default search action
Bixin Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j60]Hao Chen, Shengyang Zhou, Chen Chen, Zheng Dai, Bixin Li:
A Business-Oriented Methodology to Evaluate the Security of Software Architecture Quantitatively. Int. J. Softw. Eng. Knowl. Eng. 34(2): 239-271 (2024) - [j59]Tong Wang, Bixin Li:
EsArCost: Estimating repair costs of software architecture erosion using slice technology. J. Syst. Softw. 208: 111875 (2024) - [j58]Tianyuan Hu, Jingyue Li, Xiangfei Xu, Bixin Li:
SoliTester: Detecting exploitable external-risky vulnerability in smart contracts using contract account triggering method. J. Softw. Evol. Process. 36(7) (2024) - [j57]Tianyuan Hu, Bixin Li, Zhenyu Pan, Chen Qian:
Detect Defects of Solidity Smart Contract Based on the Knowledge Graph. IEEE Trans. Reliab. 73(1): 186-202 (2024) - 2023
- [j56]Chunguang Zhang, Bixin Li, Lulu Wang, Haixin Xu, Tao Shao:
A Hierarchical Model for Quality Evaluation of Mixed Source Software Based on ISO/IEC 25010. Int. J. Softw. Eng. Knowl. Eng. 33(2): 181-205 (2023) - [j55]Tong Wang, Bixin Li, Lingyuan Zhu:
A Quality-Driven Iterative Evolution Approach for Software Architecture. Int. J. Softw. Eng. Knowl. Eng. 33(2): 231-255 (2023) - [j54]Chen Cheng, Bixin Li, Dong Chen:
A quality evaluation method for intelligent traffic management system based on business data flow. J. Intell. Fuzzy Syst. 45(4): 6193-6208 (2023) - [j53]Qihao Bao, Bixin Li, Tianyuan Hu, Xueyong Sun:
A survey of blockchain consensus safety and security: State-of-the-art, challenges, and future work. J. Syst. Softw. 196: 111555 (2023) - [j52]Jiaxin Pan, Zixuan Liu, Donglin Li, Lulu Wang, Bixin Li:
An empirical study of software architecture resilience evaluation methods. J. Syst. Softw. 202: 111726 (2023) - [j51]Lulu Wang, Peng Hu, Xianglong Kong, Wenjie Ouyang, Bixin Li, Haixin Xu, Tao Shao:
Microservice architecture recovery based on intra-service and inter-service features. J. Syst. Softw. 204: 111754 (2023) - [c101]Xiangfei Xu, Tianyuan Hu, Bixin Li, Li Liao:
CCDetector: Detect Chaincode Vulnerabilities Based on Knowledge Graph. COMPSAC 2023: 699-704 - [c100]Donglin Li, Zixuan Liu, Jiaxin Pan, Bixin Li:
Evaluating the Resilience of Software Architecture Based on Minimal Path. DSA 2023: 42-53 - [i1]Mingke Yang, Yuming Zhou, Bixin Li, Yutian Tang:
On Code Reuse from StackOverflow: An Exploratory Study on Jupyter Notebook. CoRR abs/2302.11732 (2023) - 2022
- [j50]Li Wang, Xianglong Kong, Jiahui Wang, Bixin Li:
An incremental software architecture recovery technique driven by code changes. Frontiers Inf. Technol. Electron. Eng. 23(5): 664-677 (2022) - [j49]Md Nasir Uddin, Bixin Li, Zafar Ali, Pavlos Kefalas, Inayat Khan, Islam Zada:
Software defect prediction employing BiLSTM and BERT-based semantic feature. Soft Comput. 26(16): 7877-7891 (2022) - [j48]Bixin Li, Zhenyu Pan, Tianyuan Hu:
ReDefender: Detecting Reentrancy Vulnerabilities in Smart Contracts Automatically. IEEE Trans. Reliab. 71(2): 984-999 (2022) - [c99]Yin Li, Bixin Li:
Answering Why-Not Questions on GeoSPARQL Queries. APWeb/WAIM (2) 2022: 286-300 - [c98]Chen Qian, Tianyuan Hu, Bixin Li:
A BiLSTM-Attention Model for Detecting Smart Contract Defects More Accurately. QRS 2022: 53-62 - [c97]Jingyuan Cai, Ying Zhou, Tianyuan Hu, Bixin Li:
PTLC: Protect the Identity Privacy during Cross-Chain Asset Transaction More Effectively. QRS Companion 2022: 70-78 - [c96]Qihao Bao, Bixin Li, Tianyuan Hu, Dongyu Cao:
Model Checking the Safety of Raft Leader Election Algorithm. QRS 2022: 400-409 - [c95]Xueyong Sun, Qihao Bao, Bixin Li:
Can PoW Consensus Protocol Resist the Whale Attack? QRS 2022: 504-515 - 2021
- [c94]Zhenyu Pan, Tianyuan Hu, Chen Qian, Bixin Li:
ReDefender: A Tool for Detecting Reentrancy Vulnerabilities in Smart Contracts Effectively. QRS 2021: 915-925 - [c93]Tianyuan Hu, Zhenyu Pan, Bixin Li:
SolDetector: Detect Defects Based on Knowledge Graph of Solidity Smart Contract. SEKE 2021: 423-428 - 2020
- [j47]Chunling Hu, Xiaona Wu, Bixin Li:
A Framework for Trustworthy Web Service Composition and Optimization. IEEE Access 8: 73508-73522 (2020) - [j46]Xianglong Kong, Weina Han, Li Liao, Bixin Li:
An analysis of correctness for API recommendation: are the unmatched results useless? Sci. China Inf. Sci. 63(9): 1-15 (2020) - [j45]Biao Xiong, Rong Fan, Shuai Wang, Bixin Li, Can Wang:
Performance Evaluation and Disruption Recovery for Military Supply Chain Network. Complex. 2020: 9760604:1-9760604:10 (2020) - [j44]Chunling Hu, Cuicui Liu, Bixin Li:
Evaluating the trustworthiness of BPEL processes based on data dependency and XBFG. Int. J. Comput. Sci. Eng. 21(1): 146-161 (2020) - [j43]Lulu Wang, Bixin Li, Xianglong Kong:
Type slicing: An accurate object oriented slicing based on sub-statement level dependence graph. Inf. Softw. Technol. 127: 106369 (2020) - [c92]Xinyun Cheng, Xianglong Kong, Li Liao, Bixin Li:
A Combined Method for Usage of NLP Libraries Towards Analyzing Software Documents. CAiSE 2020: 515-529 - [c91]Qiwei Song, Xianglong Kong, Lulu Wang, Bixin Li:
An Empirical Investigation into the Effects of Code Comments on Issue Resolution. COMPSAC 2020: 921-930 - [c90]Huidan Li, Rensong Xie, Xianglong Kong, Lulu Wang, Bixin Li:
An Analysis of Utility for API Recommendation: Do the Matched Results Have the Same Efforts? QRS 2020: 479-488 - [c89]Tong Wang, Bixin Li, Lingyuan Zhu:
A Co-evolutionary Method Between Architecture and Code. SEKE 2020: 147-152 - [c88]Renhao Xiong, David Lo, Bixin Li:
Distinguishing Similar Design Pattern Instances through Temporal Behavior Analysis. SANER 2020: 296-307
2010 – 2019
- 2019
- [j42]Shunhui Ji, Bixin Li, Pengcheng Zhang:
Test Case Selection for All-Uses Criterion-Based Regression Testing of Composite Service. IEEE Access 7: 174438-174464 (2019) - [j41]Lulu Wang, Jingyue Li, Bixin Li:
Tracking runtime concurrent dependences in java threads using thread control profiling. J. Syst. Softw. 148: 116-131 (2019) - [j40]Lulu Wang, Jingyue Li, Bixin Li:
Erratum to "Tracking runtime concurrent dependences in java threads using thread control profiling" [The Journal of Systems and Software 148 (2019) 116-131]. J. Syst. Softw. 153: 44 (2019) - [j39]Bixin Li, Rong Fan, Bing Yang, Shigang Lin:
Detection of Abnormal Oil Data Based on Feature Selection. Rev. d'Intelligence Artif. 33(4): 321-325 (2019) - [c87]Chunling Hu, Guoqing Geng, Bixin Li, Chao Tang, Xiaofeng Wang:
Verifying Cloud Application for the Interaction Correctness Using SoaML and SPIN. ICSCA 2019: 210-216 - [c86]Chunling Hu, Bixin Li, Xiaofeng Wang, Gang Lv:
Empirical Study of Hybrid Optimization Strategy for Evolutionary Testing. ICPCSEE (2) 2019: 41-53 - [c85]Rensong Xie, Xianglong Kong, Lulu Wang, Ying Zhou, Bixin Li:
HiRec: API Recommendation using Hierarchical Context. ISSRE 2019: 369-379 - [c84]Tong Wang, Bixin Li:
Analyzing Software Architecture Evolvability Based on Multiple Architectural Attributes Measurements. QRS 2019: 204-215 - [c83]Tong Wang, Dongdong Wang, Bixin Li:
A Multilevel Analysis Method for Architecture Erosion. SEKE 2019: 443-566 - [c82]Tong Wang, Yelian Zhang, Xufang Gong, Bixin Li:
Recover and Optimize Software Architecture Based on Source Code and Directory Hierarchies (S). SEKE 2019: 469-599 - [c81]Qiang Yin, Lulu Wang, Bixin Li:
Identify MVC architectural pattern based on ontology. SEKE 2019: 612-777 - [c80]Lihui Tang, Lulu Wang, Bixin Li:
Identify Blackboard Pattern Based on Ontology. TASE 2019: 224-231 - [c79]Tong Wang, Dongdong Wang, Ying Zhou, Bixin Li:
Software Multiple-Level Change Detection Based on Two-Step MPAT Matching. SANER 2019: 4-14 - [c78]Renhao Xiong, Bixin Li:
Accurate Design Pattern Detection Based on Idiomatic Implementation Matching in Java Language Context. SANER 2019: 163-174 - 2018
- [j38]Xianglong Kong, Bixin Li, Lulu Wang, Wensheng Wu:
Directory-Based Dependency Processing for Software Architecture Recovery. IEEE Access 6: 52321-52335 (2018) - [j37]Pengfei Duan, Ying Zhou, Xufang Gong, Bixin Li:
A Systematic Mapping Study on the Verification of Cyber-Physical Systems. IEEE Access 6: 59043-59064 (2018) - [j36]Chunling Hu, Bixin Li, Xiaobing Sun:
Mining Variable-Method Correlation for Change Impact Analysis. IEEE Access 6: 77581-77595 (2018) - [j35]Huihui Liu, Bixin Li, Yibiao Yang, Wanwangying Ma, Ru Jia:
Exploring the Impact of Code Smells on Fine-Grained Structural Change-Proneness. Int. J. Softw. Eng. Knowl. Eng. 28(10): 1487-1516 (2018) - [j34]Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li:
The impacts of techniques, programs and tests on automated program repair: An empirical study. J. Syst. Softw. 137: 480-496 (2018) - [c77]Ying Zhou, Xufang Gong, Jiakai Li, Bixin Li:
Verifying CPS for Self-Adaptability. ICIS 2018: 166-172 - [c76]Ying Zhou, Xufang Gong, Bixin Li, Min Zhu:
A Framework for CPS Modeling and Verification Based on dL. ICIS 2018: 173-179 - [c75]Huihui Liu, Yijun Yu, Bixin Li, Yibiao Yang, Ru Jia:
Are Smell-Based Metrics Actually Useful in Effort-Aware Structural Change-Proneness Prediction? An Empirical Study. APSEC 2018: 315-324 - [c74]Huihui Liu, Xufang Gong, Li Liao, Bixin Li:
Evaluate How Cyclomatic Complexity Changes in the Context of Software Evolution. COMPSAC (2) 2018: 756-761 - 2017
- [j33]Zecheng Li, Li Liao, Hareton Leung, Bixin Li, Chao Li:
Evaluating the credibility of cloud services. Comput. Electr. Eng. 58: 161-175 (2017) - [j32]Biao Xiong, Bixin Li, Rong Fan, Qingzhong Zhou, Wu Li:
Modeling and Simulation for Effectiveness Evaluation of Dynamic Discrete Military Supply Chain Networks. Complex. 2017: 6052037:1-6052037:9 (2017) - [j31]Dong Qiu, Bixin Li, Earl T. Barr, Zhendong Su:
Understanding the syntactic rule usage in java. J. Syst. Softw. 123: 160-172 (2017) - [j30]Xiaobing Sun, Xiangyue Liu, Bin Li, Bixin Li, David Lo, Lingzhi Liao:
Clustering Classes in Packages for Program Comprehension. Sci. Program. 2017: 3787053:1-3787053:15 (2017) - [c73]Bixin Li, Li Liao, Yi Cheng:
Evaluating Software Architecture Evolution Using Performance Simulation. ACIT/CSII/BCD 2017: 7-13 - [c72]Ying Zhou, Min Zhu, Xufang Gong, Bixin Li:
Verifying CPS Using DDL. Intelligent Environments (Workshops) 2017: 15-24 - 2016
- [j29]Lulu Wang, Bixin Li, Hareton Leung:
A new method to encode calling contexts with recursions. Sci. China Inf. Sci. 59(5): 052104:1-052104:15 (2016) - [j28]Xiaobing Sun, Xin Peng, Bin Li, Bixin Li, Wanzhi Wen:
IPSETFUL: an iterative process of selecting test cases for effective fault localization by exploring concept lattice of program spectra. Frontiers Comput. Sci. 10(5): 812-831 (2016) - [j27]Yan Lei, Min Zhang, Bixin Li, Jingan Ren, Yinhua Jiang:
The Impact of Information Richness on Fault Localization. IEICE Trans. Inf. Syst. 99-D(1): 265-269 (2016) - [j26]Dong Qiu, Bixin Li, Hareton Leung:
Understanding the API usage in Java. Inf. Softw. Technol. 73: 81-100 (2016) - [j25]Fei Liu, Bixin Li, Rupesh Nasre:
Efficient online cycle detection technique combining with Steensgaard points-to information. Softw. Pract. Exp. 46(5): 601-623 (2016) - [c71]Shunhui Ji, Bixin Li, Pengcheng Zhang:
Test Case Selection for Data Flow Based Regression Testing of BPEL Composite Services. SCC 2016: 547-554 - [c70]Li Liao, Bixin Li, Chao Li:
A Model to Evaluate the Credibility of Service in Cloud Computing Environment. DASC/PiCom/DataCom/CyberSciTech 2016: 294-301 - [c69]Li Liao, ShanShan Qi, Bixin Li:
Trust analysis of composite service evolution. SERA 2016: 15-22 - [c68]Bixin Li, Li Liao, Jingwen Si:
A technique to evaluate software evolution based on architecture metric. SERA 2016: 273- - 2015
- [j24]Xiaobing Sun, Bixin Li, Hareton K. N. Leung, Bin Li, Yun Li:
MSR4SM: Using topic models to effectively mining software repositories for software maintenance tasks. Inf. Softw. Technol. 66: 1-12 (2015) - [j23]Xiaobing Sun, Bixin Li, Hareton Leung, Bin Li, Junwu Zhu:
Static change impact analysis techniques: A comparative study. J. Syst. Softw. 109: 137-149 (2015) - [c67]Chuanqi Tao, Jerry Gao, Bixin Li:
Cloud-Based Infrastructure for Mobile Testing as a Service. CBD 2015: 133-140 - [c66]Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li:
Experience report: How do techniques, programs, and tests impact automated program repair? ISSRE 2015: 194-204 - [c65]Chuanqi Tao, Jerry Gao, Bixin Li:
A Model-Based Framework to Support Complexity Analysis Service for Regression Testing of Component-Based Software. SOSE 2015: 326-331 - 2014
- [j22]Bixin Li, Lulu Wang, Hareton Leung:
Profiling selected paths with loops. Sci. China Inf. Sci. 57(7): 1-15 (2014) - [j21]Dong Qiu, Bixin Li, Shunhui Ji, Hareton K. N. Leung:
Regression Testing of Web Service: A Systematic Mapping Study. ACM Comput. Surv. 47(2): 21:1-21:46 (2014) - [j20]Chunli Xie, Bixin Li, Hareton Leung:
SRM: a staged reliability model for Web service. Innov. Syst. Softw. Eng. 10(2): 137-154 (2014) - [j19]Xiaobing Sun, Hareton Leung, Bin Li, Bixin Li:
Change impact analysis and changeability assessment for a change proposal: An empirical study ☆☆. J. Syst. Softw. 96: 51-60 (2014) - [j18]Bixin Li, Li Liao, Hareton Leung, Rui Song:
PHAT: A Preference and Honesty Aware Trust Model for Web Services. IEEE Trans. Netw. Serv. Manag. 11(3): 363-375 (2014) - 2013
- [j17]Bixin Li, Qiandong Zhang, Xiaobing Sun, Hareton Leung:
Using water wave propagation phenomenon to study software change impact analysis. Adv. Eng. Softw. 58: 45-53 (2013) - [j16]Xiaobing Sun, Bixin Li, Wanzhi Wen, Sai Zhang:
Analyzing Impact Rules of Different Change Types to Support Change Impact Analysis. Int. J. Softw. Eng. Knowl. Eng. 23(3): 259-288 (2013) - [j15]Bixin Li, Xiaobing Sun, Jacky Keung:
FCA-CIA: An approach of using FCA to support cross-level change impact analysis for object oriented Java programs. Inf. Softw. Technol. 55(8): 1437-1449 (2013) - [j14]Chuanqi Tao, Bixin Li, Jerry Gao:
A Systematic State-Based Approach to Regression Testing of Component Software. J. Softw. 8(3): 560-571 (2013) - [j13]Bixin Li, Xiaobing Sun, Hareton Leung, Sai Zhang:
A survey of code-based change impact analysis techniques. Softw. Test. Verification Reliab. 23(8): 613-646 (2013) - [j12]Bixin Li, Shunhui Ji, Dong Qiu, Hareton Leung, Gongyuan Zhang:
Verifying the Concurrent Properties in BPEL Based Web Service Composition Process. IEEE Trans. Netw. Serv. Manag. 10(4): 410-424 (2013) - [c64]Xiaobing Sun, Ying Chen, Bin Li, Bixin Li:
Exploring software engineering data with formal concept analysis. DAPSE@ICSE 2013: 14-16 - [c63]Xiaobing Sun, Bixin Li, Wanzhi Wen:
CLPS-MFL: Using Concept Lattice of Program Spectrum for Effective Multi-fault Localization. QSIC 2013: 204-207 - [c62]Bixin Li, Qiandong Zhang, Xiaobing Sun, Hareton Leung:
WAVE-CIA: a novel CIA approach based on call graph mining. SAC 2013: 1000-1005 - [c61]Chuanqi Tao, Bixin Li, Jerry Gao:
Testing Configurable Architectures For Component-Based Software Using an Incremental Approach. SEKE 2013: 356-361 - [c60]Fei Liu, Lulu Wang, Bixin Li:
ELCD: an efficient online cycle detection technique for pointer analysis. SEKE 2013: 606-611 - [c59]Dong Qiu, Bixin Li, Zhendong Su:
An empirical analysis of the co-evolution of schema and code in database applications. ESEC/SIGSOFT FSE 2013: 125-135 - [c58]Bixin Li, Shunhui Ji, Li Liao, Dong Qiu, Mingjie Sun:
Monitoring Web Services for Conformance. SOSE 2013: 92-102 - [c57]Bixin Li, Rui Song, Li Liao, Cuicui Liu:
A User-Oriented Trust Model for Web Services. SOSE 2013: 224-232 - 2012
- [j11]Bixin Li, Xiaobing Sun, Hareton Leung:
Combining concept lattice with call graph for impact analysis. Adv. Eng. Softw. 53: 1-13 (2012) - [j10]Bixin Li, Dong Qiu, Hareton Leung, Di Wang:
Automatic test case selection for regression testing of composite service based on extensible BPEL flow graph. J. Syst. Softw. 85(6): 1300-1324 (2012) - [j9]Bixin Li, Lulu Wang, Hareton Leung, Fei Liu:
Profiling all paths: A new profiling technique for both cyclic and acyclic paths. J. Syst. Softw. 85(7): 1558-1576 (2012) - [c56]Rui Song, Bixin Li, Xiaona Wu, Cuicui Liu, ShanShan Qi:
A Preference and Honesty Aware Trust Model for Web Services. APSEC 2012: 61-66 - [c55]Xiaona Wu, Bixin Li, Rui Song, Cuicui Liu, ShanShan Qi:
Trust-Based Service Composition and Optimization. APSEC 2012: 67-72 - [c54]ShanShan Qi, Bixin Li, Cuicui Liu, Xiaona Wu, Rui Song:
A Trust Impact Analysis Model for Composite Service Evolution. APSEC 2012: 73-78 - [c53]Cuicui Liu, Bixin Li, ShanShan Qi, Xiaona Wu, Rui Song:
Data Depedency Based Trust Evaluation for BPEL Processes. APSEC 2012: 857-866 - [c52]Xiaobing Sun, Bixin Li, Qiandong Zhang:
A Change Proposal Driven Approach for Changeability Assessment Using FCA-Based Impact Analysis. COMPSAC 2012: 328-333 - [c51]Xiaobing Sun, Bin Li, Bixin Li, Wanzhi Wen:
A comparative study of static CIA techniques. Internetware 2012: 23:1-23:8 - [c50]Xiaoxiang Zhai, Qiaoqiao Chen, Shunhui Ji, Bixin Li:
A Unified Modeling and Verifying Framework for Cyber Physical Systems. QSIC 2012: 128-131 - [c49]Qiandong Zhang, Bixin Li, Xiaobing Sun:
Mining Call Graph for Change Impact Analysis. SEKE 2012: 7-12 - [c48]Xiaoxiang Zhai, Bixin Li, Min Zhu, Jiakai Li, Qiaoqiao Chen, Shunhui Ji:
Verification of Cyber-Physical Systems Based on Differential-Algebraic Temporal Dynamic Logic. SEKE 2012: 231-234 - [c47]Min Zhu, Bixin Li, Jiakai Li, Qiaoqiao Chen, Xiaoxiang Zhai, Shunhui Ji:
HybridUML Based Verification of CPS Using Differential Dynamic Logic. SEKE 2012: 235-238 - [c46]Jiakai Li, Bixin Li, Qiaoqiao Chen, Min Zhu, Shunhui Ji, Xiaoxiang Zhai:
A HybridUML and QdL Based Verification Method for CPS Self-Adaptability. SEKE 2012: 239-242 - [c45]Xiaobing Sun, Bixin Li, Chuanqi Tao, Qiandong Zhang:
Using FCA-based Change Impact Analysis for Regression Testing. SEKE 2012: 452-457 - 2011
- [c44]Xifeng Wang, Bixin Li, Li Liao, Chunli Xie:
Ontology-Based Reliability Evaluation for Web Service. COMPSAC 2011: 348-349 - [c43]Chunli Xie, Bixin Li, Xifeng Wang:
A Staged Model for Web Service Reliability. COMPSAC 2011: 564-565 - [c42]Lulu Wang, Bixin Li:
A Technique of Profiling Selective Paths. COMPSAC 2011: 588-589 - [c41]Zhengshan Wang, Bixin Li, Lulu Wang, Qiao Li:
An Effective Approach for Automatic Generation of Class Integration Test Order. COMPSAC 2011: 680-681 - [c40]Chuanqi Tao, Bixin Li, Jerry Gao:
Regression Testing of Component-Based Software: A Systematic Practise Based on State Testing. HASE 2011: 29-32 - [c39]Xiaobing Sun, Bixin Li:
Using Formal Concept Analysis to support change analysis. ASE 2011: 641-645 - [c38]Xiaobing Sun, Bixin Li, Sai Zhang, Chuanqi Tao, Xiang Chen, Wanzhi Wen:
Using lattice of class and method dependence for change impact analysis of object oriented programs. SAC 2011: 1439-1444 - [c37]Lulu Wang, Bixin Li:
A Technology of Profiling Inter-procedural Paths. SEKE 2011: 31-36 - [c36]Fei Liu, Bixin Li:
Multithreaded Pointer Analysis Based on Petri Net. SEKE 2011: 127-130 - [c35]Wanzhi Wen, Bixin Li, Xiaobing Sun, Jiakai Li:
Program slicing spectrum-based software fault localization. SEKE 2011: 213-218 - [c34]