关注
Jiamou Sun
Jiamou Sun
Data61, CSIRO
在 data61.csiro.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
Improving api caveats accessibility by mining api caveats knowledge graph
H Li, S Li, J Sun, Z Xing, X Peng, M Liu, X Zhao
2018 IEEE International Conference on Software Maintenance and Evolution …, 2018
1162018
Prcbert: Prompt learning for requirement classification using bert-based pretrained language models
X Luo, Y Xue, Z Xing, J Sun
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
382022
Data-driven proactive policy assurance of post quality in community q&a sites
C Chen, X Chen, J Sun, Z Xing, G Li
Proceedings of the ACM on human-computer interaction 2 (CSCW), 1-22, 2018
372018
Detecting and augmenting missing key aspects in vulnerability descriptions
H Guo, S Chen, Z Xing, X Li, Y Bai, J Sun
ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (3), 1-27, 2022
312022
Demystify official API usage directives with crowdsourced API misuse scenarios, erroneous code examples and patches
X Ren, J Sun, Z Xing, X Xia, J Sun
Proceedings of the ACM/IEEE 42nd international conference on software …, 2020
282020
Know-how in programming tasks: From textual tutorials to task-oriented knowledge graph
J Sun, Z Xing, R Chu, H Bai, J Wang, X Peng
2019 IEEE International Conference on Software Maintenance and Evolution …, 2019
252019
Generating informative CVE description from ExploitDB posts by extractive summarization
J Sun, Z Xing, H Guo, D Ye, X Li, X Xu, L Zhu
arXiv preprint arXiv:2101.01431, 2021
192021
Unveiling the tricks: Automated detection of dark patterns in mobile applications
J Chen, J Sun, S Feng, Z Xing, Q Lu, X Xu, C Chen
Proceedings of the 36th Annual ACM Symposium on User Interface Software and …, 2023
152023
Task-oriented api usage examples prompting powered by programming task knowledge graph
J Sun, Z Xing, X Peng, X Xu, L Zhu
2021 IEEE International Conference on Software Maintenance and Evolution …, 2021
102021
Silent vulnerable dependency alert prediction with vulnerability key aspect explanation
J Sun, Z Xing, Q Lu, X Xu, L Zhu, T Hoang, D Zhao
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
82023
Prediction of vulnerability characteristics based on vulnerability description and prompt learning
X Li, X Ren, Y Xue, Z Xing, J Sun
2023 IEEE International Conference on Software Analysis, Evolution and …, 2023
82023
Aspect-level information discrepancies across heterogeneous vulnerability reports: Severity, types and detection methods
J Sun, Z Xing, X Xia, Q Lu, X Xu, L Zhu
ACM Transactions on Software Engineering and Methodology 33 (2), 1-38, 2023
52023
Heterogeneous vulnerability report traceability recovery by vulnerability aspect matching
J Sun, Z Xing, X Xu, L Zhu, Q Lu
2022 IEEE International Conference on Software Maintenance and Evolution …, 2022
52022
Pop Quiz! Do Pre-trained Code Models Possess Knowledge of Correct API Names?
TY Zhuo, X Du, Z Xing, J Sun, H Quan, L Li, L Zhu
arXiv preprint arXiv:2309.07804, 2023
22023
Don't Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-tail Software through Feature Inference
L Han, S Pan, Z Xing, J Sun, S Yitagesu, X Zhang, Z Feng
arXiv preprint arXiv:2405.07430, 2024
12024
A Multi-faceted Vulnerability Searching Website Powered by Aspect-level Vulnerability Knowledge Graph
J Sun, Z Xing, Q Lu, X Xu, L Zhu
2023 IEEE/ACM 45th International Conference on Software Engineering …, 2023
12023
The Invisible Game on the Internet: A Case Study of Decoding Deceptive Patterns
Z Shi, R Sun, J Chen, J Sun, M Xue
Companion Proceedings of the ACM on Web Conference 2024, 521-524, 2024
2024
Where is it? Tracing the Vulnerability-Relevant Files from Vulnerability Reports
J Sun, J Chen, Z Xing, Q Lu, X Xu, L Zhu
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–18