Badprompt: Backdoor attacks on continuous prompts X Cai, H Xu, S Xu, Y Zhang Advances in Neural Information Processing Systems 35, 37068-37080, 2022 | 38 | 2022 |
Method name suggestion with hierarchical attention networks S Xu, S Zhang, W Wang, X Cao, C Guo, J Xu Proceedings of the 2019 ACM SIGPLAN workshop on partial evaluation and …, 2019 | 30 | 2019 |
Gems: An extract method refactoring recommender S Xu, A Sivaraman, SC Khoo, J Xu 2017 ieee 28th international symposium on software reliability engineering …, 2017 | 30 | 2017 |
Respiratory sound classification based on BiGRU-attention network with XGBoost X Zhao, Y Shao, J Mai, A Yin, S Xu 2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2020 | 18 | 2020 |
Autoper: Automatic recommender for runtime-permission in android applications H Gao, C Guo, Y Wu, N Dong, X Hou, S Xu, J Xu 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019 | 16 | 2019 |
LiDetector: License Incompatibility Detection for Open Source Software S Xu, Y Gao, L Fan, Z Liu, Y Liu, H Ji ACM Transactions on Software Engineering and Methodology 32 (1), 1-28, 2023 | 15 | 2023 |
A projection-based approach for memory leak detection X Sun, S Xu, C Guo, J Xu, N Dong, X Ji, S Zhang 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 12 | 2018 |
Exposing SQL injection vulnerability through penetration test based on finite state machine L Liu, J Xu, C Guo, J Kang, S Xu, B Zhang 2016 2nd IEEE International Conference on Computer and Communications (ICCC …, 2016 | 10 | 2016 |
Metapath-aggregated heterogeneous graph neural network for drug–target interaction prediction M Li, X Cai, S Xu, H Ji Briefings in Bioinformatics 24 (1), bbac578, 2023 | 9 | 2023 |
An effective penetration test approach based on feature matrix for exposing SQL injection vulnerability L Liu, J Xu, H Yang, C Guo, J Kang, S Xu, B Zhang, G Si 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016 | 9 | 2016 |
MalDetector-using permission combinations to evaluate malicious features of Android App C Guo, J Xu, L Liu, S Xu 2015 6th IEEE International Conference on Software Engineering and Service …, 2015 | 6 | 2015 |
High-frequency keywords to predict defects for android applications Y Fan, X Cao, J Xu, S Xu, H Yang 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 5 | 2018 |
An inferential metamorphic testing approach to reduce false positives in SQLIV penetration test L Liu, G Su, J Xu, B Zhang, J Kang, S Xu, P Li, G Si 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017 | 5 | 2017 |
Using association statistics to rank risk of android application C Guo, J Xu, L Liu, S Xu 2015 IEEE International Conference on Computer and Communications (ICCC), 6-10, 2015 | 5 | 2015 |
Contrastive meta-learning for drug-target binding affinity prediction M Li, S Xu, X Cai, Z Zhang, H Ji 2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2022 | 4 | 2022 |
Heterogeneous graph attention network for drug-target interaction prediction M Li, X Cai, L Li, S Xu, H Ji Proceedings of the 31st ACM International Conference on Information …, 2022 | 4 | 2022 |
Test input selection for deep neural networks Z Wang, S Xu, X Cai, H Ji Journal of Physics: Conference Series 1693 (1), 012017, 2020 | 4 | 2020 |
Real-Time Diagnosis of Configuration Errors for Software of AI Server Infrastructure G Xu, X Ding, S Xu, Y Jia, S Liu, S Feng, X Zheng IEEE Transactions on Dependable and Secure Computing, 2023 | 3 | 2023 |
Deepsuite: A test suite optimizer for autonomous vehicles S Xu, Z Wang, L Fan, X Cai, H Ji, SC Khoo, BB Gupta IEEE Transactions on Intelligent Transportation Systems 23 (7), 9506-9517, 2021 | 3 | 2021 |
LiResolver: License Incompatibility Resolution for Open Source Software S Xu, Y Gao, L Fan, L Li, X Cai, Z Liu Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 2 | 2023 |