Yulei Sui

Yulei Sui

University of Technology

H-index: 32

Asia-India

About Yulei Sui

Yulei Sui, With an exceptional h-index of 32 and a recent h-index of 27 (since 2020), a distinguished researcher at University of Technology, specializes in the field of Static Program Analysis, Secure Software Engineering, SE4AI, AI4SE.

His recent articles reflect a diverse array of research interests and contributions to the field:

NL2Formula: Generating Spreadsheet Formulas from Natural Language Queries

Iterative-Epoch Online Cycle Elimination for Context-Free Language Reachability

Does Your Neural Code Completion Model Use My Code? A Membership Inference Approach

Automated Data Visualization from Natural Language via Large Language Models: An Exploratory Study

Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems

An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles

The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors

Cross-project concurrency bug prediction using domain-adversarial neural network

Yulei Sui Information

University

Position

(UTS)

Citations(all)

3305

Citations(since 2020)

2727

Cited By

1059

hIndex(all)

32

hIndex(since 2020)

27

i10Index(all)

64

i10Index(since 2020)

57

Email

University Profile Page

University of Technology

Google Scholar

View Google Scholar Profile

Yulei Sui Skills & Research Interests

Static Program Analysis

Secure Software Engineering

SE4AI

AI4SE

Top articles of Yulei Sui

Title

Journal

Author(s)

Publication Date

NL2Formula: Generating Spreadsheet Formulas from Natural Language Queries

arXiv preprint arXiv:2402.14853

Wei Zhao

Zhitao Hou

Siyuan Wu

Yan Gao

Haoyu Dong

...

2024/2/20

Iterative-Epoch Online Cycle Elimination for Context-Free Language Reachability

Proceedings of the ACM on Programming Languages

Pei Xu

Yuxiang Lei

Yulei Sui

Jingling Xue

2024/4/29

Does Your Neural Code Completion Model Use My Code? A Membership Inference Approach

arXiv preprint arXiv:2404.14296

Yao Wan

Guanghua Wan

Shijie Zhang

Hongyu Zhang

Yulei Sui

...

2024/4/22

Automated Data Visualization from Natural Language via Large Language Models: An Exploratory Study

arXiv preprint arXiv:2404.17136

Yang Wu

Yao Wan

Hongyu Zhang

Yulei Sui

Wucai Wei

...

2024/4/26

Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems

arXiv preprint arXiv:2401.17618

Jinmeng Zhou

Jiayi Hu

Ziyue Pan

Jiaxun Zhu

Guoren Li

...

2024/1/31

An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles

Dinghua Wang

Shuqing Li

Guanping Xiao

Yepang Liu

Yulei Sui

...

2024/4/12

The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors

arXiv preprint arXiv:2401.02737

Baijun Cheng

Kailong Wang

Cuiyun Gao

Xiapu Luo

Yulei Sui

...

2024/1/5

Cross-project concurrency bug prediction using domain-adversarial neural network

Journal of Systems and Software

Fangyun Qin

Zheng Zheng

Yulei Sui

Siqian Gong

Zhiping Shi

...

2024/4/25

Precise Sparse Abstract Execution via Cross-Domain Interaction

Xiao Cheng

Jiawei Wang

Yulei Sui

2024/4/12

Dynamic Transitive Closure-Based Static Analysis through the Lens of Quantum Search

ACM Transactions on Software Engineering and Methodology

Jiawei Ren

Yulei Sui

Xiao Cheng

Yuan Feng

Jianjun Zhao

2024

CodeIP: A Grammar-Guided Multi-Bit Watermark for Large Language Models of Code

arXiv preprint arXiv:2404.15639

Batu Guan

Yao Wan

Zhangqian Bi

Zheng Wang

Hongyu Zhang

...

2024/4/24

Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback

arXiv preprint arXiv:2403.16792

Zhangqian Bi

Yao Wan

Zheng Wang

Hongyu Zhang

Batu Guan

...

2024/3/25

Adversarial Learning for Coordinate Regression through k-layer Penetrating Representation

IEEE Transactions on Dependable and Secure Computing

Mengxi Jiang

Yulei Sui

Yunqi Lei

Xiaofei Xie

Cuihua Li

...

2024/3/18

Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation

arXiv preprint arXiv:2404.15687

Zhaoyang Chu

Yao Wan

Qian Li

Yang Wu

Hongyu Zhang

...

2024/4/24

Uncovering Limitations in Text-to-Image Generation: A Contrastive Approach with Structured Semantic Alignment

Qianyu Feng

Yulei Sui

Hongyu Zhang

2023/12/1

Challenging machine learning-based clone detectors via semantic-preserving code transformations

IEEE Transactions on Software Engineering

Weiwei Zhang

Shengjian Guo

Hongyu Zhang

Yulei Sui

Yinxing Xue

...

2023/1/27

New challenges in reinforcement learning: a survey of security and privacy

Yunjiao Lei

Dayong Ye

Sheng Shen

Yulei Sui

Tianqing Zhu

...

2023/7

Compatibility Issues in Deep Learning Systems: Problems and Opportunities

Jun Wang

Guanping Xiao

Shuai Zhang

Huashan Lei

Yepang Liu

...

2023

A Smart Status Based Monitoring Algorithm for the Dynamic Analysis of Memory Safety

ACM Transactions on Software Engineering and Methodology

Zhe Chen

Rui Yan

Yingzi Ma

Yulei Sui

Jingling Xue

2023

Recursive state machine guided graph folding for context-free language reachability

Proceedings of the ACM on Programming Languages

Yuxiang Lei

Yulei Sui

Shin Hwei Tan

Qirun Zhang

2023/6/6

See List of Professors in Yulei Sui University(University of Technology)