


default search action
Chong Wang 0013
Person information
- affiliation: Nanyang Technological University, Singapore
Other persons with the same name
- Chong Wang — disambiguation page
- Chong Wang 0001
— Ningbo University, Department of Electrical Engineering and Computer Science, China (and 1 more)
- Chong Wang 0002 — ByteDance (and 4 more)
- Chong Wang 0003 — Dalian University of Technology, China
- Chong Wang 0004
— Wuhan University, State Key Lab of Software Engineering, China
- Chong Wang 0005
— Iowa State University, Department of Veterinary Diagnostic, Ames, IA, USA (and 1 more)
- Chong Wang 0006
— Liaocheng University, School of Mechanical and Automation Engineering, China (and 1 more)
- Chong Wang 0007
— Southeast University, School of Transportation, Nanjing, China
- Chong Wang 0008 — University of Hong Kong
- Chong Wang 0009 — Durham University, UK
- Chong Wang 0010 — Arizona State University, Tempe, USA
- Chong Wang 0011
— Nanyang Technological University, Singapore
- Chong Wang 0012
— University of Adelaide, Australia
- Chong Wang 0014
— Amazon Ads, NY, USA (and 2 more)
- Chong Wang 0015
— Jilin University, College of Computer Science and Technology, Changchun, China (and 1 more)
- Chong Wang 0016
— Tsinghua University, Beijing, China
- Chong Wang 0017
— Shenzhen International Graduate School, Tsinghua University, Shenzhen, China
- Chong Wang 0018
— College of Marine Sciences, University of Chinese Academy of Sciences, Beijing, China
- Chong Wang 0019
— Shandong University of Science and Technology, Qingdao, China
- Chong Wang 0020
— China University of Geosciences, Wuhan, China
- Chong Wang 0021
— Nanjing University of Science and Technology, Nanjing, China
- Chong Wang 0022
— University of Science and Technology of China, Hefei, Anhui, China
- Chong Wang 0023
— University of Science and Technology of China, Hefei, China
- Chong Wang 0024
— PLA Information Engineering University, Zhengzhou, China
- Chong Wang 0025
— Washington and Lee University, Lexington, VA, USA
- Chong Wang 0026
— Hohai University, Nanjing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j7]Xiangping Chen, Xing Hu, Yuan Huang, He Jiang, Weixing Ji, Yanjie Jiang, Yanyan Jiang, Bo Liu, Hui Liu, Xiaochen Li, Xiaoli Lian, Guozhu Meng, Xin Peng, Hailong Sun, Lin Shi, Bo Wang, Chong Wang, Jiayi Wang, Tiantian Wang, Jifeng Xuan, Xin Xia, Yibiao Yang, Yixin Yang, Li Zhang, Yuming Zhou, Lu Zhang:
Deep learning-based software engineering: progress, challenges, and opportunities. Sci. China Inf. Sci. 68(1) (2025) - [j6]Yanqi Su, Zhenchang Xing, Chong Wang, Chunyang Chen, Xiwei Xu, Qinghua Lu, Liming Zhu:
Automated Soap Opera Testing Directed by LLMs and Scenario Knowledge: Feasibility, Challenges, and Road Ahead. Proc. ACM Softw. Eng. 2(FSE): 757-778 (2025) - [j5]Ziyao Zhang, Chong Wang, Yanlin Wang, Ensheng Shi, Yuchi Ma, Wanjun Zhong, Jiachi Chen, Mingzhi Mao, Zibin Zheng:
LLM Hallucinations in Practical Code Generation: Phenomena, Mechanism, and Mitigation. Proc. ACM Softw. Eng. 2(ISSTA): 481-503 (2025) - [j4]Lyuye Zhang, Jiahui Wu, Chengwei Liu, Kaixuan Li, Xiaoyu Sun, Lida Zhao, Chong Wang, Yang Liu:
Fixing Outside the Box: Uncovering Tactics for Open-Source Security Issue Management. Proc. ACM Softw. Eng. 2(ISSTA): 2273-2295 (2025) - [j3]Junan Zhang, Kaifeng Huang, Yiheng Huang, Bihuan Chen, Ruisi Wang, Chong Wang, Xin Peng:
