[go: up one dir, main page]

Follow
Xiaoxue Wu
Xiaoxue Wu
Information Engineering
Verified email at yzu.edu.cn
Title
Cited by
Cited by
Year
Data quality matters: A case study on data label correctness for security bug report prediction
X Wu, W Zheng, X Xia, D Lo
IEEE Transactions on Software Engineering 48 (7), 2541-2556, 2021
1962021
Improving high-impact bug report prediction with combination of interactive machine learning and active learning
X Wu, W Zheng, X Chen, Y Zhao, T Yu, D Mu
Information and Software Technology 133, 106530, 2021
1322021
A survey of Intel SGX and its applications
W Zheng, Y Wu, X Wu, C Feng, Y Sui, X Luo, Y Zhou
Frontiers of Computer Science 15 (3), 153808, 2021
972021
A comparative study of class rebalancing methods for security bug report classification
W Zheng, Y Xun, X Wu, Z Deng, X Chen, Y Sui
IEEE Transactions on Reliability 70 (4), 1658-1670, 2021
952021
The impact factors on the performance of machine learning-based vulnerability detection: A comparative study
W Zheng, J Gao, X Wu, F Liu, Y Xun, G Liu, X Chen
Journal of Systems and Software 168, 110659, 2020
802020
An Abstract Syntax Tree based static fuzzing mutation for vulnerability evolution analysis
W Zheng, P Deng, K Gui, X Wu
Information and Software Technology 158, 107194, 2023
582023
Domain knowledge-based security bug reports prediction
W Zheng, JY Cheng, X Wu, R Sun, X Wang, X Sun
Knowledge-Based Systems 241, 108293, 2022
532022
Oddfuzz: Discovering java deserialization vulnerabilities via structure-aware directed greybox fuzzing
S Cao, B He, X Sun, Y Ouyang, C Zhang, X Wu, T Su, L Bo, B Li, C Ma, ...
2023 IEEE Symposium on Security and Privacy (SP), 2726-2743, 2023
522023
Coca: Improving and explaining graph neural network-based vulnerability detection systems
S Cao, X Sun, X Wu, D Lo, L Bo, B Li, W Liu
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
502024
CVE-assisted large-scale security bug report dataset construction method
X Wu, W Zheng, X Chen, F Wang, D Mu
Journal of Systems and Software 160, 110456, 2020
502020
Recdroid+: Automated end-to-end crash reproduction from bug reports for android apps
Y Zhao, T Su, Y Liu, W Zheng, X Wu, R Kavuluru, WGJ Halfond, T Yu
ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (3), 1-33, 2022
462022
An empirical study on correlations between deep neural network fairness and neuron coverage criteria
W Zheng, L Lin, X Wu, X Chen
IEEE Transactions on Software Engineering 50 (3), 391-412, 2024
422024
Improving java deserialization gadget chain mining via overriding-guided object generation
S Cao, X Sun, X Wu, L Bo, B Li, R Wu, W Liu, B He, Y Ouyang, J Li
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
332023
A deep learning‐based approach for software vulnerability detection using code metrics
F Subhan, X Wu, L Bo, X Sun, M Rahman
IET software 16 (5), 516-526, 2022
332022
Literature survey of deep learning‐based vulnerability analysis on source code
AOA Semasaba, W Zheng, X Wu, SA Agyemang
IET Software 14 (6), 654-664, 2020
332020
Automatic software vulnerability assessment by extracting vulnerability elements
X Sun, Z Ye, L Bo, X Wu, Y Wei, T Zhang, B Li
Journal of Systems and Software 204, 111790, 2023
302023
A systematic literature review on explainability for machine/deep learning-based software engineering research
S Cao, X Sun, R Widyasari, D Lo, X Wu, L Bo, J Zhang, B Li, W Liu, D Wu, ...
arXiv preprint arXiv:2401.14617, 2024
262024
Invalid bug reports complicate the software aging situation
X Wu, W Zheng, M Pu, J Chen, D Mu
Software Quality Journal 28 (1), 195-220, 2020
262020
Learning to detect memory-related vulnerabilities
S Cao, X Sun, L Bo, R Wu, B Li, X Wu, C Tao, T Zhang, W Liu
ACM Transactions on Software Engineering and Methodology 33 (2), 1-35, 2023
232023
SPVF: security property assisted vulnerability fixing via attention-based models
Z Zhou, L Bo, X Wu, X Sun, T Zhang, B Li, J Zhang, S Cao
Empirical Software Engineering 27 (7), 171, 2022
232022
The system can't perform the operation now. Try again later.
Articles 1–20