default search action
Xiaohong Su
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j50]Weining Zheng, Xiaohong Su, Hongwei Wei, Wenxin Tao:
SVulDetector: Vulnerability detection based on similarity using tree-based attention and weighted graph embedding mechanisms. Comput. Secur. 144: 103930 (2024) - [j49]Hyeongbok Kim, Lingling Zhao, Zhiqi Pang, Xiaohong Su, Jin Suk Lee:
Joint reconstruction and deidentification for mobile identity anonymization. Multim. Tools Appl. 83(13): 38313-38328 (2024) - [c35]Xiaocheng Zhang, Chang Wang, Guoping Zhao, Xiaohong Su:
LI4: Label-Infused Iterative Information Interacting Based Fact Verification in Question-answering Dialogue. LREC/COLING 2024: 10488-10498 - [i4]Yuan Jiang, Yujian Zhang, Xiaohong Su, Christoph Treude, Tiantian Wang:
StagedVulBERT: Multi-Granular Vulnerability Detection with a Novel Pre-trained Code Model. CoRR abs/2410.05766 (2024) - 2023
- [j48]Wenxin Tao, Xiaohong Su, Jiayuan Wan, Hongwei Wei, Weining Zheng:
Vulnerability detection through cross-modal feature enhancement and fusion. Comput. Secur. 132: 103341 (2023) - [j47]Yuan Jiang, Xiaohong Su, Christoph Treude, Chao Shang, Tiantian Wang:
Does Deep Learning improve the performance of duplicate bug report detection? An empirical study. J. Syst. Softw. 198: 111607 (2023) - [j46]Hyeongbok Kim, Zhiqi Pang, Lingling Zhao, Xiaohong Su, Jin Suk Lee:
Semantic-aware deidentification generative adversarial networks for identity anonymization. Multim. Tools Appl. 82(10): 15535-15551 (2023) - [j45]Hongwei Wei, Xiaohong Su, Cuiyun Gao, Weining Zheng, Wenxin Tao:
A Hypothesis Testing-based Framework for Software Cross-modal Retrieval in Heterogeneous Semantic Spaces. ACM Trans. Softw. Eng. Methodol. 32(5): 123:1-123:28 (2023) - [j44]Shiyi Qi, Yaoxian Li, Cuiyun Gao, Xiaohong Su, Shuzheng Gao, Zibin Zheng, Chuanyi Liu:
Dynamically Relative Position Encoding-Based Transformer for Automatic Code Edit. IEEE Trans. Reliab. 72(3): 1147-1160 (2023) - [c34]Ziyue Wei, Weining Zheng, Xiaohong Su, Wenxin Tao, Tiantian Wang:
A Graph Neural Network-Based Smart Contract Vulnerability Detection Method with Artificial Rule. ICANN (4) 2023: 241-252 - [c33]Hongwei Wei, Xiaohong Su, Weining Zheng, Wenxin Tao:
Documentation-Guided API Sequence Search without Worrying about the Text-API Semantic Gap. SANER 2023: 343-354 - 2022
- [j43]Tiantian Wang, HaiLong Yu, Kechao Wang, Xiaohong Su:
Fault localization based on wide & deep learning model by mining software behavior. Future Gener. Comput. Syst. 127: 309-319 (2022) - [j42]Dan Gong, Tiantian Wang, Xiaohong Su:
Golden Mutator Recommendation Based on Mutation Pattern Mining. Int. J. Pattern Recognit. Artif. Intell. 36(8): 2250025:1-2250025:19 (2022) - [j41]Dan Gong, Tiantian Wang, Xiaohong Su, Yanhang Zhang:
Equivalent Mutants Detection Based on Weighted Software Behavior Graph. Int. J. Softw. Eng. Knowl. Eng. 32(6): 819-843 (2022) - [j40]Yuan Jiang, Xiaohong Su, Christoph Treude, Tiantian Wang:
Hierarchical semantic-aware neural code representation. J. Syst. Softw. 191: 111355 (2022) - [i3]Shiyi Qi, Yaoxian Li, Cuiyun Gao, Xiaohong Su, Shuzheng Gao, Zibin Zheng, Chuanyi Liu:
Dynamically Relative Position Encoding-Based Transformer for Automatic Code Edit. CoRR abs/2205.13522 (2022) - 2021
- [c32]Weining Zheng, Yuan Jiang, Xiaohong Su:
Vu1SPG: Vulnerability detection based on slice property graph representation learning. ISSRE 2021: 457-467 - [i2]Weining Zheng, Yuan Jiang, Xiaohong Su:
VulSPG: Vulnerability detection based on slice property graph representation learning. CoRR abs/2109.02527 (2021) - 2020
- [j39]Fanlong Zhang, Siau-Cheng Khoo, Xiaohong Su:
Improving Maintenance-Consistency Prediction During Code Clone Creation. IEEE Access 8: 82085-82099 (2020) - [j38]Yuan Jiang, Pengcheng Lu, Xiaohong Su, Tiantian Wang:
LTRWES: A new framework for security bug report detection. Inf. Softw. Technol. 124: 106314 (2020) - [j37]Tiantian Wang, Kechao Wang, Xiaohong Su:
Fault localization by analyzing failure propagation with samples in cloud computing environment. J. Cloud Comput. 9: 17 (2020) - [j36]Tiantian Wang, Kechao Wang, Xiaohong Su, Lin Liu:
Data Mining in Programs: Clustering Programs Based on Structure Metrics and Execution Values. Int. J. Data Warehous. Min. 16(2): 48-63 (2020)
2010 – 2019
- 2019
- [j35]Fanqi Meng, Xiaohong Su:
WCET optimization strategy based on source code refactoring. Clust. Comput. 22(Supplement): 5563-5572 (2019) - [j34]Junjie Wang, Lingling Zhao, Xiaohong Su:
Marginalized Particle Flow Filter. Circuits Syst. Signal Process. 38(7): 3152-3169 (2019) - [j33]Tiantian Wang, Kechao Wang, Xiaohong Su, Lei Zhang:
Invariant based fault localization by analyzing error propagation. Future Gener. Comput. Syst. 94: 549-563 (2019) - [j32]Tiantian Wang, JiaHuan Xu, Xiaohong Su, ChenShi Li, Yang Chi:
Automatic debugging of operator errors based on efficient mutation analysis. Multim. Tools Appl. 78(21): 29881-29898 (2019) - 2018
- [j31]Kechao Wang, Tiantian Wang, Xiaohong Su:
Test case selection using multi-criteria optimization for effective fault localization. Computing 100(8): 787-808 (2018) - [j30]CholMyong Pak, Tiantian Wang, Xiaohong Su:
An Empirical Study on Software Defect Prediction Using Over-Sampling by SMOTE. Int. J. Softw. Eng. Knowl. Eng. 28(6): 811-830 (2018) - [j29]Zhixiang Tong, Xiaohong Su, Xiao Ding, Jiaxin Lin:
Optimizing Software Development Requirements based on Dependency Relations. J. Inf. Hiding Multim. Signal Process. 9(4): 1014-1030 (2018) - [j28]Junjie Wang, Lingling Zhao, Xiaohong Su:
Distributed Particle Flow Filter for Target Tracking in Wireless Sensor Networks. J. Sensors 2018: 5387142:1-5387142:10 (2018) - [c31]Chunmei Shi, Junjie Wang, Lingling Zhao, Xiaohong Su, Guangshun Jiang:
The Delta Generalized Labeled Multi-Bernoulli Filter for Cell Tracking. BIBE 2018: 215-220 - [c30]Junjie Wang, Lingling Zhao, Xiaohong Su, Chunmei Shi:
Multi-Target Tracking with the Progressive Gaussian Probability Hypothesis Density Filter. ICCAIS 2018: 78-83 - 2017
- [j27]Zhen Yu, Zhen Yang, Xiaohong Su, Peijun Ma:
Evaluation and comparison of ten data race detection techniques. Int. J. High Perform. Comput. Netw. 10(4/5): 279-288 (2017) - [j26]Fanqi Meng, Xiaohong Su, Zhaoyang Qu:
Interactive WCET Prediction with Warning for Timeout Risk. Int. J. Pattern Recognit. Artif. Intell. 31(5): 1750012:1-1750012:24 (2017) - [j25]Fanlong Zhang, Siau-Cheng Khoo, Xiaohong Su:
Predicting change consistency in a clone group. J. Syst. Softw. 134: 105-119 (2017) - [j24]Naifeng Wen, Xiaohong Su, Peijun Ma, Lingling Zhao, Yan-hang Zhang:
Online UAV path planning in uncertain and hostile environments. Int. J. Mach. Learn. Cybern. 8(2): 469-487 (2017) - [j23]Ming Zhao, Lingling Zhao, Xiaohong Su, Peijun Ma, Yan-hang Zhang:
Improved discrete mapping differential evolution for multi-unmanned aerial vehicles cooperative multi-targets assignment under unified model. Int. J. Mach. Learn. Cybern. 8(3): 765-780 (2017) - [j22]Xiaohong Su, Shuai Wang, Michael G. Pecht, Lingling Zhao, Zhe Ye:
Interacting multiple model particle filter for prognostics of lithium-ion batteries. Microelectron. Reliab. 70: 59-69 (2017) - [j21]Zhixiang Tong, Xiaohong Su, Longzhu Cen, Tiantian Wang:
Greening Software Requirements Change Management Strategy Based on Nash Equilibrium. Wirel. Commun. Mob. Comput. 2017 (2017) - [c29]Syed Rizwan, Tiantian Wang, Xiaohong Su, Salahuddin:
Empirical Study on Software Bug Prediction. ICSEB 2017: 55-59 - 2016
- [j20]Fanqi Meng, Xiaohong Su, Zhaoyang Qu:
Nonlinear approach for estimating WCET during programming phase. Clust. Comput. 19(3): 1449-1459 (2016) - [j19]Junjie Wang, Lingling Zhao, Xiaohong Su, Chunmei Shi, Jiquan Ma:
Computation-distributed probability hypothesis density filter. EURASIP J. Adv. Signal Process. 2016: 126 (2016) - [j18]Zhen Yu, Xiaohong Su, Peijun Ma:
Slider: an online and active deadlock avoider by serial execution of critical sections. Int. J. High Perform. Syst. Archit. 6(1): 36-50 (2016) - [j17]Jing Qiu, Xiaohong Su, Peijun Ma:
Using Reduced Execution Flow Graph to Identify Library Functions in Binary Code. IEEE Trans. Software Eng. 42(2): 187-202 (2016) - [c28]Xiaohong Su, Jing Qiu, Tiantian Wang, Lingling Zhao:
Optimization and improvements of a Moodle-Based online learning system for C programming. FIE 2016: 1-8 - [c27]Li Yang, Lingling Zhao, Xiaohong Su, Shuai Wang:
A lithium-ion battery RUL prognosis method using temperature changing rate. ICPHM 2016: 1-7 - [c26]Rui Sun, Lingling Zhao, Xiaohong Su:
A novel computationally efficient SMC-PHD Filter using particle-measurement partition. ISSPIT 2016: 51-56 - [c25]Fanlong Zhang, Siau-Cheng Khoo, Xiaohong Su:
Predicting Consistent Clone Change. ISSRE 2016: 353-364 - [c24]Xiaohong Su, Ming Zhao, Ling-Ling Zhao, Yan-hang Zhang:
A Novel Multi Stage Cooperative Path Re-planning Method for Multi UAV. PRICAI 2016: 482-495 - [c23]Zhen Yang, Zhen Yu, Xiaohong Su, Peijun Ma:
RaceTracker: Effective and efficient detection of data races. SNPD 2016: 293-300 - 2015
- [j16]Dandan Gong, Xiaohong Su, Tiantian Wang, Peijun Ma, Wang Yu:
State dependency probabilistic model for fault localization. Inf. Softw. Technol. 57: 430-445 (2015) - [j15]Jing Qiu, Xiaohong Su, Peijun Ma:
Identifying functions in binary code with reverse extended control flow graphs. J. Softw. Evol. Process. 27(10): 793-820 (2015) - [c22]Lingling Zhao, Yingjun Zhang, Peijun Ma, Xiaohong Su, Chunmei Shi:
Intuitionistic Fuzzy Sets with Shannon Relative Entropy. BIOSIGNALS 2015: 150-157 - [c21]Jing Qiu, Babak Yadegari, Brian Johannesmeyer, Saumya Debray, Xiaohong Su:
Identifying and Understanding Self-Checksumming Defenses in Software. CODASPY 2015: 207-218 - [c20]Xiaohong Su, Tiantian Wang, Jing Qiu, Lingling Zhao:
Motivating students with new mechanisms of online assignments and examination to meet the MOOC challenges for programming. FIE 2015: 1-6 - [c19]Lingling Zhao, Xiaohong Su, Tiantian Wang, Yongfeng Yuan:
Interest-driven and innovation-oriented practice for programming course. FIE 2015: 1-6 - [c18]Junjie Wang, Lingling Zhao, Xiaohong Su, Rui Sun, Jiquan Ma:
Cluster-based efficient particle PHD filter. ICCAIS 2015: 219-224 - [c17]Yi Zhou, Xiaoming Liu, Jidong Suo, Chang Liu, Xiaohong Su, Limei Liu:
Nonparametric background model based clutter map for X-band marine radar. ICIP 2015: 123-127 - [c16]Peijun Ma, Shuai Wang, Lingling Zhao, Michael G. Pecht, Xiaohong Su, Zhe Ye:
An improved exponential model for predicting the remaining useful life of lithium-ion batteries. ICPHM 2015: 1-6 - [c15]Zhe Ye, Lingling Zhao, Zhuo Wang, Peijun Ma, Xiaohong Su, Long Pang, Michael G. Pecht:
A dual-level approach for lithium-ion battery RUL prognosis. ICPHM 2015: 1-6 - [c14]Jing Qiu, Xiaohong Su, Peijun Ma:
Library functions identification in binary code by using graph isomorphism testings. SANER 2015: 261-270 - [i1]Junjie Wang, Lingling Zhao, Xiaohong Su, Peijun Ma:
Distributed Computation Particle PHD filter. CoRR abs/1503.03769 (2015) - 2014
- [j14]Tiantian Wang, Kechao Wang, Xiaohong Su, Peijun Ma:
Detection of semantically similar code. Frontiers Comput. Sci. 8(6): 996-1011 (2014) - [j13]Yixin Bian, Günes Koru, Xiaohong Su, Peijun Ma:
Corrigendum to: "SPAPE: A semantic-preserving amorphous procedure extraction method for near-miss clones": [J. Syst. Softw. 86 (2013) 2077-2093]. J. Syst. Softw. 88: 250 (2014) - [j12]Wei Pan, Peijun Ma, Qinghua Hu, Xiaohong Su, Chaoqi Ma:
Comparative analysis on margin based feature selection algorithms. Int. J. Mach. Learn. Cybern. 5(3): 339-367 (2014) - [c13]Jing Qiu, Babak Yadegari, Brian Johannesmeyer, Saumya Debray, Xiaohong Su:
A Framework for Understanding Dynamic Anti-Analysis Defenses. PPREW@ACSAC 2014: 2:1-2:9 - [c12]Chunmei Shi, Lingling Zhao, Peijun Ma, Xiaohong Su, Junjie Wang, Chiping Zhang:
Multi-object Tracking Based on Particle Probability Hypothesis Density Tracker in Microscopic Video. BIBE 2014: 69-75 - 2013
- [j11]Dandan Gong, Tiantian Wang, Xiaohong Su, Peijun Ma:
A test-suite reduction approach to improving fault-localization effectiveness. Comput. Lang. Syst. Struct. 39(3): 95-108 (2013) - [j10]Yixin Bian, Günes Koru, Xiaohong Su, Peijun Ma:
SPAPE: A semantic-preserving amorphous procedure extraction method for near-miss clones. J. Syst. Softw. 86(8): 2077-2093 (2013) - [j9]Yong Guo, Peijun Ma, Xiaohong Su:
Dynamic Collection of Reliability-Related Data and Reliability Evaluation for Internet software. J. Softw. 8(6): 1390-1397 (2013) - [j8]Wei Pan, Qinghua Hu, Peijun Ma, Xiaohong Su:
Robust feature selection based on regularized brownboost loss. Knowl. Based Syst. 54: 180-198 (2013) - [c11]Lingling Zhao, Xianglei Dong, Peijun Ma, Xiaohong Su, Chunmei Shi:
A New Multi-sensor Track Association Approach Based on Intuitionistic Fuzzy Clustering. IAIT 2013: 256-266 - 2012
- [j7]Guang Li, Yadong Wang, Xiaohong Su:
Improvements on a privacy-protection algorithm for DNA sequences with generalization lattices. Comput. Methods Programs Biomed. 108(1): 1-9 (2012) - [j6]Peng Li, Peijun Ma, Xiaohong Su, Ching-Nung Yang:
Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Vis. Commun. Image Represent. 23(3): 441-453 (2012) - [c10]Zhenwei Lu, Lingling Zhao, Xiaohong Su, Peijun Ma:
A STPHD-Based Multi-sensor Fusion Method. ICONIP (3) 2012: 100-107 - [c9]Wei Pan, Peijun Ma, Xiaohong Su:
Feature Weighting Algorithm Based on Margin and Linear Programming. RSCTC 2012: 388-396 - 2011
- [j5]Tiantian Wang, Xiaohong Su, Peijun Ma, Yuying Wang, Kuanquan Wang:
Ability-training-oriented automated assessment in introductory programming course. Comput. Educ. 56(1): 220-226 (2011) - [c8]Yingjun Zhang, Peijun Ma, Xiaohong Su, Chiping Zhang:
Entropy on interval-valued intuitionistic fuzzy sets and its application in multi-attribute decision making. FUSION 2011: 1-7 - [c7]Li Xu, Peijun Ma, Xiaohong Su:
Selective Track Fusion. ICONIP (3) 2011: 18-25 - [c6]Yong Du, Qinghua Hu, Peijun Ma, Xiaohong Su:
Driver Status Recognition by Neighborhood Covering Rules. RSKT 2011: 327-336 - 2010
- [j4]Jiquan Ma, Peijun Ma, Xiaohong Su:
Solder Joints Detection Method Based on Surface Recovery. Comput. Inf. Sci. 3(2): 163-170 (2010) - [c5]Xiaohong Su, Jidong Suo, Xiaoming Liu, Yingchun Wang:
FCM-based radar target detection in medium frequency signal of radar. FSKD 2010: 542-545 - [c4]Lingling Zhao, Peijun Ma, Xiaohong Su, Hongtao Zhang:
A new multi-target state estimation algorithm for PHD particle filter. FUSION 2010: 1-8
2000 – 2009
- 2008
- [c3]Tiantian Wang, Xiaohong Su, Peijun Ma:
Program Normalization for Removing Code Variations. CSSE (2) 2008: 306-309 - [c2]Tiantian Wang, Xiaohong Su, Peijun Ma:
Normalization for Removing Code Variations in Modular Programs. ISCSCT (2) 2008: 21-24 - 2007
- [j3]Bo Yang, Xiaohong Su, Yadong Wang:
Distributed Learning Strategy Based on Chips for Classification with Large-Scale Dataset. Int. J. Pattern Recognit. Artif. Intell. 21(5): 899-920 (2007) - [j2]Tiantian Wang, Xiaohong Su, Yuying Wang, Peijun Ma:
Semantic similarity-based grading of student programs. Inf. Softw. Technol. 49(2): 99-107 (2007) - 2006
- [j1]Bo Yang, Yadong Wang, Xiaohong Su, Xianglong Tang:
Neural Networks' Distributed Cooperative Learning Strategy Based on Agent and Chips. J. Comput. Res. Dev. 43(12): 2096-2103 (2006) - 2005
- [c1]Bo Yang, Yadong Wang, Xiaohong Su:
Research and Design of Distributed Neural Networks with Chip Training Algorithm. ICNC (1) 2005: 213-216
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint