2025
Privacy-Preserving Federated Neural Architecture Search With Enhanced Robustness for Edge Computing.
IEEE Trans. Mob. Comput., March, 2025
2024
Comparing the Pretrained Models of Source Code by Re-pretraining Under a Unified Setup.
IEEE Trans. Neural Networks Learn. Syst., December, 2024
An extensive replication study of the ABLoTS approach for bug localization.
Empir. Softw. Eng., November, 2024
Esale: Enhancing Code-Summary Alignment Learning for Source Code Summarization.
IEEE Trans. Software Eng., August, 2024
Judicial intelligent assistant system: Extracting events from Chinese divorce cases to detect disputes for the judge.
Expert Syst. J. Knowl. Eng., July, 2024
PassSum: Leveraging paths of abstract syntax trees and self-supervision for code summarization.
J. Softw. Evol. Process., June, 2024
Decentralized Scheduling for Concurrent Tasks in Mobile Edge Computing via Deep Reinforcement Learning.
IEEE Trans. Mob. Comput., April, 2024
RobustNPR: Evaluating the robustness of neural program repair models.
J. Softw. Evol. Process., April, 2024
FMASketch: Freehand Mid-Air Sketching in AR.
Int. J. Hum. Comput. Interact., April, 2024
An Extractive-and-Abstractive Framework for Source Code Summarization.
,
,
,
,
,
,
,
,
,
,
ACM Trans. Softw. Eng. Methodol., March, 2024
PTM-APIRec: Leveraging Pre-trained Models of Source Code in API Recommendation.
ACM Trans. Softw. Eng. Methodol., March, 2024
CCAF: Learning Code Change via AdapterFusion.
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024
An Empirical Study on Code Search Pre-trained Models: Academic Progresses vs. Industry Requirements.
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024
Practical Program Repair via Preference-based Ensemble Strategy.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
RAT: A Refactoring-Aware Tool for Tracking Code History.
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024
FAIR: Flow Type-Aware Pre-Training of Compiler Intermediate Representations.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
A Crowdsourcing Digital Forensics Platform for IoT Environments Powered by Blockchain.
Proceedings of the IEEE International Conference on Communications, 2024
On Evaluating the Efficiency of Source Code Generated by LLMs.
Proceedings of the 2024 IEEE/ACM First International Conference on AI Foundation Models and Software Engineering, 2024
Leveraging Hierarchies: HMCAT for Efficiently Mapping CTI to Attack Techniques.
Proceedings of the Computer Security - ESORICS 2024, 2024
LJPCheck: Functional Tests for Legal Judgment Prediction.
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
Machine Learning-Based Non-Intrusive Digital Forensic Service for Smart Homes.
IEEE Trans. Netw. Serv. Manag., June, 2023
Learning the Relation Between Similarity Loss and Clustering Loss in Self-Supervised Learning.
IEEE Trans. Image Process., 2023
A Comprehensive Evaluation of Parameter-Efficient Fine-Tuning on Software Engineering Tasks.
CoRR, 2023
Judicial Intelligent Assistant System: Extracting Events from Divorce Cases to Detect Disputes for the Judge.
CoRR, 2023
ARPad: Compound Spatial-Semantic Gesture Interaction in Augmented Reality.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2023
The ABLoTS Approach for Bug Localization: is it replicable and generalizable?
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023
An Automated and Flexible Multilingual Bug-Fix Dataset Construction System.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Domain Adaptive Code Completion via Language Models and Decoupled Domain Databases.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Improving Online POMDP Planning Algorithms with Decaying Q Value.
Proceedings of the 35th IEEE International Conference on Tools with Artificial Intelligence, 2023
CrossCodeBench: Benchmarking Cross-Task Generalization of Source Code Models.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
An Empirical Comparison of Pre-Trained Models of Source Code.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
RAT: A Refactoring-Aware Traceability Model for Bug Localization.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Convolutional Neural Network Based Classification of WeChat Mini-Apps.
Proceedings of the IEEE International Conference on Communications, 2023
Credibility Management of Cloud-based Digital Forensic Data: A Decentralized Verification Mechanism.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
MuTCR: Test Case Recommendation via Multi-Level Signature Matching.
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2023
A Partially Observable Monte Carlo Planning Algorithm Based on Path Modification.
Proceedings of the Asian Conference on Machine Learning, 2023
Backdooring Neural Code Search.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023
2022
Measuring Business Process Behavioral Similarity Based on Token Log Profile.
IEEE Trans. Serv. Comput., 2022
Predicting Product Review Helpfulness - A Hybrid Method.
IEEE Trans. Serv. Comput., 2022
SGBRT: An Edge-Intelligence Based Remaining Useful Life Prediction Model for Aero-Engine Monitoring System.
IEEE Trans. Netw. Sci. Eng., 2022
Statute recommendation: Re-ranking statutes by modeling case-statute relation with interpretable hand-crafted features.
Inf. Sci., 2022
TamForen: A tamper-proof cloud forensic framework.
Trans. Emerg. Telecommun. Technol., 2022
An Extractive-and-Abstractive Framework for Source Code Summarization.
CoRR, 2022
Lighting up supervised learning in user review-based code localization: dataset and benchmark.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
StandUp4NPR: Standardizing SetUp for Empirically Comparing Neural Program Repair Systems.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Neural Program Repair : Systems, Challenges and Solutions.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022
Towards Just-In-Time Feature Request Approval Prediction.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022
Deep Learning Meets Software Engineering: A Survey on Pre-Trained Models of Source Code.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
AST-Trans: Code Summarization with Efficient Tree-Structured Attention.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
SPT-Code: Sequence-to-Sequence Pre-Training for Learning Source Code Representations.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Using Cloud Computing Based Crowdsourcing for Security and Privacy Settings of Android Users.
Proceedings of the IEEE Global Communications Conference, 2022
2021
Interaction-Oriented Service Entity Placement in Edge Computing.
IEEE Trans. Mob. Comput., 2021
Recommending Statutes: A Portable Method Based on Neural Networks.
ACM Trans. Knowl. Discov. Data, 2021
Dependency Learning for Legal Judgment Prediction with a Unified Text-to-Text Transformer.
CoRR, 2021
Learning Fine-grained Fact-Article Correspondence in Legal Cases.
CoRR, 2021
SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
AST-Transformer: Encoding Abstract Syntax Trees Efficiently for Code Summarization.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
A Non-Intrusive Method for Smart Speaker Forensics.
Proceedings of the ICC 2021, 2021
Optimizing Federated Edge Learning on Non-IID Data via Neural Architecture Search.
Proceedings of the IEEE Global Communications Conference, 2021
Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction.
Proceedings of the IEEE Global Communications Conference, 2021
Understanding Digital Forensic Characteristics of Smart Speaker Ecosystems.
Proceedings of the IEEE Global Communications Conference, 2021
Don't Miss the Potential Customers! Retrieving Similar Ads to Improve User Targeting.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021
2020
Leveraging multiple features for document sentiment classification.
Inf. Sci., 2020
A novel completeness definition of event logs and corresponding generation algorithm.
Expert Syst. J. Knowl. Eng., 2020
Efficient Service Entity Chain Placement in Mobile Edge Computing.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Retrieving Similar Software from Large-scale Open-source Repository by Constructing Representation of Project Description.
Proceedings of the 5th International Conference on Internet of Things, 2020
Detecting and Mitigating ARP Attacks in SDN-Based Cloud Environment.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Forensic Model for DDoS Attack.
Proceedings of the IEEE Global Communications Conference, 2020
Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network.
Proceedings of the IEEE Global Communications Conference, 2020
Identifying Exaggerated Language.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020
2019
Monitoring Interactions Across Multi Business Processes with Token Carried Data.
IEEE Trans. Serv. Comput., 2019
A Utility-Based Optimization Framework for Edge Service Entity Caching.
IEEE Trans. Parallel Distributed Syst., 2019
File-level socio-technical congruence and its relationship with bug proneness in OSS projects.
J. Syst. Softw., 2019
Online learning offloading framework for heterogeneous mobile edge computing system.
J. Parallel Distributed Comput., 2019
Modeling and deploying hybrid tenant requests with shared networklets.
Comput. Networks, 2019
Timing Channel in IaaS: How to Identify and Investigate.
IEEE Access, 2019
An Efficient Heuristic Method for Repairing Event Logs Independent of Process Models.
Proceedings of the 4th International Conference on Internet of Things, 2019
Word Segmentation for Chinese Judicial Documents.
Proceedings of the Data Science, 2019
Statute Recommendation Based on Word Embedding.
Proceedings of the Data Science, 2019
Evaluation System for Reasoning Description of Judgment Documents Based on TensorFlow CNN.
Proceedings of the Data Science, 2019
Apply event extraction techniques to the judicial field.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019
A Design of Firewall Based on Feedback of Intrusion Detection System in Cloud Environment.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Cloud Database Encryption Technology Based on Combinatorial Encryption.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Improving Statute Prediction via Mining Correlations between Statutes.
Proceedings of The 11th Asian Conference on Machine Learning, 2019
2018
Cost and Energy Aware Scheduling Algorithm for Scientific Workflows with Deadline Constraint in Clouds.
IEEE Trans. Serv. Comput., 2018
Video-based salient object detection via spatio-temporal difference and coherence.
Multim. Tools Appl., 2018
Automatically classifying user requests in crowdsourcing requirements engineering.
J. Syst. Softw., 2018
PTM: A Topic Model for the Inferring of the Penalty.
J. Comput. Sci. Technol., 2018
A load-aware resource allocation and task scheduling for the emerging cloudlet system.
Future Gener. Comput. Syst., 2018
Timing Channel in IaaS: How to Identify and Investigate.
CoRR, 2018
Real-Time Behavior Analysis and Identification for Android Application.
IEEE Access, 2018
Does Socio-Technical Congruence Have an Effect on Continuous Integration Build Failures? An Empirical Study on 10 GitHub Projects.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
Automatically Classifying Chinese Judgment Documents Using Character-Level Convolutional Neural Networks.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018
A Novel Convolutional Neural Network for Statutes Recommendation.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018
Construction of Microblog-Specific Chinese Sentiment Lexicon Based on Representation Learning.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018
Statutes Recommendation Using Classification and Co-occurrence Between Statutes.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018
The Construction Approach of Statutes Database.
Proceedings of the Data Science, 2018
Predicting Statutes Based on Causes of Action and Content of Statutes.
Proceedings of the Data Science, 2018
Establish Evidence Chain Model on Chinese Criminal Judgment Documents Using Text Similarity Measure.
Proceedings of the Data Science, 2018
Monitoring User-Intent of Cloud-Based Networked Applications in Cognitive Networks.
Proceedings of the IEEE Global Communications Conference, 2018
Word Embedding Based Document Similarity for the Inferring of Penalty.
Proceedings of the Web Information Systems and Applications, 2018
2017
Security Threats to Hadoop: Data Leakage Attacks and Investigation.
IEEE Netw., 2017
Tag refinement of micro-videos by learning from multiple data sources.
Multim. Tools Appl., 2017
Software cybernetics in BPM: Modeling software behavior as feedback for evolution by a novel discovery method based on augmented event logs.
J. Syst. Softw., 2017
A lightweight live memory forensic approach based on hardware virtualization.
Inf. Sci., 2017
Energy cost minimization with job security guarantee in Internet data center.
Future Gener. Comput. Syst., 2017
Distributed Cloud Forensic System with Decentralization and Multi-participation.
Proceedings of the Wireless Internet - 10th International Conference, 2017
Exploring the Influence of Feature Selection Techniques on Bug Report Prioritization.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017
Personalized Micro-Video Recommendation via Hierarchical User Interest Modeling.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017
Eyes Understand the Sketch!: Gaze-Aided Stroke Grouping of Hand-Drawn Flowcharts.
Proceedings of the 22nd International Conference on Intelligent User Interfaces, 2017
Task Offloading for Scientific Workflow Application in Mobile Cloud.
Proceedings of the 2nd International Conference on Internet of Things, 2017
Topic Model Based Text Similarity Measure for Chinese Judgment Document.
Proceedings of the Data Science, 2017
Build Evidence Chain Relational Model Based on Chinese Judgment Documents.
Proceedings of the Data Science, 2017
Analyzing Android Application in Real-Time at Kernel Level.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
AutoPatchDroid: A framework for patching inter-app vulnerabilities in android application.
Proceedings of the IEEE International Conference on Communications, 2017
Automatically Classify Chinese Judgment Documents Utilizing Machine Learning Algorithms.
Proceedings of the Database Systems for Advanced Applications, 2017
Information Extraction from Chinese Judgment Documents.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017
Statutes Recommendation Based on Text Similarity.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017
Checking the Statutes in Chinese Judgment Document Based on Editing Distance Algorithm.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017
Cluster Correction on Polysemy and Synonymy.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017
Knowledge Graph Construction Based on Judicial Data with Social Media.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017
A Method of the Association Statistics between the Cause of Action and the Statutes.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017
Design and Implementation of Visual Modeling Tool for Evidence Chain.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017
2016
A Spatial-Temporal Topic Model for the Semantic Annotation of POIs in LBSNs.
ACM Trans. Intell. Syst. Technol., 2016
基于抽象状态的类的行为规格化方法 (Behavior Specification Method of Class Based on Abstract State).
计算机科学, 2016
Process mining with token carried data.
Inf. Sci., 2016
A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds.
Future Gener. Comput. Syst., 2016
Investigating Timing Channel in IaaS.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016
Energy Cost Minimization with Risk Rate Constraint for Internet Data Center in Deregulated Electricity Markets.
Proceedings of the International Conference on Internet of Things and Big Data, 2016
A shared memory based cross-VM side channel attacks in IaaS cloud.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Salient Object Detection via Video Spatio-Temporal Difference and Coherence.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016
iReference: Make the Reference Details Under Your Nose.
Proceedings of the Fourth International Symposium on Chinese CHI, 2016
2015
Data correlation-based analysis methods for automatic memory forensic.
Secur. Commun. Networks, 2015
基于语法描述语言的在线手绘流程图识别 (On-line Handwritten Flowchart Recognition Based on Grammar Description Language).
计算机科学, 2015
Correlating processes for automatic memory evidence analysis.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
PCFBPI: A Point Clustering Feature Based Policy Iteration Algorithm.
Proceedings of the 27th IEEE International Conference on Tools with Artificial Intelligence, 2015
Detective: Automatically identify and analyze malware processes in forensic scenarios via DLLs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Haddle: A Framework for Investigating Data Leakage Attacks in Hadoop.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Predicting Users' Purchasing Behaviors Using Their Browsing History.
Proceedings of the Databases Theory and Applications, 2015
Predicting Passengers in Public Transportation Using Smart Card Data.
Proceedings of the Databases Theory and Applications, 2015
2014
WAS: A weighted attribute-based strategy for cluster test selection.
J. Syst. Softw., 2014
Combining research and education of software testing: a preliminary study.
Proceedings of the Symposium on Applied Computing, 2014
POPVI: A Probability-Based Optimal Policy Value Iteration Algorithm.
Proceedings of the PRICAI 2014: Trends in Artificial Intelligence, 2014
Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensics.
Proceedings of the Information Security - 17th International Conference, 2014
Quasi-crowdsourcing testing for educational projects.
Proceedings of the 36th International Conference on Software Engineering, 2014
2013
A Task Selecting Algorithm for Personal Schedules in Workflow Systems.
Proceedings of the Web Information Systems Engineering - WISE 2013 Workshops, 2013
Mining Sequential Patterns of Predicates for Fault Localization and Understanding.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
Product and User Dependent Social Network Models for Recommender Systems.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013
How screen size influences Chinese readability.
Proceedings of the Augmentation, Application, Innovation, Collaboration, OzCHI '13, Adelaide, Australia - November 25, 2013
A Method to Automatically Filter Log Evidences for Intrusion Forensics.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
2012
Discovering process models from event multiset.
Expert Syst. Appl., 2012
Using Weighted Attributes to Improve Cluster Test Selection.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
An Experience of Teaching HCI to Undergraduate Software Engineering Students.
Proceedings of the 25th IEEE Conference on Software Engineering Education and Training, 2012
2011
An empirical study on the effectiveness of time-aware test case prioritization techniques.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
A New Process Mining Algorithm Based on Event Type.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
An introductory software engineering course for software engineering program.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011
Research and practice on software engineering undergraduate curriculum NJU-SEC2006.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011
Teaching software testing methods based on diversity principles.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011
2009
A Novel Practical Framework for Operating Systems Teaching.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009
2007
Applying ontology in architecture-based self-management applications.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
2005
A Study on Illumination Invariant Face Recognition Methods Based on Multiple Eigenspaces.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005
A Multiple Eigenspaces Constructing Method and Its Application to Face Recognition.
Proceedings of the Advances in Natural Computation, First International Conference, 2005
An Efficient Adaptive Focused Crawler Based on Ontology Learning.
Proceedings of the 5th International Conference on Hybrid Intelligent Systems (HIS 2005), 2005