financial Cryptography Workshops 2021: 149-161 - [c31]Xiuheng Wu, Mengyang Li, Yi Li:
EvoMe: A Software Evolution Management Engine Based on Differential Factbase. ASE 2021: 1252-1256 - [c30]Sahar Badihi, Yi Li, Julia Rubin:
EqBench: A Dataset of Equivalent and Non-equivalent Program Pairs. MSR 2021: 610-614 - [c29]Xiuheng Wu, Chenguang Zhu, Yi Li:
DIFFBASE: a differential factbase for effective software evolution management. ESEC/SIGSOFT FSE 2021: 503-515 - [i6]Palina Tolmach, Yi Li, Shang-Wei Lin, Yang Liu:
Formal Analysis of Composable DeFi Protocols. CoRR abs/2103.00540 (2021) - [i5]Zhiming Li, Xiaofei Xie, Haoliang Li, Zhengzi Xu, Yi Li, Yang Liu:
Cross-Lingual Adaptation for Type Inference. CoRR abs/2107.00157 (2021) - 2020
- [c28]Xindong Zhang, Chenguang Zhu, Yi Li, Jianmei Guo, Lihua Liu, Haobo Gu:
Precfix: large-scale patch recommendation by mining defect-patch pairs. ICSE (SEIP) 2020: 41-50 - [c27]Xindong Zhang, Chenguang Zhu, Yi Li, Jianmei Guo, Lihua Liu, Haobo Gu:
Large-scale patch recommendation at Alibaba. ICSE (Companion Volume) 2020: 252-253 - [c26]Haijun Wang, Xiaofei Xie, Yi Li, Cheng Wen, Yuekang Li, Yang Liu, Shengchao Qin, Hongxu Chen, Yulei Sui:
Typestate-guided fuzzer for discovering use-after-free vulnerabilities. ICSE 2020: 999-1010 - [c25]Chenguang Zhu, Yi Li, Julia Rubin, Marsha Chechik:
GenSlice: Generalized Semantic History Slicing. ICSME 2020: 81-91 - [c24]Xiaoning Du, Yi Li, Xiaofei Xie, Lei Ma, Yang Liu, Jianjun Zhao:
Marble: Model-based Robustness Analysis of Stateful Deep Learning Systems. ASE 2020: 423-435 - [c23]Qianyu Guo, Xiaofei Xie, Yi Li, Xiaoyu Zhang, Yang Liu, Xiaohong Li, Chao Shen:
Audee: Automated Testing for Deep Learning Frameworks. ASE 2020: 486-498 - [c22]Sahar Badihi, Faridah Akinotcho, Yi Li, Julia Rubin:
ARDiff: scaling program equivalence checking via iterative abstraction and refinement of common code. ESEC/SIGSOFT FSE 2020: 13-24 - [c21]Ye Liu, Yi Li, Shang-Wei Lin, Rong Zhao:
Towards automated verification of smart contract fairness. ESEC/SIGSOFT FSE 2020: 666-677 - [c20]Ye Liu, Yi Li, Shang-Wei Lin, Qiang Yan:
ModCon: a model-based testing platform for smart contracts. ESEC/SIGSOFT FSE 2020: 1601-1605 - [e1]Yi Li, Alan Wee-Chung Liew:
25th International Conference on Engineering of Complex Computer Systems, ICECCS 2020, Singapore, October 28-31, 2020. IEEE 2020, ISBN 978-1-7281-8558-3 [contents] - [i4]Palina Tolmach, Yi Li, Shang-Wei Lin, Yang Liu, Zengxiang Li:
A Survey of Smart Contract Formal Specification and Verification. CoRR abs/2008.02712 (2020)
2010 – 2019
- 2019
- [j3]Yi Li, Chenguang Zhu, Milos Gligoric, Julia Rubin, Marsha Chechik:
Precise semantic history slicing through dynamic delta refinement. Autom. Softw. Eng. 26(4): 757-793 (2019) - [c19]Haijun Wang, Yi Li, Shang-Wei Lin, Lei Ma, Yang Liu:
Vultron: catching vulnerable smart contracts once and for all. ICSE (NIER) 2019: 1-4 - [c18]Xiaoning Du, Xiaofei Xie, Yi Li, Lei Ma, Yang Liu, Jianjun Zhao:
A Quantitative Analysis Framework for Recurrent Neural Network. ASE 2019: 1062-1065 - [c17]Xiaofei Xie, Hongxu Chen, Yi Li, Lei Ma, Yang Liu, Jianjun Zhao:
Coverage-Guided Fuzzing for Feedforward Neural Networks. ASE 2019: 1162-1165 - [c16]Xiaoning Du, Xiaofei Xie, Yi Li, Lei Ma, Yang Liu, Jianjun Zhao:
