Bin Li

Orcid: 0000-0001-8500-9917

Affiliations:
  • Yangzhou University, School of Information Engineering, China
  • Nanjing University, National Key Laboratory of Novel Software Technology, China (former)
  • Najing University of Aeronautics & Astronautics, China (PhD 2001)


According to our database1, Bin Li authored at least 171 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fine-grained smart contract vulnerability detection by heterogeneous code feature learning and automated dataset construction.
J. Syst. Softw., March, 2024

Learning to Detect Memory-related Vulnerabilities.
ACM Trans. Softw. Eng. Methodol., February, 2024

Neurodynamics for Equality-Constrained Time-Variant Nonlinear Optimization Using Discretization.
IEEE Trans. Ind. Informatics, February, 2024

Automatic software vulnerability classification by extracting vulnerability triggers.
J. Softw. Evol. Process., February, 2024

A new recurrent neural network based on direct discretization method for solving discrete time-variant matrix inversion with application.
Inf. Sci., January, 2024

2023
VulRep: vulnerability repair based on inducing commits and fixing commits.
EURASIP J. Wirel. Commun. Netw., December, 2023

Hyperspectral Image Classification Network Based on 3D Octave Convolution and Multiscale Depthwise Separable Convolution.
ISPRS Int. J. Geo Inf., November, 2023

Automatic software vulnerability assessment by extracting vulnerability elements.
J. Syst. Softw., October, 2023

An intrusion detection system based on stacked ensemble learning for IoT network.
Comput. Electr. Eng., September, 2023

An advanced discrete-time RNN for handling discrete time-varying matrix inversion: Form model design to disturbance-suppression analysis.
CAAI Trans. Intell. Technol., September, 2023

A direct discretization recurrent neurodynamics method for time-variant nonlinear optimization with redundant robot manipulators.
Neural Networks, July, 2023

Discrete generalized-Sylvester matrix equation solved by RNN with a novel direct discretization numerical method.
Numer. Algorithms, July, 2023

Novel Discrete-Time Recurrent Neural Network for Robot Manipulator: A Direct Discretization Technical Route.
IEEE Trans. Neural Networks Learn. Syst., June, 2023

Tracking Control of Cable-Driven Planar Robot Based on Discrete-Time Recurrent Neural Network With Immediate Discretization Method.
IEEE Trans. Ind. Informatics, June, 2023

Automated event extraction of CVE descriptions.
Inf. Softw. Technol., June, 2023

Hybrid Attention and Motion Constraint for Anomaly Detection in Crowded Scenes.
IEEE Trans. Circuits Syst. Video Technol., May, 2023

Leveraging multi-level embeddings for knowledge-aware bug report reformulation.
J. Syst. Softw., April, 2023

<i>ASSBert</i>: Active and semi-supervised bert for smart contract vulnerability detection.
J. Inf. Secur. Appl., March, 2023

Discovery of medical pathways considering complications.
Comput. Electr. Eng., March, 2023

Direct derivation scheme of DT-RNN algorithm for discrete time-variant matrix pseudo-inversion with application to robotic manipulator.
Appl. Soft Comput., January, 2023

A Multi-Scale Feature Fusion Network With Cascaded Supervision for Cross-Scene Crowd Counting.
IEEE Trans. Instrum. Meas., 2023

Combine sliced joint graph with graph neural networks for smart contract vulnerability detection.
J. Syst. Softw., 2023

A new ZNN model for finding discrete time-variant matrix square root: From model design to parameter analysis.
J. Comput. Appl. Math., 2023

VulLoc: vulnerability localization based on inducing commits and fixing commits.
Frontiers Comput. Sci., 2023

Extended Abstract of Combine Sliced Joint Graph with Graph Neural Networks for Smart Contract Vulnerability Detection.
Proceedings of the IEEE International Conference on Software Analysis, 2023

TemLock: A Lightweight Template-based Approach for Fixing Deadlocks Caused by ReentrantLock.
Proceedings of the IEEE International Conference on Software Analysis, 2023

ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

2022
SATNet: A Spatial Attention Based Network for Hyperspectral Image Classification.
Remote. Sens., 2022

Online active classification via margin-based and feature-based label queries.
Mach. Learn., 2022

Random walk-based algorithm for distance-aware influence maximization on multiple query locations.
Knowl. Based Syst., 2022

Recurrent neural dynamics for handling linear equation system with rank-deficient coefficient and disturbance existence.
J. Frankl. Inst., 2022

Depression prediction based on BiAttention-GRU.
J. Ambient Intell. Humaniz. Comput., 2022

An approach of method-level bug localization.
IET Softw., 2022

SPVF: security property assisted vulnerability fixing via attention-based models.
Empir. Softw. Eng., 2022

