| Data quality matters: A case study on data label correctness for security bug report prediction X Wu, W Zheng, X Xia, D Lo IEEE Transactions on Software Engineering 48 (7), 2541-2556, 2021 | 196 | 2021 |
| Improving high-impact bug report prediction with combination of interactive machine learning and active learning X Wu, W Zheng, X Chen, Y Zhao, T Yu, D Mu Information and Software Technology 133, 106530, 2021 | 132 | 2021 |
| A survey of Intel SGX and its applications W Zheng, Y Wu, X Wu, C Feng, Y Sui, X Luo, Y Zhou Frontiers of Computer Science 15 (3), 153808, 2021 | 97 | 2021 |
| A comparative study of class rebalancing methods for security bug report classification W Zheng, Y Xun, X Wu, Z Deng, X Chen, Y Sui IEEE Transactions on Reliability 70 (4), 1658-1670, 2021 | 95 | 2021 |
| The impact factors on the performance of machine learning-based vulnerability detection: A comparative study W Zheng, J Gao, X Wu, F Liu, Y Xun, G Liu, X Chen Journal of Systems and Software 168, 110659, 2020 | 80 | 2020 |
| An Abstract Syntax Tree based static fuzzing mutation for vulnerability evolution analysis W Zheng, P Deng, K Gui, X Wu Information and Software Technology 158, 107194, 2023 | 58 | 2023 |
| Domain knowledge-based security bug reports prediction W Zheng, JY Cheng, X Wu, R Sun, X Wang, X Sun Knowledge-Based Systems 241, 108293, 2022 | 53 | 2022 |
| Oddfuzz: Discovering java deserialization vulnerabilities via structure-aware directed greybox fuzzing S Cao, B He, X Sun, Y Ouyang, C Zhang, X Wu, T Su, L Bo, B Li, C Ma, ... 2023 IEEE Symposium on Security and Privacy (SP), 2726-2743, 2023 | 52 | 2023 |
| Coca: Improving and explaining graph neural network-based vulnerability detection systems S Cao, X Sun, X Wu, D Lo, L Bo, B Li, W Liu Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024 | 50 | 2024 |
| CVE-assisted large-scale security bug report dataset construction method X Wu, W Zheng, X Chen, F Wang, D Mu Journal of Systems and Software 160, 110456, 2020 | 50 | 2020 |
| Recdroid+: Automated end-to-end crash reproduction from bug reports for android apps Y Zhao, T Su, Y Liu, W Zheng, X Wu, R Kavuluru, WGJ Halfond, T Yu ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (3), 1-33, 2022 | 46 | 2022 |
| An empirical study on correlations between deep neural network fairness and neuron coverage criteria W Zheng, L Lin, X Wu, X Chen IEEE Transactions on Software Engineering 50 (3), 391-412, 2024 | 42 | 2024 |
| Improving java deserialization gadget chain mining via overriding-guided object generation S Cao, X Sun, X Wu, L Bo, B Li, R Wu, W Liu, B He, Y Ouyang, J Li 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023 | 33 | 2023 |
| A deep learning‐based approach for software vulnerability detection using code metrics F Subhan, X Wu, L Bo, X Sun, M Rahman IET software 16 (5), 516-526, 2022 | 33 | 2022 |
| Literature survey of deep learning‐based vulnerability analysis on source code AOA Semasaba, W Zheng, X Wu, SA Agyemang IET Software 14 (6), 654-664, 2020 | 33 | 2020 |
| Automatic software vulnerability assessment by extracting vulnerability elements X Sun, Z Ye, L Bo, X Wu, Y Wei, T Zhang, B Li Journal of Systems and Software 204, 111790, 2023 | 30 | 2023 |
| A systematic literature review on explainability for machine/deep learning-based software engineering research S Cao, X Sun, R Widyasari, D Lo, X Wu, L Bo, J Zhang, B Li, W Liu, D Wu, ... arXiv preprint arXiv:2401.14617, 2024 | 26 | 2024 |
| Invalid bug reports complicate the software aging situation X Wu, W Zheng, M Pu, J Chen, D Mu Software Quality Journal 28 (1), 195-220, 2020 | 26 | 2020 |
| Learning to detect memory-related vulnerabilities S Cao, X Sun, L Bo, R Wu, B Li, X Wu, C Tao, T Zhang, W Liu ACM Transactions on Software Engineering and Methodology 33 (2), 1-35, 2023 | 23 | 2023 |
| SPVF: security property assisted vulnerability fixing via attention-based models Z Zhou, L Bo, X Wu, X Sun, T Zhang, B Li, J Zhang, S Cao Empirical Software Engineering 27 (7), 171, 2022 | 23 | 2022 |