Experience report: How do techniques, programs, and tests impact automated program repair? X Kong, L Zhang, WE Wong, B Li 2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015 | 43 | 2015 |
Hirec: Api recommendation using hierarchical context R Xie, X Kong, L Wang, Y Zhou, B Li 2019 IEEE 30th International Symposium on Software Reliability Engineering …, 2019 | 30 | 2019 |
The impacts of techniques, programs and tests on automated program repair: An empirical study X Kong, L Zhang, WE Wong, B Li Journal of Systems and Software 137, 480-496, 2018 | 24 | 2018 |
Directory-based dependency processing for software architecture recovery X Kong, B Li, L Wang, W Wu IEEE Access 6, 52321-52335, 2018 | 17 | 2018 |
A simple framework to enhance the adversarial robustness of deep learning-based intrusion detection system X Yuan, S Han, W Huang, H Ye, X Kong, F Zhang Computers & Security 137, 103644, 2024 | 13 | 2024 |
A combined method for usage of NLP libraries towards analyzing software documents X Cheng, X Kong, L Liao, B Li Advanced Information Systems Engineering: 32nd International Conference …, 2020 | 11 | 2020 |
Effects of RNAs on chromatin accessibility and gene expression suggest RNA-mediated activation X Wang, Z Ma, X Kong, Z Lv The International Journal of Biochemistry & Cell Biology 79, 24-32, 2016 | 11 | 2016 |
An analysis of correctness for API recommendation: are the unmatched results useless? X Kong, W Han, L Liao, B Li Science China Information Sciences 63, 1-15, 2020 | 10 | 2020 |
Microservice architecture recovery based on intra-service and inter-service features L Wang, P Hu, X Kong, W Ouyang, B Li, H Xu, T Shao Journal of Systems and Software 204, 111754, 2023 | 7 | 2023 |
Combined sense-antisense Alu elements activate the EGFP reporter gene when stable transfection Z Ma, X Kong, S Liu, S Yin, Y Zhao, C Liu, Z Lv, X Wang Molecular genetics and genomics 292, 833-846, 2017 | 7 | 2017 |
A label-free fluorescence strategy for analysis of aflatoxin M1 by self-protected DNAzyme and aptamer recognition triggered DNA walker cascade amplification M Wang, L Shan, X Kong, R Pan, H Wang, J Zhou, J Ming Microchemical Journal 186, 108356, 2023 | 5 | 2023 |
An incremental software architecture recovery technique driven by code changes L Wang, X Kong, J Wang, B Li Frontiers of Information Technology & Electronic Engineering 23 (5), 664-677, 2022 | 4 | 2022 |
Joint Embedding of Semantic and Statistical Features for Effective Code Search X Kong, S Kong, M Yu, C Du Applied Sciences 12 (19), 10002, 2022 | 3 | 2022 |
Ensemble Adversarial Defense via Integration of Multiple Dispersed Low Curvature Models K Zhao, X Chen, W Huang, L Ding, X Kong, F Zhang arXiv preprint arXiv:2403.16405, 2024 | 2 | 2024 |
An Empirical Investigation into the Effects of Code Comments on Issue Resolution Q Song, X Kong, L Wang, B Li 2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020 | 2 | 2020 |
Boosting Code Search with Structural Code Annotation X Kong, H Chen, M Yu, L Zhang Electronics 11 (19), 3053, 2022 | 1 | 2022 |
An Analysis of Utility for API Recommendation: Do the Matched Results Have the Same Efforts? H Li, R Xie, X Kong, L Wang, B Li 2020 IEEE 20th International Conference on Software Quality, Reliability and …, 2020 | 1 | 2020 |
Code Recommendation for Schema Evolution of Mimic Storage Systems X Kong, Z Lv, C Chen, H Chang, N Li, F Zhang International Journal of Software Engineering and Knowledge Engineering, 1-22, 2024 | | 2024 |
Shielding Object Detection: Enhancing Adversarial Defense through Ensemble Methods Z Peng, X Chen, W Huang, X Kong, J Li, S Xue 2024 5th Information Communication Technologies Conference (ICTC), 88-97, 2024 | | 2024 |
Boosting Multimode Ruling in DHR Architecture With Metamorphic Relations R Li, X Kong, W Guo, J Guo, H Li, F Zhang Software Testing, Verification and Reliability, e1890, 2024 | | 2024 |