[go: up one dir, main page]

Follow
Jiayuan Zhou
Jiayuan Zhou
Principal Researcher, Waterloo Research Centre, Huawei Canada
Verified email at huawei.com - Homepage
Title
Cited by
Cited by
Year
Finding a needle in a haystack: Automated mining of silent vulnerability fixes
J Zhou, M Pacheco, Z Wan, X Xia, D Lo, Y Wang, AE Hassan
2021 36th IEEE/ACM International Conference on Automated Software …, 2021
1282021
Bounties on technical Q&A sites: a case study of Stack Overflow bounties
J Zhou, S Wang, CP Bezemer, AE Hassan
Empirical Software Engineering 25 (1), 139-177, 2020
452020
Colefunda: Explainable silent vulnerability fix identification
J Zhou, M Pacheco, J Chen, X Hu, X Xia, D Lo, AE Hassan
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
352023
Studying the association between bountysource bounties and the issue-addressing likelihood of github issue reports
J Zhou, S Wang, CP Bezemer, Y Zou, AE Hassan
IEEE Transactions on Software Engineering 47 (12), 2919-2933, 2020
322020
Automated unearthing of dangerous issue reports
S Pan, J Zhou, FR Cogo, X Xia, L Bao, X Hu, S Li, AE Hassan
Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022
262022
Multi-granularity detector for vulnerability fixes
TG Nguyen, T Le-Cong, HJ Kang, R Widyasari, C Yang, Z Zhao, B Xu, ...
IEEE Transactions on Software Engineering 49 (8), 4035-4057, 2023
202023
Towards more practical automation of vulnerability assessment
S Pan, L Bao, J Zhou, X Hu, X Xia, S Li
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
192024
Studying donations and their expenses in open source projects: a case study of GitHub projects collecting donations through open collectives
J Zhou, S Wang, Y Kamei, AE Hassan, N Ubayashi
Empirical Software Engineering 27 (1), 24, 2022
132022
Studying backers and hunters in bounty issue addressing process of open source projects
J Zhou, S Wang, H Zhang, TH Chen, AE Hassan
Empirical Software Engineering 26 (4), 81, 2021
122021
Code Change Intention, Development Artifact, and History Vulnerability: Putting Them Together for Vulnerability Fix Detection by LLM
X Yang, W Zhu, M Pacheco, J Zhou, S Wang, X Hu, K Liu
Proceedings of the ACM on Software Engineering 2 (FSE), 489-510, 2025
82025
An empirical study on vulnerability disclosure management of open source software systems
S Liu, J Zhou, X Hu, FR Cogo, X Xia, X Yang
ACM Transactions on Software Engineering and Methodology, 2025
52025
Unveil the mystery of critical software vulnerabilities
S Pan, L Bao, J Zhou, X Hu, X Xia, S Li
Companion Proceedings of the 32nd ACM International Conference on the …, 2024
52024
One-for-All Does Not Work! Enhancing Vulnerability Detection by Mixture-of-Experts (MoE)
X Yang, S Wang, J Zhou, W Zhu
Proceedings of the ACM on Software Engineering 2 (FSE), 446-464, 2025
42025
Similar but Patched Code Considered Harmful--The Impact of Similar but Patched Code on Recurring Vulnerability Detection and How to Remove Them
Z Tan, J Zhou, X Hu, S Pan, K Liu, X Xia
arXiv preprint arXiv:2412.20740, 2024
32024
Silent Taint-Style Vulnerability Fixes Identification
Z Wen, J Zhou, M Pan, S Wang, X Hu, T Xu, T Zhang, X Li
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software …, 2024
32024
Diffploit: Facilitating Cross-Version Exploit Migration for Open Source Library Vulnerabilities
Z Chen, Z Xue, J Zhou, X Hu, X Xia, X Yang
arXiv preprint arXiv:2511.12950, 2025
12025
From Industrial Practices to Academia: Uncovering the Gap in Vulnerability Research and Practice
Z Liu, X Hu, J Zhou, X Xia
2025 IEEE/ACM 22nd International Conference on Mining Software Repositories …, 2025
12025
Lingxi: Repository-Level Issue Resolution Framework Enhanced by Procedural Knowledge Guided Scaling
X Yang, J Zhou, M Pacheco, W Zhu, P He, S Wang, K Liu, R Pan
arXiv preprint arXiv:2510.11838, 2025
2025
An Empirical Study of Automatic Program Repair Techniques for Injection Vulnerabilities
T Zhu, T Xu, K Liu, J Zhou, X Hu, X Xia, T Zhang, D Lo
2024 IEEE International Conference on Software Maintenance and Evolution …, 2024
2024
VFDelta: A Framework for Detecting Silent Vulnerability Fixes by Enhancing Code Change Learning
X Yang, S Wang, J Zhou, X Hu
arXiv preprint arXiv:2409.16606, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20