


default search action
Xiaobing Sun 0001
Person information
- unicode name: 孙小兵
- affiliation: Yangzhou University, School of Information Engineering, China
- affiliation (PhD): Southeast University, Nanjing, China
Other persons with the same name
- Xiaobing Sun — disambiguation page
- Xiaobing Sun 0002 — Singapore University of Technology and Design, Singapore
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j95]Rongcun Wang, Xingyu Ji, Yuan Tian, Senlei Xu, Xiaobing Sun, Shujuan Jiang:
Fixer-level supervised contrastive learning for bug assignment. Empir. Softw. Eng. 30(3): 76 (2025) - [j94]Xiaoxue Wu
, Shiyu Weng, Bin Zheng, Wei Zheng, Xiang Chen, Xiaobing Sun:
NG_MDERANK: A software vulnerability feature knowledge extraction method based on N-gram similarity. J. Softw. Evol. Process. 37(1) (2025) - [j93]Bosen Rao, Jiale Zhang, Di Wu, Chengcheng Zhu, Xiaobing Sun, Bing Chen:
Privacy Inference Attack and Defense in Centralized and Federated Learning: A Comprehensive Survey. IEEE Trans. Artif. Intell. 6(2): 333-353 (2025) - [j92]Yang Shi, Chenling Ding, Shuai Li, Bin Li, Xiaobing Sun:
New RNN Algorithms for Different Time-Variant Matrix Inequalities Solving Under Discrete-Time Framework. IEEE Trans. Neural Networks Learn. Syst. 36(3): 5244-5257 (2025) - [i11]Jiale Zhang, Bosen Rao, Chengcheng Zhu, Xiaobing Sun, Qingming Li, Haibo Hu, Xiapu Luo, Qingqing Ye, Shouling Ji:
Fine-tuning is Not Fine: Mitigating Backdoor Attacks in GNNs with Limited Clean Data. CoRR abs/2501.05835 (2025) - 2024
- [j91]Rongcun Wang, Senlei Xu, Yuan Tian
, Xingyu Ji, Xiaobing Sun, Shujuan Jiang:
SCL-CVD: Supervised contrastive learning for code vulnerability detection via GraphCodeBERT. Comput. Secur. 145: 103994 (2024) - [j90]Chao Yang, Xiaobing Sun, Qingyu He, Qichao Wang, Yongming Li:
Deterministic fuzzy two-dimensional on-line tessellation automata and their languages. Fuzzy Sets Syst. 491: 109051 (2024) - [j89]Chao Yang, Ruiling Wu, Xiaobing Sun, Qichao Wang, Yongming Li:
Relative approximate bisimulations for fuzzy picture automata. Inf. Comput. 299: 105172 (2024) - [j88]Sicong Cao
, Xiaobing Sun
, Wei Liu
, Di Wu
, Jiale Zhang
, Yan Li
, Tom H. Luan
, Longxiang Gao
:
EXVul: Toward Effective and Explainable Vulnerability Detection for IoT Devices. IEEE Internet Things J. 11(12): 22385-22398 (2024) - [j87]Yang Shi
, Wei Chong, Wenhan Zhao, Shuai Li, Bin Li, Xiaobing Sun:
A new recurrent neural network based on direct discretization method for solving discrete time-variant matrix inversion with application. Inf. Sci. 652: 119729 (2024) - [j86]Jie Cai, Bin Li, Tao Zhang
, Jiale Zhang, Xiaobing Sun:
Fine-grained smart contract vulnerability detection by heterogeneous code feature learning and automated dataset construction. J. Syst. Softw. 209: 111919 (2024) - [j85]Weitong Chen
, Yuheng Li, Zhenhao Niu, Yanyan Xu, Anja Keskinarkaus
, Tapio Seppänen
, Xiaobing Sun:
Real-time and screen-cam robust screen watermarking. Knowl. Based Syst. 302: 112380 (2024) - [j84]Wangjie Ji, Lili Bo, Yanchi Yuan, Xiaobing Sun:
TDFix: A lightweight tool for fixing deadlocks based on templates. Sci. Comput. Program. 233: 103073 (2024) - [j83]Xiaobing Sun
, Lili Li, Lili Bo
, Xiaojun Wu, Ying Wei, Bin Li:
Automatic software vulnerability classification by extracting vulnerability triggers. J. Softw. Evol. Process. 36(2) (2024) - [j82]Waqas Ali, Lili Bo
, Xiaobing Sun, Xiaoxue Wu, Aakash Ali, Ying Wei:
Software bug localization based on optimized and ensembled deep learning models. J. Softw. Evol. Process. 36(8) (2024) - [j81]Jie Cai
, Qian Cai, Bin Li, Jiale Zhang, Xiaobing Sun:
Application programming interface recommendation for smart contract using deep learning from augmented code representation. J. Softw. Evol. Process. 36(8) (2024) - [j80]Li Li
, Chuanqi Tao
, Hongjing Guo
, Jingxuan Zhang
, Xiaobing Sun
:
FATS: Feature Distribution Analysis-Based Test Selection for Deep Learning Enhancement. IEEE Trans. Big Data 10(2): 132-145 (2024) - [j79]Jiale Zhang
, Chengcheng Zhu
, Chunpeng Ge
, Chuan Ma
, Yanchao Zhao
, Xiaobing Sun
, Bing Chen
:
BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation. IEEE Trans. Dependable Secur. Comput. 21(5): 4559-4573 (2024) - [j78]Jiale Zhang
, Chengcheng Zhu, Xiaobing Sun
, Chunpeng Ge
, Bing Chen
, Willy Susilo
, Shui Yu
:
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training. IEEE Trans. Inf. Forensics Secur. 19: 4752-4766 (2024) - [j77]Yang Shi
, Wangrong Sheng
, Shuai Li
, Bin Li, Xiaobing Sun
:
Neurodynamics for Equality-Constrained Time-Variant Nonlinear Optimization Using Discretization. IEEE Trans. Ind. Informatics 20(2): 2354-2364 (2024) - [j76]Sicong Cao
, Xiaobing Sun
, Xinye Yang
, Xiaoxue Wu
, Wei Liu
, Bin Li:
Hierarchy-Aware Representation Learning for Industrial IoT Vulnerability Classification. IEEE Trans. Ind. Informatics 20(10): 11763-11773 (2024) - [j75]Sicong Cao
, Xiaobing Sun
, Lili Bo
, Rongxin Wu
, Bin Li
, Xiaoxue Wu
, Chuanqi Tao
, Tao Zhang
, Wei Liu
:
Learning to Detect Memory-related Vulnerabilities. ACM Trans. Softw. Eng. Methodol. 33(2): 43:1-43:35 (2024) - [j74]Jie Cai
, Bin Li, Jiale Zhang
, Xiaobing Sun
:
Ponzi Scheme Detection in Smart Contract via Transaction Semantic Representation Learning. IEEE Trans. Reliab. 73(2): 1117-1131 (2024) - [j73]Jiale Zhang
, Hao Sui, Xiaobing Sun
, Chunpeng Ge
, Lu Zhou
, Willy Susilo
:
GrabPhisher: Phishing Scams Detection in Ethereum via Temporally Evolving GNNs. IEEE Trans. Serv. Comput. 17(6): 3727-3741 (2024) - [j72]Yang Shi
, Wangrong Sheng
, Jie Wang
, Long Jin
, Bin Li, Xiaobing Sun
:
Real-Time Tracking Control and Efficiency Analyses for Stewart Platform Based on Discrete-Time Recurrent Neural Network. IEEE Trans. Syst. Man Cybern. Syst. 54(8): 5099-5111 (2024) - [c66]Sicong Cao
, Xiaobing Sun
, Xiaoxue Wu
, David Lo
, Lili Bo
, Bin Li
, Wei Liu
:
Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection Systems. ICSE 2024: 155:1-155:13 - [c65]Jiale Zhang, Chengcheng Zhu, Di Wu, Xiaobing Sun, Jianming Yong, Guodong Long:
BADFSS: Backdoor Attacks on Federated Self-Supervised Learning. IJCAI 2024: 548-558 - [c64]Sicong Cao
, Xiaobing Sun
, Xiaoxue Wu, David Lo
, Lili Bo, Bin Li, Xiaolei Liu
, Xingwei Lin
, Wei Liu
:
Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection. ASE 2024: 606-618 - [c63]Xiaobing Sun
, Xingan Gao
, Sicong Cao
, Lili Bo, Xiaoxue Wu, Kaifeng Huang
:
1+1>2: Integrating Deep Code Behaviors with Metadata Features for Malicious PyPI Package Detection. ASE 2024: 1159-1170 - [c62]Lili Bo, Wangjie Ji, Xiaobing Sun
, Ting Zhang
, Xiaoxue Wu, Ying Wei:
ChatBR: Automated assessment and improvement of bug report quality using ChatGPT. ASE 2024: 1472-1483 - [c61]Lili Bo, Yuting He, Xiaobing Sun, Wangjie Ji, Xiaohan Wu:
A Software Bug Fixing Approach Based on Knowledge-Enhanced Large Language Models. QRS 2024: 169-179 - [i10]Sicong Cao, Xiaobing Sun, Ratnadira Widyasari, David Lo, Xiaoxue Wu, Lili Bo, Jiale Zhang, Bin Li, Wei Liu, Di Wu, Yixin Chen:
A Systematic Literature Review on Explainability for Machine/Deep Learning-based Software Engineering Research. CoRR abs/2401.14617 (2024) - [i9]Sicong Cao, Xiaobing Sun, Xiaoxue Wu, David Lo, Lili Bo, Bin Li, Wei Liu:
Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection Systems. CoRR abs/2401.14886 (2024) - [i8]Xin Zhou, Sicong Cao, Xiaobing Sun, David Lo:
Large Language Model for Vulnerability Detection and Repair: Literature Review and the Road Ahead. CoRR abs/2404.02525 (2024) - [i7]Jiale Zhang, Chengcheng Zhu, Bosen Rao, Hao Sui, Xiaobing Sun, Bing Chen, Chunyi Zhou, Shouling Ji:
"No Matter What You Do!": Mitigating Backdoor Attacks in Graph Neural Networks. CoRR abs/2410.01272 (2024) - [i6]Jiale Zhang, Haoxuan Li, Di Wu, Xiaobing Sun, Qinghua Lu, Guodong Long:
Beyond Dataset Watermarking: Model-Level Copyright Protection for Code Summarization Models. CoRR abs/2410.14102 (2024) - [i5]Xiaojun Jia, Yihao Huang, Yang Liu, Peng Yan Tan, Weng Kuan Yau, Mun-Thye Mak, Xin Ming Sim, Wee Siong Ng, See-Kiong Ng, Hanqing Liu, Lifeng Zhou, Huanqian Yan, Xiaobing Sun, Wei Liu, Long Wang, Yiming Qian, Yong Liu, Junxiao Yang, Zhexin Zhang, Leqi Lei, Renmiao Chen, Yida Lu, Shiyao Cui, Zizhou Wang, Shaohua Li, Yan Wang, Rick Siow Mong Goh, Liangli Zhen, Yingjie Zhang, Zhe Zhao:
Global Challenge for Safe and Secure LLMs Track 1. CoRR abs/2411.14502 (2024) - 2023
- [j71]Yang Shi
, Wenhan Zhao, Shuai Li, Bin Li, Xiaobing Sun:
Direct derivation scheme of DT-RNN algorithm for discrete time-variant matrix pseudo-inversion with application to robotic manipulator. Appl. Soft Comput. 133: 109861 (2023) - [j70]Yang Shi
, Qiaowen Shi, Xinwei Cao, Bin Li, Xiaobing Sun, Dimitrios Gerontitis:
An advanced discrete-time RNN for handling discrete time-varying matrix inversion: Form model design to disturbance-suppression analysis. CAAI Trans. Intell. Technol. 8(3): 607-621 (2023) - [j69]Chengcheng Zhu, Jiale Zhang
, Xiaobing Sun, Bing Chen, Weizhi Meng
:
ADFL: Defending backdoor attacks in federated learning via adversarial distillation. Comput. Secur. 132: 103366 (2023) - [j68]Ying Wei, Lili Bo, Xiaojun Wu, Yue Li, Zhenlei Ye, Xiaobing Sun, Bin Li:
VulRep: vulnerability repair based on inducing commits and fixing commits. EURASIP J. Wirel. Commun. Netw. 2023(1): 34 (2023) - [j67]Waqas Ali
, Lili Bo
, Xiaobing Sun
, Xiaoxue Wu, Saifullah Memon
, Saima Siraj
, Ann Suwaree Ashton:
Automated software bug localization enabled by meta-heuristic-based convolutional neural network and improved deep neural network. Expert Syst. Appl. 232: 120562 (2023) - [j66]Lili Bo, Yue Li, Xiaobing Sun, Xiaoxue Wu, Bin Li:
VulLoc: vulnerability localization based on inducing commits and fixing commits. Frontiers Comput. Sci. 17(3): 173207 (2023) - [j65]Ying Wei, Lili Bo
, Xiaobing Sun
, Bin Li, Tao Zhang
, Chuanqi Tao:
Automated event extraction of CVE descriptions. Inf. Softw. Technol. 158: 107178 (2023) - [j64]Chuanqi Tao, Yali Tao, Hongjing Guo, Zhiqiu Huang, Xiaobing Sun
:
DLRegion: Coverage-guided fuzz testing of deep neural networks with region-based neuron selection strategies. Inf. Softw. Technol. 162: 107266 (2023) - [j63]Xiaobing Sun
, Liangqiong Tu, Jiale Zhang
, Jie Cai, Bin Li, Yu Wang
:
ASSBert: Active and semi-supervised bert for smart contract vulnerability detection. J. Inf. Secur. Appl. 73: 103423 (2023) - [j62]Chao Jiang, Yixiang Zhang, Chao Mou, Bin Li, Xiaobing Sun, Yang Shi
:
A new ZNN model for finding discrete time-variant matrix square root: From model design to parameter analysis. J. Comput. Appl. Math. 431: 115260 (2023) - [j61]Jie Cai, Bin Li, Jiale Zhang
, Xiaobing Sun
, Bing Chen:
Combine sliced joint graph with graph neural networks for smart contract vulnerability detection. J. Syst. Softw. 195: 111550 (2023) - [j60]Cheng Zhou, Bin Li, Xiaobing Sun
, Sheng Yu:
Leveraging multi-level embeddings for knowledge-aware bug report reformulation. J. Syst. Softw. 198: 111617 (2023) - [j59]Xiaobing Sun
, Zhenlei Ye, Lili Bo, Xiaoxue Wu, Ying Wei, Tao Zhang
, Bin Li:
Automatic software vulnerability assessment by extracting vulnerability elements. J. Syst. Softw. 204: 111790 (2023) - [j58]Yang Shi
, Chenling Ding, Shuai Li, Bin Li, Xiaobing Sun:
Discrete generalized-Sylvester matrix equation solved by RNN with a novel direct discretization numerical method. Numer. Algorithms 93(3): 971-992 (2023) - [j57]Hao Sui, Xiaobing Sun, Jiale Zhang
, Bing Chen, Wenjuan Li:
Multi-level membership inference attacks in federated Learning based on active GAN. Neural Comput. Appl. 35(23): 17013-17027 (2023) - [j56]Yang Shi
, Wangrong Sheng, Shuai Li, Bin Li, Xiaobing Sun, Dimitrios Gerontitis:
A direct discretization recurrent neurodynamics method for time-variant nonlinear optimization with redundant robot manipulators. Neural Networks 164: 428-438 (2023) - [j55]Yang Shi
, Jie Wang
, Shuai Li
, Bin Li, Xiaobing Sun
:
Tracking Control of Cable-Driven Planar Robot Based on Discrete-Time Recurrent Neural Network With Immediate Discretization Method. IEEE Trans. Ind. Informatics 19(6): 7414-7423 (2023) - [j54]Yang Shi
, Wenhan Zhao
, Shuai Li
, Bin Li, Xiaobing Sun
:
Novel Discrete-Time Recurrent Neural Network for Robot Manipulator: A Direct Discretization Technical Route. IEEE Trans. Neural Networks Learn. Syst. 34(6): 2781-2790 (2023) - [j53]Aitizaz Ali
, Muhammad Fermi Pasha
, Antonio Guerrieri
, Antonella Guzzo
, Xiaobing Sun
, Aamir Saeed, Amir Hussain, Giancarlo Fortino
:
A Novel Homomorphic Encryption and Consortium Blockchain-Based Hybrid Deep Learning Model for Industrial Internet of Medical Things. IEEE Trans. Netw. Sci. Eng. 10(5): 2402-2418 (2023) - [j52]Chuanqi Tao
, Kai Lin
, Zhiqiu Huang
, Xiaobing Sun
:
CRAM: Code Recommendation With Programming Context Based on Self-Attention Mechanism. IEEE Trans. Reliab. 72(1): 302-316 (2023) - [c60]Xiaoxue Wu, Wenjing Shan, Wei Zheng, Zhiguo Chen, Tao Ren, Xiaobing Sun:
An Intelligent Duplicate Bug Report Detection Method Based on Technical Term Extraction. AST 2023: 1-12 - [c59]Sicong Cao
, Xiaobing Sun, Xiaoxue Wu, Lili Bo, Bin Li, Rongxin Wu, Wei Liu, Biao He, Yu Ouyang, Jiajia Li:
Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation. ICSE 2023: 397-409 - [c58]Sen Fang
, Tao Zhang
, Youshuai Tan, He Jiang, Xin Xia, Xiaobing Sun:
RepresentThemAll: A Universal Learning Representation of Bug Reports. ICSE 2023: 602-614 - [c57]Weitong Chen
, Wei Zhang, Jiale Zhang, Xiaobing Sun, Xiang Cheng, Chengcheng Zhu:
A Client-Side Watermarking with Private-Class in Federated Learning. ML4CS 2023: 90-103 - [c56]Sicong Cao
, Biao He, Xiaobing Sun, Yu Ouyang, Chao Zhang, Xiaoxue Wu, Ting Su, Lili Bo, Bin Li, Chuanlei Ma, Jiajia Li, Tao Wei:
ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing. SP 2023: 2726-2743 - [c55]Lili Bo, Yanchi Yuan, Xiaobing Sun, Hao Xie, Bin Li:
TemLock: A Lightweight Template-based Approach for Fixing Deadlocks Caused by ReentrantLock. SANER 2023: 723-727 - [c54]Jie Cai, Bin Li, Jiale Zhang, Xiaobing Sun, Bing Chen:
Extended Abstract of Combine Sliced Joint Graph with Graph Neural Networks for Smart Contract Vulnerability Detection. SANER 2023: 851-852 - [i4]Sicong Cao, Xiaobing Sun, Xiaoxue Wu, Lili Bo, Bin Li, Rongxin Wu, Wei Liu, Biao He, Yu Ouyang, Jiajia Li:
Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation. CoRR abs/2303.07593 (2023) - [i3]Sicong Cao, Biao He, Xiaobing Sun, Yu Ouyang, Chao Zhang, Xiaoxue Wu, Ting Su, Lili Bo, Bin Li, Chuanlei Ma, Jiajia Li, Tao Wei:
ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing. CoRR abs/2304.04233 (2023) - 2022
- [j51]Bin Li, Ying Wei, Xiaobing Sun
, Lili Bo, Dingshan Chen, Chuanqi Tao:
Towards the identification of bug entities and relations in bug reports. Autom. Softw. Eng. 29(1): 24 (2022) - [j50]Zhou Zhou, Lili Bo, Xiaoxue Wu, Xiaobing Sun, Tao Zhang
, Bin Li, Jiale Zhang, Sicong Cao
:
SPVF: security property assisted vulnerability fixing via attention-based models. Empir. Softw. Eng. 27(7): 171 (2022) - [j49]Zhen Ni, Lili Bo
, Bin Li, Tianhao Chen, Xiaobing Sun, Xiaoxue Wu:
An approach of method-level bug localization. IET Softw. 16(4): 422-437 (2022) - [j48]Fazli Subhan
, Xiaojun Wu, Lili Bo
, Xiaobing Sun, Muhammad Rahman:
A deep learning-based approach for software vulnerability detection using code metrics. IET Softw. 16(5): 516-526 (2022) - [j47]Yang Shi
, Zhenggang Pan, Jian Li, Bin Li, Xiaobing Sun
:
Recurrent neural dynamics for handling linear equation system with rank-deficient coefficient and disturbance existence. J. Frankl. Inst. 359(7): 3090-3102 (2022) - [j46]Tao Zhang
, Xiaobing Sun, Zibin Zheng, Ge Li:
Intelligent analysis for software data: research and applications. Frontiers Inf. Technol. Electron. Eng. 23(5): 661-663 (2022) - [j45]Wei Zheng, Jingyuan Cheng, Xiaoxue Wu
, Ruiyang Sun, Xiaolong Wang, Xiaobing Sun:
Domain knowledge-based security bug reports prediction. Knowl. Based Syst. 241: 108293 (2022) - [c53]Jiale Zhang
, Liangqiong Tu, Jie Cai, Xiaobing Sun, Bin Li, Weitong Chen
, Yu Wang:
Vulnerability Detection for Smart Contract via Backward Bayesian Active Learning. ACNS Workshops 2022: 66-83 - [c52]Chengcheng Zhu, Jiale Zhang
, Xiang Cheng, Weitong Chen
, Xiaobing Sun:
MIA-Leak: Exploring Membership Inference Attacks in Federated Learning Systems. BlockTEA 2022: 140-154 - [c51]Sicong Cao
, Xiaobing Sun, Lili Bo, Rongxin Wu
, Bin Li, Chuanqi Tao:
MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks. ICSE 2022: 1456-1468 - [c50]Lili Bo, Xing Meng, Xiaobing Sun, Jingli Xia, Xiaoxue Wu:
A Comprehensive Analysis of NVD Concurrency Vulnerabilities. QRS 2022: 9-18 - [c49]Xingqi Cheng, Xiaobing Sun, Lili Bo, Ying Wei:
KVS: a tool for knowledge-driven vulnerability searching. ESEC/SIGSOFT FSE 2022: 1731-1735 - [i2]Sicong Cao, Xiaobing Sun, Lili Bo, Rongxin Wu, Bin Li, Chuanqi Tao:
MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks. CoRR abs/2203.02660 (2022) - [i1]Xiaobing Sun, Wei Lu:
Implicit N-grams Induced by Recurrence. CoRR abs/2205.02724 (2022) - 2021
- [j44]Muhammad Rahman, Yongzhong Cao, Xiaobing Sun, Bin Li, Yameng Hao:
Deep pre-trained networks as a feature extractor with XGBoost to detect tuberculosis from chest X-ray. Comput. Electr. Eng. 93: 107252 (2021) - [j43]Cheng Zhou, Bin Li, Xiaobing Sun
, Lili Bo:
Why and what happened? Aiding bug comprehension with automated category and causal link identification. Empir. Softw. Eng. 26(6): 118 (2021) - [j42]Xiaobing Sun, Tianchi Zhou, Rongcun Wang, Yucong Duan, Lili Bo, Jianming Chang:
Experience report: investigating bug fixes in machine learning frameworks/libraries. Frontiers Comput. Sci. 15(6): 156212 (2021) - [j41]Sicong Cao
, Xiaobing Sun
, Lili Bo, Ying Wei, Bin Li:
BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection. Inf. Softw. Technol. 136: 106576 (2021) - [j40]Xiapu Luo, Weiyi Shang, Xiaobing Sun, Tao Zhang
:
Special Issue on New Generation of Bug Fixing. J. Syst. Softw. 178: 110992 (2021) - [j39]Jinting Lu, Xiaobing Sun, Bin Li, Lili Bo, Tao Zhang
:
BEAT: Considering question types for bug question answering via templates. Knowl. Based Syst. 225: 107098 (2021) - [j38]Weijia Ju
, Ling Chen
, Bin Li, Yixin Chen, Xiaobing Sun:
Node deletion-based algorithm for blocking maximizing on negative influence from uncertain sources. Knowl. Based Syst. 231: 107451 (2021) - [j37]Yong Xu
, Lili Bo
, Xiaobing Sun
, Bin Li, Jing Jiang
, Wei Zhou:
image2emmet: Automatic code generation from web user interface image. J. Softw. Evol. Process. 33(8) (2021) - [j36]Ying Wei, Xiaobing Sun, Lili Bo, Sicong Cao
, Xin Xia, Bin Li:
A comprehensive study on security bug characteristics. J. Softw. Evol. Process. 33(10) (2021) - [j35]Honghao Gao, Yucong Duan
, Lixu Shao, Xiaobing Sun:
Transformation-based processing of typed resources for multimedia sources in the IoT environment. Wirel. Networks 27(5): 3377-3393 (2021) - [c48]Ben Tang, Bin Li, Lili Bo, Xiaoxue Wu, Sicong Cao
, Xiaobing Sun:
GrasP: Graph-to-Sequence Learning for Automated Program Repair. QRS 2021: 819-828 - 2020
- [j34]Zhen Ni, Bin Li, Xiaobing Sun
, Tianhao Chen, Ben Tang, Xinchen Shi:
Analyzing bug fix for automatic bug cause classification. J. Syst. Softw. 163: 110538 (2020) - [j33]Cheng Zhou, Bin Li, Xiaobing Sun
:
Improving software bug-specific named entity recognition with deep neural network. J. Syst. Softw. 165: 110572 (2020)
2010 – 2019
- 2019
- [j32]Xiaobing Sun
, Wei Zhou, Bin Li, Zhen Ni, Jinting Lu:
Bug Localization for Version Issues With Defect Patterns. IEEE Access 7: 18811-18820 (2019) - [j31]Xiaobing Sun
, Congying Xu, Bin Li, Yucong Duan
, Xintong Lu:
Enabling Feature Location for API Method Recommendation and Usage Location. IEEE Access 7: 49872-49881 (2019) - [j30]Yucong Duan
, Xiaobing Sun
, Haoyang Che, Chunjie Cao, Zhao Li
, Xiaoxian Yang:
Modeling Data, Information and Knowledge for Security Protection of Hybrid IoT and Edge Resources. IEEE Access 7: 99161-99176 (2019) - [j29]Xiaobing Sun, Xin Peng, Kai Zhang, Yang Liu, Yuanfang Cai:
How security bugs are fixed and what can be improved: an empirical study with Mozilla. Sci. China Inf. Sci. 62(1): 19102:1-19102:3 (2019) - [j28]Yucong Duan, Zhihui Lu, Zhangbing Zhou, Xiaobing Sun, Jie Wu:
Data Privacy Protection for Edge Computing of Smart City in a DIKW Architecture. Eng. Appl. Artif. Intell. 81: 323-335 (2019) - [j27]Tianchi Zhou, Xiaobing Sun
, Xin Xia
, Bin Li, Xiang Chen
:
Improving defect prediction with deep forest. Inf. Softw. Technol. 114: 204-216 (2019) - [c47]Congying Xu, Bosen Min, Xiaobing Sun, Jiajun Hu, Bin Li, Yucong Duan:
MULAPI: a tool for API method and usage location recommendation. ICSE (Companion Volume) 2019: 119-122 - 2018
- [j26]Jinting Lu, Ying Wei, Xiaobing Sun
, Bin Li, Wanzhi Wen, Cheng Zhou:
Interactive Query Reformulation for Source-Code Search With Word Relations. IEEE Access 6: 75660-75668 (2018) - [j25]Chunling Hu
, Bixin Li
, Xiaobing Sun:
Mining Variable-Method Correlation for Change Impact Analysis. IEEE Access 6: 77581-77595 (2018) - [j24]Xiaobing Sun, Wenyuan Xu, Xin Xia
, Xiang Chen, Bin Li:
Personalized project recommendation on GitHub. Sci. China Inf. Sci. 61(5): 050106:1-050106:14 (2018) - [j23]Xiaobing Sun, Hui Yang, Hareton Leung, Bin Li, Hanchao Jerry Li, Lingzhi Liao:
Effectiveness of exploring historical commits for developer recommendation: an empirical study. Frontiers Comput. Sci. 12(3): 528-544 (2018) - [j22]Congying Xu, Xiaobing Sun
, Bin Li, Xintong Lu, Hongjing Guo:
MULAPI: Improving API method recommendation with API usage location. J. Syst. Softw. 142: 195-205 (2018) - [j21]Zhengyang Song, Yucong Duan
, Shixiang Wan, Xiaobing Sun
, Quan Zou
, Honghao Gao, Donghai Zhu:
Processing Optimization of Typed Resources with Synchronized Storage and Computation Adaptation in Fog Computing. Wirel. Commun. Mob. Comput. 2018: 3794175:1-3794175:13 (2018) - [c46]Cheng Zhou, Bin Li, Xiaobing Sun, Hongjing Guo:
Recognizing software bug-specific named entity in software bug repository. ICPC 2018: 108-119 - [c45]Yucong Duan, Zhengyang Song, Xiaoxian Yang, Quan Zou, Xiaobing Sun, Xinyue Zhang:
Towards Cost Effective Privacy Provision for Typed Resources in IoT Environment (S). SEKE 2018: 46-49 - 2017
- [j20]Yucong Duan, Lixu Shao, Xiaoxian Yang, Xiaobing Sun, Zhangbing Zhou, Lifeng Yu:
Data, information, and knowledge-driven manipulation between strategical planning and technical implementation for wireless sensor network construction. Int. J. Distributed Sens. Networks 13(11) (2017) - [j19]Kai Zhang, Xiaobing Sun, Xin Peng, Wenyun Zhao:
基于Mozilla的安全性漏洞再修复经验研究 (Empirical Study of Reopened Security Bugs on Mozilla). 计算机科学 44(11): 41-49 (2017) - [j18]Xiaobing Sun, Hui Yang, Xin Xia
, Bin Li:
Enhancing developer recommendation with supplementary information via mining historical commits. J. Syst. Softw. 134: 355-368 (2017) - [j17]Xiaobing Sun
, Xiangyue Liu, Bin Li
, Bixin Li, David Lo
, Lingzhi Liao:
Clustering Classes in Packages for Program Comprehension. Sci. Program. 2017: 3787053:1-3787053:15 (2017) - [j16]Xiaobing Sun
, Xiangyue Liu, Yucong Duan
, Bin Li
:
Using Hierarchical Latent Dirichlet Allocation to Construct Feature Tree for Program Comprehension. Sci. Program. 2017: 4382348:1-4382348:11 (2017) - [c44]Xiaobing Sun, Tianchi Zhou, Gengjie Li, Jiajun Hu, Hui Yang, Bin Li:
An Empirical Study on Real Bugs for Machine Learning Programs. APSEC 2017: 348-357 - [c43]Yucong Duan, Lixu Shao, Xiaobing Sun, Lizhen Cui, Donghai Zhu, Zhengyang Song:
Constructing Search as a Service Towards Non-deterministic and Not Validated Resource Environment with a Positive-Negative Strategy. CollaborateCom 2017: 365-373 - [c42]Lu Wang, Xiaobing Sun
, Jingwei Wang, Yucong Duan, Bin Li:
Construct bug knowledge graph for bug resolution: poster. ICSE (Companion Volume) 2017: 189-191 - [c41]Wenyuan Xu, Xiaobing Sun, Jiajun Hu, Bin Li:
REPERSP: Recommending Personalized Software Projects on GitHub. ICSME 2017: 648-652 - [c40]Lixu Shao, Yucong Duan, Lizhen Cui, Quan Zou
, Xiaobing Sun:
A Pay as You Use Resource Security Provision Approach Based on Data Graph, Information Graph and Knowledge Graph. IDEAL 2017: 444-451 - [c39]Yucong Duan, Lixu Shao, Xiaobing Sun, Donghai Zhu, Xiaoxian Yang, Abdelrahman Osman Elfaki
:
An Investment Defined Transaction Processing Towards Temporal and Spatial Optimization with Collaborative Storage and Computation Adaptation. IDEAL 2017: 452-460 - [c38]Wenyuan Xu, Xiaobing Sun, Xin Xia
, Xiang Chen:
Scalable Relevant Project Recommendation on GitHub. Internetware 2017: 9:1-9:10 - [c37]Lixu Shao, Yucong Duan, Xiaobing Sun, Honghao Gao, Donghai Zhu, Weikai Miao:
Answering Who/When, What, How, Why through Constructing Data Graph, Information Graph, Knowledge Graph and Wisdom Graph. SEKE 2017: 1-6 - [c36]Lixu Shao, Yucong Duan, Xiaobing Sun
, Quan Zou, Rongqi Jing, Jiami Lin:
Bidirectional value driven design between economical planning and technical implementation based on data graph, information graph and knowledge graph. SERA 2017: 339-344 - 2016
- [j15]Xiaobing Sun
, Xin Peng, Bin Li, Bixin Li, Wanzhi Wen:
IPSETFUL: an iterative process of selecting test cases for effective fault localization by exploring concept lattice of program spectra. Frontiers Comput. Sci. 10(5): 812-831 (2016) - [j14]Yucong Duan, Xiaobing Sun, Antonella Longo, Zhaoxin Lin, Shixiang Wan:
Sorting Terms of "aaS" of Everything as a Service. Int. J. Networked Distributed Comput. 4(1): 32-44 (2016) - [j13]Yucong Duan, Gongzhu Hu, Xiaobing Sun, Zhaoxin Lin, Qiang Duan:
Refinement on Data, Information and Knowledge Lifecycles towards Service Economics Planning to Services Implementation. Int. J. Networked Distributed Comput. 4(4): 231-242 (2016) - [j12]Xiaobing Sun
, Qiang Geng, David Lo
, Yucong Duan, Xiangyue Liu, Bin Li:
Code Comment Quality Analysis and Improvement Recommendation: An Automated Approach. Int. J. Softw. Eng. Knowl. Eng. 26(6): 981-1000 (2016) - [j11]Xiaobing Sun
, Xin Peng, Hareton Leung, Bin Li:
ComboRT: A New Approach for Generating Regression Test Cases for Evolving Programs. Int. J. Softw. Eng. Knowl. Eng. 26(6): 1001- (2016) - [j10]Yucong Duan, Guohua Fu, Nianjun Zhou, Xiaobing Sun
, Mingdong Tang, Honghao Gao:
Towards a problem-value-constraint framework for maximising business value through minimising under design and over design. Int. J. Serv. Technol. Manag. 22(1/2): 120-141 (2016) - [j9]Xiaobing Sun
, Bin Li, Yucong Duan
, Wei Shi, Xiangyue Liu:
Mining Software Repositories for Automatic Interface Recommendation. Sci. Program. 2016: 5475964:1-5475964:11 (2016) - [c35]Yucong Duan, Qiang Duan, Gongzhu Hu, Xiaobing Sun
:
Refinement from service economics planning to ubiquitous services implementation. ICIS 2016: 1-6 - [c34]Jinfeng Shen, Xiaobing Sun
, Bin Li, Hui Yang, Jiajun Hu:
On Automatic Summarization of What and Why Information in Source Code Changes. COMPSAC 2016: 103-112 - [c33]Hui Yang, Xiaobing Sun
, Bin Li, Yucong Duan:
DR_PSF: Enhancing Developer Recommendation by Leveraging Personalized Source-Code Files. COMPSAC 2016: 239-244 - [c32]Yucong Duan, Xiaobing Sun
, Nanjangud C. Narendra, Qiang Duan, Guohua Fu, Ruomeng Xu
:
Model under design and over design on mobile applications. MOBILESoft 2016: 279-280 - [c31]Hui Yang, Xiaobing Sun
, Bin Li, Jiajun Hu:
Recommending developers with supplementary information for issue request resolution. ICSE (Companion Volume) 2016: 707-709 - [c30]Liang Huang, Yucong Duan, Zhangbing Zhou, Lixu Shao, Xiaobing Sun, Patrick C. K. Hung:
Enhancing UML Class Diagram Abstraction with Page Rank Algorithm and Relationship Abstraction Rules. ICSOC Workshops 2016: 103-116 - [c29]Hui Yang, Xiaobing Sun
, Yucong Duan, Han Zhao, Bin Li:
On Expanding Abbreviated Identifiers in the Source Code. IDEAL 2016: 588-595 - [c28]Liang Huang, Yucong Duan, Xiaobing Sun
, Zhaoxin Lin, Chuanpu Zhu:
Enhancing UML Class Diagram Abstraction with Knowledge Graph. IDEAL 2016: 606-616 - [c27]Weisong Sun, Xiaobing Sun
, Hui Yang, Bin Li:
WB4SP: A tool to build the word base for specific programs. ICPC 2016: 1-3 - [c26]Xiaobing Sun
, Xiangyue Liu, Bin Li, Yucong Duan, Hui Yang, Jiajun Hu:
Exploring topic models in software engineering data analysis: A survey. SNPD 2016: 357-362 - 2015
- [j8]Xiaobing Sun
, Bixin Li, Hareton K. N. Leung, Bin Li, Yun Li:
MSR4SM: Using topic models to effectively mining software repositories for software maintenance tasks. Inf. Softw. Technol. 66: 1-12 (2015) - [j7]Xiaobing Sun
, Bixin Li, Hareton Leung, Bin Li, Junwu Zhu:
Static change impact analysis techniques: A comparative study. J. Syst. Softw. 109: 137-149 (2015) - [c25]Yucong Duan, Guohua Fu, Nianjun Zhou, Xiaobing Sun
, Nanjangud C. Narendra, Bo Hu:
Everything as a Service (XaaS) on the Cloud: Origins, Current and Future Trends. CLOUD 2015: 621-628 - [c24]Wei Shi, Xiaobing Sun
, Bin Li, Yucong Duan, Xiangyue Liu:
Using Feature-Interface Graph for Automatic Interface Recommendation: A Case Study. CBD 2015: 296-303 - [c23]Yangchao Liu, Xiaobing Sun
, Yucong Duan:
Analyzing program readability based on WordNet. EASE 2015: 27:1-27:2 - [c22]Yucong Duan, Chengxiang Ren, Nianjun Zhou, Xiaobing Sun
, Mingdong Tang, Honghao Gao:
A Problem-Value-Constraint Framework for Minimizing Under Design and Over Design in Web Service Based System Development. ICSS 2015: 117-124 - [c21]Yucong Duan, Yuan Cao, Xiaobing Sun
:
Various "aaS" of everything as a service. SNPD 2015: 289-294 - [c20]Jiajun Hu, Xiaobing Sun
, David Lo
, Bin Li:
Modeling the evolution of development topics using Dynamic Topic Models. SANER 2015: 3-12 - [c19]Meili Lu, Xiaobing Sun
, Shaowei Wang, David Lo
, Yucong Duan:
Query expansion via WordNet for effective code search. SANER 2015: 545-549 - [c18]Jiajun Hu, Xiaobing Sun
, Bin Li:
Explore the evolution of development topics via on-line LDA. SANER 2015: 555-559 - [p1]Xiaobing Sun
, Bin Li, Yun Li, Ying Chen:
What Information in Software Historical Repositories Do We Need to Support Software Maintenance Tasks? An Approach Based on Topic Model. Computer and Information Science 2015: 27-37 - 2014
- [j6]Xiaobing Sun
, Hareton Leung
, Bin Li, Bixin Li:
Change impact analysis and changeability assessment for a change proposal: An empirical study ☆☆. J. Syst. Softw. 96: 51-60 (2014) - [c17]Li Jiang, Xiaobing Sun
, Yun Li, Xiangyue Liu:
Automatic generation of package diagram to understand Java packages. ICIS 2014: 343-348 - [c16]Xiangyue Liu, Xiaobing Sun
, Bin Li, Junwu Zhu:
PFN: A novel program feature network for program comprehension. ICIS 2014: 349-354 - [c15]Yu Liu, Xiaobing Sun
, Xiangyue Liu, Yun Li:
Supporting program comprehension with program summarization. ICIS 2014: 363-368 - 2013
- [j5]Bixin Li, Qiandong Zhang, Xiaobing Sun
, Hareton Leung
:
Using water wave propagation phenomenon to study software change impact analysis. Adv. Eng. Softw. 58: 45-53 (2013) - [j4]Xiaobing Sun
, Bixin Li, Wanzhi Wen, Sai Zhang:
Analyzing Impact Rules of Different Change Types to Support Change Impact Analysis. Int. J. Softw. Eng. Knowl. Eng. 23(3): 259-288 (2013) - [j3]Bixin Li, Xiaobing Sun
, Jacky Keung
:
FCA-CIA: An approach of using FCA to support cross-level change impact analysis for object oriented Java programs. Inf. Softw. Technol. 55(8): 1437-1449 (2013) - [j2]Bixin Li, Xiaobing Sun
, Hareton Leung
, Sai Zhang:
A survey of code-based change impact analysis techniques. Softw. Test. Verification Reliab. 23(8): 613-646 (2013) - [c14]Xiaobing Sun
, Ying Chen, Bin Li, Bixin Li:
Exploring software engineering data with formal concept analysis. DAPSE@ICSE 2013: 14-16 - [c13]Xiaobing Sun
, Bixin Li, Wanzhi Wen:
CLPS-MFL: Using Concept Lattice of Program Spectrum for Effective Multi-fault Localization. QSIC 2013: 204-207 - [c12]Bixin Li, Qiandong Zhang, Xiaobing Sun
, Hareton Leung
:
WAVE-CIA: a novel CIA approach based on call graph mining. SAC 2013: 1000-1005 - 2012
- [j1]Bixin Li, Xiaobing Sun
, Hareton Leung
:
Combining concept lattice with call graph for impact analysis. Adv. Eng. Softw. 53: 1-13 (2012) - [c11]Xiaobing Sun
, Bixin Li, Qiandong Zhang:
A Change Proposal Driven Approach for Changeability Assessment Using FCA-Based Impact Analysis. COMPSAC 2012: 328-333 - [c10]Xiaobing Sun
, Bin Li, Bixin Li, Wanzhi Wen:
A comparative study of static CIA techniques. Internetware 2012: 23:1-23:8 - [c9]Qiandong Zhang, Bixin Li, Xiaobing Sun:
Mining Call Graph for Change Impact Analysis. SEKE 2012: 7-12 - [c8]Xiaobing Sun, Bixin Li, Chuanqi Tao, Qiandong Zhang:
Using FCA-based Change Impact Analysis for Regression Testing. SEKE 2012: 452-457 - 2011
- [c7]Xiaobing Sun
, Bixin Li:
Using Formal Concept Analysis to support change analysis. ASE 2011: 641-645 - [c6]Xiang Chen, Lijiu Zhang, Qing Gu, Haigang Zhao, Ziyuan Wang, Xiaobing Sun
, Daoxu Chen:
A test suite reduction approach based on pairwise interaction of requirements. SAC 2011: 1390-1397 - [c5]Xiaobing Sun
, Bixin Li, Sai Zhang, Chuanqi Tao, Xiang Chen, Wanzhi Wen:
Using lattice of class and method dependence for change impact analysis of object oriented programs. SAC 2011: 1439-1444 - [c4]Wanzhi Wen, Bixin Li, Xiaobing Sun, Jiakai Li:
Program slicing spectrum-based software fault localization. SEKE 2011: 213-218 - 2010
- [c3]Chuanqi Tao, Bixin Li, Xiaobing Sun
, Ying Zhou:
A Hierarchical Model for Regression Test Selection and Cost Analysis of Java Programs. APSEC 2010: 290-299 - [c2]Chuanqi Tao, Bixin Li, Xiaobing Sun
, Chongfeng Zhang:
An Approach to Regression Test Selection Based on Hierarchical Slicing Technique. COMPSAC Workshops 2010: 347-352 - [c1]Xiaobing Sun
, Bixin Li, Chuanqi Tao, Wanzhi Wen, Sai Zhang:
Change Impact Analysis Based on a Taxonomy of Change Types. COMPSAC 2010: 373-382
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-21 02:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint