关注
Xianglong Kong
Xianglong Kong
在 seu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Experience report: How do techniques, programs, and tests impact automated program repair?
X Kong, L Zhang, WE Wong, B Li
2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015
432015
Hirec: Api recommendation using hierarchical context
R Xie, X Kong, L Wang, Y Zhou, B Li
2019 IEEE 30th International Symposium on Software Reliability Engineering …, 2019
302019
The impacts of techniques, programs and tests on automated program repair: An empirical study
X Kong, L Zhang, WE Wong, B Li
Journal of Systems and Software 137, 480-496, 2018
242018
Directory-based dependency processing for software architecture recovery
X Kong, B Li, L Wang, W Wu
IEEE Access 6, 52321-52335, 2018
172018
A simple framework to enhance the adversarial robustness of deep learning-based intrusion detection system
X Yuan, S Han, W Huang, H Ye, X Kong, F Zhang
Computers & Security 137, 103644, 2024
132024
A combined method for usage of NLP libraries towards analyzing software documents
X Cheng, X Kong, L Liao, B Li
Advanced Information Systems Engineering: 32nd International Conference …, 2020
112020
Effects of RNAs on chromatin accessibility and gene expression suggest RNA-mediated activation
X Wang, Z Ma, X Kong, Z Lv
The International Journal of Biochemistry & Cell Biology 79, 24-32, 2016
112016
An analysis of correctness for API recommendation: are the unmatched results useless?
X Kong, W Han, L Liao, B Li
Science China Information Sciences 63, 1-15, 2020
102020
Microservice architecture recovery based on intra-service and inter-service features
L Wang, P Hu, X Kong, W Ouyang, B Li, H Xu, T Shao
Journal of Systems and Software 204, 111754, 2023
72023
Combined sense-antisense Alu elements activate the EGFP reporter gene when stable transfection
Z Ma, X Kong, S Liu, S Yin, Y Zhao, C Liu, Z Lv, X Wang
Molecular genetics and genomics 292, 833-846, 2017
72017
A label-free fluorescence strategy for analysis of aflatoxin M1 by self-protected DNAzyme and aptamer recognition triggered DNA walker cascade amplification
M Wang, L Shan, X Kong, R Pan, H Wang, J Zhou, J Ming
Microchemical Journal 186, 108356, 2023
52023
An incremental software architecture recovery technique driven by code changes
L Wang, X Kong, J Wang, B Li
Frontiers of Information Technology & Electronic Engineering 23 (5), 664-677, 2022
42022
Joint Embedding of Semantic and Statistical Features for Effective Code Search
X Kong, S Kong, M Yu, C Du
Applied Sciences 12 (19), 10002, 2022
32022
Ensemble Adversarial Defense via Integration of Multiple Dispersed Low Curvature Models
K Zhao, X Chen, W Huang, L Ding, X Kong, F Zhang
arXiv preprint arXiv:2403.16405, 2024
22024
An Empirical Investigation into the Effects of Code Comments on Issue Resolution
Q Song, X Kong, L Wang, B Li
2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020
22020
Boosting Code Search with Structural Code Annotation
X Kong, H Chen, M Yu, L Zhang
Electronics 11 (19), 3053, 2022
12022
An Analysis of Utility for API Recommendation: Do the Matched Results Have the Same Efforts?
H Li, R Xie, X Kong, L Wang, B Li
2020 IEEE 20th International Conference on Software Quality, Reliability and …, 2020
12020
Code Recommendation for Schema Evolution of Mimic Storage Systems
X Kong, Z Lv, C Chen, H Chang, N Li, F Zhang
International Journal of Software Engineering and Knowledge Engineering, 1-22, 2024
2024
Shielding Object Detection: Enhancing Adversarial Defense through Ensemble Methods
Z Peng, X Chen, W Huang, X Kong, J Li, S Xue
2024 5th Information Communication Technologies Conference (ICTC), 88-97, 2024
2024
Boosting Multimode Ruling in DHR Architecture With Metamorphic Relations
R Li, X Kong, W Guo, J Guo, H Li, F Zhang
Software Testing, Verification and Reliability, e1890, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20