Xiaoxue Wu

ORCID: 0009-0009-5432-651X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Advanced Malware Detection Techniques
  • Software Testing and Debugging Techniques
  • Software Reliability and Analysis Research
  • Security and Verification in Computing
  • Web Application Security Vulnerabilities
  • Adversarial Robustness in Machine Learning
  • Topic Modeling
  • Software System Performance and Reliability
  • Real-time simulation and control systems
  • Anomaly Detection Techniques and Applications
  • Digital Marketing and Social Media
  • Online Learning and Analytics
  • Advanced Data Compression Techniques
  • Real-Time Systems Scheduling
  • Cloud Computing and Resource Management
  • Explainable Artificial Intelligence (XAI)
  • Rough Sets and Fuzzy Logic
  • Oil Spill Detection and Mitigation
  • Infrared Target Detection Methodologies
  • Ethics and Social Impacts of AI
  • Advanced Measurement and Detection Methods
  • Advanced Wireless Communication Techniques
  • Dental Health and Care Utilization
  • Video Coding and Compression Technologies

Yangzhou University
2021-2024

Hebei University
2023

Shanghai University of Finance and Economics
2021

Northwestern Polytechnical University
2017

Recently, with the widespread use of deep neural networks (DNNs) in high-stakes decision-making systems (such as fraud detection and prison sentencing), concerns have arisen about fairness DNNs terms potential negative impact they may on individuals society. Therefore, testing has become an important research topic DNN testing. At same time, network coverage criteria based neuronal activation) is considered adequacy test for white-box It implicitly assumed that improving can enhance quality...

10.1109/tse.2023.3349001 article EN IEEE Transactions on Software Engineering 2024-01-08

Java deserialization vulnerability is a severe threat in practice. Researchers have proposed static analysis solutions to locate candidate vulnerabilities and fuzzing generate proof-of-concept (PoC) serialized objects trigger them. However, existing limited effectiveness efficiency.In this paper, we propose novel hybrid solution ODDFuzz efficiently discover vulnerabilities. First, performs lightweight taint identify gadget chains that may cause In step, tries all candidates avoid false...

10.1109/sp46215.2023.10179377 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2023-05-01

Java (de)serialization is prone to causing security-critical vulnerabilities that attackers can invoke existing methods (gadgets) on the application's classpath construct a gadget chain perform malicious behaviors. Several techniques have been proposed statically identify suspicious chains and dynamically generate injection objects for fuzzing. However, due their incomplete support dynamic program features (e.g., runtime polymorphism) ineffective object generation fuzzing, are still far from...

10.1109/icse48619.2023.00044 article EN 2023-05-01

Recently, Graph Neural Network (GNN)-based vulnerability detection systems have achieved remarkable success. However, the lack of explainability poses a critical challenge to deploy black-box models in security-related domains. For this reason, several approaches been proposed explain decision logic model by providing set crucial statements positively contributing its predictions. Unfortunately, due weakly-robust and suboptimal explanation strategy, they danger revealing spurious...

10.1145/3597503.3639168 article EN 2024-04-12

Vulnerabilities can have devastating effects on information security, affecting the economy, social stability, and national security. The idea of automatic vulnerability detection has always attracted researchers. From traditional manual mining techniques to static dynamic detection, all rely human experts for feature definition. rapid development machine learning deep alleviated tedious task manually defining features by while reducing lack objectivity caused subjective awareness. However,...

10.1049/sfw2.12066 article EN cc-by-nc-nd IET Software 2022-07-06

Memory-related vulnerabilities can result in performance degradation or even program crashes, constituting severe threats to the security of modern software. Despite promising results deep learning (DL)-based vulnerability detectors, there exist three main limitations: (1) rich contextual semantics related have not yet been fully modeled; (2) multi-granularity features hierarchical code structure are still hard be captured; and (3) heterogeneous flow information is well utilized. To address...

10.1145/3624744 article EN ACM Transactions on Software Engineering and Methodology 2023-09-18

Abstract Vulnerability classification is a significant activity in software development and maintenance. Natural Language Processing (NLP) techniques, which utilize the descriptions public repositories, are widely used automatic vulnerability classification. However, ordinarily short contain many technical terms, making them difficult for machines to automatically comprehend. In this paper, we present an approach based on triggers classify vulnerabilities. First, extract with Bert Question...

10.1002/smr.2508 article EN Journal of Software Evolution and Process 2022-09-08

Abstract With the rapid development of information age, software vulnerabilities have threatened safety communication and mobile network, research on vulnerability repair is urgent. Different from existing machine learning-based approaches, we propose VulRep , a approach based introduction, which combines empirical findings inducing fixing commit with learning approaches for repair. Firstly, construct introduction dataset, generate AST tree code to form sequence after abstraction processing,...

10.1186/s13638-023-02242-7 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2023-04-21

Context: As software evolves, the test suite tends to grow, regression testing has become prohibitively expensive. Test minimization is one of most important approaches for reducing cost. The process a trade-off between cost and other value criteria appropriate be described as many-objective optimization problem. Objective: To identify efficient redundant degree data improving efficiency without decreasing defect detection ability data. Method: We introduce mutation testing-based approach,...

10.1109/sate.2017.12 article EN 2017-11-01

Abstract Vulnerabilities in the source code of software are critical issues realm engineering. Coping with vulnerabilities is becoming more challenging due to several aspects such as complexity and volume. Deep learning has gained popularity throughout years a means addressing issues. This paper proposes an evaluation vulnerability detection performance on representations evaluates how machine (ML) strategies can improve them. The structure our experiment consists three deep neural networks...

10.1002/smr.2422 article EN Journal of Software Evolution and Process 2022-01-20

Bug localization is an important field in software engineering research. The traditional bug approaches based on information retrieval separate words through lexical analysis. In this way, the comments of source code are ignored or treated as plain text, which will lose some semantic information. paper, MBL_SHL, automatic Method-level Localization approach, utilises Summarization, Historical fixed bugs and Length, presented. Based summarization technology, approach first supplements comment...

10.1049/sfw2.12060 article EN cc-by-nc-nd IET Software 2022-05-17

Abstract An automated task for finding the essential buggy files among software projects with help of a given bug report is termed localization. The conventional approaches suffer from challenges performing lexical matching. Particularly, terms utilized describing bugs in reports are observed to be irrelevant used source code files. To resolve these problems, we propose an optimized and ensemble deep learning model These features reduced by principle component analysis (PCA). Then, they...

10.1002/smr.2654 article EN Journal of Software Evolution and Process 2024-02-26

<title>Abstract</title> Previous studies have noted a distinct seasonal variation in oral diseases, which appeared to align with the patterns of climate change. This observation sparked our interest investigating whether there is definitive correlation between ambient temperature fluctuations and incidence diseases different climatic cities China, connection that, date, remains unclear. study aimed elucidate relationship diseases. Daily outpatient data from Affiliated Stomatological Hospital...

10.21203/rs.3.rs-4081027/v1 preprint EN cc-by Research Square (Research Square) 2024-03-29
Coming Soon ...