Follow
Sihan Xu
Title
Cited by
Cited by
Year
Method name suggestion with hierarchical attention networks
S Xu, S Zhang, W Wang, X Cao, C Guo, J Xu
Proceedings of the 2019 ACM SIGPLAN workshop on partial evaluation and …, 2019
242019
Gems: An extract method refactoring recommender
S Xu, A Sivaraman, SC Khoo, J Xu
2017 IEEE 28th International Symposium on Software Reliability Engineering …, 2017
232017
Respiratory sound classification based on BiGRU-Attention network with XGBoost
X Zhao, Y Shao, J Mai, A Yin, S Xu
2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2020
122020
AutoPer: automatic recommender for runtime-permission in android applications
H Gao, C Guo, Y Wu, N Dong, X Hou, S Xu, J Xu
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019
112019
A projection-based approach for memory leak detection
X Sun, S Xu, C Guo, J Xu, N Dong, X Ji, S Zhang
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018
92018
Exposing SQL injection vulnerability through penetration test based on finite state machine
L Liu, J Xu, C Guo, J Kang, S Xu, B Zhang
2016 2nd IEEE International Conference on Computer and Communications (ICCC …, 2016
92016
An effective penetration test approach based on feature matrix for exposing SQL injection vulnerability
L Liu, J Xu, H Yang, C Guo, J Kang, S Xu, B Zhang, G Si
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
72016
An inferential metamorphic testing approach to reduce false positives in SQLIV penetration test
L Liu, G Su, J Xu, B Zhang, J Kang, S Xu, P Li, G Si
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017
52017
MalDetector-using permission combinations to evaluate malicious features of android app
C Guo, J Xu, L Liu, S Xu
2015 6th IEEE International Conference on Software Engineering and Service …, 2015
52015
Badprompt: Backdoor attacks on continuous prompts
X Cai, H Xu, S Xu, Y Zhang
Advances in Neural Information Processing Systems 35, 37068-37080, 2022
42022
LiDetector: License Incompatibility Detection for Open Source Software
S Xu, Y Gao, L Fan, Z Liu, Y Liu, H Ji
ACM Transactions on Software Engineering and Methodology 32 (1), 1-28, 2023
32023
Test input selection for deep neural networks
Z Wang, S Xu, X Cai, H Ji
Journal of Physics: Conference Series 1693 (1), 012017, 2020
32020
High-frequency keywords to predict defects for android applications
Y Fan, X Cao, J Xu, S Xu, H Yang
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018
32018
Using association statistics to rank risk of android application
C Guo, J Xu, L Liu, S Xu
2015 IEEE International Conference on Computer and Communications (ICCC), 6-10, 2015
32015
An improvement to fault localization technique based on branch-coverage spectra
S Xu, J Xu, H Yang, J Yang, C Guo, L Yuan, W Song, G Si
2015 IEEE 39th Annual Computer Software and Applications Conference 2, 282-287, 2015
22015
Contrastive Meta-Learning for Drug-Target Binding Affinity Prediction
M Li, S Xu, X Cai, Z Zhang, H Ji
2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2022
12022
Deepsuite: A test suite optimizer for autonomous vehicles
S Xu, Z Wang, L Fan, X Cai, H Ji, SC Khoo, BB Gupta
IEEE Transactions on Intelligent Transportation Systems 23 (7), 9506-9517, 2021
12021
TRAC: A Therapeutic Regimen-Oriented Access Control Model in Healthcare
H Gao, Y Wu, S Xu, C Guo, X Hou, J Xu
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018
12018
A log-linear probabilistic model for prioritizing extract method refactorings
S Xu, C Guo, L Liu, J Xu
2017 3rd IEEE International Conference on Computer and Communications (ICCC …, 2017
12017
面向移动应用软件信息泄露的模型检测研究
过辰楷, 许静, 司冠南, 李恩鹏, 徐思涵
计算机学报 39 (11), 2324-2343, 2016
12016
The system can't perform the operation now. Try again later.
Articles 1–20