关注
Xiaoxue Wu
Xiaoxue Wu
Information Engineering
在 yzu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Data quality matters: A case study on data label correctness for security bug report prediction
X Wu, W Zheng, X Xia, D Lo
IEEE Transactions on Software Engineering 48 (7), 2541-2556, 2021
1452021
Improving high-impact bug report prediction with combination of interactive machine learning and active learning
X Wu, W Zheng, X Chen, Y Zhao, T Yu, D Mu
Information and Software Technology 133, 106530, 2021
1082021
A comparative study of class rebalancing methods for security bug report classification
W Zheng, Y Xun, X Wu, Z Deng, X Chen, Y Sui
IEEE Transactions on Reliability 70 (4), 1658-1670, 2021
852021
The impact factors on the performance of machine learning-based vulnerability detection: A comparative study
W Zheng, J Gao, X Wu, F Liu, Y Xun, G Liu, X Chen
Journal of Systems and Software 168, 110659, 2020
552020
A survey of Intel SGX and its applications
W Zheng, Y Wu, X Wu, C Feng, Y Sui, X Luo, Y Zhou
Frontiers of Computer Science 15, 1-15, 2021
532021
An Abstract Syntax Tree based static fuzzing mutation for vulnerability evolution analysis
W Zheng, P Deng, K Gui, X Wu
Information and Software Technology 158, 107194, 2023
442023
Domain knowledge-based security bug reports prediction
W Zheng, JY Cheng, X Wu, R Sun, X Wang, X Sun
Knowledge-Based Systems 241, 108293, 2022
432022
CVE-assisted large-scale security bug report dataset construction method
X Wu, W Zheng, X Chen, F Wang, D Mu
Journal of Systems and Software 160, 110456, 2020
372020
Recdroid+: Automated end-to-end crash reproduction from bug reports for android apps
Y Zhao, T Su, Y Liu, W Zheng, X Wu, R Kavuluru, WGJ Halfond, T Yu
ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (3), 1-33, 2022
292022
Literature survey of deep learning‐based vulnerability analysis on source code
AOA Semasaba, W Zheng, X Wu, SA Agyemang
IET Software 14 (6), 654-664, 2020
252020
Oddfuzz: Discovering java deserialization vulnerabilities via structure-aware directed greybox fuzzing
S Cao, B He, X Sun, Y Ouyang, C Zhang, X Wu, T Su, L Bo, B Li, C Ma, ...
2023 IEEE Symposium on Security and Privacy (SP), 2726-2743, 2023
222023
Invalid bug reports complicate the software aging situation
X Wu, W Zheng, M Pu, J Chen, D Mu
Software Quality Journal 28, 195-220, 2020
222020
Towards understanding bugs in an open source cloud management stack: An empirical study of OpenStack software bugs
W Zheng, C Feng, T Yu, X Yang, X Wu
Journal of Systems and Software 151, 210-223, 2019
222019
SPVF: security property assisted vulnerability fixing via attention-based models
Z Zhou, L Bo, X Wu, X Sun, T Zhang, B Li, J Zhang, S Cao
Empirical Software Engineering 27 (7), 171, 2022
172022
Test suite minimization with mutation testing-based many-objective evolutionary optimization
Z Wei, W Xiaoxue, Y Xibing, C Shichao, L Wenxin, L Jun
2017 International Conference on Software Analysis, Testing and Evolution …, 2017
172017
Improving java deserialization gadget chain mining via overriding-guided object generation
S Cao, X Sun, X Wu, L Bo, B Li, R Wu, W Liu, B He, Y Ouyang, J Li
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
152023
Locating minimal fault interaction in combinatorial testing
W Zheng, X Wu, D Hu, Q Zhu
Advances in Software Engineering 2016 (1), 2409521, 2016
142016
A deep learning‐based approach for software vulnerability detection using code metrics
F Subhan, X Wu, L Bo, X Sun, M Rahman
IET Software 16 (5), 516-526, 2022
122022
An empirical study of high-impact factors for machine learning-based vulnerability detection
W Zheng, J Gao, X Wu, Y Xun, G Liu, X Chen
2020 IEEE 2nd International workshop on intelligent bug fixing (IBF), 26-34, 2020
122020
Automatic software vulnerability classification by extracting vulnerability triggers
X Sun, L Li, L Bo, X Wu, Y Wei, B Li
Journal of Software: Evolution and Process 36 (2), e2508, 2024
92024
系统目前无法执行此操作,请稍后再试。
文章 1–20