default search action
Zhouyang Jia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j7]Haoran Liu, Zhouyang Jia, Shanshan Li, Yan Lei, Yue Yu, Yu Jiang, Xiaoguang Mao, Xiangke Liao:
Cut to the Chase: An Error-Oriented Approach to Detect Error-Handling Bugs. Proc. ACM Softw. Eng. 1(FSE): 1796-1818 (2024) - 2023
- [j6]Haochen He, Erci Xu, Shanshan Li, Zhouyang Jia, Si Zheng, Yue Yu, Jun Ma, Xiangke Liao:
When Database Meets New Storage Devices: Understanding and Exposing Performance Mismatches via Configurations. Proc. VLDB Endow. 16(7): 1712-1725 (2023) - 2020
- [j5]Shanshan Li, Xu Niu, Zhouyang Jia, Xiangke Liao, Ji Wang, Tao Li:
Guiding log revisions by learning from software evolution history. Empir. Softw. Eng. 25(3): 2302-2340 (2020) - 2019
- [j4]Shanshan Li, Zhouyang Jia, Yunfeng Li, Xiangke Liao, Erci Xu, Xiaodong Liu, Haochen He, Long Gao:
Detecting Performance Bottlenecks Guided by Resource Usage. IEEE Access 7: 117839-117849 (2019) - 2018
- [j3]Xiangke Liao, Shulin Zhou, Shanshan Li, Zhouyang Jia, Xiaodong Liu, Haochen He:
Do You Really Know How to Configure Your Software? Configuration Constraints in Source Code May Help. IEEE Trans. Reliab. 67(3): 832-846 (2018) - [j2]Shanshan Li, Wang Li, Xiangke Liao, Shaoliang Peng, Shulin Zhou, Zhouyang Jia, Teng Wang:
ConfVD: System Reactions Analysis and Evaluation Through Misconfiguration Injection. IEEE Trans. Reliab. 67(4): 1393-1405 (2018) - 2015
- [j1]Jing Zhang, Shanshan Li, Xiangke Liao, Shaoliang Peng, Xiaodong Liu, Zhouyang Jia:
HeMatch: A redundancy layout placement scheme for erasure-coded storages in practical heterogeneous failure patterns. Sci. China Inf. Sci. 58(6): 1-11 (2015)
Conference and Workshop Papers
- 2024
- [c21]Ying Fu, Teng Wang, Shanshan Li, Jinyan Ding, Shulin Zhou, Zhouyang Jia, Wang Li, Yu Jiang, Xiangke Liao:
MissConf: LLM-Enhanced Reproduction of Configuration-Triggered Bugs. ICSE Companion 2024: 484-495 - [c20]Haoran Liu, Zhouyang Jia, Huiping Zhou, Haifang Zhou, Shanshan Li:
Go the Extra Mile: Fixing Propagated Error-Handling Bugs. SIGSOFT FSE Companion 2024: 661-662 - 2023
- [c19]Shulin Zhou, Zhijie Jiang, Shanshan Li, Xiaodong Liu, Zhouyang Jia, Yuanliang Zhang, Jun Ma, Haibo Mi:
WMWatcher: Preventing Workload-Related Misconfigurations in Production Environment. APSEC 2023: 279-288 - [c18]Teng Wang, Zhouyang Jia, Shanshan Li, Si Zheng, Yue Yu, Erci Xu, Shaoliang Peng, Xiangke Liao:
Understanding and Detecting On-The-Fly Configuration Bugs. ICSE 2023: 628-639 - [c17]Jiaying Li, Yan Lei, Shanshan Li, Haifang Zhou, Yue Yu, Zhouyang Jia, Yingwei Ma, Teng Wang:
A Two-Stage Framework for Ambiguous Classification in Software Engineering. ISSRE 2023: 275-286 - [c16]Teng Wang, Haochen He, Xiaodong Liu, Shanshan Li, Zhouyang Jia, Yu Jiang, Qing Liao, Wang Li:
ConfTainter: Static Taint Analysis For Configuration Options. ASE 2023: 1640-1651 - [c15]Yingwei Ma, Yue Yu, Shanshan Li, Zhouyang Jia, Jun Ma, Rulin Xu, Wei Dong, Xiangke Liao:
MulCS: Towards a Unified Deep Representation for Multilingual Code Search. SANER 2023: 120-131 - 2022
- [c14]Deze Wang, Zhouyang Jia, Shanshan Li, Yue Yu, Yun Xiong, Wei Dong, Xiangke Liao:
Bridging Pre-trained Models and Downstream Tasks for Source Code Understanding. ICSE 2022: 287-298 - [c13]Haochen He, Zhouyang Jia, Shanshan Li, Yue Yu, Chenglong Zhou, Qing Liao, Ji Wang, Xiangke Liao:
Multi-Intention-Aware Configuration Selection for Performance Tuning. ICSE 2022: 1431-1442 - 2021
- [c12]Zhouyang Jia, Shanshan Li, Tingting Yu, Chen Zeng, Erci Xu, Xiaodong Liu, Ji Wang, Xiangke Liao:
DepOwl: Detecting Dependency Bugs to Prevent Compatibility Failures. ICSE 2021: 86-98 - [c11]Wang Li, Zhouyang Jia, Shanshan Li, Yuanliang Zhang, Teng Wang, Erci Xu, Ji Wang, Xiangke Liao:
Challenges and opportunities: an in-depth empirical study on configuration error injection testing. ISSTA 2021: 478-490 - [c10]Shulin Zhou, Xiaodong Liu, Shanshan Li, Zhouyang Jia, Yuanliang Zhang, Teng Wang, Wang Li, Xiangke Liao:
ConfInLog: Leveraging Software Logs to Infer Configuration Constraints. ICPC 2021: 94-105 - 2020
- [c9]Haochen He, Zhouyang Jia, Shanshan Li, Erci Xu, Tingting Yu, Yue Yu, Ji Wang, Xiangke Liao:
CP-Detector: Using Configuration-related Performance Properties to Expose Performance Bugs. ASE 2020: 623-634 - 2019
- [c8]Zhouyang Jia, Shanshan Li, Tingting Yu, Xiangke Liao, Ji Wang, Xiaodong Liu, Yunhuai Liu:
Detecting Error-Handling Bugs without Error Specification Input. ASE 2019: 213-225 - [c7]Zhouyang Jia, Shanshan Li, Tingting Yu, Xiangke Liao, Ji Wang:
Automatically detecting missing cleanup for ungraceful exits. ESEC/SIGSOFT FSE 2019: 751-762 - 2018
- [c6]Shuqi Chi, Shanshan Li, Yong Guo, Wei Dong, Zhouyang Jia, Haochen He, Qing Liao:
NotOnlyLog: Mining Patch-Log Associations from Software Evolution History to Enhance Failure Diagnosis Capability. APSEC 2018: 189-198 - [c5]Shanshan Li, Xu Niu, Zhouyang Jia, Ji Wang, Haochen He, Teng Wang:
Logtracker: learning log revision behaviors proactively from software evolution history. ICPC 2018: 178-188 - [c4]Zhouyang Jia, Shanshan Li, Xiaodong Liu, Xiangke Liao, Yunhuai Liu:
SMARTLOG: Place error log statement by deep understanding of log intention. SANER 2018: 61-71 - 2017
- [c3]Wang Li, Shanshan Li, Xiangke Liao, Xiangyang Xu, Shulin Zhou, Zhouyang Jia:
ConfTest: Generating Comprehensive Misconfiguration for System Reaction Ability Evaluation. EASE 2017: 88-97 - [c2]Jinyu Liu, Shanshan Li, Zhouyang Jia, Xiaodong Liu, Bin Lin, Xiangke Liao:
IdenEH: Identify error-handling code snippets in large-scale software. ICCSA (7) 2017: 1-8 - 2016
- [c1]Bin Lin, Shanshan Li, Xiangke Liao, Xiaodong Liu, Jing Zhang, Zhouyang Jia:
CareDedup: Cache-Aware Deduplication for Reading Performance Optimization in Primary Storage. DSC 2016: 1-10
Informal and Other Publications
- 2021
- [i3]Zhouyang Jia, Shanshan Li, Tingting Yu, Chen Zeng, Erci Xu, Xiaodong Liu, Ji Wang, Xiangke Liao:
DepOwl: Detecting Dependency Bugs to Prevent Compatibility Failures. CoRR abs/2102.08543 (2021) - [i2]Shulin Zhou, Xiaodong Liu, Shanshan Li, Zhouyang Jia, Yuanliang Zhang, Teng Wang, Wang Li, Xiangke Liao:
ConfInLog: Leveraging Software Logs to Infer Configuration Constraints. CoRR abs/2103.11561 (2021) - [i1]Deze Wang, Zhouyang Jia, Shanshan Li, Yue Yu, Yun Xiong, Wei Dong, Xiangke Liao:
Bridging Pre-trained Models and Downstream Tasks for Source Code Understanding. CoRR abs/2112.02268 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint