| Linevd: Statement-level vulnerability detection using graph neural networks D Hin, A Kan, H Chen, MA Babar Proceedings of the 19th international conference on mining software …, 2022 | 331 | 2022 |
| An intelligent blockchain-based system for safe vaccine supply and supervision B Yong, J Shen, X Liu, F Li, H Chen, Q Zhou International Journal of Information Management 52, 102024, 2020 | 322 | 2020 |
| From llms to llm-based agents for software engineering: A survey of current, challenges and future H Jin, L Huang, H Cai, J Yan, B Li, H Chen arXiv preprint arXiv:2408.02479, 2024 | 219* | 2024 |
| Look before you leap: An exploratory study of uncertainty measurement for large language models Y Huang, J Song, Z Wang, S Zhao, H Chen, F Juefei-Xu, L Ma arXiv preprint arXiv:2307.10236, 2023 | 193 | 2023 |
| Data hiding with deep learning: A survey unifying digital watermarking and steganography Z Wang, O Byrnes, H Wang, R Sun, C Ma, H Chen, Q Wu, M Xue IEEE Transactions on Computational Social Systems 10 (6), 2985-2999, 2023 | 144 | 2023 |
| A survey on data-driven software vulnerability assessment and prioritization THM Le, H Chen, MA Babar ACM Computing Surveys 55 (5), 1-39, 2022 | 130 | 2022 |
| Supervised machine learning model for high dimensional gene data in colon cancer detection H Chen, H Zhao, J Shen, R Zhou, Q Zhou 2015 IEEE International Congress on Big Data, 134-141, 2015 | 62 | 2015 |
| Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges H Chen, MA Babar ACM Computing Surveys, 2024 | 59 | 2024 |
| Ensemble machine learning systems for the estimation of steel quality control F Li, J Wu, F Dong, J Lin, G Sun, H Chen, J Shen 2018 IEEE International Conference on Big Data (Big Data), 2245-2252, 2018 | 56 | 2018 |
| Large expert-curated database for benchmarking document similarity detection in biomedical literature search P Brown, Y Zhou Database 2019, baz085, 2019 | 48 | 2019 |
| Look Before You Leap: An Exploratory Study of Uncertainty Analysis for Large Language Models Y Huang, J Song, Z Wang, S Zhao, H Chen, F Juefei-Xu, L Ma IEEE Transactions on Software Engineering 51 (2), 413-429, 2025 | 46 | 2025 |
| Systematic evaluation of machine learning methods for identifying human–pathogen protein–protein interactions H Chen, F Li, L Wang, Y Jin, CH Chi, L Kurgan, J Song, J Shen Briefings in Bioinformatics 22 (3), bbaa068, 2021 | 41 | 2021 |
| Large language models based fuzzing techniques: A survey L Huang, P Zhao, H Chen, L Ma arXiv e-prints, arXiv: 2402.00350, 2024 | 38 | 2024 |
| Neural network model with Monte Carlo algorithm for electricity demand forecasting in Queensland B Yong, Z Xu, J Shen, H Chen, Y Tian, Q Zhou Proceedings of the Australasian computer science week multiconference, 1-7, 2017 | 36 | 2017 |
| Threats and defenses in the federated learning life cycle: a comprehensive survey and challenges Y Li, Z Guo, N Yang, H Chen, D Yuan, W Ding IEEE Transactions on Neural Networks and Learning Systems, 2025 | 31 | 2025 |
| MFABA: A More Faithful and Accelerated Boundary-based Attribution Method for Deep Neural Networks Z Zhu, H Chen, J Zhang, X Wang, Z Jin, M Xue, D Zhu, KKR Choo The 38th Annual AAAI Conference on Artificial Intelligence, 2024 | 24 | 2024 |
| Intelligent monitor system based on cloud and convolutional neural networks B Yong, G Zhang, H Chen, Q Zhou The Journal of Supercomputing 73 (7), 3260-3276, 2017 | 24 | 2017 |
| Noisy label learning for security defects R Croft, MA Babar, H Chen Proceedings of the 19th International Conference on Mining Software …, 2022 | 19 | 2022 |
| GE-AdvGAN: Improving the transferability of adversarial samples by gradient editing-based adversarial generative model Z Zhu, H Chen, X Wang, J Zhang, Z Jin, KKR Choo, J Shen, D Yuan SIAM International Conference on Data Mining (SDM24), 2024 | 17 | 2024 |
| Effective long-term travel time prediction with fuzzy rules for tollway R Li, G Rose, H Chen, J Shen Neural Computing and Applications 30 (9), 2921-2933, 2018 | 17 | 2018 |