Repairing order-dependent flaky tests via test generation C Li, C Zhu, W Wang, A Shi Proceedings of the 44th International Conference on Software Engineering …, 2022 | 15 | 2022 |
NeuroBack: Improving CDCL SAT Solving using Graph Neural Networks W Wang, Y Hu, M Tiwari, S Khurshid, K McMillan, R Miikkulainen arXiv preprint arXiv:2110.14053, 2021 | 14 | 2021 |
A study of symmetry breaking predicates and model counting W Wang, M Usman, A Almaawi, K Wang, KS Meel, S Khurshid Tools and Algorithms for the Construction and Analysis of Systems: 26th …, 2020 | 14 | 2020 |
TestMC: testing model counters using differential and metamorphic testing M Usman, W Wang, S Khurshid Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020 | 12 | 2020 |
A bit-vector solver with word-level propagation W Wang, H Søndergaard, PJ Stuckey Integration of AI and OR Techniques in Constraint Programming: 13th …, 2016 | 12 | 2016 |
A study of learning data structure invariants using off-the-shelf tools M Usman, W Wang, K Wang, C Yelen, N Dini, S Khurshid Model Checking Software: 26th International Symposium, SPIN 2019, Beijing …, 2019 | 10 | 2019 |
Learning to optimize the alloy analyzer W Wang, K Wang, M Zhang, S Khurshid 2019 12th IEEE Conference on Software Testing, Validation and Verification …, 2019 | 9 | 2019 |
Incremental analysis of evolving alloy models W Wang, K Wang, M Gligoric, S Khurshid Tools and Algorithms for the Construction and Analysis of Systems: 25th …, 2019 | 8 | 2019 |
Cadiback: Extracting backbones with cadical A Biere, N Froleyks, W Wang 26th International Conference on Theory and Applications of Satisfiability …, 2023 | 6 | 2023 |
A study of the learnability of relational properties: model counting meets machine learning (mcml) M Usman, W Wang, M Vasic, K Wang, H Vikalo, S Khurshid Proceedings of the 41st ACM SIGPLAN Conference on Programming Language …, 2020 | 5 | 2020 |
Wombit: A portfolio bit-vector solver using word-level propagation W Wang, H Søndergaard, PJ Stuckey Journal of Automated Reasoning 63, 723-762, 2019 | 5 | 2019 |
ACHyb: A hybrid analysis approach to detect kernel access control vulnerabilities Y Hu, W Wang, C Hunger, R Wood, S Khurshid, M Tiwari Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021 | 3 | 2021 |
AlloyMC: Alloy meets model counting J Yang, W Wang, D Marinov, S Khurshid Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020 | 3 | 2020 |
A study of learning likely data structure properties using machine learning models M Usman, W Wang, K Wang, C Yelen, N Dini, S Khurshid International Journal on Software Tools for Technology Transfer 22, 601-615, 2020 | 3 | 2020 |
Fixing Privilege Escalations in Cloud Access Control with MaxSAT and Graph Neural Networks Y Hu, W Wang, S Khurshid, KL McMillan, M Tiwari 2023 38th IEEE/ACM International Conference on Automated Software …, 2023 | 1 | 2023 |
Greybox Penetration Testing on Cloud Access Control with IAM Modeling and Deep Reinforcement Learning Y Hu, W Wang, M Tiwari arXiv preprint arXiv:2304.14540, 2023 | 1 | 2023 |
SymMC: approximate model enumeration and counting using symmetry information for Alloy specifications W Wang, Y Hu, KL McMillan, S Khurshid Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022 | | 2022 |
Initial Results on Counting Test Orders for Order-Dependent Flaky Tests Using Alloy W Wang, P Yi, S Khurshid, D Marinov IFIP International Conference on Testing Software and Systems, 123-130, 2021 | | 2021 |