Method name suggestion with hierarchical attention networks S Xu, S Zhang, W Wang, X Cao, C Guo, J Xu Proceedings of the 2019 ACM SIGPLAN workshop on partial evaluation and …, 2019 | 24 | 2019 |
Gems: An extract method refactoring recommender S Xu, A Sivaraman, SC Khoo, J Xu 2017 IEEE 28th International Symposium on Software Reliability Engineering …, 2017 | 23 | 2017 |
Respiratory sound classification based on BiGRU-Attention network with XGBoost X Zhao, Y Shao, J Mai, A Yin, S Xu 2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2020 | 12 | 2020 |
AutoPer: automatic recommender for runtime-permission in android applications H Gao, C Guo, Y Wu, N Dong, X Hou, S Xu, J Xu 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019 | 11 | 2019 |
A projection-based approach for memory leak detection X Sun, S Xu, C Guo, J Xu, N Dong, X Ji, S Zhang 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 9 | 2018 |
Exposing SQL injection vulnerability through penetration test based on finite state machine L Liu, J Xu, C Guo, J Kang, S Xu, B Zhang 2016 2nd IEEE International Conference on Computer and Communications (ICCC …, 2016 | 9 | 2016 |
An effective penetration test approach based on feature matrix for exposing SQL injection vulnerability L Liu, J Xu, H Yang, C Guo, J Kang, S Xu, B Zhang, G Si 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016 | 7 | 2016 |
An inferential metamorphic testing approach to reduce false positives in SQLIV penetration test L Liu, G Su, J Xu, B Zhang, J Kang, S Xu, P Li, G Si 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017 | 5 | 2017 |
MalDetector-using permission combinations to evaluate malicious features of android app C Guo, J Xu, L Liu, S Xu 2015 6th IEEE International Conference on Software Engineering and Service …, 2015 | 5 | 2015 |
Badprompt: Backdoor attacks on continuous prompts X Cai, H Xu, S Xu, Y Zhang Advances in Neural Information Processing Systems 35, 37068-37080, 2022 | 4 | 2022 |
LiDetector: License Incompatibility Detection for Open Source Software S Xu, Y Gao, L Fan, Z Liu, Y Liu, H Ji ACM Transactions on Software Engineering and Methodology 32 (1), 1-28, 2023 | 3 | 2023 |
Test input selection for deep neural networks Z Wang, S Xu, X Cai, H Ji Journal of Physics: Conference Series 1693 (1), 012017, 2020 | 3 | 2020 |
High-frequency keywords to predict defects for android applications Y Fan, X Cao, J Xu, S Xu, H Yang 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 3 | 2018 |
Using association statistics to rank risk of android application C Guo, J Xu, L Liu, S Xu 2015 IEEE International Conference on Computer and Communications (ICCC), 6-10, 2015 | 3 | 2015 |
An improvement to fault localization technique based on branch-coverage spectra S Xu, J Xu, H Yang, J Yang, C Guo, L Yuan, W Song, G Si 2015 IEEE 39th Annual Computer Software and Applications Conference 2, 282-287, 2015 | 2 | 2015 |
Contrastive Meta-Learning for Drug-Target Binding Affinity Prediction M Li, S Xu, X Cai, Z Zhang, H Ji 2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2022 | 1 | 2022 |
Deepsuite: A test suite optimizer for autonomous vehicles S Xu, Z Wang, L Fan, X Cai, H Ji, SC Khoo, BB Gupta IEEE Transactions on Intelligent Transportation Systems 23 (7), 9506-9517, 2021 | 1 | 2021 |
TRAC: A Therapeutic Regimen-Oriented Access Control Model in Healthcare H Gao, Y Wu, S Xu, C Guo, X Hou, J Xu 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 1 | 2018 |
A log-linear probabilistic model for prioritizing extract method refactorings S Xu, C Guo, L Liu, J Xu 2017 3rd IEEE International Conference on Computer and Communications (ICCC …, 2017 | 1 | 2017 |
面向移动应用软件信息泄露的模型检测研究 过辰楷, 许静, 司冠南, 李恩鹏, 徐思涵 计算机学报 39 (11), 2324-2343, 2016 | 1 | 2016 |