Time Interval Aware Self-Attention approach for Knowledge Tracing.
Comput. Electr. Eng., 2022

Towards the identification of bug entities and relations in bug reports.
Autom. Softw. Eng., 2022

MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Attentional Meta-path Contrastive Graph Convolutional Networks for Knowledge Concept Recommendation.
Proceedings of the Tenth International Conference on Advanced Cloud and Big Data, 2022

Vulnerability Detection for Smart Contract via Backward Bayesian Active Learning.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
A random walk-based method for detecting essential proteins by integrating the topological and biological features of PPI network.
Soft Comput., 2021

image2emmet: Automatic code generation from web user interface image.
J. Softw. Evol. Process., 2021

A comprehensive study on security bug characteristics.
J. Softw. Evol. Process., 2021

Minimizing the seed set cost for influence spreading with the probabilistic guarantee.
Knowl. Based Syst., 2021

BEAT: Considering question types for bug question answering via templates.
Knowl. Based Syst., 2021

Node deletion-based algorithm for blocking maximizing on negative influence from uncertain sources.
Knowl. Based Syst., 2021

OPLS-SR: A novel face super-resolution learning method using orthonormalized coherent features.
Inf. Sci., 2021

Negative influence blocking maximization with uncertain sources under the independent cascade model.
Inf. Sci., 2021

<i>BGNN4VD</i>: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection.
Inf. Softw. Technol., 2021

Evaluation of Winter Wheat Yields using SPI and SPEI at 10-Daily scales.
Int. J. Robotics Autom., 2021

Design, analysis and verification of recurrent neural dynamics for handling time-variant augmented Sylvester linear system.
Neurocomputing, 2021

Why and what happened? Aiding bug comprehension with automated category and causal link identification.
Empir. Softw. Eng., 2021

Ontology negotiation: Knowledge interchange between distributed ontologies through agent negotiation.
Concurr. Comput. Pract. Exp., 2021

Composite nonlinear multiset canonical correlation analysis for multiview feature learning and recognition.
Concurr. Comput. Pract. Exp., 2021

Prediction of medical expenses for gastric cancer based on process mining.
Concurr. Comput. Pract. Exp., 2021

Deep pre-trained networks as a feature extractor with XGBoost to detect tuberculosis from chest X-ray.
Comput. Electr. Eng., 2021

GrasP: Graph-to-Sequence Learning for Automated Program Repair.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

A Crowd Flow Segmentation Method based on Deep Motion Transformation Network.
Proceedings of the ICMIP 2021: 6th International Conference on Multimedia and Image Processing, Zhuhai, China, 8 January, 2021, 2021

2020
Positive influence maximization in signed social networks under independent cascade model.
Soft Comput., 2020

Allocation and pricing of group-buying based on the fixed bidding.
Multim. Tools Appl., 2020

Improving software bug-specific named entity recognition with deep neural network.
J. Syst. Softw., 2020

Analyzing bug fix for automatic bug cause classification.
J. Syst. Softw., 2020

A new algorithm for positive influence maximization in signed networks.
Inf. Sci., 2020

Learning Fractional Orthogonal Latent Consistent Features for Face Hallucination and Recognition.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Improved Image Enhancement Method Based on Retinex Algorithm.
Proceedings of the Cognitive Internet of Things: Frameworks, Tools and Applications, 2019

Improving defect prediction with deep forest.
Inf. Softw. Technol., 2019

An auction mechanism for cloud resource allocation with time-discounting values.
Int. J. Comput. Sci. Eng., 2019

Fractional generalized multiview discriminative projections and extension for multiview learning.
Cogn. Syst. Res., 2019

A real-time decentralized algorithm for task scheduling in multi-agent system with continuous damage.
Appl. Soft Comput., 2019

Link prediction on signed social networks based on latent space mapping.
Appl. Intell., 2019

Fractional Sparse Representation Based Classification and Multi-view Extension for Face Recognition.
Aust. J. Intell. Inf. Process. Syst., 2019

Face Hallucination Using Locality Preserving Canonical Correlation Analysis.
Aust. J. Intell. Inf. Process. Syst., 2019

Bug Localization for Version Issues With Defect Patterns.
IEEE Access, 2019

Enabling Feature Location for API Method Recommendation and Usage Location.
IEEE Access, 2019

MULAPI: a tool for API method and usage location recommendation.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Task Assignment Based on the Dynamic Alliance Formation Game.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

Fuzzy Bilinear Latent Canonical Correlation Projection for Feature Learning.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

D<sup>2</sup>PLS: A Novel Bilinear Method for Facial Feature Fusion.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Learning Simultaneous Face Super-Resolution Using Multiset Partial Least Squares.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

