default search action
Bihuan Chen 0001
- > Home > Persons > Bihuan Chen 0001
Publications
- 2024
- [c48]Qi Guo, Junming Cao, Xiaofei Xie, Shangqing Liu, Xiaohong Li, Bihuan Chen, Xin Peng:
Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study. ICSE 2024: 34:1-34:13 - [c47]Susheng Wu, Wenyan Song, Kaifeng Huang, Bihuan Chen, Xin Peng:
Identifying Affected Libraries and Their Ecosystems for Open Source Software Vulnerabilities. ICSE 2024: 162:1-162:12 - [c46]Dongfang Xie, Bihuan Chen, Kaifeng Huang, Yu Wang, Linghao Pan, Zhicheng Chen, Xin Peng:
Enhancing Field Tracking and Interprocedural Analysis to Find More Null Pointer Exceptions. SANER 2024: 849-859 - [i17]Yufei Zhao, Dingji Wang, Bihuan Chen, Ziqian Chen, Xin Peng:
A general approach to enhance the survivability of backdoor attacks by decision path coupling. CoRR abs/2403.02950 (2024) - [i16]Xueying Du, Geng Zheng, Kaixin Wang, Jiayi Feng, Wentai Deng, Mingwei Liu, Bihuan Chen, Xin Peng, Tao Ma, Yiling Lou:
Vul-RAG: Enhancing LLM-based Vulnerability Detection via Knowledge-level RAG. CoRR abs/2406.11147 (2024) - 2023
- [j16]Bihuan Chen, Yang Liu, Xin Peng, Yijian Wu, Shengchao Qin:
Baton: symphony of random testing and concolic testing through machine learning and taint analysis. Sci. China Inf. Sci. 66(3) (2023) - [c45]Junming Cao, Bihuan Chen, Longjie Hu, Jie Gao, Kaifeng Huang, Xuezhi Song, Xin Peng:
Characterizing the Complexity and Its Impact on Testing in ML-Enabled Systems : A Case Sutdy on Rasa. ICSME 2023: 258-270 - [c44]Shenglin Bao, Chaofeng Sha, Bihuan Chen, Xin Peng, Wenyun Zhao:
In Defense of Simple Techniques for Neural Network Test Case Selection. ISSTA 2023: 501-513 - [c43]Xuezhi Song, Yijian Wu, Junming Cao, Bihuan Chen, Yun Lin, Zhengjie Lu, Dingji Wang, Xin Peng:
BugMiner: Automating Precise Bug Dataset Construction by Code Evolution History Mining. ASE 2023: 1919-1929 - [c42]Kaifeng Huang, Bihuan Chen, Susheng Wu, Junming Cao, Lei Ma, Xin Peng:
Demystifying Dependency Bugs in Deep Learning Stack. ESEC/SIGSOFT FSE 2023: 450-462 - [c41]Fengyi Zhang, Bihuan Chen, Yufei Zhao, Xin Peng:
Slice-Based Code Change Representation Learning. SANER 2023: 319-330 - [i15]Junming Cao, Bihuan Chen, Longjie Hu, Jie Gao, Kaifeng Huang, Xin Peng:
Understanding the Complexity and Its Impact on Testing in ML-Enabled Systems. CoRR abs/2301.03837 (2023) - [i14]Yixuan Yan, Kaifeng Huang, Bihuan Chen, Zixin Tao, Xin Peng:
Scalable Demand-Driven Call Graph Generation for Python. CoRR abs/2305.05949 (2023) - [i13]Junan Zhang, Kaifeng Huang, Bihuan Chen, Chong Wang, Zhenhao Tian, Xin Peng:
Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence. CoRR abs/2309.02637 (2023) - [i12]Qi Guo, Junming Cao, Xiaofei Xie, Shangqing Liu, Xiaohong Li, Bihuan Chen, Xin Peng:
Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study. CoRR abs/2309.08221 (2023) - [i11]Kaifeng Huang, Yingfeng Xia, Bihuan Chen, Zhuotong Zhou, Jin Guo, Xin Peng:
Detecting and Fixing Violations of Modification Terms in Open Source Licenses during Forking. CoRR abs/2310.07991 (2023) - 2022
- [j14]Chi Chen, Xin Peng, Bihuan Chen, Jun Sun, Zhenchang Xing, Xin Wang, Wenyun Zhao:
"More Than Deep Learning": post-processing for API sequence recommendation. Empir. Softw. Eng. 27(1): 15 (2022) - [j13]Kaifeng Huang, Bihuan Chen, Congying Xu, Ying Wang, Bowen Shi, Xin Peng, Yijian Wu, Yang Liu:
Characterizing usages, updates and risks of third-party libraries in Java projects. Empir. Softw. Eng. 27(4): 90 (2022) - [c40]Chen Zhang, Bihuan Chen, Xin Peng, Wenyun Zhao:
Buildsheriff: Change-Aware Test Failure Triage for Continuous Integration Builds. ICSE 2022: 312-324 - [c39]Chengwei Liu, Sen Chen, Lingling Fan, Bihuan Chen, Yang Liu, Xin Peng:
Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem. ICSE 2022: 672-684 - [c38]Chen Zhang, Bihuan Chen, Junhao Hu, Xin Peng, Wenyun Zhao:
BuildSonic: Detecting and Repairing Performance-Related Configuration Smells for Continuous Integration Builds. ASE 2022: 18:1-18:13 - [c36]Junming Cao, Bihuan Chen, Chao Sun, Longjie Hu, Shuaihong Wu, Xin Peng:
Understanding performance problems in deep learning systems. ESEC/SIGSOFT FSE 2022: 357-369 - [c35]Congying Xu, Bihuan Chen, Chenhao Lu, Kaifeng Huang, Xin Peng, Yang Liu:
Tracking patches for open source software vulnerabilities. ESEC/SIGSOFT FSE 2022: 860-871 - [c34]Rongfan Li, Bihuan Chen, Fengyi Zhang, Chao Sun, Xin Peng:
Detecting Runtime Exceptions by Deep Code Representation Learning with Attention-Based Graph Neural Networks. SANER 2022: 373-384 - [c33]Yi Liu, Yadong Yan, Chaofeng Sha, Xin Peng, Bihuan Chen, Chong Wang:
DeepAnna: Deep Learning based Java Annotation Recommendation and Misuse Detection. SANER 2022: 685-696 - [i10]Chengwei Liu, Sen Chen, Lingling Fan, Bihuan Chen, Yang Liu, Xin Peng:
Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem. CoRR abs/2201.03981 (2022) - [i9]Kaifeng Huang, Bihuan Chen, Susheng Wu, Junmin Cao, Lei Ma, Xin Peng:
Demystifying Dependency Bugs in Deep Learning Stack. CoRR abs/2207.10347 (2022) - 2021
- [j12]Wenjian Liu, Bihuan Chen, Xin Peng, Qinghao Sun, Wenyun Zhao:
Identifying change patterns of API misuses from code changes. Sci. China Inf. Sci. 64(3) (2021) - [j11]Fengyi Zhang, Bihuan Chen, Rongfan Li, Xin Peng:
A hybrid code representation learning approach for predicting method names. J. Syst. Softw. 180: 111011 (2021) - [c32]Kaifeng Huang, Bihuan Chen, Linghao Pan, Shuai Wu, Xin Peng:
REPFINDER: Finding Replacements for Missing APIs in Library Update. ASE 2021: 266-278 - [i7]Junming Cao, Bihuan Chen, Chao Sun, Longjie Hu, Xin Peng:
Characterizing Performance Bugs in Deep Learning Systems. CoRR abs/2112.01771 (2021) - [i6]Congying Xu, Bihuan Chen, Chenhao Lu, Kaifeng Huang, Xin Peng, Yang Liu:
TRACER: Finding Patches for Open Source Software Vulnerabilities. CoRR abs/2112.02240 (2021) - 2020
- [c29]Ying Wang, Bihuan Chen, Kaifeng Huang, Bowen Shi, Congying Xu, Xin Peng, Yijian Wu, Yang Liu:
An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java Projects. ICSME 2020: 35-45 - [c26]Bihuan Chen, Linlin Chen, Chen Zhang, Xin Peng:
BUILDFAST: History-Aware Build Outcome Prediction for Fast Feedback and Reduced Cost in Continuous Integration. ASE 2020: 42-53 - [c25]Kaifeng Huang, Bihuan Chen, Bowen Shi, Ying Wang, Congying Xu, Xin Peng:
Interactive, effort-aware library version harmonization. ESEC/SIGSOFT FSE 2020: 518-529 - [i5]Ying Wang, Bihuan Chen, Kaifeng Huang, Bowen Shi, Congying Xu, Xin Peng, Yang Liu, Yijian Wu:
An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java Projects. CoRR abs/2002.11028 (2020) - [i4]Kaifeng Huang, Bihuan Chen, Bowen Shi, Ying Wang, Congying Xu, Xin Peng:
Interactive, Effort-Aware Library Version Harmonization. CoRR abs/2002.11066 (2020) - 2019
- [j9]Hang Ruan, Bihuan Chen, Xin Peng, Wenyun Zhao:
DeepLink: Recovering issue-commit links based on deep learning. J. Syst. Softw. 158 (2019) - [j7]Bihuan Chen, Xin Peng, Yang Liu, Songzheng Song, Jiahuan Zheng, Wenyun Zhao:
Architecture-Based Behavioral Adaptation with Generated Alternatives and Relaxed Constraints. IEEE Trans. Serv. Comput. 12(1): 73-87 (2019) - [c19]Chen Zhang, Bihuan Chen, Linlin Chen, Xin Peng, Wenyun Zhao:
A large-scale empirical study of compiler errors in continuous integration. ESEC/SIGSOFT FSE 2019: 176-187 - 2018
- [c15]Kaifeng Huang, Bihuan Chen, Xin Peng, Daihong Zhou, Ying Wang, Yang Liu, Wenyun Zhao:
ClDiff: generating concise linked code differences. ASE 2018: 679-690 - 2015
- [j4]Wenyi Qian, Xin Peng, Bihuan Chen, John Mylopoulos, Huanhuan Wang, Wenyun Zhao:
Rationalism with a dose of empiricism: combining goal reasoning and case-based reasoning for self-adaptive software systems. Requir. Eng. 20(3): 233-252 (2015) - [j3]Bihuan Chen, Xin Peng, Yijun Yu, Wenyun Zhao:
Requirements-Driven Self-Optimization of Composite Services Using Feedback Control. IEEE Trans. Serv. Comput. 8(1): 107-120 (2015) - 2014
- [j2]Bihuan Chen, Xin Peng, Yijun Yu, Wenyun Zhao:
Uncertainty handling in goal-driven self-optimization - Limiting the negative effect on adaptation. J. Syst. Softw. 90: 114-127 (2014) - [c7]Bihuan Chen, Xin Peng, Yijun Yu, Bashar Nuseibeh, Wenyun Zhao:
Self-adaptation through incremental generative model transformations at runtime. ICSE 2014: 676-687 - [c6]Wenyi Qian, Xin Peng, Bihuan Chen, John Mylopoulos, Huanhuan Wang, Wenyun Zhao:
Rationalism with a dose of empiricism: Case-based reasoning for requirements-driven self-adaptation. RE 2014: 113-122 - 2012
- [j1]Xin Peng, Bihuan Chen, Yijun Yu, Wenyun Zhao:
Self-tuning of software systems through dynamic quality tradeoff and value-based feedback control loop. J. Syst. Softw. 85(12): 2707-2719 (2012) - [c5]Richang Lin, Bihuan Chen, Yi Xie, Xin Peng, Wenyun Zhao:
Learning-Based Multi-controller Coordination for Self-Optimization. COMPSAC Workshops 2012: 164-169 - 2011
- [c4]Bihuan Chen, Xin Peng, Yijun Yu, Wenyun Zhao:
Are your sites down? Requirements-driven self-tuning for the survivability of Web systems. RE 2011: 219-228 - [c3]Bihuan Chen, Xin Peng, Yijun Yu, Wenyun Zhao:
Survivability-oriented self-tuning of web systems. WWW (Companion Volume) 2011: 23-24 - 2010
- [c2]Xin Peng, Bihuan Chen, Yijun Yu, Wenyun Zhao:
Self-Tuning of Software Systems Through Goal-based Feedback Loop Control. RE 2010: 104-107 - 2009
- [c1]Bihuan Chen, Xin Peng, Wenyun Zhao:
Towards runtime optimization of software quality based on feedback control theory. Internetware 2009: 10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-16 00:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint