Xiaoxue Wu

Orcid: 0000-0002-7567-3643

According to our database1, Xiaoxue Wu authored at least 46 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Empirical Study on Correlations Between Deep Neural Network Fairness and Neuron Coverage Criteria.
IEEE Trans. Software Eng., March, 2024

Learning to Detect Memory-related Vulnerabilities.
ACM Trans. Softw. Eng. Methodol., February, 2024

Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection Systems.
CoRR, 2024

A Systematic Literature Review on Explainability for Machine/Deep Learning-based Software Engineering Research.
CoRR, 2024

2023
Automated software bug localization enabled by meta-heuristic-based convolutional neural network and improved deep neural network.
Expert Syst. Appl., December, 2023

An empirical evaluation of deep learning-based source code vulnerability detection: Representation versus models.
J. Softw. Evol. Process., November, 2023

RNNtcs: A test case selection method for Recurrent Neural Networks.
Knowl. Based Syst., November, 2023

Automatic software vulnerability assessment by extracting vulnerability elements.
J. Syst. Softw., October, 2023

Incremental reduction methods based on granular ball neighborhood rough sets and attribute grouping.
Int. J. Approx. Reason., September, 2023

An Abstract Syntax Tree based static fuzzing mutation for vulnerability evolution analysis.
Inf. Softw. Technol., June, 2023

VulLoc: vulnerability localization based on inducing commits and fixing commits.
Frontiers Comput. Sci., 2023

ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

An Intelligent Duplicate Bug Report Detection Method Based on Technical Term Extraction.
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2023

2022
Dynamic Analysis of a New Financial System with Diffusion Effect and Two Delays.
Int. J. Bifurc. Chaos, December, 2022

Data Quality Matters: A Case Study on Data Label Correctness for Security Bug Report Prediction.
IEEE Trans. Software Eng., 2022

ReCDroid+: Automated End-to-End Crash Reproduction from Bug Reports for Android Apps.
ACM Trans. Softw. Eng. Methodol., 2022

Domain knowledge-based security bug reports prediction.
Knowl. Based Syst., 2022

An approach of method-level bug localization.
IET Softw., 2022

SPVF: security property assisted vulnerability fixing via attention-based models.
Empir. Softw. Eng., 2022

A Comprehensive Analysis of NVD Concurrency Vulnerabilities.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

2021
A Comparative Study of Class Rebalancing Methods for Security Bug Report Classification.
IEEE Trans. Reliab., 2021

Improving high-impact bug report prediction with combination of interactive machine learning and active learning.
Inf. Softw. Technol., 2021

A survey of Intel SGX and its applications.
Frontiers Comput. Sci., 2021

Representation vs. Model: What Matters Most for Source Code Vulnerability Detection.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

GrasP: Graph-to-Sequence Learning for Automated Program Repair.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Automatically Identifying Bug Reports with Tactical Vulnerabilities by Deep Feature Learning.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

A Domain Knowledge-Guided Lightweight Approach for Security Bug Reports Prediction.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

2020
Invalid bug reports complicate the software aging situation.
Softw. Qual. J., 2020

The impact factors on the performance of machine learning-based vulnerability detection: A comparative study.
J. Syst. Softw., 2020

CVE-assisted large-scale security bug report dataset construction method.
J. Syst. Softw., 2020

Literature survey of deep learning-based vulnerability analysis on source code.
IET Softw., 2020

An Efficient Detection Approach for LDoS Attack based on NCS-SVM Algorithm.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Improving the Security of Wireless Network Through Cross-project Security Issue Prediction.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

2019
Towards understanding bugs in an open source cloud management stack: An empirical study of OpenStack software bugs.
J. Syst. Softw., 2019

UTCPredictor: An uncertainty-aware novel teaching cases predictor.
Comput. Appl. Eng. Educ., 2019

2018
MS-guided many-objective evolutionary optimisation for test suite minimisation.
IET Softw., 2018

The Performance Evaluation Model of Intel SGX-Based Data Protection.
Proceedings of the 2018 IEEE SmartWorld, 2018

Leaks or Not: A Framework for Evaluating Cache Timing Side Channel Attacks in SGX.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Low-Rate DoS Attack Detection Method Based on Hilbert Spectrum and Correlation.
Proceedings of the 2018 IEEE SmartWorld, 2018

2017
基于本体的并发错误测试工具推荐方法研究 (Research on Recommendation of Concurrency Bug Testing Tools Based on Ontology).
计算机科学, 2017

运用变异测试的并行程序测试用例最小化算法 (Mutation Test Based Test Case Minimization for Concurrent Program).
计算机科学, 2017

Test Suite Minimization with Mutation Testing-Based Many-Objective Evolutionary Optimization.
Proceedings of the 2017 International Conference on Software Analysis, 2017

2016
Locating Minimal Fault Interaction in Combinatorial Testing.
Adv. Softw. Eng., 2016

2014
Intelligent Data Acquisition and Processing of Remote Monitoring System Based on Internet of Things.
Proceedings of the Human Centered Computing - First International Conference, 2014

2010
Bayesian Cramér-rao Bound for channel estimation in cooperative OFDM.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2010


  Loading...