Killing Two Birds with One Stone: Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence. ACM Trans. Softw. Eng. Methodol. 34(4): 104:1-104:28 (2025) - [c14]Yihao Huang, Chong Wang, Xiaojun Jia, Qing Guo, Felix Juefei-Xu, Jian Zhang, Yang Liu, Geguang Pu:
Efficient Universal Goal Hijacking with Semantics-guided Prompt Organization. ACL (1) 2025: 5796-5816 - [c13]Alperen Yildiz, Sin G. Teo, Yiling Lou, Yebo Feng, Chong Wang, Dinil Mon Divakaran:
Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code Repositories. ACL (1) 2025: 30848-30865 - [c12]Chong Wang, Zhenpeng Chen, Tianlin Li, Yilun Zhang, Yang Liu:
Towards Trustworthy LLMs for Code: A Data-Centric Synergistic Auditing Framework. NIER@ICSE 2025: 56-60 - [c11]Chong Wang, Jian Zhang, Yiling Lou, Mingwei Liu, Weisong Sun, Yang Liu, Xin Peng:
TIGER: A Generating-Then-Ranking Framework for Practical Python Type Inference. ICSE 2025: 321-333 - [c10]Chong Wang, Kaifeng Huang, Jian Zhang, Yebo Feng, Lyuye Zhang, Yang Liu, Xin Peng:
LLMs Meet Library Evolution: Evaluating Deprecated API Usage in LLM-Based Code Completion. ICSE 2025: 885-897 - [c9]Weisong Sun, Yuchen Chen, Mengzhe Yuan, Chunrong Fang, Zhenpeng Chen, Chong Wang, Yang Liu, Baowen Xu, Zhenyu Chen:
Show Me Your Code! Kill Code Poisoning: A Lightweight Method Based on Code Naturalness. ICSE 2025: 2663-2675 - [c8]Yuqing Nie, Chong Wang, Kailong Wang, Guoai Xu, Guosheng Xu, Haoyu Wang:
Decoding Secret Memorization in Code LLMs Through Token-Level Characterization. ICSE 2025: 2880-2892 - [i29]Jiageng Li, Zhen Dong, Chong Wang, Haozhen You, Cen Zhang, Yang Liu, Xin Peng:
LLM Based Input Space Partitioning Testing for Library APIs. CoRR abs/2501.05456 (2025) - [i28]Weisong Sun, Yuchen Chen, Mengzhe Yuan, Chunrong Fang, Zhenpeng Chen, Chong Wang, Yang Liu, Baowen Xu, Zhenyu Chen:
Show Me Your Code! Kill Code Poisoning: A Lightweight Method Based on Code Naturalness. CoRR abs/2502.15830 (2025) - [i27]Zhenpeng Chen, Chong Wang, Weisong Sun, Guang Yang, Xuanzhe Liu, Jie M. Zhang, Yang Liu:
Promptware Engineering: Software Engineering for LLM Prompt Development. CoRR abs/2503.02400 (2025) - [i26]Alperen Yildiz, Sin G. Teo, Yiling Lou, Yebo Feng, Chong Wang, Dinil Mon Divakaran:
Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code Repositories. CoRR abs/2503.03586 (2025) - [i25]Xin Peng, Chong Wang, Mingwei Liu, Yiling Lou, Yijian Wu:
Code Digital Twin: Empowering LLMs with Tacit Knowledge for Complex Software Maintenance. CoRR abs/2503.07967 (2025) - [i24]Ke Zhang, Chenxi Zhang, Chong Wang, Chi Zhang, YaChen Wu, Zhenchang Xing, Yang Liu, Qingshan Li, Xin Peng:
LogiAgent: Automated Logical Testing for REST Systems with LLM-Based Multi-Agents. CoRR abs/2503.15079 (2025) - [i23]Linxi Liang, Jing Gong, Mingwei Liu, Chong Wang, Guangsheng Ou, Yanlin Wang, Xin Peng, Zibin Zheng:
RustEvo2: An Evolving Benchmark for API Evolution in LLM-based Rust Code Generation. CoRR abs/2503.16922 (2025) - [i22]Lyuye Zhang, Jiahui Wu, Chengwei Liu, Kaixuan Li, Xiaoyu Sun, Lida Zhao, Chong Wang, Yang Liu:
