Xiaobing Sun

Orcid: 0000-0001-5165-5080

Affiliations:
  • Yangzhou University, School of Information Engineering, China
  • Southeast University, Nanjing, China (PhD)


According to our database1, Xiaobing Sun authored at least 158 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Hierarchy-Aware Representation Learning for Industrial IoT Vulnerability Classification.
IEEE Trans. Ind. Informatics, October, 2024

Real-Time Tracking Control and Efficiency Analyses for Stewart Platform Based on Discrete-Time Recurrent Neural Network.
IEEE Trans. Syst. Man Cybern. Syst., August, 2024

Application programming interface recommendation for smart contract using deep learning from augmented code representation.
J. Softw. Evol. Process., August, 2024

Software bug localization based on optimized and ensembled deep learning models.
J. Softw. Evol. Process., August, 2024

Ponzi Scheme Detection in Smart Contract via Transaction Semantic Representation Learning.
IEEE Trans. Reliab., June, 2024

EXVul: Toward Effective and Explainable Vulnerability Detection for IoT Devices.
IEEE Internet Things J., June, 2024

FATS: Feature Distribution Analysis-Based Test Selection for Deep Learning Enhancement.
IEEE Trans. Big Data, April, 2024

Fine-grained smart contract vulnerability detection by heterogeneous code feature learning and automated dataset construction.
J. Syst. Softw., March, 2024

Learning to Detect Memory-related Vulnerabilities.
ACM Trans. Softw. Eng. Methodol., February, 2024

Neurodynamics for Equality-Constrained Time-Variant Nonlinear Optimization Using Discretization.
IEEE Trans. Ind. Informatics, February, 2024

Automatic software vulnerability classification by extracting vulnerability triggers.
J. Softw. Evol. Process., February, 2024

A new recurrent neural network based on direct discretization method for solving discrete time-variant matrix inversion with application.
Inf. Sci., January, 2024

FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training.
IEEE Trans. Inf. Forensics Secur., 2024

BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation.
IEEE Trans. Dependable Secur. Comput., 2024

TDFix: A lightweight tool for fixing deadlocks based on templates.
Sci. Comput. Program., 2024

Real-time and screen-cam robust screen watermarking.
Knowl. Based Syst., 2024

Relative approximate bisimulations for fuzzy picture automata.
Inf. Comput., 2024

Deterministic fuzzy two-dimensional on-line tessellation automata and their languages.
Fuzzy Sets Syst., 2024

"No Matter What You Do!": Mitigating Backdoor Attacks in Graph Neural Networks.
CoRR, 2024

Large Language Model for Vulnerability Detection and Repair: Literature Review and the Road Ahead.
CoRR, 2024

A Systematic Literature Review on Explainability for Machine/Deep Learning-based Software Engineering Research.
CoRR, 2024

SCL-CVD: Supervised contrastive learning for code vulnerability detection via GraphCodeBERT.
Comput. Secur., 2024

A Software Bug Fixing Approach Based on Knowledge-Enhanced Large Language Models.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024

BADFSS: Backdoor Attacks on Federated Self-Supervised Learning.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection Systems.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Automated software bug localization enabled by meta-heuristic-based convolutional neural network and improved deep neural network.
Expert Syst. Appl., December, 2023

VulRep: vulnerability repair based on inducing commits and fixing commits.
EURASIP J. Wirel. Commun. Netw., December, 2023

Automatic software vulnerability assessment by extracting vulnerability elements.
J. Syst. Softw., October, 2023

ADFL: Defending backdoor attacks in federated learning via adversarial distillation.
Comput. Secur., September, 2023

An advanced discrete-time RNN for handling discrete time-varying matrix inversion: Form model design to disturbance-suppression analysis.
CAAI Trans. Intell. Technol., September, 2023

Multi-level membership inference attacks in federated Learning based on active GAN.
Neural Comput. Appl., August, 2023

A direct discretization recurrent neurodynamics method for time-variant nonlinear optimization with redundant robot manipulators.
Neural Networks, July, 2023

Discrete generalized-Sylvester matrix equation solved by RNN with a novel direct discretization numerical method.
Numer. Algorithms, July, 2023

Novel Discrete-Time Recurrent Neural Network for Robot Manipulator: A Direct Discretization Technical Route.
IEEE Trans. Neural Networks Learn. Syst., June, 2023

Tracking Control of Cable-Driven Planar Robot Based on Discrete-Time Recurrent Neural Network With Immediate Discretization Method.
IEEE Trans. Ind. Informatics, June, 2023

Automated event extraction of CVE descriptions.
Inf. Softw. Technol., June, 2023

Leveraging multi-level embeddings for knowledge-aware bug report reformulation.
J. Syst. Softw., April, 2023

CRAM: Code Recommendation With Programming Context Based on Self-Attention Mechanism.
IEEE Trans. Reliab., March, 2023

<i>ASSBert</i>: Active and semi-supervised bert for smart contract vulnerability detection.
J. Inf. Secur. Appl., March, 2023

Direct derivation scheme of DT-RNN algorithm for discrete time-variant matrix pseudo-inversion with application to robotic manipulator.
Appl. Soft Comput., January, 2023

A Novel Homomorphic Encryption and Consortium Blockchain-Based Hybrid Deep Learning Model for Industrial Internet of Medical Things.
IEEE Trans. Netw. Sci. Eng., 2023

Combine sliced joint graph with graph neural networks for smart contract vulnerability detection.
J. Syst. Softw., 2023

A new ZNN model for finding discrete time-variant matrix square root: From model design to parameter analysis.
J. Comput. Appl. Math., 2023

DLRegion: Coverage-guided fuzz testing of deep neural networks with region-based neuron selection strategies.
Inf. Softw. Technol., 2023

VulLoc: vulnerability localization based on inducing commits and fixing commits.
Frontiers Comput. Sci., 2023

Extended Abstract of Combine Sliced Joint Graph with Graph Neural Networks for Smart Contract Vulnerability Detection.
Proceedings of the IEEE International Conference on Software Analysis, 2023

TemLock: A Lightweight Template-based Approach for Fixing Deadlocks Caused by ReentrantLock.
Proceedings of the IEEE International Conference on Software Analysis, 2023

ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

A Client-Side Watermarking with Private-Class in Federated Learning.
Proceedings of the Machine Learning for Cyber Security - 5th International Conference, 2023

RepresentThemAll: A Universal Learning Representation of Bug Reports.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

An Intelligent Duplicate Bug Report Detection Method Based on Technical Term Extraction.
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2023

2022
Domain knowledge-based security bug reports prediction.
Knowl. Based Syst., 2022

Intelligent analysis for software data: research and applications.
Frontiers Inf. Technol. Electron. Eng., 2022

Recurrent neural dynamics for handling linear equation system with rank-deficient coefficient and disturbance existence.
J. Frankl. Inst., 2022

A deep learning-based approach for software vulnerability detection using code metrics.
IET Softw., 2022

An approach of method-level bug localization.
IET Softw., 2022

SPVF: security property assisted vulnerability fixing via attention-based models.
Empir. Softw. Eng., 2022

Implicit N-grams Induced by Recurrence.
CoRR, 2022

Towards the identification of bug entities and relations in bug reports.
Autom. Softw. Eng., 2022

KVS: a tool for knowledge-driven vulnerability searching.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

A Comprehensive Analysis of NVD Concurrency Vulnerabilities.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

MIA-Leak: Exploring Membership Inference Attacks in Federated Learning Systems.
Proceedings of the Blockchain Technology and Emerging Technologies, 2022

Vulnerability Detection for Smart Contract via Backward Bayesian Active Learning.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
Transformation-based processing of typed resources for multimedia sources in the IoT environment.
Wirel. Networks, 2021

image2emmet: Automatic code generation from web user interface image.
J. Softw. Evol. Process., 2021

A comprehensive study on security bug characteristics.
J. Softw. Evol. Process., 2021

BEAT: Considering question types for bug question answering via templates.
Knowl. Based Syst., 2021

Node deletion-based algorithm for blocking maximizing on negative influence from uncertain sources.
Knowl. Based Syst., 2021

Special Issue on New Generation of Bug Fixing.
J. Syst. Softw., 2021

<i>BGNN4VD</i>: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection.
Inf. Softw. Technol., 2021

Experience report: investigating bug fixes in machine learning frameworks/libraries.
Frontiers Comput. Sci., 2021

Why and what happened? Aiding bug comprehension with automated category and causal link identification.
Empir. Softw. Eng., 2021

Deep pre-trained networks as a feature extractor with XGBoost to detect tuberculosis from chest X-ray.
Comput. Electr. Eng., 2021

GrasP: Graph-to-Sequence Learning for Automated Program Repair.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

2020
Improving software bug-specific named entity recognition with deep neural network.
J. Syst. Softw., 2020

Analyzing bug fix for automatic bug cause classification.
J. Syst. Softw., 2020

2019
Improving defect prediction with deep forest.
Inf. Softw. Technol., 2019

Data Privacy Protection for Edge Computing of Smart City in a DIKW Architecture.
Eng. Appl. Artif. Intell., 2019

How security bugs are fixed and what can be improved: an empirical study with Mozilla.
Sci. China Inf. Sci., 2019

Bug Localization for Version Issues With Defect Patterns.
IEEE Access, 2019

Enabling Feature Location for API Method Recommendation and Usage Location.
IEEE Access, 2019

Modeling Data, Information and Knowledge for Security Protection of Hybrid IoT and Edge Resources.
IEEE Access, 2019

MULAPI: a tool for API method and usage location recommendation.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

2018
Processing Optimization of Typed Resources with Synchronized Storage and Computation Adaptation in Fog Computing.
Wirel. Commun. Mob. Comput., 2018

MULAPI: Improving API method recommendation with API usage location.
J. Syst. Softw., 2018

Effectiveness of exploring historical commits for developer recommendation: an empirical study.
Frontiers Comput. Sci., 2018

Personalized project recommendation on GitHub.
Sci. China Inf. Sci., 2018

Interactive Query Reformulation for Source-Code Search With Word Relations.
IEEE Access, 2018

Mining Variable-Method Correlation for Change Impact Analysis.
IEEE Access, 2018

Towards Cost Effective Privacy Provision for Typed Resources in IoT Environment (S).
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Recognizing software bug-specific named entity in software bug repository.
Proceedings of the 26th Conference on Program Comprehension, 2018

2017
Clustering Classes in Packages for Program Comprehension.
Sci. Program., 2017

Using Hierarchical Latent Dirichlet Allocation to Construct Feature Tree for Program Comprehension.
Sci. Program., 2017

Enhancing developer recommendation with supplementary information via mining historical commits.
J. Syst. Softw., 2017

基于Mozilla的安全性漏洞再修复经验研究 (Empirical Study of Reopened Security Bugs on Mozilla).
计算机科学, 2017

Data, information, and knowledge-driven manipulation between strategical planning and technical implementation for wireless sensor network construction.
Int. J. Distributed Sens. Networks, 2017

Bidirectional value driven design between economical planning and technical implementation based on data graph, information graph and knowledge graph.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

Answering Who/When, What, How, Why through Constructing Data Graph, Information Graph, Knowledge Graph and Wisdom Graph.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

Scalable Relevant Project Recommendation on GitHub.
Proceedings of the 9th Asia-Pacific Symposium on Internetware, 2017

A Pay as You Use Resource Security Provision Approach Based on Data Graph, Information Graph and Knowledge Graph.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2017 - 18th International Conference, Guilin, China, October 30, 2017

An Investment Defined Transaction Processing Towards Temporal and Spatial Optimization with Collaborative Storage and Computation Adaptation.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2017 - 18th International Conference, Guilin, China, October 30, 2017

REPERSP: Recommending Personalized Software Projects on GitHub.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

Construct bug knowledge graph for bug resolution: poster.
Proceedings of the 39th International Conference on Software Engineering, 2017

Constructing Search as a Service Towards Non-deterministic and Not Validated Resource Environment with a Positive-Negative Strategy.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

An Empirical Study on Real Bugs for Machine Learning Programs.
Proceedings of the 24th Asia-Pacific Software Engineering Conference, 2017

2016
Mining Software Repositories for Automatic Interface Recommendation.
Sci. Program., 2016

Towards a problem-value-constraint framework for maximising business value through minimising under design and over design.
Int. J. Serv. Technol. Manag., 2016

ComboRT: A New Approach for Generating Regression Test Cases for Evolving Programs.
Int. J. Softw. Eng. Knowl. Eng., 2016

Code Comment Quality Analysis and Improvement Recommendation: An Automated Approach.
Int. J. Softw. Eng. Knowl. Eng., 2016

Sorting Terms of "aaS" of Everything as a Service.
Int. J. Networked Distributed Comput., 2016

Refinement on Data, Information and Knowledge Lifecycles towards Service Economics Planning to Services Implementation.
Int. J. Networked Distributed Comput., 2016

IPSETFUL: an iterative process of selecting test cases for effective fault localization by exploring concept lattice of program spectra.
Frontiers Comput. Sci., 2016

Exploring topic models in software engineering data analysis: A survey.
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016

WB4SP: A tool to build the word base for specific programs.
Proceedings of the 24th IEEE International Conference on Program Comprehension, 2016

On Expanding Abbreviated Identifiers in the Source Code.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2016, 2016

Enhancing UML Class Diagram Abstraction with Knowledge Graph.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2016, 2016

Enhancing UML Class Diagram Abstraction with Page Rank Algorithm and Relationship Abstraction Rules.
Proceedings of the Service-Oriented Computing - ICSOC 2016 Workshops, 2016

Recommending developers with supplementary information for issue request resolution.
Proceedings of the 38th International Conference on Software Engineering, 2016

Model under design and over design on mobile applications.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

DR_PSF: Enhancing Developer Recommendation by Leveraging Personalized Source-Code Files.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

On Automatic Summarization of What and Why Information in Source Code Changes.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Refinement from service economics planning to ubiquitous services implementation.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

2015
What Information in Software Historical Repositories Do We Need to Support Software Maintenance Tasks? An Approach Based on Topic Model.
Proceedings of the Computer and Information Science, 2015

Static change impact analysis techniques: A comparative study.
J. Syst. Softw., 2015

MSR4SM: Using topic models to effectively mining software repositories for software maintenance tasks.
Inf. Softw. Technol., 2015

Query expansion via WordNet for effective code search.
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015

Modeling the evolution of development topics using Dynamic Topic Models.
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015

Explore the evolution of development topics via on-line LDA.
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015

Various "aaS" of everything as a service.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

A Problem-Value-Constraint Framework for Minimizing Under Design and Over Design in Web Service Based System Development.
Proceedings of the International Conference on Service Science, 2015

Analyzing program readability based on WordNet.
Proceedings of the 19th International Conference on Evaluation and Assessment in Software Engineering, 2015

Using Feature-Interface Graph for Automatic Interface Recommendation: A Case Study.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

Everything as a Service (XaaS) on the Cloud: Origins, Current and Future Trends.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Change impact analysis and changeability assessment for a change proposal: An empirical study ☆☆.
J. Syst. Softw., 2014

PFN: A novel program feature network for program comprehension.
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014

Supporting program comprehension with program summarization.
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014

Automatic generation of package diagram to understand Java packages.
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014

2013
A survey of code-based change impact analysis techniques.
Softw. Test. Verification Reliab., 2013

FCA-CIA: An approach of using FCA to support cross-level change impact analysis for object oriented Java programs.
Inf. Softw. Technol., 2013

Analyzing Impact Rules of Different Change Types to Support Change Impact Analysis.
Int. J. Softw. Eng. Knowl. Eng., 2013

Using water wave propagation phenomenon to study software change impact analysis.
Adv. Eng. Softw., 2013

WAVE-CIA: a novel CIA approach based on call graph mining.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

CLPS-MFL: Using Concept Lattice of Program Spectrum for Effective Multi-fault Localization.
Proceedings of the 2013 13th International Conference on Quality Software, 2013

Exploring software engineering data with formal concept analysis.
Proceedings of the 1st International Workshop on Data Analysis Patterns in Software Engineering, 2013

2012
Combining concept lattice with call graph for impact analysis.
Adv. Eng. Softw., 2012

Mining Call Graph for Change Impact Analysis.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012

Using FCA-based Change Impact Analysis for Regression Testing.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012

A comparative study of static CIA techniques.
Proceedings of the Fourth Asia-Pacific Symposium on Internetware, 2012

A Change Proposal Driven Approach for Changeability Assessment Using FCA-Based Impact Analysis.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

2011
Program slicing spectrum-based software fault localization.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

Using lattice of class and method dependence for change impact analysis of object oriented programs.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

A test suite reduction approach based on pairwise interaction of requirements.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Using Formal Concept Analysis to support change analysis.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

2010
An Approach to Regression Test Selection Based on Hierarchical Slicing Technique.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Change Impact Analysis Based on a Taxonomy of Change Types.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

A Hierarchical Model for Regression Test Selection and Cost Analysis of Java Programs.
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010


  Loading...