Bihuan Chen

Orcid: 0000-0001-7238-7492

Affiliations:
  • Fudan University, School of Computer Science / Shanghai Key Laboratory of Data Science, China
  • Nanyang Technological University, Singapore (former)


According to our database1, Bihuan Chen authored at least 77 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Lifting the Veil on the Large Language Model Supply Chain: Composition, Risks, and Mitigations.
CoRR, 2024

Vul-RAG: Enhancing LLM-based Vulnerability Detection via Knowledge-level RAG.
CoRR, 2024

A general approach to enhance the survivability of backdoor attacks by decision path coupling.
CoRR, 2024

Enhancing Field Tracking and Interprocedural Analysis to Find More Null Pointer Exceptions.
Proceedings of the IEEE International Conference on Software Analysis, 2024

C2D2: Extracting Critical Changes for Real-World Bugs with Dependency-Sensitive Delta Debugging.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

DiaVio: LLM-Empowered Diagnosis of Safety Violations in ADS Simulation Testing.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Your "Notice" Is Missing: Detecting and Fixing Violations of Modification Terms in Open Source Licenses during Forking.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Identifying Affected Libraries and Their Ecosystems for Open Source Software Vulnerabilities.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Baton: symphony of random testing and concolic testing through machine learning and taint analysis.
Sci. China Inf. Sci., March, 2023

A Large-Scale Empirical Study of Real-Life Performance Issues in Open Source Projects.
IEEE Trans. Software Eng., February, 2023

Detecting and Fixing Violations of Modification Terms in Open Source Licenses during Forking.
CoRR, 2023

Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence.
CoRR, 2023

Scalable Demand-Driven Call Graph Generation for Python.
CoRR, 2023

Understanding the Complexity and Its Impact on Testing in ML-Enabled Systems.
CoRR, 2023

Slice-Based Code Change Representation Learning.
Proceedings of the IEEE International Conference on Software Analysis, 2023

Demystifying Dependency Bugs in Deep Learning Stack.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

BugMiner: Automating Precise Bug Dataset Construction by Code Evolution History Mining.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

In Defense of Simple Techniques for Neural Network Test Case Selection.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Characterizing the Complexity and Its Impact on Testing in ML-Enabled Systems : A Case Sutdy on Rasa.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2023

2022
Characterizing usages, updates and risks of third-party libraries in Java projects.
Empir. Softw. Eng., 2022

"More Than Deep Learning": post-processing for API sequence recommendation.
Empir. Softw. Eng., 2022

Demystifying Dependency Bugs in Deep Learning Stack.
CoRR, 2022

DeepAnna: Deep Learning based Java Annotation Recommendation and Misuse Detection.
Proceedings of the IEEE International Conference on Software Analysis, 2022

Detecting Runtime Exceptions by Deep Code Representation Learning with Attention-Based Graph Neural Networks.
Proceedings of the IEEE International Conference on Software Analysis, 2022

Tracking patches for open source software vulnerabilities.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Understanding performance problems in deep learning systems.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Has My Release Disobeyed Semantic Versioning? Static Detection Based on Semantic Differencing.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

BuildSonic: Detecting and Repairing Performance-Related Configuration Smells for Continuous Integration Builds.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Buildsheriff: Change-Aware Test Failure Triage for Continuous Integration Builds.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
Guardauto: A Decentralized Runtime Protection System for Autonomous Driving.
IEEE Trans. Computers, 2021

A hybrid code representation learning approach for predicting method names.
J. Syst. Softw., 2021

TRACER: Finding Patches for Open Source Software Vulnerabilities.
CoRR, 2021

Characterizing Performance Bugs in Deep Learning Systems.
CoRR, 2021

Identifying change patterns of API misuses from code changes.
Sci. China Inf. Sci., 2021

REPFINDER: Finding Replacements for Missing APIs in Library Update.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

2020
How Are Performance Issues Caused and Resolved?-An Empirical Study from a Design Perspective.
Proceedings of the ICPE '20: ACM/SPEC International Conference on Performance Engineering, 2020

MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.
Proceedings of the 29th USENIX Security Symposium, 2020

Interactive, effort-aware library version harmonization.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

BUILDFAST: History-Aware Build Outcome Prediction for Fast Feedback and Reduced Cost in Continuous Integration.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

An Empirical Study on Dynamic Typing Related Practices in Python Systems.
Proceedings of the ICPC '20: 28th International Conference on Program Comprehension, 2020

Patch based vulnerability matching for binary programs.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java Projects.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

Butterfly Space: An Architectural Approach for Investigating Performance Issues.
Proceedings of the 2020 IEEE International Conference on Software Architecture, 2020

DesignDiff: Continuously Modeling Software Design Difference from Code Revisions.
Proceedings of the 2020 IEEE International Conference on Software Architecture, 2020

2019
Automatic Loop Summarization via Path Dependency Analysis.
IEEE Trans. Software Eng., 2019

Architecture-Based Behavioral Adaptation with Generated Alternatives and Relaxed Constraints.
IEEE Trans. Serv. Comput., 2019

Layered Object-Oriented Programming: Advanced VTable Reuse Attacks on Binary-Level Defense.
IEEE Trans. Inf. Forensics Secur., 2019

DeepLink: Recovering issue-commit links based on deep learning.
J. Syst. Softw., 2019

A large-scale empirical study of compiler errors in continuous integration.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Localized or architectural: an empirical study of performance issues dichotomy.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Superion: grammar-aware greybox fuzzing.
Proceedings of the 41st International Conference on Software Engineering, 2019

Leopard: identifying vulnerable code for vulnerability assessment through program metrics.
Proceedings of the 41st International Conference on Software Engineering, 2019

2018
ROPSentry: Runtime defense against ROP attacks using hardware performance counters.
Comput. Secur., 2018

FOT: a versatile, configurable, extensible fuzzing framework.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

ClDiff: generating concise linked code differences.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

DangDone: Eliminating Dangling Pointers via Intermediate Pointers.
Proceedings of the Tenth Asia-Pacific Symposium on Internetware, 2018

Speedoo: prioritizing performance optimization opportunities.
Proceedings of the 40th International Conference on Software Engineering, 2018

Hawkeye: Towards a Desired Directed Grey-box Fuzzer.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Skyfire: Data-Driven Seed Generation for Fuzzing.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Loopster: static loop termination analysis.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Steelix: program-state based binary fuzzing.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

SPAIN: security patch analysis for binaries towards understanding the pain and pills.
Proceedings of the 39th International Conference on Software Engineering, 2017

2016
Proteus: computing disjunctive loop summary via path dependency analysis.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Generating performance distributions via probabilistic symbolic execution.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
Requirements-Driven Self-Optimization of Composite Services Using Feedback Control.
IEEE Trans. Serv. Comput., 2015

Rationalism with a dose of empiricism: combining goal reasoning and case-based reasoning for self-adaptive software systems.
Requir. Eng., 2015

2014
Uncertainty handling in goal-driven self-optimization - Limiting the negative effect on adaptation.
J. Syst. Softw., 2014

Rationalism with a dose of empiricism: Case-based reasoning for requirements-driven self-adaptation.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

Self-adaptation through incremental generative model transformations at runtime.
Proceedings of the 36th International Conference on Software Engineering, 2014

2012
Self-tuning of software systems through dynamic quality tradeoff and value-based feedback control loop.
J. Syst. Softw., 2012

Learning-Based Multi-controller Coordination for Self-Optimization.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Survivability-oriented self-tuning of web systems.
Proceedings of the 20th International Conference on World Wide Web, 2011

Are your sites down? Requirements-driven self-tuning for the survivability of Web systems.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

2010
Self-Tuning of Software Systems Through Goal-based Feedback Loop Control.
Proceedings of the RE 2010, 18th IEEE International Requirements Engineering Conference, Sydney, New South Wales, Australia, September 27, 2010

2009
Towards runtime optimization of software quality based on feedback control theory.
Proceedings of the First Asia-Pacific Symposium on Internetware, 2009


  Loading...