default search action
Bin Luo 0003
Person information
- affiliation (PhD 2000): Nanjing University, Software Institute, State Key Laboratory for Novel Software Technology, China
Other persons with the same name
- Bin Luo — disambiguation page
- Bin Luo 0001 — Anhui University, School of Computer Science and Technology, Anhui Provincial Key Laboratory of Multimodal Cognitive Computing, Hefei, China (and 1 more)
- Bin Luo 0002 — Nanchang University, School of Information Engineering, China (and 1 more)
- Bin Luo 0004 — University of Hong Kong, Department of Electrical and Electronic Engineering, Hong Kong
- Bin Luo 0005 — Wuhan University, State Key Laboratory of Information Engineering in Surveying, Mapping and Remote Sensing, China (and 1 more)
- Bin Luo 0006 — Xidian University, State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, China
- Bin Luo 0007 — Southwest Jiaotong University, Center for Information Photonics & Communications, China (and 1 more)
- Bin Luo 0008 — Alibaba Group, DAMO Academy, Shenzhen, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Yuan Zhang, Chuanyi Li, Yu Sheng, Jidong Ge, Bin Luo:
Judicial intelligent assistant system: Extracting events from Chinese divorce cases to detect disputes for the judge. Expert Syst. J. Knowl. Eng. 41(7) (2024) - [j44]Feifei Niu, Enshuo Zhang, Christoph Mayr-Dorn, Wesley Klewerton Guez Assunção, Liguo Huang, Jidong Ge, Bin Luo, Alexander Egyed:
An extensive replication study of the ABLoTS approach for bug localization. Empir. Softw. Eng. 29(6): 143 (2024) - [j43]Yang Zhou, Peixin Yang, Xinchi Xu, Bingchan Shao, Guihuan Feng, Jie Liu, Bin Luo:
FMASketch: Freehand Mid-Air Sketching in AR. Int. J. Hum. Comput. Interact. 40(8): 2142-2152 (2024) - [j42]Hongliang Ge, Wenkang Zhong, Chuanyi Li, Jidong Ge, Hao Hu, Bin Luo:
RobustNPR: Evaluating the robustness of neural program repair models. J. Softw. Evol. Process. 36(4) (2024) - [j41]Changan Niu, Chuanyi Li, Vincent Ng, Jidong Ge, Liguo Huang, Bin Luo:
PassSum: Leveraging paths of abstract syntax trees and self-supervision for code summarization. J. Softw. Evol. Process. 36(6) (2024) - [j40]Ye Fan, Jidong Ge, Sheng Zhang, Jie Wu, Bin Luo:
Decentralized Scheduling for Concurrent Tasks in Mobile Edge Computing via Deep Reinforcement Learning. IEEE Trans. Mob. Comput. 23(4): 2765-2779 (2024) - [j39]Zhihao Li, Chuanyi Li, Ze Tang, Wanhong Huang, Jidong Ge, Bin Luo, Vincent Ng, Ting Wang, Yucheng Hu, Xiaopeng Zhang:
PTM-APIRec: Leveraging Pre-trained Models of Source Code in API Recommendation. ACM Trans. Softw. Eng. Methodol. 33(3): 72:1-72:30 (2024) - [j38]Weisong Sun, Chunrong Fang, Yuchen Chen, Quanjun Zhang, Guanhong Tao, Yudu You, Tingxu Han, Yifei Ge, Yuling Hu, Bin Luo, Zhenyu Chen:
An Extractive-and-Abstractive Framework for Source Code Summarization. ACM Trans. Softw. Eng. Methodol. 33(3): 75:1-75:39 (2024) - [j37]Chunrong Fang, Weisong Sun, Yuchen Chen, Xiao Chen, Zhao Wei, Quanjun Zhang, Yudu You, Bin Luo, Yang Liu, Zhenyu Chen:
Esale: Enhancing Code-Summary Alignment Learning for Source Code Summarization. IEEE Trans. Software Eng. 50(8): 2077-2095 (2024) - [c110]Yuan Zhang, Wanhong Huang, Yi Feng, Chuanyi Li, Zhiwei Fei, Jidong Ge, Bin Luo, Vincent Ng:
LJPCheck: Functional Tests for Legal Judgment Prediction. ACL (Findings) 2024: 5878-5894 - [c109]Zhiqiang Hao, Chuanyi Li, Xiao Fu, Bin Luo, Xiaojiang Du:
Leveraging Hierarchies: HMCAT for Efficiently Mapping CTI to Attack Techniques. ESORICS (4) 2024: 65-85 - [c108]Changan Niu, Ting Zhang, Chuanyi Li, Bin Luo, Vincent Ng:
On Evaluating the Efficiency of Source Code Generated by LLMs. FORGE 2024: 103-107 - [c107]Yaqing Zhang, Xiao Fu, Bin Luo, Xiaojiang Du:
A Crowdsourcing Digital Forensics Platform for IoT Environments Powered by Blockchain. ICC 2024: 2016-2021 - [c106]Wenkang Zhong, Chuanyi Li, Kui Liu, Tongtong Xu, Jidong Ge, Tegawendé F. Bissyandé, Bin Luo, Vincent Ng:
Practical Program Repair via Preference-based Ensemble Strategy. ICSE 2024: 5:1-5:13 - [c105]Changan Niu, Chuanyi Li, Vincent Ng, David Lo, Bin Luo:
FAIR: Flow Type-Aware Pre-Training of Compiler Intermediate Representations. ICSE 2024: 33:1-33:12 - [c104]Feifei Niu, Junqian Shao, Chaofan Xu, Christoph Mayr-Dorn, Wesley K. G. Assunção, Liguo Huang, Chuanyi Li, Jidong Ge, Bin Luo, Alexander Egyed:
RAT: A Refactoring-Aware Tool for Tracking Code History. ICSE Companion 2024: 104-108 - [c103]Kuo Chi, Chuanyi Li, Jidong Ge, Bin Luo:
An Empirical Study on Code Search Pre-trained Models: Academic Progresses vs. Industry Requirements. Internetware 2024 - [c102]Wentao Zou, Zongwen Shen, JiDong Ge, Chuanyi Li, Bin Luo:
CCAF: Learning Code Change via AdapterFusion. Internetware 2024 - [i19]Changan Niu, Ting Zhang, Chuanyi Li, Bin Luo, Vincent Ng:
On Evaluating the Efficiency of Source Code Generated by LLMs. CoRR abs/2404.06041 (2024) - [i18]Chunrong Fang, Weisong Sun, Yuchen Chen, Xiao Chen, Zhao Wei, Quanjun Zhang, Yudu You, Bin Luo, Yang Liu, Zhenyu Chen:
ESALE: Enhancing Code-Summary Alignment Learning for Source Code Summarization. CoRR abs/2407.01646 (2024) - 2023
- [j36]Jidong Ge, Yuxiang Liu, Jie Gui, Lanting Fang, Ming Lin, James Tin-Yau Kwok, Liguo Huang, Bin Luo:
Learning the Relation Between Similarity Loss and Clustering Loss in Self-Supervised Learning. IEEE Trans. Image Process. 32: 3442-3454 (2023) - [j35]Xuanyu Liu, Xiao Fu, Xiaojiang Du, Bin Luo, Mohsen Guizani:
Machine Learning-Based Non-Intrusive Digital Forensic Service for Smart Homes. IEEE Trans. Netw. Serv. Manag. 20(2): 945-960 (2023) - [c101]Weisong Sun, Yuchen Chen, Guanhong Tao, Chunrong Fang, Xiangyu Zhang, Quanjun Zhang, Bin Luo:
Backdooring Neural Code Search. ACL (1) 2023: 9692-9708 - [c100]Qingya Wang, Feng Liu, Bin Luo:
A Partially Observable Monte Carlo Planning Algorithm Based on Path Modification. ACML 2023: 1449-1462 - [c99]Weisong Sun, Weidong Qian, Bin Luo, Zhenyu Chen:
MuTCR: Test Case Recommendation via Multi-Level Signature Matching. AST 2023: 179-190 - [c98]Ruiqing Chu, Xuanyu Liu, Xiao Fu, Bin Luo, Mohsen Guizani:
Credibility Management of Cloud-based Digital Forensic Data: A Decentralized Verification Mechanism. CloudNet 2023: 45-52 - [c97]Yihao Jin, Xuanyu Liu, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Convolutional Neural Network Based Classification of WeChat Mini-Apps. ICC 2023: 747-752 - [c96]Feifei Niu, Wesley K. G. Assunção, LiGuo Huang, Christoph Mayr-Dorn, Jidong Ge, Bin Luo, Alexander Egyed:
RAT: A Refactoring-Aware Traceability Model for Bug Localization. ICSE 2023: 196-207 - [c95]Changan Niu, Chuanyi Li, Vincent Ng, Bin Luo:
CrossCodeBench: Benchmarking Cross-Task Generalization of Source Code Models. ICSE 2023: 537-549 - [c94]Changan Niu, Chuanyi Li, Vincent Ng, Dongxiao Chen, Jidong Ge, Bin Luo:
An Empirical Comparison of Pre-Trained Models of Source Code. ICSE 2023: 2136-2148 - [c93]Qingya Wang, Feng Liu, Xuan Wang, Bin Luo:
Improving Online POMDP Planning Algorithms with Decaying Q Value. ICTAI 2023: 654-660 - [c92]Ze Tang, Jidong Ge, Shangqing Liu, Tingwei Zhu, Tongtong Xu, Liguo Huang, Bin Luo:
Domain Adaptive Code Completion via Language Models and Decoupled Domain Databases. ASE 2023: 421-433 - [c91]Wenkang Zhong, Chuanyi Li, Yunfei Zhang, Ziwen Ge, Jingyu Wang, Jidong Ge, Bin Luo:
An Automated and Flexible Multilingual Bug-Fix Dataset Construction System. ASE 2023: 1881-1886 - [c90]Feifei Niu, Christoph Mayr-Dorn, Wesley K. G. Assunção, LiGuo Huang, Jidong Ge, Bin Luo, Alexander Egyed:
The ABLoTS Approach for Bug Localization: is it replicable and generalizable? MSR 2023: 576-587 - [c89]Yang Zhou, Jie Liu, Peixin Yang, Xinchi Xu, Bingchan Shao, Guihuan Feng, Bin Luo:
ARPad: Compound Spatial-Semantic Gesture Interaction in Augmented Reality. VR Workshops 2023: 805-806 - [i17]Jidong Ge, Yuxiang Liu, Jie Gui, Lanting Fang, Ming Lin, James Tin-Yau Kwok, LiGuo Huang, Bin Luo:
Learning the Relation between Similarity Loss and Clustering Loss in Self-Supervised Learning. CoRR abs/2301.03041 (2023) - [i16]Changan Niu, Chuanyi Li, Vincent Ng, Dongxiao Chen, Jidong Ge, Bin Luo:
An Empirical Comparison of Pre-Trained Models of Source Code. CoRR abs/2302.04026 (2023) - [i15]Changan Niu, Chuanyi Li, Vincent Ng, Bin Luo:
CrossCodeBench: Benchmarking Cross-Task Generalization of Source Code Models. CoRR abs/2302.04030 (2023) - [i14]Yuan Zhang, Chuanyi Li, Yu Sheng, Jidong Ge, Bin Luo:
Judicial Intelligent Assistant System: Extracting Events from Divorce Cases to Detect Disputes for the Judge. CoRR abs/2303.16751 (2023) - [i13]Weisong Sun, Yuchen Chen, Guanhong Tao, Chunrong Fang, Xiangyu Zhang, Quanjun Zhang, Bin Luo:
Backdooring Neural Code Search. CoRR abs/2305.17506 (2023) - [i12]Ze Tang, Jidong Ge, Shangqing Liu, Tingwei Zhu, Tongtong Xu, Liguo Huang, Bin Luo:
Domain Adaptive Code Completion via Language Models and Decoupled Domain Databases. CoRR abs/2308.09313 (2023) - [i11]Changan Niu, Chuanyi Li, Vincent Ng, David Lo, Bin Luo:
FAIR: Flow Type-Aware Pre-Training of Compiler Intermediate Representations. CoRR abs/2309.04828 (2023) - [i10]Wenkang Zhong, Chuanyi Li, Kui Liu, Tongtong Xu, Tegawendé F. Bissyandé, Jidong Ge, Bin Luo, Vincent Ng:
Practical Program Repair via Preference-based Ensemble Strategy. CoRR abs/2309.08211 (2023) - [i9]Wentao Zou, Qi Li, Jidong Ge, Chuanyi Li, Xiaoyu Shen, Liguo Huang, Bin Luo:
A Comprehensive Evaluation of Parameter-Efficient Fine-Tuning on Software Engineering Tasks. CoRR abs/2312.15614 (2023) - 2022
- [j34]Fei Ye, Yunzhi Zheng, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
TamForen: A tamper-proof cloud forensic framework. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j33]Chuanyi Li, Jidong Ge, Kun Cheng, Bin Luo, Victor Chang:
Statute recommendation: Re-ranking statutes by modeling case-statute relation with interpretable hand-crafted features. Inf. Sci. 607: 1023-1040 (2022) - [j32]Tiantian Xu, Guangjie Han, Linfeng Gou, Miguel Martínez-García, Dong Shao, Bin Luo, Zhenyu Yin:
SGBRT: An Edge-Intelligence Based Remaining Useful Life Prediction Model for Aero-Engine Monitoring System. IEEE Trans. Netw. Sci. Eng. 9(5): 3112-3122 (2022) - [j31]Li Kong, Chuanyi Li, Jidong Ge, Vincent Ng, Bin Luo:
Predicting Product Review Helpfulness - A Hybrid Method. IEEE Trans. Serv. Comput. 15(4): 2213-2225 (2022) - [j30]Feifei Niu, Chuanyi Li, Jidong Ge, Lijie Wen, Zhongjin Li, Bin Luo:
Measuring Business Process Behavioral Similarity Based on Token Log Profile. IEEE Trans. Serv. Comput. 15(6): 3344-3357 (2022) - [c88]Yuzhu Sun, Xuanyu Liu, Tianchi Wu, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Using Cloud Computing Based Crowdsourcing for Security and Privacy Settings of Android Users. GLOBECOM 2022: 522-527 - [c87]Changan Niu, Chuanyi Li, Vincent Ng, Jidong Ge, Liguo Huang, Bin Luo:
SPT-Code: Sequence-to-Sequence Pre-Training for Learning Source Code Representations. ICSE 2022: 1-13 - [c86]Ze Tang, Xiaoyu Shen, Chuanyi Li, Jidong Ge, Liguo Huang, Zheling Zhu, Bin Luo:
AST-Trans: Code Summarization with Efficient Tree-Structured Attention. ICSE 2022: 150-162 - [c85]Changan Niu, Chuanyi Li, Bin Luo, Vincent Ng:
Deep Learning Meets Software Engineering: A Survey on Pre-Trained Models of Source Code. IJCAI 2022: 5546-5555 - [c84]Wenkang Zhong, Chuanyi Li, Jidong Ge, Bin Luo:
Neural Program Repair : Systems, Challenges and Solutions. Internetware 2022: 96-106 - [c83]Feifei Niu, Chuanyi Li, Heng Chen, Jidong Ge, Bin Luo:
Towards Just-In-Time Feature Request Approval Prediction. Internetware 2022: 262-271 - [c82]Wenkang Zhong, Hongliang Ge, Hongfei Ai, Chuanyi Li, Kui Liu, Jidong Ge, Bin Luo:
StandUp4NPR: Standardizing SetUp for Empirically Comparing Neural Program Repair Systems. ASE 2022: 97:1-97:13 - [c81]Xinwen Hu, Yu Guo, Jianjie Lu, Zheling Zhu, Chuanyi Li, Jidong Ge, Liguo Huang, Bin Luo:
Lighting up supervised learning in user review-based code localization: dataset and benchmark. ESEC/SIGSOFT FSE 2022: 533-545 - [i8]Changan Niu, Chuanyi Li, Vincent Ng, Jidong Ge, Liguo Huang, Bin Luo:
SPT-Code: Sequence-to-Sequence Pre-Training for Learning Source Code Representations. CoRR abs/2201.01549 (2022) - [i7]Wenkang Zhong, Chuanyi Li, Jidong Ge, Bin Luo:
Neural Program Repair: Systems, Challenges and Solutions. CoRR abs/2202.10868 (2022) - [i6]Changan Niu, Chuanyi Li, Bin Luo, Vincent Ng:
Deep Learning Meets Software Engineering: A Survey on Pre-Trained Models of Source Code. CoRR abs/2205.11739 (2022) - [i5]Weisong Sun, Chunrong Fang, Yuchen Chen, Quanjun Zhang, Guanhong Tao, Tingxu Han, Yifei Ge, Yudu You, Bin Luo:
An Extractive-and-Abstractive Framework for Source Code Summarization. CoRR abs/2206.07245 (2022) - 2021
- [j29]Yi Feng, Chuanyi Li, Jidong Ge, Bin Luo, Vincent Ng:
Recommending Statutes: A Portable Method Based on Neural Networks. ACM Trans. Knowl. Discov. Data 15(2): 16:1-16:22 (2021) - [j28]Yu Liang, Jidong Ge, Sheng Zhang, Jie Wu, Lingwei Pan, Tengfei Zhang, Bin Luo:
Interaction-Oriented Service Entity Placement in Edge Computing. IEEE Trans. Mob. Comput. 20(3): 1064-1075 (2021) - [c80]Yi Feng, Ting Wang, Chuanyi Li, Vincent Ng, Jidong Ge, Bin Luo, Yucheng Hu, Xiaopeng Zhang:
Don't Miss the Potential Customers! Retrieving Similar Ads to Improve User Targeting. EMNLP (Findings) 2021: 1493-1503 - [c79]Xuanyu Liu, Ang Li, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Understanding Digital Forensic Characteristics of Smart Speaker Ecosystems. GLOBECOM 2021: 1-6 - [c78]Shiwen Song, Xuanyu Liu, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction. GLOBECOM 2021: 1-6 - [c77]Feifei Zhang, Jidong Ge, Chifong Wong, Sheng Zhang, Chuanyi Li, Bin Luo:
Optimizing Federated Edge Learning on Non-IID Data via Neural Architecture Search. GLOBECOM 2021: 1-6 - [c76]Li Lin, Xuanyu Liu, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
A Non-Intrusive Method for Smart Speaker Forensics. ICC 2021: 1-6 - [c75]Ze Tang, Chuanyi Li, Jidong Ge, Xiaoyu Shen, Zheling Zhu, Bin Luo:
AST-Transformer: Encoding Abstract Syntax Trees Efficiently for Code Summarization. ASE 2021: 1193-1195 - [c74]Xuanyu Liu, Qiang Zeng, Xiaojiang Du, Siva Likitha Valluru, Chenglong Fu, Xiao Fu, Bin Luo:
SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes. RAID 2021: 33-47 - [i4]Jidong Ge, Yunyun Huang, Xiaoyu Shen, Chuanyi Li, Wei Hu, Bin Luo:
Learning Fine-grained Fact-Article Correspondence in Legal Cases. CoRR abs/2104.10726 (2021) - [i3]Ze Tang, Chuanyi Li, Jidong Ge, Xiaoyu Shen, Zheling Zhu, Bin Luo:
AST-Transformer: Encoding Abstract Syntax Trees Efficiently for Code Summarization. CoRR abs/2112.01184 (2021) - [i2]Yunyun Huang, Xiaoyu Shen, Chuanyi Li, Jidong Ge, Bin Luo:
Dependency Learning for Legal Judgment Prediction with a Unified Text-to-Text Transformer. CoRR abs/2112.06370 (2021) - 2020
- [j27]Chuanyi Li, Jidong Ge, Lijie Wen, Li Kong, Victor Chang, Liguo Huang, Bin Luo:
A novel completeness definition of event logs and corresponding generation algorithm. Expert Syst. J. Knowl. Eng. 37(4) (2020) - [j26]Li Kong, Chuanyi Li, Jidong Ge, Feifei Zhang, Yi Feng, Zhongjin Li, Bin Luo:
Leveraging multiple features for document sentiment classification. Inf. Sci. 518: 39-55 (2020) - [c73]Li Kong, Chuanyi Li, Jidong Ge, Bin Luo, Vincent Ng:
Identifying Exaggerated Language. EMNLP (1) 2020: 7024-7034 - [c72]Yuzhe Chen, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network. GLOBECOM 2020: 1-6 - [c71]Yun Luo, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Forensic Model for DDoS Attack. GLOBECOM 2020: 1-6 - [c70]Sixian Sun, Xiao Fu, Bin Luo, Xiaojiang Du:
Detecting and Mitigating ARP Attacks in SDN-Based Cloud Environment. INFOCOM Workshops 2020: 659-664 - [c69]Chuanyi Li, Jidong Ge, Victor Chang, Bin Luo:
Retrieving Similar Software from Large-scale Open-source Repository by Constructing Representation of Project Description. IoTBDS 2020: 296-303 - [c68]Yu Liang, Jidong Ge, Sheng Zhang, Changan Niu, Wei Song, Bin Luo:
Efficient Service Entity Chain Placement in Mobile Edge Computing. MSN 2020: 182-189
2010 – 2019
- 2019
- [j25]Xiao Fu, Rui Yang, Xiaojiang Du, Bin Luo, Mohsen Guizani:
Timing Channel in IaaS: How to Identify and Investigate. IEEE Access 7: 1-11 (2019) - [j24]Yu Liang, Jidong Ge, Sheng Zhang, Bin Luo:
Modeling and deploying hybrid tenant requests with shared networklets. Comput. Networks 153: 63-72 (2019) - [j23]Feifei Zhang, Jidong Ge, Chifong Wong, Chuanyi Li, Xingguo Chen, Sheng Zhang, Bin Luo, He Zhang, Victor Chang:
Online learning offloading framework for heterogeneous mobile edge computing system. J. Parallel Distributed Comput. 128: 167-183 (2019) - [j22]Weiqiang Zhang, Shing-Chi Cheung, Zhenyu Chen, Yuming Zhou, Bin Luo:
File-level socio-technical congruence and its relationship with bug proneness in OSS projects. J. Syst. Softw. 156: 21-40 (2019) - [j21]Yu Liang, Jidong Ge, Sheng Zhang, Jie Wu, Ze Tang, Bin Luo:
A Utility-Based Optimization Framework for Edge Service Entity Caching. IEEE Trans. Parallel Distributed Syst. 30(11): 2384-2395 (2019) - [j20]Chuanyi Li, Jidong Ge, Zhongjin Li, Liguo Huang, Hongji Yang, Bin Luo:
Monitoring Interactions Across Multi Business Processes with Token Carried Data. IEEE Trans. Serv. Comput. 12(6): 941-954 (2019) - [c67]Yi Feng, Chuanyi Li, Jidong Ge, Bin Luo:
Improving Statute Prediction via Mining Correlations between Statutes. ACML 2019: 710-725 - [c66]Meng Chen, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Cloud Database Encryption Technology Based on Combinatorial Encryption. GLOBECOM 2019: 1-5 - [c65]Xiaoyu Ma, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
A Design of Firewall Based on Feedback of Intrusion Detection System in Cloud Environment. GLOBECOM 2019: 1-6 - [c64]Chuanyi Li, Yu Sheng, Jidong Ge, Bin Luo:
Apply event extraction techniques to the judicial field. UbiComp/ISWC Adjunct 2019: 492-497 - [c63]Linxia Yao, Jidong Ge, Chuanyi Li, Yuan Yao, Zhenhao Li, Jin Zeng, Bin Luo, Victor Chang:
Word Segmentation for Chinese Judicial Documents. ICPCSEE (1) 2019: 466-478 - [c62]Mengting He, Zhongyue Li, Yanshu Wei, Jidong Ge, Peitang Ling, Chuanyi Li, Ting Lei, Bin Luo:
Evaluation System for Reasoning Description of Judgment Documents Based on TensorFlow CNN. ICPCSEE (1) 2019: 518-533 - [c61]Peitang Ling, Zian Wang, Yi Feng, Jidong Ge, Mengting He, Chuanyi Li, Bin Luo:
Statute Recommendation Based on Word Embedding. ICPCSEE (1) 2019: 534-548 - [c60]Li Kong, Chuanyi Li, Jidong Ge, Zhongjin Li, Feifei Zhang, Bin Luo:
An Efficient Heuristic Method for Repairing Event Logs Independent of Process Models. IoTBDS 2019: 83-93 - 2018
- [j19]Sixian Sun, Xiao Fu, Hao Ruan, Xiaojiang Du, Bin Luo, Mohsen Guizani:
Real-Time Behavior Analysis and Identification for Android Application. IEEE Access 6: 38041-38051 (2018) - [j18]Feifei Zhang, Jidong Ge, Zhongjin Li, Chuanyi Li, Chifong Wong, Li Kong, Bin Luo, Victor I. Chang:
A load-aware resource allocation and task scheduling for the emerging cloudlet system. Future Gener. Comput. Syst. 87: 438-456 (2018) - [j17]Tieke He, Hao Lian, Zemin Qin, Zhenyu Chen, Bin Luo:
PTM: A Topic Model for the Inferring of the Penalty. J. Comput. Sci. Technol. 33(4): 756-767 (2018) - [j16]Chuanyi Li, Liguo Huang, Jidong Ge, Bin Luo, Vincent Ng:
Automatically classifying user requests in crowdsourcing requirements engineering. J. Syst. Softw. 138: 108-123 (2018) - [j15]Lei Huang, Bin Luo:
Video-based salient object detection via spatio-temporal difference and coherence. Multim. Tools Appl. 77(9): 10685-10699 (2018) - [j14]Zhongjin Li, Jidong Ge, Haiyang Hu, Wei Song, Hao Hu, Bin Luo:
Cost and Energy Aware Scheduling Algorithm for Scientific Workflows with Deadline Constraint in Clouds. IEEE Trans. Serv. Comput. 11(4): 713-726 (2018) - [c59]Tieke He, Hao Lian, Zemin Qin, Zhipeng Zou, Bin Luo:
Word Embedding Based Document Similarity for the Inferring of Penalty. WISA 2018: 240-251 - [c58]Xuanyu Liu, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Monitoring User-Intent of Cloud-Based Networked Applications in Cognitive Networks. GLOBECOM 2018: 1-7 - [c57]Yixuan Dong, Yemao Zhou, Chuanyi Li, Jidong Ge, Yali Han, Mengting He, Dekuan Liu, Xiaoyu Zhou, Bin Luo:
Establish Evidence Chain Model on Chinese Criminal Judgment Documents Using Text Similarity Measure. ICPCSEE (2) 2018: 27-40 - [c56]Linxia Yao, Haojie Huang, Jidong Ge, Simeng Zhao, Peitang Ling, Ting Lei, Mengting He, Bin Luo:
The Construction Approach of Statutes Database. ICPCSEE (1) 2018: 140-150 - [c55]Zhongyue Li, Chuhan Zhuang, Jidong Ge, Chuanyi Li, Ting Lei, Peitang Ling, Mengting He, Bin Luo:
Predicting Statutes Based on Causes of Action and Content of Statutes. ICPCSEE (2) 2018: 477-492 - [c54]Li Kong, Chuanyi Li, Jidong Ge, Yufan Yang, Feifei Zhang, Bin Luo:
Construction of Microblog-Specific Chinese Sentiment Lexicon Based on Representation Learning. PRICAI (1) 2018: 204-216 - [c53]Yi Feng, Jidong Ge, Chuanyi Li, Li Kong, Feifei Zhang, Bin Luo:
Statutes Recommendation Using Classification and Co-occurrence Between Statutes. PRICAI 2018: 326-334 - [c52]Xiaosong Zhou, Chuanyi Li, Jidong Ge, Zhongjin Li, Xiaoyu Zhou, Bin Luo:
Automatically Classifying Chinese Judgment Documents Using Character-Level Convolutional Neural Networks. PRICAI 2018: 430-437 - [c51]Chuanyi Li, Jingjing Ye, Jidong Ge, Li Kong, Haiyang Hu, Bin Luo:
A Novel Convolutional Neural Network for Statutes Recommendation. PRICAI (1) 2018: 851-863 - [c50]Weiqiang Zhang, Zhenyu Chen, Bin Luo:
Does Socio-Technical Congruence Have an Effect on Continuous Integration Build Failures? An Empirical Study on 10 GitHub Projects. QRS 2018: 333-343 - [i1]Xiao Fu, Rui Yang, Xiaojiang Du, Bin Luo:
Timing Channel in IaaS: How to Identify and Investigate. CoRR abs/1804.01634 (2018) - 2017
- [j13]Zhongjin Li, Jidong Ge, Chuanyi Li, Hongji Yang, Haiyang Hu, Bin Luo, Victor Chang:
Energy cost minimization with job security guarantee in Internet data center. Future Gener. Comput. Syst. 73: 63-78 (2017) - [j12]Yingxin Cheng, Xiao Fu, Xiaojiang Du, Bin Luo, Mohsen Guizani:
A lightweight live memory forensic approach based on hardware virtualization. Inf. Sci. 379: 23-41 (2017) - [j11]Chuanyi Li, Jidong Ge, Liguo Huang, Haiyang Hu, Budan Wu, Hao Hu, Bin Luo:
Software cybernetics in BPM: Modeling software behavior as feedback for evolution by a novel discovery method based on augmented event logs. J. Syst. Softw. 124: 260-273 (2017) - [j10]Lei Huang, Bin Luo:
Tag refinement of micro-videos by learning from multiple data sources. Multim. Tools Appl. 76(19): 20341-20358 (2017) - [j9]Xiao Fu, Yun Gao, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Security Threats to Hadoop: Data Leakage Attacks and Investigation. IEEE Netw. 31(2): 67-71 (2017) - [c49]Yi Feng, Jidong Ge, Yemao Zhou, Chuanyi Li, Zhongjin Li, Xiaoyu Zhou, Bin Luo:
A Method of the Association Statistics between the Cause of Action and the Statutes. WISA 2017: 23-26 - [c48]Zemin Qin, Hao Lian, Tieke He, Bin Luo:
Cluster Correction on Polysemy and Synonymy. WISA 2017: 136-138 - [c47]Yuanliang Chen, Jidong Ge, Yi Feng, Yemao Zhou, Chuanyi Li, Zhongjin Li, Bin Luo:
Design and Implementation of Visual Modeling Tool for Evidence Chain. WISA 2017: 168-171 - [c46]Yufan Yang, Yi Feng, Jidong Ge, Yemao Zhou, Jin Zeng, Chuanyi Li, Bin Luo:
Checking the Statutes in Chinese Judgment Document Based on Editing Distance Algorithm. WISA 2017: 197-200 - [c45]Jin Zeng, Jidong Ge, Yemao Zhou, Yi Feng, Chuanyi Li, Zhongjin Li, Bin Luo:
Statutes Recommendation Based on Text Similarity. WISA 2017: 201-204 - [c44]Hao Lian, Zemin Qin, Tieke He, Bin Luo:
Knowledge Graph Construction Based on Judicial Data with Social Media. WISA 2017: 225-227 - [c43]Chuhan Zhuang, Yemao Zhou, Jidong Ge, Zhongjin Li, Chuanyi Li, Xiaoyu Zhou, Bin Luo:
Information Extraction from Chinese Judgment Documents. WISA 2017: 240-244 - [c42]Miaomiao Lei, Jidong Ge, Zhongjin Li, Chuanyi Li, Yemao Zhou, Xiaoyu Zhou, Bin Luo:
Automatically Classify Chinese Judgment Documents Utilizing Machine Learning Algorithms. DASFAA Workshops 2017: 3-17 - [c41]Jiayun Xie, Xiao Fu, Xiaojiang Du, Bin Luo, Mohsen Guizani:
AutoPatchDroid: A framework for patching inter-app vulnerabilities in android application. ICC 2017: 1-6 - [c40]Hao Ruan, Xiao Fu, Xuanyu Liu, Xiaojiang Du, Bin Luo:
Analyzing Android Application in Real-Time at Kernel Level. ICCCN 2017: 1-9 - [c39]Yue Wang, Jidong Ge, Yemao Zhou, Yi Feng, Chuanyi Li, Zhongjin Li, Xiaoyu Zhou, Bin Luo:
Topic Model Based Text Similarity Measure for Chinese Judgment Document. ICPCSEE (2) 2017: 42-54 - [c38]Siyuan Kong, Yemao Zhou, Jidong Ge, Zhongjin Li, Chuanyi Li, Yi Feng, Xiaoyu Zhou, Bin Luo:
Build Evidence Chain Relational Model Based on Chinese Judgment Documents. ICPCSEE (2) 2017: 94-107 - [c37]Feifei Zhang, Jidong Ge, Zhongjin Li, Chuanyi Li, Zifeng Huang, Li Kong, Bin Luo:
Task Offloading for Scientific Workflow Application in Mobile Cloud. IoTBDS 2017: 136-148 - [c36]Beibei Chao, Xiaoyan Zhao, Dapeng Shi, Guihuan Feng, Bin Luo:
Eyes Understand the Sketch!: Gaze-Aided Stroke Grouping of Hand-Drawn Flowcharts. IUI 2017: 79-83 - [c35]Lei Huang, Bin Luo:
Personalized Micro-Video Recommendation via Hierarchical User Interest Modeling. PCM (1) 2017: 564-574 - [c34]Yabin Wang, Tieke He, Weiqiang Zhang, Chunrong Fang, Bin Luo:
Exploring the Influence of Feature Selection Techniques on Bug Report Prioritization. SEKE 2017: 179-184 - [c33]Xuanyu Liu, Xiao Fu, Bin Luo, Xiaojiang Du:
Distributed Cloud Forensic System with Decentralization and Multi-participation. WICON 2017: 181-196 - 2016
- [j8]Zhongjin Li, Jidong Ge, Hongji Yang, Liguo Huang, Haiyang Hu, Hao Hu, Bin Luo:
A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds. Future Gener. Comput. Syst. 65: 140-152 (2016) - [j7]Chuanyi Li, Jidong Ge, Liguo Huang, Haiyang Hu, Budan Wu, Hongji Yang, Hao Hu, Bin Luo:
Process mining with token carried data. Inf. Sci. 328: 558-576 (2016) - [j6]Wei Wang, Eryu Ding, Bin Luo:
基于抽象状态的类的行为规格化方法 (Behavior Specification Method of Class Based on Abstract State). 计算机科学 43(Z6): 457-460 (2016) - [j5]Tieke He, Hongzhi Yin, Zhenyu Chen, Xiaofang Zhou, Shazia W. Sadiq, Bin Luo:
A Spatial-Temporal Topic Model for the Semantic Annotation of POIs in LBSNs. ACM Trans. Intell. Syst. Technol. 8(1): 12:1-12:24 (2016) - [c32]Xiaohan Song, Guihuan Feng, Bin Luo:
iReference: Make the Reference Details Under Your Nose. CCHI 2016: 4:1-4:5 - [c31]Lei Huang, Bin Luo:
Salient Object Detection via Video Spatio-Temporal Difference and Coherence. CIS 2016: 218-222 - [c30]Ziqi Wang, Rui Yang, Xiao Fu, Xiaojiang Du, Bin Luo:
A shared memory based cross-VM side channel attacks in IaaS cloud. INFOCOM Workshops 2016: 181-186 - [c29]Zhongjin Li, Jidong Ge, Chuanyi Li, Hongji Yang, Haiyang Hu, Bin Luo:
Energy Cost Minimization with Risk Rate Constraint for Internet Data Center in Deregulated Electricity Markets. IoTBD 2016: 407-418 - [c28]Rui Yang, Xiao Fu, Xiaojiang Du, Bin Luo:
Investigating Timing Channel in IaaS. MobiMedia 2016: 84-89 - 2015
- [j4]Quan Chen, Dapeng Shi, Guihuan Feng, Xiaoyan Zhao, Bin Luo:
基于语法描述语言的在线手绘流程图识别 (On-line Handwritten Flowchart Recognition Based on Grammar Description Language). 计算机科学 42(Z11): 113-118 (2015) - [j3]Xiao Fu, Xiaojiang Du, Bin Luo:
Data correlation-based analysis methods for automatic memory forensic. Secur. Commun. Networks 8(18): 4213-4226 (2015) - [c27]Mengyu Dou, Tieke He, Hongzhi Yin, Xiaofang Zhou, Zhenyu Chen, Bin Luo:
Predicting Passengers in Public Transportation Using Smart Card Data. ADC 2015: 28-40 - [c26]Tieke He, Hongzhi Yin, Zhenyu Chen, Xiaofang Zhou, Bin Luo:
Predicting Users' Purchasing Behaviors Using Their Browsing History. ADC 2015: 129-141 - [c25]Yun Gao, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Haddle: A Framework for Investigating Data Leakage Attacks in Hadoop. GLOBECOM 2015: 1-6 - [c24]Yiheng Duan, Xiao Fu, Bin Luo, Ziqi Wang, Jin Shi, Xiaojiang Du:
Detective: Automatically identify and analyze malware processes in forensic scenarios via DLLs. ICC 2015: 5691-5696 - [c23]Feng Liu, Chongjun Wang, Jidong Ge, Bin Luo:
PCFBPI: A Point Clustering Feature Based Policy Iteration Algorithm. ICTAI 2015: 119-124 - [c22]Xiao Fu, Xiaojiang Du, Bin Luo, Jin Shi, Zhitao Guan, Yuhua Wang:
Correlating processes for automatic memory evidence analysis. INFOCOM Workshops 2015: 115-120 - 2014
- [j2]Yabin Wang, Ruizhi Gao, Zhenyu Chen, W. Eric Wong, Bin Luo:
WAS: A weighted attribute-based strategy for cluster test selection. J. Syst. Softw. 98: 44-58 (2014) - [c21]Zhenyu Chen, Bin Luo:
Quasi-crowdsourcing testing for educational projects. ICSE Companion 2014: 272-275 - [c20]Yingxin Cheng, Xiao Fu, Bin Luo, Rui Yang, Hao Ruan:
Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensics. ISC 2014: 255-272 - [c19]Feng Liu, Bin Luo:
POPVI: A Probability-Based Optimal Policy Value Iteration Algorithm. PRICAI 2014: 627-639 - [c18]Zhenyu Chen, Atif M. Memon, Bin Luo:
Combining research and education of software testing: a preliminary study. SAC 2014: 1179-1180 - 2013
- [c17]Jian Zhang, Xiao Fu, Xiaojiang Du, Bin Luo, Zhihong Zhao:
A Method to Automatically Filter Log Evidences for Intrusion Forensics. ICDCS Workshops 2013: 39-44 - [c16]You Wang, Zhihao Zhao, Danni Wang, Guihuan Feng, Bin Luo:
How screen size influences Chinese readability. OZCHI 2013: 277-280 - [c15]Min Li, Zhiwei Jiang, Bin Luo, Jiubin Tang, Qing Gu, Daoxu Chen:
Product and User Dependent Social Network Models for Recommender Systems. PAKDD (2) 2013: 13-24 - [c14]Zebao Gao, Zhenyu Chen, Yang Feng, Bin Luo:
Mining Sequential Patterns of Predicates for Fault Localization and Understanding. SERE 2013: 109-118 - [c13]Huan Yang, Jidong Ge, Quanjiang Yu, Chuanyi Li, Zhihong Zhao, Hao Hu, Bin Luo:
A Task Selecting Algorithm for Personal Schedules in Workflow Systems. WISE Workshops 2013: 133-143 - 2012
- [j1]Dongyi Wang, JiDong Ge, Hao Hu, Bin Luo, LiGuo Huang:
Discovering process models from event multiset. Expert Syst. Appl. 39(15): 11970-11978 (2012) - [c12]Guihuan Feng, Bin Luo:
An Experience of Teaching HCI to Undergraduate Software Engineering Students. CSEE&T 2012: 125-129 - [c11]Yabin Wang, Zhenyu Chen, Yang Feng, Bin Luo, Yijie Yang:
Using Weighted Attributes to Improve Cluster Test Selection. SERE 2012: 138-146 - 2011
- [c10]Zhenyu Chen, Jinyu Zhang, Bin Luo:
Teaching software testing methods based on diversity principles. CSEE&T 2011: 391-395 - [c9]Dong Shao, Bin Luo, Eryu Ding, Qin Liu:
An introductory software engineering course for software engineering program. CSEE&T 2011: 411-415 - [c8]Eryu Ding, Bin Luo, Daliang Zhang, JiDong Ge, Dong Shao, Haoran Wang:
Research and practice on software engineering undergraduate curriculum NJU-SEC2006. CSEE&T 2011: 492-496 - [c7]Dongyi Wang, JiDong Ge, Hao Hu, Bin Luo:
A New Process Mining Algorithm Based on Event Type. DASC 2011: 1144-1151 - [c6]Dongjiang You, Zhenyu Chen, Baowen Xu, Bin Luo, Chen Zhang:
An empirical study on the effectiveness of time-aware test case prioritization techniques. SAC 2011: 1451-1456
2000 – 2009
- 2009
- [c5]JiDong Ge, Baoliu Ye, Xianglin Fei, Bin Luo:
A Novel Practical Framework for Operating Systems Teaching. ScalCom-EmbeddedCom 2009: 596-601 - 2007
- [c4]Yu Zhou, Jian Pan, Xiaoxing Ma, Bin Luo, XianPing Tao, Jian Lu:
Applying ontology in architecture-based self-management applications. SAC 2007: 97-103 - 2005
- [c3]Chang Su, Yang Gao, Jianmei Yang, Bin Luo:
An Efficient Adaptive Focused Crawler Based on Ontology Learning. HIS 2005: 73-78 - [c2]Wu-Jun Li, Bin Luo, Chong-Jun Wang, Xiang-Ping Zhong, Zhaoqian Chen:
A Multiple Eigenspaces Constructing Method and Its Application to Face Recognition. ICNC (2) 2005: 55-64 - [c1]Wu-Jun Li, Chong-Jun Wang, Dianxiang Xu, Bin Luo, Zhaoqian Chen:
A Study on Illumination Invariant Face Recognition Methods Based on Multiple Eigenspaces. ISNN (2) 2005: 131-136
Coauthor Index
aka: JiDong Ge
aka: Liguo Huang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint