Xiaohong Su

Orcid: 0000-0002-8584-0716

According to our database1, Xiaohong Su authored at least 89 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Joint reconstruction and deidentification for mobile identity anonymization.
Multim. Tools Appl., April, 2024

Augmenting the Veracity and Explanations of Complex Fact Checking via Iterative Self-Revision with LLMs.
CoRR, 2024

StagedVulBERT: Multi-Granular Vulnerability Detection with a Novel Pre-trained Code Model.
CoRR, 2024

SVulDetector: Vulnerability detection based on similarity using tree-based attention and weighted graph embedding mechanisms.
Comput. Secur., 2024

LI4: Label-Infused Iterative Information Interacting Based Fact Verification in Question-answering Dialogue.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024

2023
Dynamically Relative Position Encoding-Based Transformer for Automatic Code Edit.
IEEE Trans. Reliab., September, 2023

A Hypothesis Testing-based Framework for Software Cross-modal Retrieval in Heterogeneous Semantic Spaces.
ACM Trans. Softw. Eng. Methodol., September, 2023

Vulnerability detection through cross-modal feature enhancement and fusion.
Comput. Secur., September, 2023

Semantic-aware deidentification generative adversarial networks for identity anonymization.
Multim. Tools Appl., April, 2023

Does Deep Learning improve the performance of duplicate bug report detection? An empirical study.
J. Syst. Softw., April, 2023

Documentation-Guided API Sequence Search without Worrying about the Text-API Semantic Gap.
Proceedings of the IEEE International Conference on Software Analysis, 2023

A Graph Neural Network-Based Smart Contract Vulnerability Detection Method with Artificial Rule.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023

2022
Hierarchical semantic-aware neural code representation.
J. Syst. Softw., 2022

Equivalent Mutants Detection Based on Weighted Software Behavior Graph.
Int. J. Softw. Eng. Knowl. Eng., 2022

Golden Mutator Recommendation Based on Mutation Pattern Mining.
Int. J. Pattern Recognit. Artif. Intell., 2022

Fault localization based on wide & deep learning model by mining software behavior.
Future Gener. Comput. Syst., 2022

2021
VulSPG: Vulnerability detection based on slice property graph representation learning.
CoRR, 2021

Vu1SPG: Vulnerability detection based on slice property graph representation learning.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

2020
Data Mining in Programs: Clustering Programs Based on Structure Metrics and Execution Values.
Int. J. Data Warehous. Min., 2020

Fault localization by analyzing failure propagation with samples in cloud computing environment.
J. Cloud Comput., 2020

LTRWES: A new framework for security bug report detection.
Inf. Softw. Technol., 2020

Improving Maintenance-Consistency Prediction During Code Clone Creation.
IEEE Access, 2020

2019
Automatic debugging of operator errors based on efficient mutation analysis.
Multim. Tools Appl., 2019

Invariant based fault localization by analyzing error propagation.
Future Gener. Comput. Syst., 2019

Marginalized Particle Flow Filter.
Circuits Syst. Signal Process., 2019

WCET optimization strategy based on source code refactoring.
Clust. Comput., 2019

2018
Distributed Particle Flow Filter for Target Tracking in Wireless Sensor Networks.
J. Sensors, 2018

Optimizing Software Development Requirements based on Dependency Relations.
J. Inf. Hiding Multim. Signal Process., 2018

An Empirical Study on Software Defect Prediction Using Over-Sampling by SMOTE.
Int. J. Softw. Eng. Knowl. Eng., 2018

Test case selection using multi-criteria optimization for effective fault localization.
Computing, 2018

Multi-Target Tracking with the Progressive Gaussian Probability Hypothesis Density Filter.
Proceedings of the 2018 International Conference on Control, 2018

The Delta Generalized Labeled Multi-Bernoulli Filter for Cell Tracking.
Proceedings of the 18th IEEE International Conference on Bioinformatics and Bioengineering, 2018

2017
Greening Software Requirements Change Management Strategy Based on Nash Equilibrium.
Wirel. Commun. Mob. Comput., 2017

Interacting multiple model particle filter for prognostics of lithium-ion batteries.
Microelectron. Reliab., 2017

Improved discrete mapping differential evolution for multi-unmanned aerial vehicles cooperative multi-targets assignment under unified model.
Int. J. Mach. Learn. Cybern., 2017

Online UAV path planning in uncertain and hostile environments.
Int. J. Mach. Learn. Cybern., 2017

Predicting change consistency in a clone group.
J. Syst. Softw., 2017

Interactive WCET Prediction with Warning for Timeout Risk.
Int. J. Pattern Recognit. Artif. Intell., 2017

Evaluation and comparison of ten data race detection techniques.
Int. J. High Perform. Comput. Netw., 2017

Empirical Study on Software Bug Prediction.
Proceedings of the International Conference on Software and e-Business, 2017

2016
Using Reduced Execution Flow Graph to Identify Library Functions in Binary Code.
IEEE Trans. Software Eng., 2016

Slider: an online and active deadlock avoider by serial execution of critical sections.
Int. J. High Perform. Syst. Archit., 2016

Computation-distributed probability hypothesis density filter.
EURASIP J. Adv. Signal Process., 2016

Nonlinear approach for estimating WCET during programming phase.
Clust. Comput., 2016

RaceTracker: Effective and efficient detection of data races.
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016

A Novel Multi Stage Cooperative Path Re-planning Method for Multi UAV.
Proceedings of the PRICAI 2016: Trends in Artificial Intelligence, 2016

Predicting Consistent Clone Change.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

A novel computationally efficient SMC-PHD Filter using particle-measurement partition.
Proceedings of the 2016 IEEE International Symposium on Signal Processing and Information Technology, 2016

A lithium-ion battery RUL prognosis method using temperature changing rate.
Proceedings of the IEEE International Conference on Prognostics and Health Management, 2016

Optimization and improvements of a Moodle-Based online learning system for C programming.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

2015
Identifying functions in binary code with reverse extended control flow graphs.
J. Softw. Evol. Process., 2015

State dependency probabilistic model for fault localization.
Inf. Softw. Technol., 2015

Distributed Computation Particle PHD filter.
CoRR, 2015

Library functions identification in binary code by using graph isomorphism testings.
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015

A dual-level approach for lithium-ion battery RUL prognosis.
Proceedings of the 2015 IEEE Conference on Prognostics and Health Management, 2015

An improved exponential model for predicting the remaining useful life of lithium-ion batteries.
Proceedings of the 2015 IEEE Conference on Prognostics and Health Management, 2015

Nonparametric background model based clutter map for X-band marine radar.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Cluster-based efficient particle PHD filter.
Proceedings of the 2015 International Conference on Control, 2015

Interest-driven and innovation-oriented practice for programming course.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015

Motivating students with new mechanisms of online assignments and examination to meet the MOOC challenges for programming.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015

Identifying and Understanding Self-Checksumming Defenses in Software.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Intuitionistic Fuzzy Sets with Shannon Relative Entropy.
Proceedings of the BIOSIGNALS 2015, 2015

2014
Comparative analysis on margin based feature selection algorithms.
Int. J. Mach. Learn. Cybern., 2014

Corrigendum to: "SPAPE: A semantic-preserving amorphous procedure extraction method for near-miss clones": [J. Syst. Softw. 86 (2013) 2077-2093].
J. Syst. Softw., 2014

Detection of semantically similar code.
Frontiers Comput. Sci., 2014

Multi-object Tracking Based on Particle Probability Hypothesis Density Tracker in Microscopic Video.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Bioengineering, 2014

A Framework for Understanding Dynamic Anti-Analysis Defenses.
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 2014

2013
Robust feature selection based on regularized brownboost loss.
Knowl. Based Syst., 2013

Dynamic Collection of Reliability-Related Data and Reliability Evaluation for Internet software.
J. Softw., 2013

SPAPE: A semantic-preserving amorphous procedure extraction method for near-miss clones.
J. Syst. Softw., 2013

A test-suite reduction approach to improving fault-localization effectiveness.
Comput. Lang. Syst. Struct., 2013

A New Multi-sensor Track Association Approach Based on Intuitionistic Fuzzy Clustering.
Proceedings of the Advances in Information Technology - 6th International Conference, 2013

2012
Improvements of a two-in-one image secret sharing scheme based on gray mixing model.
J. Vis. Commun. Image Represent., 2012

Improvements on a privacy-protection algorithm for DNA sequences with generalization lattices.
Comput. Methods Programs Biomed., 2012

Feature Weighting Algorithm Based on Margin and Linear Programming.
Proceedings of the Rough Sets and Current Trends in Computing, 2012

A STPHD-Based Multi-sensor Fusion Method.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

2011
Ability-training-oriented automated assessment in introductory programming course.
Comput. Educ., 2011

Driver Status Recognition by Neighborhood Covering Rules.
Proceedings of the Rough Sets and Knowledge Technology - 6th International Conference, 2011

Selective Track Fusion.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Entropy on interval-valued intuitionistic fuzzy sets and its application in multi-attribute decision making.
Proceedings of the 14th International Conference on Information Fusion, 2011

2010
Solder Joints Detection Method Based on Surface Recovery.
Comput. Inf. Sci., 2010

A new multi-target state estimation algorithm for PHD particle filter.
Proceedings of the 13th Conference on Information Fusion, 2010

FCM-based radar target detection in medium frequency signal of radar.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

2008
Normalization for Removing Code Variations in Modular Programs.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Program Normalization for Removing Code Variations.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Semantic similarity-based grading of student programs.
Inf. Softw. Technol., 2007

Distributed Learning Strategy Based on Chips for Classification with Large-Scale Dataset.
Int. J. Pattern Recognit. Artif. Intell., 2007

2006
Neural Networks' Distributed Cooperative Learning Strategy Based on Agent and Chips.
J. Comput. Res. Dev., 2006

2005
Research and Design of Distributed Neural Networks with Chip Training Algorithm.
Proceedings of the Advances in Natural Computation, First International Conference, 2005


  Loading...