Method name suggestion with hierarchical attention networks S Xu, S Zhang, W Wang, X Cao, C Guo, J Xu Proceedings of the 2019 ACM SIGPLAN workshop on partial evaluation and …, 2019 | 22 | 2019 |
Gems: An extract method refactoring recommender S Xu, A Sivaraman, SC Khoo, J Xu 2017 IEEE 28th International Symposium on Software Reliability Engineering …, 2017 | 19 | 2017 |
AutoPer: automatic recommender for runtime-permission in android applications H Gao, C Guo, Y Wu, N Dong, X Hou, S Xu, J Xu 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019 | 11 | 2019 |
Respiratory sound classification based on BiGRU-Attention network with XGBoost X Zhao, Y Shao, J Mai, A Yin, S Xu 2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2020 | 10 | 2020 |
Exposing SQL injection vulnerability through penetration test based on finite state machine L Liu, J Xu, C Guo, J Kang, S Xu, B Zhang 2016 2nd IEEE International Conference on Computer and Communications (ICCC …, 2016 | 9 | 2016 |
A projection-based approach for memory leak detection X Sun, S Xu, C Guo, J Xu, N Dong, X Ji, S Zhang 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 7 | 2018 |
An effective penetration test approach based on feature matrix for exposing SQL injection vulnerability L Liu, J Xu, H Yang, C Guo, J Kang, S Xu, B Zhang, G Si 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016 | 7 | 2016 |
An inferential metamorphic testing approach to reduce false positives in SQLIV penetration test L Liu, G Su, J Xu, B Zhang, J Kang, S Xu, P Li, G Si 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017 | 5 | 2017 |
MalDetector-using permission combinations to evaluate malicious features of android app C Guo, J Xu, L Liu, S Xu 2015 6th IEEE International Conference on Software Engineering and Service …, 2015 | 5 | 2015 |
High-frequency keywords to predict defects for android applications Y Fan, X Cao, J Xu, S Xu, H Yang 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 3 | 2018 |
Using association statistics to rank risk of android application C Guo, J Xu, L Liu, S Xu 2015 IEEE International Conference on Computer and Communications (ICCC), 6-10, 2015 | 3 | 2015 |
An improvement to fault localization technique based on branch-coverage spectra S Xu, J Xu, H Yang, J Yang, C Guo, L Yuan, W Song, G Si 2015 IEEE 39th Annual Computer Software and Applications Conference 2, 282-287, 2015 | 2 | 2015 |
Deepsuite: A test suite optimizer for autonomous vehicles S Xu, Z Wang, L Fan, X Cai, H Ji, SC Khoo, BB Gupta IEEE Transactions on Intelligent Transportation Systems 23 (7), 9506-9517, 2021 | 1 | 2021 |
Test input selection for deep neural networks Z Wang, S Xu, X Cai, H Ji Journal of Physics: Conference Series 1693 (1), 012017, 2020 | 1 | 2020 |
TRAC: A Therapeutic Regimen-Oriented Access Control Model in Healthcare H Gao, Y Wu, S Xu, C Guo, X Hou, J Xu 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 1 | 2018 |
面向移动应用软件信息泄露的模型检测研究 过辰楷, 许静, 司冠南, 李恩鹏, 徐思涵 计算机学报 39 (11), 2324-2343, 2016 | 1 | 2016 |
Metapath-aggregated heterogeneous graph neural network for drug–target interaction prediction M Li, X Cai, S Xu, H Ji Briefings in Bioinformatics 24 (1), bbac578, 2023 | | 2023 |
Contrastive Meta-Learning for Drug-Target Binding Affinity Prediction M Li, S Xu, X Cai, Z Zhang, H Ji 2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2022 | | 2022 |
BadPrompt: Backdoor Attacks on Continuous Prompts X Cai, H Xu, S Xu, Y Zhang, X Yuan arXiv preprint arXiv:2211.14719, 2022 | | 2022 |
Heterogeneous Graph Attention Network for Drug-Target Interaction Prediction M Li, X Cai, L Li, S Xu, H Ji Proceedings of the 31st ACM International Conference on Information …, 2022 | | 2022 |