Fixing Outside the Box: Uncovering Tactics for Open-Source Security Issue Management. CoRR abs/2503.23357 (2025) - [i21]Dekun Dai, Mingwei Liu, Anji Li, Jialun Cao, Yanlin Wang, Chong Wang, Xin Peng, Zibin Zheng:
FeedbackEval: A Benchmark for Evaluating Large Language Models in Feedback-Driven Code Repair Tasks. CoRR abs/2504.06939 (2025) - [i20]Chengwei Liu, Chong Wang, Jiayue Cao, Jingquan Ge, Kun Wang, Lvye Zhang, Ming-Ming Cheng, Penghai Zhao, Tianlin Li, Xiaojun Jia, Xiang Li, Xinfeng Li, Yang Liu, Yebo Feng, Yihao Huang, Yijia Xu, Yuqiang Sun, Zhenhong Zhou, Zhengzi Xu:
A Vision for Auto Research with LLM Agents. CoRR abs/2504.18765 (2025) - [i19]Kaixin Wang, Tianlin Li, Xiaoyu Zhang, Chong Wang, Weisong Sun, Yang Liu, Bin Shi:
Software Development Life Cycle Perspective: A Survey of Benchmarks for Code Large Language Models and Agents. CoRR abs/2505.05283 (2025) - [i18]Zhenhao Zhou, Zhuochen Huang, Yike He, Chong Wang, Jiajun Wang, Yijian Wu, Xin Peng, Yiling Lou:
Benchmarking and Enhancing LLM Agents in Localizing Linux Kernel Bugs. CoRR abs/2505.19489 (2025) - [i17]Kaifeng He, Mingwei Liu, Chong Wang, Zike Li, Yanlin Wang, Xin Peng, Zibin Zheng:
Towards Better Code Generation: Adaptive Decoding with Uncertainty Guidance. CoRR abs/2506.08980 (2025) - [i16]Xueying Du, Kai Yu, Chong Wang, Yi Zou, Wentai Deng, Zuoyu Ou, Xin Peng, Lingming Zhang, Yiling Lou:
Minimizing False Positives in Static Bug Detection via LLM-Enhanced Path Feasibility Analysis. CoRR abs/2506.10322 (2025) - [i15]Lyuye Zhang, Jian Zhang, Kaixuan Li, Chong Wang, Chengwei Liu, Jiahui Wu, Sen Chen, Yaowen Zheng, Yang Liu:
VFArchē: A Dual-Mode Framework for Locating Vulnerable Functions in Open-Source Software. CoRR abs/2506.18050 (2025) - [i14]Guoliang Duan, Mingwei Liu, Yanlin Wang, Chong Wang, Xin Peng, Zibin Zheng:
A Hierarchical and Evolvable Benchmark for Fine-Grained Code Instruction Following with Multi-Turn Feedback. CoRR abs/2507.00699 (2025) - 2024
- [c7]Jian Zhang, Chong Wang, Anran Li, Wenhan Wang, Tianlin Li, Yang Liu:
VulAdvisor: Natural Language Suggestion Generation for Software Vulnerability Repair. ASE 2024: 1932-1944 - [i13]Chong Wang, Jian Zhang, Yebo Feng, Tianlin Li, Weisong Sun, Yang Liu
, Xin Peng:
Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation. CoRR abs/2401.06391 (2024) - [i12]Jian Zhang, Chong Wang, Anran Li, Weisong Sun, Cen Zhang, Wei Ma, Yang Liu:
An Empirical Study of Automated Vulnerability Localization with Large Language Models. CoRR abs/2404.00287 (2024) - [i11]Yihao Huang, Chong Wang, Xiaojun Jia, Qing Guo, Felix Juefei-Xu, Jian Zhang, Geguang Pu, Yang Liu
:
Semantic-guided Prompt Organization for Universal Goal Hijacking against LLMs. CoRR abs/2405.14189 (2024) - [i10]Chong Wang, Kaifeng Huang, Jian Zhang, Yebo Feng, Lyuye Zhang, Yang Liu
, Xin Peng:
How and Why LLMs Use Deprecated APIs in Code Completion? An Empirical Study. CoRR abs/2406.09834 (2024) - [i9]Chong Wang, Jian Zhang, Yiling Lou, Mingwei Liu, Weisong Sun, Yang Liu
, Xin Peng:
TIGER: A Generating-Then-Ranking Framework for Practical Python Type Inference. CoRR abs/2407.02095 (2024) - [i8]Ziyao Zhang, Yanli Wang, Chong Wang, Jiachi Chen, Zibin Zheng:
LLM Hallucinations in Practical Code Generation: Phenomena, Mechanism, and Mitigation. CoRR abs/2409.20550 (2024) - [i7]Yuqing Nie, Chong Wang, Kailong Wang, Guoai Xu, Guosheng Xu, Haoyu Wang:
Decoding Secret Memorization in Code LLMs Through Token-Level Characterization. CoRR abs/2410.08858 (2024) - [i6]Chong Wang, Zhenpeng Chen, Tianlin Li, Yilun Zhao, Yang Liu
:
Towards Trustworthy LLMs for Code: A Data-Centric Synergistic Auditing Framework. CoRR abs/2410.09048 (2024) - [i5]Xiangping Chen, Xing Hu, Yuan Huang, He Jiang, Weixing Ji, Yanjie Jiang, Yanyan Jiang, Bo Liu, Hui Liu, Xiaochen Li, Xiaoli Lian, Guozhu Meng, Xin Peng, Hailong Sun, Lin Shi, Bo Wang, Chong Wang, Jiayi Wang, Tiantian Wang, Jifeng Xuan, Xin Xia, Yibiao Yang, Yixin Yang, Li Zhang, Yuming Zhou, Lu Zhang:
Deep Learning-based Software Engineering: Progress, Challenges, and Opportunities. CoRR abs/2410.13110 (2024) - [i4]Yanqi Su, Zhenchang Xing, Chong Wang, Chunyang Chen, Xiwei Xu, Qinghua Lu, Liming Zhu:
Automated Soap Opera Testing Directed by LLMs and Scenario Knowledge: Feasibility, Challenges, and Road Ahead. CoRR abs/2412.08581 (2024) - 2023
- [j2]Chong Wang
, Xin Peng
, Zhenchang Xing
, Yue Zhang
, Mingwei Liu
, Rong Luo
, Xiujie Meng
:
XCoS: Explainable Code Search Based on Query Scoping and Knowledge Graph. ACM Trans. Softw. Eng. Methodol. 32(6): 140:1-140:28 (2023) - [j1]Chong Wang
, Xin Peng
, Zhenchang Xing
, Xiujie Meng:
Beyond Literal Meaning: Uncover and Explain Implicit Knowledge in Code Through Wikipedia-Based Concept Linking. IEEE Trans. Software Eng. 49(5): 3226-3240 (2023) - [c6]Chong Wang, Yiling Lou, Junwei Liu, Xin Peng:
Generating Variable Explanations via Zero-shot Prompt Learning. ASE 2023: 748-760 - [c5]Chong Wang
, Yiling Lou
, Xin Peng
, Jianan Liu
, Baihan Zou
:
Mining Resource-Operation Knowledge to Support Resource Leak Detection. ESEC/SIGSOFT FSE 2023: 986-998 - [i3]Junan Zhang, Kaifeng Huang, Bihuan Chen, Chong Wang, Zhenhao Tian, Xin Peng:
Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence. CoRR abs/2309.02637 (2023) - [i2]Chong Wang, Jianan Liu, Xin Peng, Yang Liu, Yiling Lou:
Boosting Static Resource Leak Detection via LLM-based Resource-Oriented Intention Inference. CoRR abs/2311.04448 (2023) - [i1]Weisong Sun, Chunrong Fang, Yudu You, Yuchen Chen, Yi Liu, Chong Wang, Jian Zhang, Quanjun Zhang, Hanwei Qian, Wei Zhao, Yang Liu, Zhenyu Chen:
A Prompt Learning Framework for Source Code Summarization. CoRR abs/2312.16066 (2023) - 2022
- [c4]Yi Liu, Yadong Yan, Chaofeng Sha, Xin Peng, Bihuan Chen, Chong Wang:
DeepAnna: Deep Learning based Java Annotation Recommendation and Misuse Detection. SANER 2022: 685-696 - 2021
- [c3]Yanqi Su
, Zhenchang Xing, Xin Peng, Xin Xia, Chong Wang, Xiwei Xu, Liming Zhu:
Reducing Bug Triaging Confusion by Learning from Mistakes with a Bug Tossing Knowledge Graph. ASE 2021: 191-202 - 2020
- [c2]Mingwei Liu
, Yanjun Yang, Xin Peng, Chong Wang, Chengyuan Zhao, Xin Wang, Shuangshuang Xing:
Learning based and Context Aware Non-Informative Comment Detection. ICSME 2020: 866-867
2010 – 2019
- 2019
- [c1]Chong Wang, Xin Peng, Mingwei Liu
, Zhenchang Xing, Xuefang Bai, Bing Xie, Tuo Wang:
A learning-based approach for automatic construction of domain glossary from source code and documentation. ESEC/SIGSOFT FSE 2019: 97-108
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-08-21 01:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint