Bixin Li

ORCID: 0000-0001-9916-4790
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Software Reliability and Analysis Research
  • Software System Performance and Reliability
  • Software Testing and Debugging Techniques
  • Service-Oriented Architecture and Web Services
  • Advanced Software Engineering Methodologies
  • Business Process Modeling and Analysis
  • Blockchain Technology Applications and Security
  • Advanced Malware Detection Techniques
  • Formal Methods in Verification
  • Software Engineering Techniques and Practices
  • Access Control and Trust
  • Advanced Computational Techniques and Applications
  • Cloud Data Security Solutions
  • Network Security and Intrusion Detection
  • Cloud Computing and Resource Management
  • Logic, programming, and type systems
  • Parallel Computing and Optimization Techniques
  • Petri Nets in System Modeling
  • Web Data Mining and Analysis
  • Model-Driven Software Engineering Techniques
  • Cybercrime and Law Enforcement Studies
  • Spam and Phishing Detection
  • Infrastructure Resilience and Vulnerability Analysis
  • Information and Cyber Security

Southeast University
2015-2024

Norwegian University of Science and Technology
2002-2023

Southeast University
2008-2023

Nanjing University of Science and Technology
2023

ShanghaiTech University
2023

PLA Army Service Academy
2008-2020

Towson University
2016

Institute of Software
2012-2013

Chinese Academy of Sciences
2012-2013

Yangzhou University
2013

SUMMARY Software change impact analysis (CIA) is a technique for identifying the effects of change, or estimating what needs to be modified accomplish change. Since 1980s, there have been many investigations on CIA, especially code‐based CIA techniques. However, very few surveys this topic. This article tries fill gap. And 30 papers that provide empirical evaluation 23 techniques are identified. Then, data was synthesized against four research questions. The study presents comparative...

10.1002/stvr.1475 article EN Software Testing Verification and Reliability 2012-04-27

Smart contract security is one of the core issues in any application based on blockchain. There are many techniques focusing smart security, however, due to diversity Solidity versions and limitations detection time, it difficult for them comprehensively localize defects different contracts. In this article, we propose a static defect method knowledge graph language present tool called <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/tr.2023.3233999 article EN IEEE Transactions on Reliability 2023-01-24

Modern database applications are among the most widely used and complex software systems. They constantly evolve, responding to changes data, schemas, code. It is challenging manage these ensure that everything co-evolves consistently. For example, when a schema modified, all code interacts with must be changed accordingly. Although evolution have been extensively studied in isolation, co-evolution of has largely unexplored.

10.1145/2491411.2491431 article EN 2013-08-18

Software change impact analysis (CIA) is a key technique for identifying unpredicted and potential effects caused by changes made to software. Different types often have different mechanisms, even some do not other entities in programs spite of dependences existed between these the modified entity. In this paper, we propose static CIA technique, which considers mechanisms rules types, calculate sets. Precision improvement sets relies on 3 aspects: entity, entity entities, intuition that win...

10.1109/compsac.2010.45 article EN 2010-07-01

10.1016/j.infsof.2016.01.011 article EN Information and Software Technology 2016-02-02

As one of the most complex types vulnerabilities, reentrancy poses a significant threat to smart contract development. Indeed, millions dollars have evaporated due vulnerabilities contracts in past years. In this article, we propose new approach detect using fuzz testing and develop novel tool named ReDefender. Our consists three main steps: 1) <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">preprocess be detected:</i> when is uploaded, its...

10.1109/tr.2022.3161634 article EN IEEE Transactions on Reliability 2022-04-13

Automated program repair can save tremendous manual efforts in software debugging. Therefore, a huge body of research have been dedicated to design and implement automated techniques. Among the existing techniques, genetic-programming-based techniques shown promising results. Recently, researchers found that random-search-based adaptive also produce effective In this work, we performed an extensive study for four including genetic-programming-based, random-search-based, brute-force-based Due...

10.1109/issre.2015.7381813 article EN 2015-11-01

Context-aware API recommendation techniques aim to generate a ranked list of candidate APIs on an editing position during development. The basic context used in traditional mainly focuses the from third-party libraries, limit or even ignore usage project-specific code. limited code may result lack information, and degrade effectiveness recommendation. To address this problem, we introduce novel type context, i.e., hierarchical which can leverage hidden information by analyzing call graph. In...

10.1109/issre.2019.00044 article EN 2019-10-01

10.1016/j.compeleceng.2016.05.014 article EN Computers & Electrical Engineering 2016-06-07

With the continuous development and innovation of blockchain technology, a large number networks with various features have emerged to satisfy needs differ-ent scenarios. For example, Cross-Chain technologies been proposed enable information interaction value transfer between two blockchains. In asset transaction, Hashed Timelock Contract (HTLC for short) algorithm is most widely used control transaction. However, HTLC has problem low-level security assurance in practical applications:...

10.1109/qrs-c57518.2022.00019 article EN 2022-12-01

10.1016/j.jss.2009.09.013 article EN Journal of Systems and Software 2009-09-11

With the loose coupling and dynamic attributes of Web service, implementation behavior may be different from original requirement, so itpsilas essential to implement run-time monitoring. Monitoring analyzes conformance a service requirements. This paper gives novel monitoring prototype framework. It introduces WS-policy express userpsilas requirement on services. Then, AOP (aspect oriented programming) technology is used extend BPEL execution engine in order capture information service....

10.1109/icis.2009.70 article EN 2009-01-01

10.1016/j.advengsoft.2012.07.001 article EN Advances in Engineering Software 2012-08-03

Software change impact analysis (CIA) is a key technique to identify unpredicted and potential effects caused by software changes. In this paper, we propose new CIA based on compact effective representation for object oriented programs, called lattice of class method dependence (LoCMD). This novel can effectively capture the dependences between classes methods. Based LoCMD, our calculates ranked list impacted methods according metric, factor, which corresponds priority these be inspected....

10.1145/1982185.1982495 article EN 2011-03-21
Coming Soon ...