Xiaobing Sun
Orcid: 0000-0001-5165-5080Affiliations:
- Yangzhou University, School of Information Engineering, China
- Southeast University, Nanjing, China (PhD)
According to our database1,
Xiaobing Sun
authored at least 157 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Hierarchy-Aware Representation Learning for Industrial IoT Vulnerability Classification.
IEEE Trans. Ind. Informatics, October, 2024
Real-Time Tracking Control and Efficiency Analyses for Stewart Platform Based on Discrete-Time Recurrent Neural Network.
IEEE Trans. Syst. Man Cybern. Syst., August, 2024
Application programming interface recommendation for smart contract using deep learning from augmented code representation.
J. Softw. Evol. Process., August, 2024
J. Softw. Evol. Process., August, 2024
Ponzi Scheme Detection in Smart Contract via Transaction Semantic Representation Learning.
IEEE Trans. Reliab., June, 2024
IEEE Internet Things J., June, 2024
FATS: Feature Distribution Analysis-Based Test Selection for Deep Learning Enhancement.
IEEE Trans. Big Data, April, 2024
Fine-grained smart contract vulnerability detection by heterogeneous code feature learning and automated dataset construction.
J. Syst. Softw., March, 2024
ACM Trans. Softw. Eng. Methodol., February, 2024
Neurodynamics for Equality-Constrained Time-Variant Nonlinear Optimization Using Discretization.
IEEE Trans. Ind. Informatics, February, 2024
Automatic software vulnerability classification by extracting vulnerability triggers.
J. Softw. Evol. Process., February, 2024
A new recurrent neural network based on direct discretization method for solving discrete time-variant matrix inversion with application.
Inf. Sci., January, 2024
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training.
IEEE Trans. Inf. Forensics Secur., 2024
BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation.
IEEE Trans. Dependable Secur. Comput., 2024
Sci. Comput. Program., 2024
Deterministic fuzzy two-dimensional on-line tessellation automata and their languages.
Fuzzy Sets Syst., 2024
Large Language Model for Vulnerability Detection and Repair: Literature Review and the Road Ahead.
CoRR, 2024
A Systematic Literature Review on Explainability for Machine/Deep Learning-based Software Engineering Research.
CoRR, 2024
SCL-CVD: Supervised contrastive learning for code vulnerability detection via GraphCodeBERT.
Comput. Secur., 2024
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection Systems.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
2023
Automated software bug localization enabled by meta-heuristic-based convolutional neural network and improved deep neural network.
Expert Syst. Appl., December, 2023
EURASIP J. Wirel. Commun. Netw., December, 2023
J. Syst. Softw., October, 2023
Comput. Secur., September, 2023
An advanced discrete-time RNN for handling discrete time-varying matrix inversion: Form model design to disturbance-suppression analysis.
CAAI Trans. Intell. Technol., September, 2023
Neural Comput. Appl., August, 2023
A direct discretization recurrent neurodynamics method for time-variant nonlinear optimization with redundant robot manipulators.
Neural Networks, July, 2023
Discrete generalized-Sylvester matrix equation solved by RNN with a novel direct discretization numerical method.
Numer. Algorithms, July, 2023
Novel Discrete-Time Recurrent Neural Network for Robot Manipulator: A Direct Discretization Technical Route.
IEEE Trans. Neural Networks Learn. Syst., June, 2023
Tracking Control of Cable-Driven Planar Robot Based on Discrete-Time Recurrent Neural Network With Immediate Discretization Method.
IEEE Trans. Ind. Informatics, June, 2023
J. Syst. Softw., April, 2023
CRAM: Code Recommendation With Programming Context Based on Self-Attention Mechanism.
IEEE Trans. Reliab., March, 2023
<i>ASSBert</i>: Active and semi-supervised bert for smart contract vulnerability detection.
J. Inf. Secur. Appl., March, 2023
Direct derivation scheme of DT-RNN algorithm for discrete time-variant matrix pseudo-inversion with application to robotic manipulator.
Appl. Soft Comput., January, 2023
A Novel Homomorphic Encryption and Consortium Blockchain-Based Hybrid Deep Learning Model for Industrial Internet of Medical Things.
IEEE Trans. Netw. Sci. Eng., 2023
Combine sliced joint graph with graph neural networks for smart contract vulnerability detection.
J. Syst. Softw., 2023
A new ZNN model for finding discrete time-variant matrix square root: From model design to parameter analysis.
J. Comput. Appl. Math., 2023
DLRegion: Coverage-guided fuzz testing of deep neural networks with region-based neuron selection strategies.
Inf. Softw. Technol., 2023
Frontiers Comput. Sci., 2023
Extended Abstract of Combine Sliced Joint Graph with Graph Neural Networks for Smart Contract Vulnerability Detection.
Proceedings of the IEEE International Conference on Software Analysis, 2023
TemLock: A Lightweight Template-based Approach for Fixing Deadlocks Caused by ReentrantLock.
Proceedings of the IEEE International Conference on Software Analysis, 2023
ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the Machine Learning for Cyber Security - 5th International Conference, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
An Intelligent Duplicate Bug Report Detection Method Based on Technical Term Extraction.
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2023
2022
Frontiers Inf. Technol. Electron. Eng., 2022
Recurrent neural dynamics for handling linear equation system with rank-deficient coefficient and disturbance existence.
J. Frankl. Inst., 2022
A deep learning-based approach for software vulnerability detection using code metrics.
IET Softw., 2022
Empir. Softw. Eng., 2022
Autom. Softw. Eng., 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the Blockchain Technology and Emerging Technologies, 2022
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
Transformation-based processing of typed resources for multimedia sources in the IoT environment.
Wirel. Networks, 2021
J. Softw. Evol. Process., 2021
J. Softw. Evol. Process., 2021
Knowl. Based Syst., 2021
Node deletion-based algorithm for blocking maximizing on negative influence from uncertain sources.
Knowl. Based Syst., 2021
<i>BGNN4VD</i>: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection.
Inf. Softw. Technol., 2021
Frontiers Comput. Sci., 2021
Why and what happened? Aiding bug comprehension with automated category and causal link identification.
Empir. Softw. Eng., 2021
Deep pre-trained networks as a feature extractor with XGBoost to detect tuberculosis from chest X-ray.
Comput. Electr. Eng., 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
2020
J. Syst. Softw., 2020
2019
Eng. Appl. Artif. Intell., 2019
How security bugs are fixed and what can be improved: an empirical study with Mozilla.
Sci. China Inf. Sci., 2019
IEEE Access, 2019
Modeling Data, Information and Knowledge for Security Protection of Hybrid IoT and Edge Resources.
IEEE Access, 2019
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019
2018
Processing Optimization of Typed Resources with Synchronized Storage and Computation Adaptation in Fog Computing.
Wirel. Commun. Mob. Comput., 2018
J. Syst. Softw., 2018
Effectiveness of exploring historical commits for developer recommendation: an empirical study.
Frontiers Comput. Sci., 2018
IEEE Access, 2018
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018
Proceedings of the 26th Conference on Program Comprehension, 2018
2017
Using Hierarchical Latent Dirichlet Allocation to Construct Feature Tree for Program Comprehension.
Sci. Program., 2017
Enhancing developer recommendation with supplementary information via mining historical commits.
J. Syst. Softw., 2017
计算机科学, 2017
Data, information, and knowledge-driven manipulation between strategical planning and technical implementation for wireless sensor network construction.
Int. J. Distributed Sens. Networks, 2017
Bidirectional value driven design between economical planning and technical implementation based on data graph, information graph and knowledge graph.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017
Answering Who/When, What, How, Why through Constructing Data Graph, Information Graph, Knowledge Graph and Wisdom Graph.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017
Proceedings of the 9th Asia-Pacific Symposium on Internetware, 2017
A Pay as You Use Resource Security Provision Approach Based on Data Graph, Information Graph and Knowledge Graph.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2017 - 18th International Conference, Guilin, China, October 30, 2017
An Investment Defined Transaction Processing Towards Temporal and Spatial Optimization with Collaborative Storage and Computation Adaptation.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2017 - 18th International Conference, Guilin, China, October 30, 2017
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
Constructing Search as a Service Towards Non-deterministic and Not Validated Resource Environment with a Positive-Negative Strategy.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017
Proceedings of the 24th Asia-Pacific Software Engineering Conference, 2017
2016
Sci. Program., 2016
Towards a problem-value-constraint framework for maximising business value through minimising under design and over design.
Int. J. Serv. Technol. Manag., 2016
Int. J. Softw. Eng. Knowl. Eng., 2016
Int. J. Softw. Eng. Knowl. Eng., 2016
Int. J. Networked Distributed Comput., 2016
Refinement on Data, Information and Knowledge Lifecycles towards Service Economics Planning to Services Implementation.
Int. J. Networked Distributed Comput., 2016
IPSETFUL: an iterative process of selecting test cases for effective fault localization by exploring concept lattice of program spectra.
Frontiers Comput. Sci., 2016
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016
Proceedings of the 24th IEEE International Conference on Program Comprehension, 2016
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2016, 2016
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2016, 2016
Enhancing UML Class Diagram Abstraction with Page Rank Algorithm and Relationship Abstraction Rules.
Proceedings of the Service-Oriented Computing - ICSOC 2016 Workshops, 2016
Proceedings of the 38th International Conference on Software Engineering, 2016
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016
DR_PSF: Enhancing Developer Recommendation by Leveraging Personalized Source-Code Files.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016
2015
What Information in Software Historical Repositories Do We Need to Support Software Maintenance Tasks? An Approach Based on Topic Model.
Proceedings of the Computer and Information Science, 2015
MSR4SM: Using topic models to effectively mining software repositories for software maintenance tasks.
Inf. Softw. Technol., 2015
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015
A Problem-Value-Constraint Framework for Minimizing Under Design and Over Design in Web Service Based System Development.
Proceedings of the International Conference on Service Science, 2015
Proceedings of the 19th International Conference on Evaluation and Assessment in Software Engineering, 2015
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
Change impact analysis and changeability assessment for a change proposal: An empirical study ☆☆.
J. Syst. Softw., 2014
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014
2013
Softw. Test. Verification Reliab., 2013
FCA-CIA: An approach of using FCA to support cross-level change impact analysis for object oriented Java programs.
Inf. Softw. Technol., 2013
Int. J. Softw. Eng. Knowl. Eng., 2013
Adv. Eng. Softw., 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
CLPS-MFL: Using Concept Lattice of Program Spectrum for Effective Multi-fault Localization.
Proceedings of the 2013 13th International Conference on Quality Software, 2013
Proceedings of the 1st International Workshop on Data Analysis Patterns in Software Engineering, 2013
2012
Adv. Eng. Softw., 2012
Mining Call Graph for Change Impact Analysis.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012
Using FCA-based Change Impact Analysis for Regression Testing.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012
Proceedings of the Fourth Asia-Pacific Symposium on Internetware, 2012
A Change Proposal Driven Approach for Changeability Assessment Using FCA-Based Impact Analysis.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012
2011
Program slicing spectrum-based software fault localization.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011
Using lattice of class and method dependence for change impact analysis of object oriented programs.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011
2010
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
A Hierarchical Model for Regression Test Selection and Cost Analysis of Java Programs.
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010