2018
On truthful auction mechanisms for electricity allocation with multiple time slots.
Multim. Tools Appl., 2018

A Voting Aggregation Algorithm for Optimal Social Satisfaction.
Mob. Networks Appl., 2018

MULAPI: Improving API method recommendation with API usage location.
J. Syst. Softw., 2018

A task allocation strategy for complex applications in heterogeneous cluster-based wireless sensor networks.
Int. J. Distributed Sens. Networks, 2018

Effectiveness of exploring historical commits for developer recommendation: an empirical study.
Frontiers Comput. Sci., 2018

Detect potential relations by link prediction in multi-relational social networks.
Decis. Support Syst., 2018

Personalized project recommendation on GitHub.
Sci. China Inf. Sci., 2018

DeepEye: Link prediction in dynamic networks based on non-negative matrix factorization.
Big Data Min. Anal., 2018

A link prediction algorithm based on low-rank matrix completion.
Appl. Intell., 2018

Interactive Query Reformulation for Source-Code Search With Word Relations.
IEEE Access, 2018

Recognizing software bug-specific named entity in software bug repository.
Proceedings of the 26th Conference on Program Comprehension, 2018

Generalized Multiview Discriminative Projections with Spectral Reconstruction.
Proceedings of the Intelligence Science and Big Data Engineering, 2018

Learning Parallel Canonical Correlations for Scale-Adaptive Low Resolution Face Recognition.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Coalition Formation Game for Task Allocation in the Social Network.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

2017
Clustering Classes in Packages for Program Comprehension.
Sci. Program., 2017

Using Hierarchical Latent Dirichlet Allocation to Construct Feature Tree for Program Comprehension.
Sci. Program., 2017

Link prediction in complex network based on modularity.
Soft Comput., 2017

On Cloud Resources Consumption Shifting Scheme for Two Different Geographic Areas.
IEEE Syst. J., 2017

Enhancing developer recommendation with supplementary information via mining historical commits.
J. Syst. Softw., 2017

Projection-based link prediction in a bipartite network.
Inf. Sci., 2017

Link prediction in multi-relational networks based on relational similarity.
Inf. Sci., 2017

Cooperative task allocation in heterogeneous wireless sensor networks.
Int. J. Distributed Sens. Networks, 2017

TRUDA: a truthful auction mechanism with non-uniform payment for heterogeneous spectrum access in wireless networks.
IET Commun., 2017

Particle swarm optimization based clustering algorithm with mobile sink for WSNs.
Future Gener. Comput. Syst., 2017

Wound intensity correction and segmentation with convolutional neural networks.
Concurr. Comput. Pract. Exp., 2017

On complex tasks scheduling scheme in cloud market based on coalition formation.
Comput. Electr. Eng., 2017

Link prediction based on sampling in complex networks.
Appl. Intell., 2017

Network link prediction based on direct optimization of area under curve.
Appl. Intell., 2017

REPERSP: Recommending Personalized Software Projects on GitHub.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

Construct bug knowledge graph for bug resolution: poster.
Proceedings of the 39th International Conference on Software Engineering, 2017

Face Hallucination and Recognition Using Kernel Canonical Correlation Analysis.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Fractional discriminative multiview correlation projection for face feature fusion.
Proceedings of the 20th International Conference on Information Fusion, 2017

An Empirical Study on Real Bugs for Machine Learning Programs.
Proceedings of the 24th Asia-Pacific Software Engineering Conference, 2017

Truthful Mechanism for Crowdsourcing Task Assignment.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Mining Software Repositories for Automatic Interface Recommendation.
Sci. Program., 2016

Task allocation via coalition formation in agent networks.
J. Intell. Fuzzy Syst., 2016

Sampling-based algorithm for link prediction in temporal networks.
Inf. Sci., 2016

A fast algorithm for predicting links to nodes of interest.
Inf. Sci., 2016

ComboRT: A New Approach for Generating Regression Test Cases for Evolving Programs.
Int. J. Softw. Eng. Knowl. Eng., 2016

Code Comment Quality Analysis and Improvement Recommendation: An Automated Approach.
Int. J. Softw. Eng. Knowl. Eng., 2016

IPSETFUL: an iterative process of selecting test cases for effective fault localization by exploring concept lattice of program spectra.
Frontiers Comput. Sci., 2016

A Truthful Greedy Mechanism toward Resource Sharing for Cloudlets in Mobile Cloud Computing.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

pHSA: A Price Schedule for Heterogeneous Spectrum Auction.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Exploring topic models in software engineering data analysis: A survey.
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016

WB4SP: A tool to build the word base for specific programs.
Proceedings of the 24th IEEE International Conference on Program Comprehension, 2016

A Task-Oriented Self-organization Mechanism in Wireless Sensor Networks.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2016, 2016

On Expanding Abbreviated Identifiers in the Source Code.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2016, 2016

An Efficient Auction Mechanism Toward Heterogeneous Spectrum Allocation.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2016, 2016

Recommending developers with supplementary information for issue request resolution.
Proceedings of the 38th International Conference on Software Engineering, 2016

On Truthful Auction Mechanisms for Electricity Allocation.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016

DR_PSF: Enhancing Developer Recommendation by Leveraging Personalized Source-Code Files.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

On Automatic Summarization of What and Why Information in Source Code Changes.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
What Information in Software Historical Repositories Do We Need to Support Software Maintenance Tasks? An Approach Based on Topic Model.
Proceedings of the Computer and Information Science, 2015

Bio-inspired ant colony optimization based clustering algorithm with mobile sinks for applications in consumer home automation networks.
IEEE Trans. Consumer Electron., 2015

Static change impact analysis techniques: A comparative study.
J. Syst. Softw., 2015

Density-based modularity for evaluating community structure in bipartite networks.
Inf. Sci., 2015

MSR4SM: Using topic models to effectively mining software repositories for software maintenance tasks.
Inf. Softw. Technol., 2015

SGAM: strategy-proof group buying-based auction mechanism for virtual machine allocation in clouds.
Concurr. Comput. Pract. Exp., 2015

Multiple mobile sink-based routing algorithm for data dissemination in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2015

Ant colony optimization applied to web service compositions in cloud computing.
Comput. Electr. Eng., 2015

Modeling the evolution of development topics using Dynamic Topic Models.
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015

Explore the evolution of development topics via on-line LDA.
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015

A New Protein-Protein Interaction Prediction Algorithm Based on Conditional Random Field.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

An Improved Energy-Efficient Clustering Algorithm Based on MECA and PEGASIS for WSNs.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

Using Feature-Interface Graph for Automatic Interface Recommendation: A Case Study.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

A Fast Level Set Model for Intensity Inhomogeneity Correction in eHealth Analysis System.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

Replication Management Framework for HDFS Based on Prediction Technique.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

Spectral and energy efficiency for massive MIMO multi-pair two-way relay networks with ZFR/ZFT and imperfect CSI.
Proceedings of the 21st Asia-Pacific Conference on Communications, 2015

A New Method for Balancing Cloud Resource.
Proceedings of the 12th Web Information System and Application Conference, 2015

2014
An enhanced fall detection system for elderly person monitoring using consumer home networks.
IEEE Trans. Consumer Electron., 2014

An Energy Efficient Distance-Aware Routing Algorithm with Multiple Mobile Sinks for Wireless Sensor Networks.
Sensors, 2014

Change impact analysis and changeability assessment for a change proposal: An empirical study ☆☆.
J. Syst. Softw., 2014

A next-hop selection scheme for emergency message propagation in VANETs.
Proceedings of the IEEE International Conference on Consumer Electronics, 2014

A Monitoring and Prediction Model of Workflow Based Self-Adaptive Software System.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014

Strategy-Proof Auction Mechanism with Group Price for Virtual Machine Allocation in Clouds.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014

Efficient Auction Mechanism with Group Price for Resource Allocation in Clouds.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014

PFN: A novel program feature network for program comprehension.
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014

2013
Exploring software engineering data with formal concept analysis.
Proceedings of the 1st International Workshop on Data Analysis Patterns in Software Engineering, 2013

2012
A Petri-net and QoS Based Model for Automatic Web Service Composition.
J. Softw., 2012

A comparative study of static CIA techniques.
Proceedings of the Fourth Asia-Pacific Symposium on Internetware, 2012

2011
A Policy-based Adaptive Web Services Security Framework.
J. Softw., 2011

Task schedulable problem and maximum scheduling problem in a multi-agent system.
J. Softw., 2011

2010
On Formal Representation of Procedure Knowledge and its Application to Interactive Electronic technology Manual.
J. Softw., 2010

Mobile Ontology.
J. Digit. Content Technol. its Appl., 2010

Utility Based Optimal Task Scheduling Problem in a Multi-agent System.
J. Digit. Content Technol. its Appl., 2010

2009
A formal method for integrating distributed ontologies and reducing the redundant relations.
Kybernetes, 2009

SVDD regularized with area under the ROC.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

2008
Towards a Coordination Infrastructure for Pervasive Computing Environment Based on Tuplespace and Semantic Web.
J. Digit. Content Technol. its Appl., 2008

A Dynamic Trust Model for the Multi-agent Systems.
Proceedings of the International Symposium on Information Processing, 2008

2007
SSOA: a Semantic Service-Oriented Architecture Based on Fuzzy Assertion System.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

On Dynamic and Concurrent Model of Web Service Components.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

2005
A Parallel and Distributed Method for Computing High Dimensional MOLAP.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005


  Loading...