Jingyue Li

Orcid: 0000-0002-7958-391X

According to our database1, Jingyue Li authored at least 100 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SoK: Cross-Chain Bridging Architectural Design Flaws and Mitigations.
CoRR, 2024

2023
Runtime Evolution of Bitcoin's Consensus Rules.
IEEE Trans. Software Eng., September, 2023

Revisit security in the era of DevOps: An evidence-based inquiry into DevSecOps industry.
IET Softw., August, 2023

AST-SafeSec: Adaptive Stress Testing for Safety and Security Co-Analysis of Cyber-Physical Systems.
IEEE Trans. Inf. Forensics Secur., 2023

An Empirical Study on Governance in Bitcoin's Consensus Evolution.
CoRR, 2023

Characterize Software Release Notes of GitHub Projects: Structure, Writing Style, and Content.
Proceedings of the IEEE International Conference on Software Analysis, 2023

Personalized First Issue Recommender for Newcomers in Open Source Projects.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

Open Source Software Onboarding as a University Course: An Experience Report.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering Education and Training, 2023

Evaluating the Impact of ChatGPT on Exercises of a Software Security Course.
Proceedings of the ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2023

A Systematic Literature Review on Client Selection in Federated Learning.
Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 2023

Perceived Trust in Blockchain Systems: An Interview-based Survey.
Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 2023

2022
Detailed proposed methodologies.
Dataset, May, 2022

Special section on IST for EASE2021.
Inf. Softw. Technol., 2022

Geolocation estimation of target vehicles using image processing and geometric computation.
Neurocomputing, 2022

Tiny Machine Learning: A New Technique for AI Security.
ERCIM News, 2022

Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review.
ACM Comput. Surv., 2022

Deep transfer learning for failure prediction across failure types.
Comput. Ind. Eng., 2022

A Tertiary Review on Blockchain and Sustainability With Focus on Sustainable Development Goals.
IEEE Access, 2022

Advantages and opportunities of the IOTA tangle for health data management: a systematic mapping study.
Proceedings of the 5th International Workshop on Emerging Trends in Software Engineering for Blockchain, 2022

Attention-guided Temporal Convolutional Network for Non-intrusive Load Monitoring.
Proceedings of the IEEE International Conference on Communications, 2022

Operationalizing machine learning models: a systematic literature review.
Proceedings of the 1st Workshop on Software Engineering for Responsible AI, 2022

Understanding Black-Box Attacks Against Object Detectors from a User's Perspective.
Proceedings of the Quality of Information and Communications Technology, 2022

A Vulnerability Detection Framework for Hyperledger Fabric Smart Contracts Based on Dynamic and Static Analysis.
Proceedings of the EASE 2022: The International Conference on Evaluation and Assessment in Software Engineering 2022, Gothenburg, Sweden, June 13, 2022

Security and Privacy Challenges in Blockchain Interoperability - A Multivocal Literature Review.
Proceedings of the EASE 2022: The International Conference on Evaluation and Assessment in Software Engineering 2022, Gothenburg, Sweden, June 13, 2022

Magnitude Adversarial Spectrum Search-based Black-box Attack against Image Classification.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022

2021
The AI-Based Cyber Threat Landscape: A Survey.
ACM Comput. Surv., 2021

3D-Fingerprint Augment based on Super-Resolution for Indoor 3D WiFi Localization.
Proceedings of the 13th International Conference on Wireless Communications and Signal Processing, 2021

An Empirical Study on Cross-Data Transferability of Adversarial Attacks on Object Detectors.
Proceedings of the Workshop on AI and Cybersecurity (AI-Cybersec 2021) co-located with 41st SGAI International Conference on Artificial Intelligence (SGAI 2021), 2021

A Systematic Literature Review on Malicious Use of Reinforcement Learning.
Proceedings of the 2nd IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical Systems, 2021

Blockchain and Sustainability: A Tertiary Study.
Proceedings of the 1st IEEE/ACM International Workshop on Body of Knowledge for Software Sustainability, 2021

Boost the Potential of EA: Essential Practices.
Proceedings of the 23rd International Conference on Enterprise Information Systems, 2021

Towards Applicability: A Comparative Study on Non-Intrusive Load Monitoring Algorithms.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

Understanding How Enterprise Architecture Contributes to Organizational Alignment.
Proceedings of the Responsible AI and Analytics for an Ethical and Inclusive Digitized Society, 2021

Agile Enterprise Architecture by Leveraging Use Cases.
Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, 2021

Enterprise Architecture and Agility: A Systematic Mapping Study.
Proceedings of the Business Modeling and Software Design - 11th International Symposium, 2021

High-Performance Asynchronous Byzantine Fault Tolerance Consensus Protocol.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

Consensus in Blockchain Systems with Low Network Throughput: A Systematic Mapping Study.
Proceedings of the BIOTC 2021: The 3rd Blockchain and Internet of Things Conference, Ho Chi Minh City, Vietnam, July 8, 2021

Critical Understanding of Security Vulnerability Detection Plugin Evaluation Reports.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

2020
Testing and verification of neural-network-based safety-critical control software: A systematic literature review.
Inf. Softw. Technol., 2020

Identifying and Counting Vehicles in Multiple Lanes by Using a Low-Cost Vehicle-Mounted Sensor for Intelligent Traffic Management Systems.
Proceedings of the Hybrid Artificial Intelligent Systems - 15th International Conference, 2020

What Norwegian Developers Want and Need From Security-Directed Program Analysis Tools: A Survey.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

2019
Erratum to "Tracking runtime concurrent dependences in java threads using thread control profiling" [The Journal of Systems and Software 148 (2019) 116-131].
J. Syst. Softw., 2019

Tracking runtime concurrent dependences in java threads using thread control profiling.
J. Syst. Softw., 2019

An experimental evaluation of bow-tie analysis for security.
Inf. Comput. Secur., 2019

Quantitative Analysis of Motor Synergies and Assessment of Upper-limb Motor Function for Post-stroke Rehabilitation Based on Multi-modal Data Fusion.
Aust. J. Intell. Inf. Process. Syst., 2019

Intelligent Intersection Management Systems Considering Autonomous Vehicles: A Systematic Literature Review.
IEEE Access, 2019

Using Vehicle-Mounted Camera to Collect Information for Managing Mixed Traffic.
Proceedings of the 15th International Conference on Signal-Image Technology & Internet-Based Systems, 2019

Ontology-Based Semantic Search for Open Government Data.
Proceedings of the 13th IEEE International Conference on Semantic Computing, 2019

Blockchain and sustainability: a systematic mapping study.
Proceedings of the 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain, 2019

A data-driven security game to facilitate information security education.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Exploring the Relationship Between Data Science and Circular Economy: An Enhanced CRISP-DM Process Model.
Proceedings of the Digital Transformation for a Sustainable Society in the 21st Century, 2019

Embracing Modern Technologies and Urban Development Trends: Initial Evaluation of a Smart City Enterprise Architecture Frameworks.
Proceedings of the Information Systems, 2019

Kinematic Redundancy Analysis during Goal-Directed Motion for Trajectory Planning of an Upper-Limb Exoskeleton Robot.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

Understanding Challenges of Applying Enterprise Architecture in Public Sectors: A Technology Acceptance Perspective.
Proceedings of the 23rd IEEE International Enterprise Distributed Object Computing Workshop, 2019

Evaluation of Open-Source IDE Plugins for Detecting Security Vulnerabilities.
Proceedings of the Evaluation and Assessment on Software Engineering, 2019

An Empirical Study on Culture, Automation, Measurement, and Sharing of DevSecOps.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

2018
Could We Issue Driving Licenses to Autonomous Vehicles?
Proceedings of the Computer Safety, Reliability, and Security, 2018

An Experimental Evaluation of Bow-Tie Analysis for Cybersecurity Requirements.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

2017
A Novel Tool for Automatic GUI Layout Testing.
Proceedings of the 24th Asia-Pacific Software Engineering Conference, 2017

2016
Automatic translation from FBD-PLC-programs to NuSMV for model checking safety-critical control systems.
Proceedings of the 29th Norsk Informatikkonferanse, 2016

2015
A moving foreground objects extraction method under camouflage effect.
Proceedings of the Seventh International Conference on Digital Image Processing, 2015

Interface Information Management Tools for the Maritime and Oil and Gas Industry.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
The position control of hydraulic cylinder based on high-speed on-off valve.
Int. J. Model. Identif. Control., 2014

2013
Developing Software with Open Source Software Components.
Proceedings of the Finding Source Code on the Web for Remix and Reuse, 2013

2012
Enhancing Defect Tracking Systems to Facilitate Software Quality Improvement.
IEEE Softw., 2012

CBCD: Cloned buggy code detector.
Proceedings of the 34th International Conference on Software Engineering, 2012

2011
Selection of third party software in Off-The-Shelf-based software development - An interview study with industrial practitioners.
J. Syst. Softw., 2011

Towards Goal-Based Software Safety Certification Based on Prescriptive Standards.
Proceedings of the 2011 First International Workshop on Software Certification, WoSoCER 2011, Hiroshima, Japan, November 29, 2011

2010
Change profiles of a reused class framework vs. two of its applications.
Inf. Softw. Technol., 2010

Cost drivers of software corrective maintenance: An empirical study in two companies.
Proceedings of the 26th IEEE International Conference on Software Maintenance (ICSM 2010), 2010

Transition from a plan-driven process to Scrum: a longitudinal case study on software quality.
Proceedings of the International Symposium on Empirical Software Engineering and Measurement, 2010

2009
Development with Off-the-Shelf Components: 10 Facts.
IEEE Softw., 2009

A case study comparing defect profiles of a reused framework and of applications reusing it.
Empir. Softw. Eng., 2009

Challenges of the Open Source Component Marketplace in the Industry.
Proceedings of the Open Source Ecosystems: Diverse Communities Interacting, 2009

2008
A State-of-the-Practice Survey of Risk Management in Development with Off-the-Shelf Software Components.
IEEE Trans. Software Eng., 2008

A state-of-the-practice study on communication and coordination between chinese software suppliers and their global outsourcers.
Softw. Process. Improv. Pract., 2008

An empirical study on software development with open source components in the chinese software industry.
Softw. Process. Improv. Pract., 2008

Identifying and Understanding Architectural Risks in Software Evolution: An Empirical Study.
Proceedings of the Product-Focused Software Process Improvement, 2008

The Impact of Test Driven Development on the Evolution of a Reusable Framework of Components - An Industrial Case Study.
Proceedings of the Third International Conference on Software Engineering Advances, 2008

Some lessons learned in conducting software engineering surveys in china.
Proceedings of the Second International Symposium on Empirical Software Engineering and Measurement, 2008

2007
An Industrial Survey of Software Outsourcing in China.
Proceedings of the Product-Focused Software Process Improvement, 2007

Open Source Collaboration for Fostering Off-The-Shelf Components Selection.
Proceedings of the Open Source Development, 2007

A Survey of Software Development with Open Source Components in Chinese Software Industry.
Proceedings of the Software Process Dynamics and Agility, 2007

Making Cost Effective Security Decision with Real Option Thinking.
Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), 2007

The Empirical Studies on Quality Benefits of Reusing Software Components.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

A Survey on the Business Relationship between Chinese Outsourcing Software Suppliers and Their Outsourcers.
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007

2006
A Case Stud on Improving Changeability of COTS-Based System Using Aspect-Oriented Programming.
J. Inf. Sci. Eng., 2006

An empirical study of variations in COTS-based software development processes in the Norwegian IT industry.
Empir. Softw. Eng., 2006

A State-of-the-Practice Survey of Off-the-Shelf Component-Based Development Processes.
Proceedings of the Reuse of Off-the-Shelf Components, 2006

An empirical study on decision making in off-the-shelf component-based development.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

2005
Barriers to disseminating off-the-shelf based development theories to IT industry.
ACM SIGSOFT Softw. Eng. Notes, 2005

Observations on versioning of off-the-shelf components in industrial projects (short paper).
Proceedings of the 12th International Workshop on Software Configuration Management, 2005

A case study on building COTS-based system using aspect-oriented programming.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

An Empirical Study on Off-the-Shelf Component Usage in Industrial Projects.
Proceedings of the Product Focused Software Process Improvement, 2005

Validation of New Theses on Off-the-Shelf Component Based Development.
Proceedings of the 11th IEEE International Symposium on Software Metrics (METRICS 2005), 2005

Reflections on conducting an international survey of software engineering.
Proceedings of the 2005 International Symposium on Empirical Software Engineering (ISESE 2005), 2005

Preliminary Results from a State-of-the-Practice Survey on Risk Management in Off-the-Shelf Component-Based Development.
Proceedings of the COTS-Based Software Systems, 4th International Conference, 2005

2004
A Study of Developer Attitude to Component Reuse in Three IT Companies.
Proceedings of the Product Focused Software Process Improvement, 2004

2001
Electronic Homework on the WWW.
Proceedings of the Web Intelligence: Research and Development, 2001


  Loading...