Follow
Jiamou Sun
Jiamou Sun
Data61, CSIRO
Verified email at data61.csiro.au
Title
Cited by
Cited by
Year
Improving api caveats accessibility by mining api caveats knowledge graph
H Li, S Li, J Sun, Z Xing, X Peng, M Liu, X Zhao
2018 IEEE International Conference on Software Maintenance and Evolution …, 2018
1102018
Data-driven proactive policy assurance of post quality in community q&a sites
C Chen, X Chen, J Sun, Z Xing, G Li
Proceedings of the ACM on human-computer interaction 2 (CSCW), 1-22, 2018
352018
Know-how in programming tasks: From textual tutorials to task-oriented knowledge graph
J Sun, Z Xing, R Chu, H Bai, J Wang, X Peng
2019 IEEE International Conference on Software Maintenance and Evolution …, 2019
252019
Demystify official API usage directives with crowdsourced API misuse scenarios, erroneous code examples and patches
X Ren, J Sun, Z Xing, X Xia, J Sun
Proceedings of the ACM/IEEE 42nd international conference on software …, 2020
242020
Prcbert: Prompt learning for requirement classification using bert-based pretrained language models
X Luo, Y Xue, Z Xing, J Sun
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
202022
Detecting and augmenting missing key aspects in vulnerability descriptions
H Guo, S Chen, Z Xing, X Li, Y Bai, J Sun
ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (3), 1-27, 2022
172022
Generating informative CVE description from ExploitDB posts by extractive summarization
J Sun, Z Xing, H Guo, D Ye, X Li, X Xu, L Zhu
arXiv preprint arXiv:2101.01431, 2021
172021
Task-oriented api usage examples prompting powered by programming task knowledge graph
J Sun, Z Xing, X Peng, X Xu, L Zhu
2021 IEEE International Conference on Software Maintenance and Evolution …, 2021
82021
Unveiling the Tricks: Automated Detection of Dark Patterns in Mobile Applications
J Chen, J Sun, S Feng, Z Xing, Q Lu, X Xu, C Chen
Proceedings of the 36th Annual ACM Symposium on User Interface Software and …, 2023
62023
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation
J Sun, Z Xing, Q Lu, X Xu, L Zhu, T Hoang, D Zhao
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
52023
Prediction of vulnerability characteristics based on vulnerability description and prompt learning
X Li, X Ren, Y Xue, Z Xing, J Sun
2023 IEEE International Conference on Software Analysis, Evolution and …, 2023
52023
Heterogeneous vulnerability report traceability recovery by vulnerability aspect matching
J Sun, Z Xing, X Xu, L Zhu, Q Lu
2022 IEEE International Conference on Software Maintenance and Evolution …, 2022
32022
Aspect-level information discrepancies across heterogeneous vulnerability reports: Severity, types and detection methods
J Sun, Z Xing, X Xia, Q Lu, X Xu, L Zhu
ACM Transactions on Software Engineering and Methodology 33 (2), 1-38, 2023
22023
Pop Quiz! Do Pre-trained Code Models Possess Knowledge of Correct API Names?
TY Zhuo, X Du, Z Xing, J Sun, H Quan, L Li, L Zhu
arXiv preprint arXiv:2309.07804, 2023
12023
Where is it? Tracing the Vulnerability-relevant Files from Vulnerability Reports
J Sun, J Chen, Z Xing, Q Lu, X Xu, L Zhu
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
2024
A Multi-faceted Vulnerability Searching Website Powered by Aspect-level Vulnerability Knowledge Graph
J Sun, Z Xing, Q Lu, X Xu, L Zhu
2023 IEEE/ACM 45th International Conference on Software Engineering …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–16