DeepStellar: model-based quantitative analysis of stateful deep learning systems. ESEC/SIGSOFT FSE 2019: 477-487 - [i3]Haijun Wang, Yi Li, Shang-Wei Lin, Cyrille Artho, Lei Ma, Yang Liu:
Oracle-Supported Dynamic Exploit Generation for Smart Contracts. CoRR abs/1909.06605 (2019) - [i2]Yinxing Xue, Jiaming Ye, Mingliang Ma, Lei Ma, Yi Li, Haijun Wang, Yun Lin, Tianyong Peng, Yang Liu:
Doublade: Unknown Vulnerability Detection in Smart Contracts Via Abstract Signature Matching and Refined Detection Rules. CoRR abs/1912.04466 (2019) - 2018
- [b1]Yi Li:
Managing Software Evolution Through Semantic History Slicing. University of Toronto, Canada, 2018 - [j2]Yi Li, Chenguang Zhu, Julia Rubin, Marsha Chechik:
Semantic Slicing of Software Version Histories. IEEE Trans. Software Eng. 44(2): 182-201 (2018) - [c15]Yi Li, Chenguang Zhu, Julia Rubin, Marsha Chechik:
CSlicerCloud: a web-based semantic history slicing framework. ICSE (Companion Volume) 2018: 57-60 - [c14]Federico Mora, Yi Li, Julia Rubin, Marsha Chechik:
Client-specific equivalence checking. ASE 2018: 441-451 - [i1]Xiaoning Du, Xiaofei Xie, Yi Li, Lei Ma, Jianjun Zhao, Yang Liu:
DeepCruiser: Automated Guided Testing for Stateful Deep Learning Systems. CoRR abs/1812.05339 (2018) - 2017
- [c13]Yi Li:
Managing software evolution through semantic history slicing. ASE 2017: 1014-1017 - [c12]Chenguang Zhu, Yi Li, Julia Rubin, Marsha Chechik:
A dataset for dynamic discovery of semantic changes in version controlled software histories. MSR 2017: 523-526 - [c11]Yi Li, Chenguang Zhu, Julia Rubin, Marsha Chechik:
FHistorian: Locating Features in Version Histories. SPLC (A) 2017: 49-58 - 2016
- [c10]Yi Li, Chenguang Zhu, Julia Rubin, Marsha Chechik:
Precise semantic history slicing through dynamic delta refinement. ASE 2016: 495-506 - [c9]Roy Luo, Richard Anthony Valenzano, Yi Li, J. Christopher Beck, Sheila A. McIlraith:
Using Metric Temporal Logic to Specify Scheduling Problems. KR 2016: 581-584 - 2015
- [c8]Ankush Das, Shuvendu K. Lahiri, Akash Lal, Yi Li:
Angelic Verification: Precise Verification Modulo Unknowns. CAV (1) 2015: 324-342 - [c7]Yi Li, Julia Rubin, Marsha Chechik:
Semantic Slicing of Software Version Histories (T). ASE 2015: 686-696 - 2014
- [j1]Yi Li, Jin Song Dong, Jing Sun, Yang Liu, Jun Sun:
Model checking approach to automated planning. Formal Methods Syst. Des. 44(2): 176-202 (2014) - [c6]Yi Li, Tian Huat Tan, Marsha Chechik:
Management of Time Requirements in Component-Based Systems. FM 2014: 399-415 - [c5]Yi Li, Aws Albarghouthi, Zachary Kincaid, Arie Gurfinkel, Marsha Chechik:
Symbolic optimization with SMT solvers. POPL 2014: 607-618 - 2013
- [c4]Aws Albarghouthi, Arie Gurfinkel, Yi Li, Sagar Chaki, Marsha Chechik:
UFO: Verification with Interpolants and Abstract Interpretation - (Competition Contribution). TACAS 2013: 637-640 - 2012
- [c3]Aws Albarghouthi, Yi Li, Arie Gurfinkel, Marsha Chechik:
Ufo: A Framework for Abstraction- and Interpolation-Based Software Verification. CAV 2012: 672-678 - [c2]Yi Li, Jing Sun, Jin Song Dong, Yang Liu, Jun Sun:
Translating PDDL into CSP# - The PAT Approach. ICECCS 2012: 240-249 - [c1]Yi Li, Jing Sun, Jin Song Dong, Yang Liu, Jun Sun:
Planning as Model Checking Tasks. SEW 2012: 177-186
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint