Follow
Sihan Xu
Title
Cited by
Cited by
Year
Badprompt: Backdoor attacks on continuous prompts
X Cai, H Xu, S Xu, Y Zhang
Advances in Neural Information Processing Systems 35, 37068-37080, 2022
402022
Gems: An extract method refactoring recommender
S Xu, A Sivaraman, SC Khoo, J Xu
2017 ieee 28th international symposium on software reliability engineering …, 2017
312017
Method name suggestion with hierarchical attention networks
S Xu, S Zhang, W Wang, X Cao, C Guo, J Xu
Proceedings of the 2019 ACM SIGPLAN workshop on partial evaluation and …, 2019
302019
Respiratory sound classification based on BiGRU-attention network with XGBoost
X Zhao, Y Shao, J Mai, A Yin, S Xu
2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2020
182020
LiDetector: License Incompatibility Detection for Open Source Software
S Xu, Y Gao, L Fan, Z Liu, Y Liu, H Ji
ACM Transactions on Software Engineering and Methodology 32 (1), 1-28, 2023
162023
Autoper: Automatic recommender for runtime-permission in android applications
H Gao, C Guo, Y Wu, N Dong, X Hou, S Xu, J Xu
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019
162019
Metapath-aggregated heterogeneous graph neural network for drug–target interaction prediction
M Li, X Cai, S Xu, H Ji
Briefings in Bioinformatics 24 (1), bbac578, 2023
142023
A projection-based approach for memory leak detection
X Sun, S Xu, C Guo, J Xu, N Dong, X Ji, S Zhang
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018
122018
Exposing SQL injection vulnerability through penetration test based on finite state machine
L Liu, J Xu, C Guo, J Kang, S Xu, B Zhang
2016 2nd IEEE International Conference on Computer and Communications (ICCC …, 2016
102016
An effective penetration test approach based on feature matrix for exposing SQL injection vulnerability
L Liu, J Xu, H Yang, C Guo, J Kang, S Xu, B Zhang, G Si
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
92016
Heterogeneous graph attention network for drug-target interaction prediction
M Li, X Cai, L Li, S Xu, H Ji
Proceedings of the 31st ACM International Conference on Information …, 2022
72022
MalDetector-using permission combinations to evaluate malicious features of Android App
C Guo, J Xu, L Liu, S Xu
2015 6th IEEE International Conference on Software Engineering and Service …, 2015
62015
High-frequency keywords to predict defects for android applications
Y Fan, X Cao, J Xu, S Xu, H Yang
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018
52018
An inferential metamorphic testing approach to reduce false positives in SQLIV penetration test
L Liu, G Su, J Xu, B Zhang, J Kang, S Xu, P Li, G Si
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017
52017
Using association statistics to rank risk of android application
C Guo, J Xu, L Liu, S Xu
2015 IEEE International Conference on Computer and Communications (ICCC), 6-10, 2015
52015
Contrastive meta-learning for drug-target binding affinity prediction
M Li, S Xu, X Cai, Z Zhang, H Ji
2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2022
42022
Test input selection for deep neural networks
Z Wang, S Xu, X Cai, H Ji
Journal of Physics: Conference Series 1693 (1), 012017, 2020
42020
Real-Time Diagnosis of Configuration Errors for Software of AI Server Infrastructure
G Xu, X Ding, S Xu, Y Jia, S Liu, S Feng, X Zheng
IEEE Transactions on Dependable and Secure Computing, 2023
32023
Deepsuite: A test suite optimizer for autonomous vehicles
S Xu, Z Wang, L Fan, X Cai, H Ji, SC Khoo, BB Gupta
IEEE Transactions on Intelligent Transportation Systems 23 (7), 9506-9517, 2021
32021
LiResolver: License Incompatibility Resolution for Open Source Software
S Xu, Y Gao, L Fan, L Li, X Cai, Z Liu
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
22023
The system can't perform the operation now. Try again later.
Articles 1–20