Improving api caveats accessibility by mining api caveats knowledge graph H Li, S Li, J Sun, Z Xing, X Peng, M Liu, X Zhao 2018 IEEE International Conference on Software Maintenance and Evolution …, 2018 | 115 | 2018 |
Data-driven proactive policy assurance of post quality in community q&a sites C Chen, X Chen, J Sun, Z Xing, G Li Proceedings of the ACM on human-computer interaction 2 (CSCW), 1-22, 2018 | 36 | 2018 |
Prcbert: Prompt learning for requirement classification using bert-based pretrained language models X Luo, Y Xue, Z Xing, J Sun Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022 | 34 | 2022 |
Detecting and augmenting missing key aspects in vulnerability descriptions H Guo, S Chen, Z Xing, X Li, Y Bai, J Sun ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (3), 1-27, 2022 | 30 | 2022 |
Demystify official API usage directives with crowdsourced API misuse scenarios, erroneous code examples and patches X Ren, J Sun, Z Xing, X Xia, J Sun Proceedings of the ACM/IEEE 42nd international conference on software …, 2020 | 26 | 2020 |
Know-how in programming tasks: From textual tutorials to task-oriented knowledge graph J Sun, Z Xing, R Chu, H Bai, J Wang, X Peng 2019 IEEE International Conference on Software Maintenance and Evolution …, 2019 | 25 | 2019 |
Generating informative CVE description from ExploitDB posts by extractive summarization J Sun, Z Xing, H Guo, D Ye, X Li, X Xu, L Zhu arXiv preprint arXiv:2101.01431, 2021 | 19 | 2021 |
Unveiling the tricks: Automated detection of dark patterns in mobile applications J Chen, J Sun, S Feng, Z Xing, Q Lu, X Xu, C Chen Proceedings of the 36th Annual ACM Symposium on User Interface Software and …, 2023 | 11 | 2023 |
Task-oriented api usage examples prompting powered by programming task knowledge graph J Sun, Z Xing, X Peng, X Xu, L Zhu 2021 IEEE International Conference on Software Maintenance and Evolution …, 2021 | 10 | 2021 |
Silent vulnerable dependency alert prediction with vulnerability key aspect explanation J Sun, Z Xing, Q Lu, X Xu, L Zhu, T Hoang, D Zhao 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023 | 8 | 2023 |
Prediction of vulnerability characteristics based on vulnerability description and prompt learning X Li, X Ren, Y Xue, Z Xing, J Sun 2023 IEEE International Conference on Software Analysis, Evolution and …, 2023 | 8 | 2023 |
Aspect-level information discrepancies across heterogeneous vulnerability reports: Severity, types and detection methods J Sun, Z Xing, X Xia, Q Lu, X Xu, L Zhu ACM Transactions on Software Engineering and Methodology 33 (2), 1-38, 2023 | 5 | 2023 |
Heterogeneous vulnerability report traceability recovery by vulnerability aspect matching J Sun, Z Xing, X Xu, L Zhu, Q Lu 2022 IEEE International Conference on Software Maintenance and Evolution …, 2022 | 5 | 2022 |
Pop Quiz! Do Pre-trained Code Models Possess Knowledge of Correct API Names? TY Zhuo, X Du, Z Xing, J Sun, H Quan, L Li, L Zhu arXiv preprint arXiv:2309.07804, 2023 | 2 | 2023 |
Don't Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-tail Software through Feature Inference L Han, S Pan, Z Xing, J Sun, S Yitagesu, X Zhang, Z Feng arXiv preprint arXiv:2405.07430, 2024 | 1 | 2024 |
A Multi-faceted Vulnerability Searching Website Powered by Aspect-level Vulnerability Knowledge Graph J Sun, Z Xing, Q Lu, X Xu, L Zhu 2023 IEEE/ACM 45th International Conference on Software Engineering …, 2023 | 1 | 2023 |
The Invisible Game on the Internet: A Case Study of Decoding Deceptive Patterns Z Shi, R Sun, J Chen, J Sun, M Xue Companion Proceedings of the ACM on Web Conference 2024, 521-524, 2024 | | 2024 |
Where is it? Tracing the Vulnerability-Relevant Files from Vulnerability Reports J Sun, J Chen, Z Xing, Q Lu, X Xu, L Zhu Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024 | | 2024 |