Finding a needle in a haystack: Automated mining of silent vulnerability fixes J Zhou, M Pacheco, Z Wan, X Xia, D Lo, Y Wang, AE Hassan 2021 36th IEEE/ACM International Conference on Automated Software …, 2021 | 89 | 2021 |
Bounties on technical Q&A sites: a case study of Stack Overflow bounties J Zhou, S Wang, CP Bezemer, AE Hassan Empirical Software Engineering 25, 139-177, 2020 | 38 | 2020 |
Studying the association between bountysource bounties and the issue-addressing likelihood of github issue reports J Zhou, S Wang, CP Bezemer, Y Zou, AE Hassan IEEE Transactions on Software Engineering 47 (12), 2919-2933, 2020 | 29 | 2020 |
Automated unearthing of dangerous issue reports S Pan, J Zhou, FR Cogo, X Xia, L Bao, X Hu, S Li, AE Hassan Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022 | 18 | 2022 |
Colefunda: Explainable silent vulnerability fix identification J Zhou, M Pacheco, J Chen, X Hu, X Xia, D Lo, AE Hassan 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023 | 17 | 2023 |
Studying donations and their expenses in open source projects: a case study of GitHub projects collecting donations through open collectives J Zhou, S Wang, Y Kamei, AE Hassan, N Ubayashi Empirical Software Engineering 27, 1-38, 2022 | 11 | 2022 |
Multi-granularity detector for vulnerability fixes TG Nguyen, T Le-Cong, HJ Kang, R Widyasari, C Yang, Z Zhao, B Xu, ... IEEE Transactions on Software Engineering 49 (8), 4035-4057, 2023 | 10 | 2023 |
Studying backers and hunters in bounty issue addressing process of open source projects J Zhou, S Wang, H Zhang, TH Chen, AE Hassan Empirical Software Engineering 26 (4), 81, 2021 | 10 | 2021 |
Towards More Practical Automation of Vulnerability Assessment S Pan, L Bao, J Zhou, X Hu, X Xia, S Li Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024 | 4 | 2024 |
MoEVD: Enhancing Vulnerability Detection by Mixture-of-Experts (MoE) X Yang, S Wang, J Zhou, W Zhu arXiv preprint arXiv:2501.16454, 2025 | | 2025 |
Code Change Intention, Development Artifact and History Vulnerability: Putting Them Together for Vulnerability Fix Detection by LLM X Yang, W Zhu, M Pacheco, J Zhou, S Wang, X Hu, K Liu arXiv preprint arXiv:2501.14983, 2025 | | 2025 |
Similar but Patched Code Considered Harmful--The Impact of Similar but Patched Code on Recurring Vulnerability Detection and How to Remove Them Z Tan, J Zhou, X Hu, S Pan, K Liu, X Xia arXiv preprint arXiv:2412.20740, 2024 | | 2024 |
An Empirical Study of Automatic Program Repair Techniques for Injection Vulnerabilities T Zhu, T Xu, K Liu, J Zhou, X Hu, X Xia, T Zhang, D Lo 2024 IEEE International Conference on Software Maintenance and Evolution …, 2024 | | 2024 |
VFDelta: A Framework for Detecting Silent Vulnerability Fixes by Enhancing Code Change Learning X Yang, S Wang, J Zhou, X Hu arXiv preprint arXiv:2409.16606, 2024 | | 2024 |
Silent Taint-Style Vulnerability Fixes Identification Z Wen, J Zhou, M Pan, S Wang, X Hu, T Xu, T Zhang, X Li Proceedings of the 33rd ACM SIGSOFT International Symposium on Software …, 2024 | | 2024 |
Unveil the Mystery of Critical Software Vulnerabilities S Pan, L Bao, J Zhou, X Hu, X Xia, S Li Companion Proceedings of the 32nd ACM International Conference on the …, 2024 | | 2024 |
STUDYING THE USE OF EXTRINSIC INCENTIVES TO SUPPORT CROWDSOURCED SOFTWARE ENGINEERING ACTIVITIES J Zhou | | 2020 |
ISSRE 2022 Industry Track Committee U Thakore, M Rahman, X Xia, CKS Yim, A Pan, A Pecchia, C Mahmoudi, ... | | |