[go: up one dir, main page]

Follow
Jinfu Chen
Title
Cited by
Cited by
Year
Security weaknesses of copilot generated code in github
Y Fu, P Liang, A Tahir, Z Li, M Shahin, J Yu, J Chen
ACM Transactions on Software Engineering and Methodology, 2025
1122025
Studying the characteristics of logging practices in mobile apps: a case study on f-droid
Y Zeng, J Chen, W Shang, TH Chen
Empirical Software Engineering 24 (6), 3394-3434, 2019
882019
An exploratory study of performance regression introducing code changes
J Chen, W Shang
2017 ieee international conference on software maintenance and evolution …, 2017
842017
Towards the use of the readily available tests from the release pipeline as performance tests: Are we there yet?
Z Ding, J Chen, W Shang
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
802020
PerfJIT: Test-level Just-in-time Prediction for Performance Regression Introducing Commits
J Chen, W Shang, E Shihab
IEEE Transactions on Software Engineering, 2020
622020
Colefunda: Explainable silent vulnerability fix identification
J Zhou, M Pacheco, J Chen, X Hu, X Xia, D Lo, AE Hassan
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
352023
Using black-box performance models to detect performance regressions under varying workloads: an empirical study
L Liao, J Chen, H Li, Y Zeng, W Shang, J Guo, C Sporea, A Toma, ...
Empirical Software Engineering 25 (5), 4130-4160, 2020
342020
An experience report of generating load tests using log-recovered workloads at varying granularities of user behaviour
J Chen, W Shang, AE Hassan, Y Wang, J Lin
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
342019
Federated learning for software engineering: A case study of code clone detection and defect prediction
Y Yang, X Hu, Z Gao, J Chen, C Ni, X Xia, D Lo
IEEE Transactions on Software Engineering 50 (2), 296-321, 2024
312024
A novel algorithm for encrypted traffic classification based on sliding window of flow's first N packets
Y Liu, J Chen, P Chang, X Yun
2017 2nd IEEE International Conference on Computational Intelligence and …, 2017
302017
Locating performance regression root causes in the field operations of web-based systems: An experience report
L Liao, J Chen, H Li, Y Zeng, W Shang, C Sporea, A Toma, S Sajedi
IEEE Transactions on Software Engineering 48 (12), 4986-5006, 2021
232021
Assessing the Performance of AI-Generated Code: A Case Study on GitHub Copilot
S Li, Y Cheng, J Chen, J Xuan, S He, W Shang
The 35th IEEE International Symposium on Software Reliability Engineering, 2024
222024
Performance regression detection in devops
J Chen
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
19*2020
Vulnerabilities of data protection in vertical federated learning training and countermeasures
D Zhu, J Chen, X Zhou, W Shang, AE Hassan, J Grossklags
IEEE Transactions on Information Forensics and Security 19, 3674-3689, 2024
162024
DeepMemory: Model-based memorization analysis of deep neural language models
D Zhu, J Chen, W Shang, X Zhou, J Grossklags, AE Hassan
2021 36th IEEE/ACM International Conference on Automated Software …, 2021
152021
Iopv: On inconsistent option performance variations
J Chen, Z Ding, Y Tang, M Sayagh, H Li, B Adams, W Shang
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
72023
STRE: an automated approach to suggesting app developers when to stop reading reviews
Y Tan, J Chen, W Shang, T Zhang, S Fang, X Luo, Z Chen, S Qi
IEEE Transactions on Software Engineering 49 (8), 4135-4151, 2023
72023
An Empirical Comparison on the Results of Different Clone Detection Setups for C-based Projects
Y Zhou, J Chen, Y Shi, B Chen, ZMJ Jiang
2023 IEEE/ACM 45th International Conference on Software Engineering …, 2023
52023
A new method to construct the software vulnerability model
X Li, J Chen, Z Lin, L Zhang, Z Wang, M Zhou, W Xie
2017 2nd IEEE International Conference on Computational Intelligence and …, 2017
52017
An approach of security testing for third‐party component based on state mutation
J Chen, J Chen, R Huang, Y Guo, Y Zhan
Security and Communication Networks 9 (15), 2827-2842, 2016
52016
The system can't perform the operation now. Try again later.
Articles 1–20