- Software Engineering Research
- Blockchain Technology Applications and Security
- Advanced Malware Detection Techniques
- Cloud Computing and Resource Management
- Software Testing and Debugging Techniques
- Software Reliability and Analysis Research
- Software System Performance and Reliability
- Web Data Mining and Analysis
- Topic Modeling
- Recommender Systems and Techniques
- Open Source Software Innovations
- Software Engineering Techniques and Practices
- Anomaly Detection Techniques and Applications
- Auction Theory and Applications
- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Adversarial Robustness in Machine Learning
- Data Mining Algorithms and Applications
- Advanced Graph Neural Networks
- Web Application Security Vulnerabilities
- Advanced Decision-Making Techniques
- Video Surveillance and Tracking Methods
- Caching and Content Delivery
- Educational Technology and Assessment
- Data Stream Mining Techniques
Yangzhou University
2016-2025
Beijing Institute of Technology
2025
Intel (United Kingdom)
2023-2024
Shanghai University of Engineering Science
2024
State Grid Corporation of China (China)
2024
Electric Power Research Institute
2023
Intel (United States)
2021-2023
Xiamen University
2023
Purple Mountain Laboratories
2023
China Electric Power Research Institute
2022
Cross-domain collaborative filtering (CF) is an emerging research topic in recommender systems. It aims to alleviate the sparsity problem individual CF domains by transferring knowledge among related domains. In this paper, we will give a brief survey of pilot studies line two dimensions: Collaborative Filtering Domains and Knowledge Transfer Styles. Some possible extensions for cross-domain be discussed end.
With the fast development of wireless communications, ZigBee and semiconductor devices, home automation networks have recently become very popular. Since typical consumer products deployed in are often powered by tiny limited batteries, one most challenging research issues is concerning energy reduction balancing consumption across network order to prolong lifetime for devices. The introduction clustering sink mobility techniques into been shown be an efficient way improve performance...
Due to the availability of various open source Machine Learning (ML) tools and libraries, developers nowadays can easily implement their purposes by just invoking machine learning APIs without knowing details algorithm. However, owners ML libraries usually pay more attention correctness functionality algorithm, while spending much less effort on maintaining code keeping at a high quality level. Considering popularity in today's world, low have huge impact software products that use...
Java deserialization vulnerability is a severe threat in practice. Researchers have proposed static analysis solutions to locate candidate vulnerabilities and fuzzing generate proof-of-concept (PoC) serialized objects trigger them. However, existing limited effectiveness efficiency.In this paper, we propose novel hybrid solution ODDFuzz efficiently discover vulnerabilities. First, performs lightweight taint identify gadget chains that may cause In step, tries all candidates avoid false...
As the development of a software project progresses, its complexity grows accordingly, making it difficult to understand and maintain. During maintenance evolution, developers stakeholders constantly shift their focus between different tasks topics. They need investigate into repositories (e.g., revision control systems) know what have recently been worked on how much effort has devoted them. For example, if an important new feature request is received, amount work that perform ought be...
Microservices are becoming the defining paradigm of cloud applications, which raises urgent challenges for efficient datacenter management. Guaranteeing end-to-end Service Level Agreement (SLA) while optimizing resource allocation is critical to both service providers and users. However, one application may contain hundreds microservices, constitute an enormous search space that unfeasible explore exhaustively. Thus, we propose RAMBO, SLA-aware framework microservices leverages...
Recently, Graph Neural Network (GNN)-based vulnerability detection systems have achieved remarkable success. However, the lack of explainability poses a critical challenge to deploy black-box models in security-related domains. For this reason, several approaches been proposed explain decision logic model by providing set crucial statements positively contributing its predictions. Unfortunately, due weakly-robust and suboptimal explanation strategy, they danger revealing spurious...
Data center power is a scarce resource that often goes underutilized due to conservative planning. This because the penalty for overloading data delivery hierarchy and tripping circuit breaker very high, potentially causing long service outages. Recently, dynamic server capping, which limits amount of consumed by server, has been proposed studied as way reduce this penalty, enabling more aggressive utilization provisioned power. However, no real at-scale solution center-wide monitoring...
This paper proposed to utilize bug knowledge graph for resolution. Bug provide more comprehensive and relevant information (i.e., reports, commits, developers, etc.). Moreover, our approach can automatically update based on the lifelong learning topic model. Preliminary results show that accurate related a issue.
The remarkable achievements of Artificial Intelligence (AI) algorithms, particularly in Machine Learning (ML) and Deep (DL), have fueled their extensive deployment across multiple sectors, including Software Engineering (SE). However, due to black-box nature, these promising AI-driven SE models are still far from being deployed practice. This lack explainability poses unwanted risks for applications critical tasks, such as vulnerability detection, where decision-making transparency is...
Abstract Security bugs can catastrophically impact our increasingly digital lives. Designing effective tools for detecting and fixing software security requires a deep understanding of bug characteristics. In this paper, we conducted comprehensive study on proposed the classification criteria category, that is, root cause, consequence, location. addition, selected 1076 reports from five projects (i.e., Apache Tomcat, HTTP Server, Mozilla Firefox, Linux Kernel, Eclipse) in NVD investigation....