Bin Luo

Orcid: 0009-0008-4409-2898

Affiliations:
  • Nanjing University, Software Institute, State Key Laboratory for Novel Software Technology, China (PhD 2000)


According to our database1, Bin Luo authored at least 146 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Decentralized Scheduling for Concurrent Tasks in Mobile Edge Computing via Deep Reinforcement Learning.
IEEE Trans. Mob. Comput., April, 2024

An Extractive-and-Abstractive Framework for Source Code Summarization.
ACM Trans. Softw. Eng. Methodol., March, 2024

PTM-APIRec: Leveraging Pre-trained Models of Source Code in API Recommendation.
ACM Trans. Softw. Eng. Methodol., March, 2024

Practical Program Repair via Preference-based Ensemble Strategy.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

FAIR: Flow Type-Aware Pre-Training of Compiler Intermediate Representations.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Machine Learning-Based Non-Intrusive Digital Forensic Service for Smart Homes.
IEEE Trans. Netw. Serv. Manag., June, 2023

Learning the Relation Between Similarity Loss and Clustering Loss in Self-Supervised Learning.
IEEE Trans. Image Process., 2023

A Comprehensive Evaluation of Parameter-Efficient Fine-Tuning on Software Engineering Tasks.
CoRR, 2023

Judicial Intelligent Assistant System: Extracting Events from Divorce Cases to Detect Disputes for the Judge.
CoRR, 2023

ARPad: Compound Spatial-Semantic Gesture Interaction in Augmented Reality.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2023

The ABLoTS Approach for Bug Localization: is it replicable and generalizable?
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

An Automated and Flexible Multilingual Bug-Fix Dataset Construction System.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Domain Adaptive Code Completion via Language Models and Decoupled Domain Databases.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Improving Online POMDP Planning Algorithms with Decaying Q Value.
Proceedings of the 35th IEEE International Conference on Tools with Artificial Intelligence, 2023

CrossCodeBench: Benchmarking Cross-Task Generalization of Source Code Models.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

An Empirical Comparison of Pre-Trained Models of Source Code.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

RAT: A Refactoring-Aware Traceability Model for Bug Localization.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Convolutional Neural Network Based Classification of WeChat Mini-Apps.
Proceedings of the IEEE International Conference on Communications, 2023

MuTCR: Test Case Recommendation via Multi-Level Signature Matching.
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2023

Backdooring Neural Code Search.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Measuring Business Process Behavioral Similarity Based on Token Log Profile.
IEEE Trans. Serv. Comput., 2022

Predicting Product Review Helpfulness - A Hybrid Method.
IEEE Trans. Serv. Comput., 2022

SGBRT: An Edge-Intelligence Based Remaining Useful Life Prediction Model for Aero-Engine Monitoring System.
IEEE Trans. Netw. Sci. Eng., 2022

Statute recommendation: Re-ranking statutes by modeling case-statute relation with interpretable hand-crafted features.
Inf. Sci., 2022

TamForen: A tamper-proof cloud forensic framework.
Trans. Emerg. Telecommun. Technol., 2022

An Extractive-and-Abstractive Framework for Source Code Summarization.
CoRR, 2022

Lighting up supervised learning in user review-based code localization: dataset and benchmark.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

StandUp4NPR: Standardizing SetUp for Empirically Comparing Neural Program Repair Systems.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Neural Program Repair : Systems, Challenges and Solutions.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

Towards Just-In-Time Feature Request Approval Prediction.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

Deep Learning Meets Software Engineering: A Survey on Pre-Trained Models of Source Code.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

AST-Trans: Code Summarization with Efficient Tree-Structured Attention.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

SPT-Code: Sequence-to-Sequence Pre-Training for Learning Source Code Representations.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Using Cloud Computing Based Crowdsourcing for Security and Privacy Settings of Android Users.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Interaction-Oriented Service Entity Placement in Edge Computing.
IEEE Trans. Mob. Comput., 2021

Recommending Statutes: A Portable Method Based on Neural Networks.
ACM Trans. Knowl. Discov. Data, 2021

Dependency Learning for Legal Judgment Prediction with a Unified Text-to-Text Transformer.
CoRR, 2021

Learning Fine-grained Fact-Article Correspondence in Legal Cases.
CoRR, 2021

SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

AST-Transformer: Encoding Abstract Syntax Trees Efficiently for Code Summarization.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

A Non-Intrusive Method for Smart Speaker Forensics.
Proceedings of the ICC 2021, 2021

Optimizing Federated Edge Learning on Non-IID Data via Neural Architecture Search.
Proceedings of the IEEE Global Communications Conference, 2021

Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction.
Proceedings of the IEEE Global Communications Conference, 2021

Understanding Digital Forensic Characteristics of Smart Speaker Ecosystems.
Proceedings of the IEEE Global Communications Conference, 2021

Don't Miss the Potential Customers! Retrieving Similar Ads to Improve User Targeting.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021

2020
Leveraging multiple features for document sentiment classification.
Inf. Sci., 2020

A novel completeness definition of event logs and corresponding generation algorithm.
Expert Syst. J. Knowl. Eng., 2020

Efficient Service Entity Chain Placement in Mobile Edge Computing.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Retrieving Similar Software from Large-scale Open-source Repository by Constructing Representation of Project Description.
Proceedings of the 5th International Conference on Internet of Things, 2020

Detecting and Mitigating ARP Attacks in SDN-Based Cloud Environment.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Forensic Model for DDoS Attack.
Proceedings of the IEEE Global Communications Conference, 2020

Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network.
Proceedings of the IEEE Global Communications Conference, 2020

Identifying Exaggerated Language.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020

2019
Monitoring Interactions Across Multi Business Processes with Token Carried Data.
IEEE Trans. Serv. Comput., 2019

A Utility-Based Optimization Framework for Edge Service Entity Caching.
IEEE Trans. Parallel Distributed Syst., 2019

File-level socio-technical congruence and its relationship with bug proneness in OSS projects.
J. Syst. Softw., 2019

Online learning offloading framework for heterogeneous mobile edge computing system.
J. Parallel Distributed Comput., 2019

Modeling and deploying hybrid tenant requests with shared networklets.
Comput. Networks, 2019

Timing Channel in IaaS: How to Identify and Investigate.
IEEE Access, 2019

An Efficient Heuristic Method for Repairing Event Logs Independent of Process Models.
Proceedings of the 4th International Conference on Internet of Things, 2019

Word Segmentation for Chinese Judicial Documents.
Proceedings of the Data Science, 2019

Statute Recommendation Based on Word Embedding.
Proceedings of the Data Science, 2019

Evaluation System for Reasoning Description of Judgment Documents Based on TensorFlow CNN.
Proceedings of the Data Science, 2019

Apply event extraction techniques to the judicial field.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

A Design of Firewall Based on Feedback of Intrusion Detection System in Cloud Environment.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Cloud Database Encryption Technology Based on Combinatorial Encryption.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Improving Statute Prediction via Mining Correlations between Statutes.
Proceedings of The 11th Asian Conference on Machine Learning, 2019

2018
Cost and Energy Aware Scheduling Algorithm for Scientific Workflows with Deadline Constraint in Clouds.
IEEE Trans. Serv. Comput., 2018

Video-based salient object detection via spatio-temporal difference and coherence.
Multim. Tools Appl., 2018

Automatically classifying user requests in crowdsourcing requirements engineering.
J. Syst. Softw., 2018

PTM: A Topic Model for the Inferring of the Penalty.
J. Comput. Sci. Technol., 2018

A load-aware resource allocation and task scheduling for the emerging cloudlet system.
Future Gener. Comput. Syst., 2018

Timing Channel in IaaS: How to Identify and Investigate.
CoRR, 2018

Real-Time Behavior Analysis and Identification for Android Application.
IEEE Access, 2018

Does Socio-Technical Congruence Have an Effect on Continuous Integration Build Failures? An Empirical Study on 10 GitHub Projects.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Automatically Classifying Chinese Judgment Documents Using Character-Level Convolutional Neural Networks.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

A Novel Convolutional Neural Network for Statutes Recommendation.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

Construction of Microblog-Specific Chinese Sentiment Lexicon Based on Representation Learning.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

Statutes Recommendation Using Classification and Co-occurrence Between Statutes.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

The Construction Approach of Statutes Database.
Proceedings of the Data Science, 2018

Predicting Statutes Based on Causes of Action and Content of Statutes.
Proceedings of the Data Science, 2018

Establish Evidence Chain Model on Chinese Criminal Judgment Documents Using Text Similarity Measure.
Proceedings of the Data Science, 2018

Monitoring User-Intent of Cloud-Based Networked Applications in Cognitive Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Word Embedding Based Document Similarity for the Inferring of Penalty.
Proceedings of the Web Information Systems and Applications, 2018

2017
Security Threats to Hadoop: Data Leakage Attacks and Investigation.
IEEE Netw., 2017

Tag refinement of micro-videos by learning from multiple data sources.
Multim. Tools Appl., 2017

Software cybernetics in BPM: Modeling software behavior as feedback for evolution by a novel discovery method based on augmented event logs.
J. Syst. Softw., 2017

A lightweight live memory forensic approach based on hardware virtualization.
Inf. Sci., 2017

Energy cost minimization with job security guarantee in Internet data center.
Future Gener. Comput. Syst., 2017

Distributed Cloud Forensic System with Decentralization and Multi-participation.
Proceedings of the Wireless Internet - 10th International Conference, 2017

Exploring the Influence of Feature Selection Techniques on Bug Report Prioritization.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

Personalized Micro-Video Recommendation via Hierarchical User Interest Modeling.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Eyes Understand the Sketch!: Gaze-Aided Stroke Grouping of Hand-Drawn Flowcharts.
Proceedings of the 22nd International Conference on Intelligent User Interfaces, 2017

Task Offloading for Scientific Workflow Application in Mobile Cloud.
Proceedings of the 2nd International Conference on Internet of Things, 2017

Topic Model Based Text Similarity Measure for Chinese Judgment Document.
Proceedings of the Data Science, 2017

Build Evidence Chain Relational Model Based on Chinese Judgment Documents.
Proceedings of the Data Science, 2017

Analyzing Android Application in Real-Time at Kernel Level.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

AutoPatchDroid: A framework for patching inter-app vulnerabilities in android application.
Proceedings of the IEEE International Conference on Communications, 2017

Automatically Classify Chinese Judgment Documents Utilizing Machine Learning Algorithms.
Proceedings of the Database Systems for Advanced Applications, 2017

Information Extraction from Chinese Judgment Documents.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

Statutes Recommendation Based on Text Similarity.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

Checking the Statutes in Chinese Judgment Document Based on Editing Distance Algorithm.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

Cluster Correction on Polysemy and Synonymy.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

Knowledge Graph Construction Based on Judicial Data with Social Media.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

A Method of the Association Statistics between the Cause of Action and the Statutes.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

Design and Implementation of Visual Modeling Tool for Evidence Chain.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

2016
A Spatial-Temporal Topic Model for the Semantic Annotation of POIs in LBSNs.
ACM Trans. Intell. Syst. Technol., 2016

基于抽象状态的类的行为规格化方法 (Behavior Specification Method of Class Based on Abstract State).
计算机科学, 2016

Process mining with token carried data.
Inf. Sci., 2016

A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds.
Future Gener. Comput. Syst., 2016

Investigating Timing Channel in IaaS.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

Energy Cost Minimization with Risk Rate Constraint for Internet Data Center in Deregulated Electricity Markets.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

A shared memory based cross-VM side channel attacks in IaaS cloud.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Salient Object Detection via Video Spatio-Temporal Difference and Coherence.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

iReference: Make the Reference Details Under Your Nose.
Proceedings of the Fourth International Symposium on Chinese CHI, 2016

2015
Data correlation-based analysis methods for automatic memory forensic.
Secur. Commun. Networks, 2015

基于语法描述语言的在线手绘流程图识别 (On-line Handwritten Flowchart Recognition Based on Grammar Description Language).
计算机科学, 2015

Correlating processes for automatic memory evidence analysis.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

PCFBPI: A Point Clustering Feature Based Policy Iteration Algorithm.
Proceedings of the 27th IEEE International Conference on Tools with Artificial Intelligence, 2015

Detective: Automatically identify and analyze malware processes in forensic scenarios via DLLs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Haddle: A Framework for Investigating Data Leakage Attacks in Hadoop.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Predicting Users' Purchasing Behaviors Using Their Browsing History.
Proceedings of the Databases Theory and Applications, 2015

Predicting Passengers in Public Transportation Using Smart Card Data.
Proceedings of the Databases Theory and Applications, 2015

2014
WAS: A weighted attribute-based strategy for cluster test selection.
J. Syst. Softw., 2014

Combining research and education of software testing: a preliminary study.
Proceedings of the Symposium on Applied Computing, 2014

POPVI: A Probability-Based Optimal Policy Value Iteration Algorithm.
Proceedings of the PRICAI 2014: Trends in Artificial Intelligence, 2014

Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensics.
Proceedings of the Information Security - 17th International Conference, 2014

Quasi-crowdsourcing testing for educational projects.
Proceedings of the 36th International Conference on Software Engineering, 2014

2013
A Task Selecting Algorithm for Personal Schedules in Workflow Systems.
Proceedings of the Web Information Systems Engineering - WISE 2013 Workshops, 2013

Mining Sequential Patterns of Predicates for Fault Localization and Understanding.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Product and User Dependent Social Network Models for Recommender Systems.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

How screen size influences Chinese readability.
Proceedings of the Augmentation, Application, Innovation, Collaboration, OzCHI '13, Adelaide, Australia - November 25, 2013

A Method to Automatically Filter Log Evidences for Intrusion Forensics.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

2012
Discovering process models from event multiset.
Expert Syst. Appl., 2012

Using Weighted Attributes to Improve Cluster Test Selection.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

An Experience of Teaching HCI to Undergraduate Software Engineering Students.
Proceedings of the 25th IEEE Conference on Software Engineering Education and Training, 2012

2011
An empirical study on the effectiveness of time-aware test case prioritization techniques.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

A New Process Mining Algorithm Based on Event Type.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

An introductory software engineering course for software engineering program.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011

Research and practice on software engineering undergraduate curriculum NJU-SEC2006.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011

Teaching software testing methods based on diversity principles.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011

2009
A Novel Practical Framework for Operating Systems Teaching.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

2007
Applying ontology in architecture-based self-management applications.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

2005
A Study on Illumination Invariant Face Recognition Methods Based on Multiple Eigenspaces.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

A Multiple Eigenspaces Constructing Method and Its Application to Face Recognition.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

An Efficient Adaptive Focused Crawler Based on Ontology Learning.
Proceedings of the 5th International Conference on Hybrid Intelligent Systems (HIS 2005), 2005


  Loading...