Yutian Tang

Short Bio

Dr. Yutian Tang [CV] is an Assistant Professor at School of Information Science and Technology, ShanghaiTech University (PI, Ph.D. Supervisor, Co-Appointed Research Professor -研究员、博导). He received his Ph.D. degree from the Department of Computing, The Hong Kong Polytechnic University, under the supervision of Dr. Xiapu Luo and Dr. Hareton Leung. He received his B.Sc in Computer Science from Jilin University, under the supervision of Prof. Lan Huang. His research interests include software engineering (product line; program understanding; testing), cybersecurity, blockchain, machine learning (NLP; deep) and empirical software engineering. He is a member of IEEE, HKCS, CCF and EuroSys.

Dr. Tang has published over 20 papers at premier software engineering venues such as ESEC/FSE, ASE, SANER, ISSRE, ICPC conferences and IEEE Transaction on Software Engineering (TSE), IEEE Transactions on Reliability (TReli), JSS, IST journals. One work received Best Industry Paper Award at ISSRE'18. Three works reported defects in Android OS, which are confirmed by Google Security Team. His future research plans are directed towards advancing the techniques to automatically test apps and locate bugs, and providing tool support for their applications.

+1. 课题组招收深度学习、软件工程、安全、系统方向博士生、硕士生(2021级),详细请联系(tangyt1@shanghaitech.edu.cn)商讨具体研究主题。

+2. 欢迎对我们研究感兴趣的本科生提前进入课题组,共同发表文章。提供去合作企业、高校的交流、实习机会,欢迎联系 更多信息参见{Team/Openings}页面。也欢迎有志于计划之后出国深造的同学进组科研共同发表论文。

+3. 团队目前招收1名博士后 和 1名Research Assistant Professor,欢迎加入。更多信息参见{Team/Openings}页面。

+4. 团队目前招收1名Research Assistant/Associate,欢迎加入。更多信息参见{Team/Openings}页面。

Note (1-4): 课题组目前的研究主题主要包括: Fuzzing, AI+SE, 逆向,Android。

Research Overview:

1. Android Security, Vulnerability, and Privacy

(1) Vunlerability Discovery:

  • Resource Race Attack Model in Android (SANER'20);
  • Vulnerabilities in App Link Scheme (ESEC/FSE'20);

(2) Potentially Harmful Apps (PHAs) Analysis:

  • DiehardDetector: Detecting Diehard Android Apps (ASE'20);

(3) Third-party Library Analysis:

  • APMHunter: Detecting (mis)use of Application Performance Management Libraries in Apps (ASE'19);
  • Comparative Study of Android Repackaged Apps Detection Techniques (SANER'19)

2. Software Product Line Enginering

  • Feature modelling (SANER'17, ICEIS"15, SOFTENG'15);
  • Modularity and type system in product line engineering (ICPC'17);

3. AI + SE

  • Knowledge graph in software engineering (ISSRE'18);

News (all/21/20/19)

  • [11/2020] Our paper entitled " Just-in-Time Defect Prediction for Android Apps via Imbalanced Deep Learning Model" has been accepted to SAC Conference.
  • [10/2020] Our paper entitled " Feature Selection and Embedding Based Cross Project Framework for Identifying Crashing Fault Residence" has been accepted to IST.
  • [07/2020] Our paper entitled "Demystifying Diehard Android Apps" has been accepted to ASE'20.
  • [06/2020] Our paper entitled "Simplified Deep Forest Model based Just-In-Time Defect Prediction for Android Mobile Apps" has been accepted to QRS'20.
  • [05/2020] Our paper entitled "All Your App Links are Belong to Us: Understanding the Threats of Instant Apps based Attacks" has been accepted to ESEC/FSE'20.
  • [11/2019] Our paper entitled "Resource Race Attacks on Android" has been accepted to SANER'20.
  • [08/2019] Our paper entitled "Demystifying Application Performance Management Libraries for Android" has been accepted to ASE'19.