代表性期刊论文
***ACM/IEEE Trans, CCF A 和 JCR Q1***
Tianyuan Hu, Jingyue Li, Bixin Li, and Andre Storhaug: Why Smart Contracts Reported as Vulnerable Were not Exploited? IEEE Transactions on Dependable and Secure Computing, in press, IF=7.0, JCR Q1, CCF A.
Ruilin Xie, Xiang Chen, Qifan He, Bixin Li, Zhanqi Cui: IATT: Interpretation Analysis based Transferable Test Generation for Convolutional Neural Networks. ACM Transactions on Software Engineering and Methodology, in press, IF=4.4, JCR Q1, CCF A.
Dongyu Cao, Jiahao He, Bixin Li, and Lulu Wang et al: TrustFabric: A Privacy-preserving Method for Hyperledger Fabric Using Trusted Execution Environment. ACM Transactions on Privacy and Security, in press, IF=3.0, JCR Q2.
Bixin Li, Zhenyu Pan, Tianyuan Hu: EvoFuzzer: An Evolutionary Fuzzer for Detecting Reentrancy Vulnerability in Smart Contracts. IEEE Transactions on Network Science and Engineering, 2024, Early Access Article. IF=6.6, JCR Q1.
Yingying Chen, Bixin Li, Yan Xiao, Xiaoning Du. PonziFinder: Attention-Based Edge-Enhanced Ponzi Contract Detection, IEEE Transactions on Reliability, 2024, Early Access Article. IF=5.9, JCR Q1.
Tianyuan Hu, Bixin Li, Zhenyu Pan, Chen Qian: Detect Defects of Solidity Smart Contract Based on the Knowledge Graph. IEEE Transactions on Reliability, 73(1): 186-202 (2024). IF=5.9, JCR Q1.
Bixin Li, Zhenyu Pan, Tianyuan Hu: ReDefender: Detecting Reentrancy Vulnerabilities in Smart Contracts Automatically. IEEE Transactions on Reliability, 71(2): 984-999 (2022). IF=5.9, JCR Q1.
Xianglong Kong, Weina Han, Li Liao, Bixin Li: An Analysis of Correctness for API Recommendation: Are the Unmatched Results Useless? Science China: Information Science, 63(9): 1-15 (2020). IF=7.3, JCR Q1, CCF A.
Lulu Wang, Bixin Li, Hareton Leung: A new method to encode calling contexts with recursions. Science China: Information Science, 59(5): 052104:1-052104:15 (2016). IF=7.3, JCR Q1, CCF A.
Bixin Li, Li Liao, Hareton Leung, Rui Song: PHAT: A Preference and Honesty Aware Trust Model for Web Services. IEEE Transaction on Network and Service Management, 11(3): 363-375 (2014). IF=6.6, JCR Q1.
Bixin Li, Lulu Wang, Hareton Leung: Profiling Selected Paths with Loops. Science China: Information Science, 57(7): 1-15 (2014). IF=7.3, JCR Q1, CCF A.
Dong Qiu, Bixin Li, Shunhui Ji, Hareton K. N. Leung: Regression Testing of Web Service: A Systematic Mapping Study. ACM Computing Surveys, 47(2): 21:1-21:46 (2014). IF=23.8, JCR Q1.
Bixin Li, Shunhui Ji, Dong Qiu, Hareton Leung, Gongyuan Zhang: Verifying the Concurrent Properties in BPEL Based Web Service Composition Process. IEEE Transaction on Network and Service Management, 10(4): 410-424 (2013). IF=6.6, JCR Q1.
Bixin Li, Qiandong Zhang, Xiaobing Sun, Hareton Leung: Using Water Wave Propagation Phenomenon to Study Software Change Impact Analysis. Advance in Engineering Software, 58: 45-53 (2013). IF=4.8, JCR Q1.
Bixin Li, Xiaobing Sun, Hareton Leung: Combining Concept Lattice with Call Graph for Impact Analysis. Advance in Engineering Software, 53: 1-13 (2012). IF=4.8, JCR Q1.
***CCF B 和 JCR Q2***
Dongyu Cao, Hao Yin, Bixin Li. A Random Mixing Scheme for Protecting Transaction Privacy on Ethereum. Journal of Computer Sceince and Technology, 2024, Early Access Article. IF=1.7, JCR Q2.
Tianyuan Hu, Jingyue Li, Xiangfei Xu, Bixin Li. SoliTester: Detecting Exploitable External-risky Vulnerability in Smart Contracts using Contract Account Triggering Method. Journal of Software: Evolution and Process, 36(7):1-22 (2024). IF=3.8, JCR Q2.
Tong Wang, Bixin Li: EsArCost: Estimating Repair Costs of Software Architecture Erosion using Slice Technology. Journal of System and Software, 208: 111875 (2024). IF=3.8, JCR Q2.
Jiaxin Pan, Zixuan Liu, Donglin Li, Lulu Wang, Bixin Li: An Empirical Study of Software Architecture Resilience Evaluation Methods. Journal of System and Software, 202: 111726 (2023). IF=3.8, JCR Q2.
Lulu Wang, Peng Hu, Xianglong Kong, Wenjie Ouyang, and Bixin Li et al.: Microservice Architecture Recovery based on Intra-service and Inter-service Features. Journal of System and Software, 204: 111754 (2023). IF=3.8, JCR Q2.
Qihao Bao, Bixin Li, Tianyuan Hu, Xueyong Sun: A Survey of Blockchain Consensus Safety and Security: State-of-the-Art, Challenges, and Future work. Journal of System and Software, 196: 111555 (2023). IF=3.8, JCR Q2.
Lulu Wang, Bixin Li, Xianglong Kong: Type Slicing: An Accurate Object Oriented Slicing based on Sub-statement Level Dependence Graph. Information and Software Technololy, 127: 106369 (2020). IF=3.9, JCR Q2.
Lulu Wang, Jingyue Li, Bixin Li: Tracking runtime concurrent dependences in Java threads using thread control profiling.
Journal of System and Software, 148: 116-131 (2019). IF=3.8, JCR Q2.
Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li: The impacts of techniques, programs and tests on automated program repair: An empirical study. Journal of System and Software, 137: 480-496 (2018). IF=3.8, JCR Q2.
Zecheng Li, Li Liao, Hareton Leung, Bixin Li, Chao Li: Evaluating the credibility of cloud services. Computer & Electrical Engineering, 58: 161-175 (2017). IF=4.0, JCR Q2.
Dong Qiu, Bixin Li, Hareton Leung: Understanding the API usage in Java. Information and Software Technology, 73: 81-100 (2016). IF=2.9, JCR Q2.
Fei Liu, Bixin Li, Rupesh Nasre: Efficient Online Cycle Detection Technique Combining with Steensgaard Points-to Information. Software - Practice and Experience, 46(5): 601-623 (2016). IF=2.1, JCR Q2
Xiaobing Sun, Bixin Li, and Hareton K. N. Leung, et al.: MSR4SM: Using Topic Models to Effectively Mining Software Repositories for Software Maintenance Tasks. Information and Software Technology, 66: 1-12 (2015). IF=3.9, JCR Q2.
Xiaobing Sun, Hareton Leung, Bin Li, Bixin Li: Change Impact Analysis and Changeability Assessment for a Change Proposal: An Empirical Study. Journal of System and Software, 96: 51-60 (2014). IF=3.8, JCR Q2.
Bixin Li, Xiaobing Sun, Jacky Keung: FCA-CIA: An Approach of Using FCA to Support Cross-Level Change Impact Analysis for Object-Oriented Java Programs. Information and Software Technology, 55(8): 1437-1449 (2013). IF=3.9, JCR Q2.
Bixin Li, Xiaobing Sun, Hareton Leung, Sai Zhang: A Survey of Code-Based Change Impact Analysis Techniques. Software Test, Verification and Reliability, 23(8): 613-646 (2013). IF=1.5, JCR Q2.
Bixin Li, Dong Qiu, Hareton Leung, Di Wang: Automatic Test Case Selection for Regression Testing of Composite Service Based on Extensible BPEL Flow Graph. Journal of System and Software, 85(6): 1300-1324 (2012). IF=3.8, JCR Q2.
Bixin Li, Lulu Wang, Hareton Leung, Fei Liu: Profiling All Paths: A New Profiling Technique for Both Cyclic and Acyclic Paths. Journal of System and Software, 85(7): 1558-1576 (2012). IF=3.8, JCR Q2.
Pengcheng Zhang, Bixin Li, Lars Grunske: Timed Property Sequence Chart. Journal of System and Software, 83(3): 371-390 (2010). IF=3.8, JCR Q2.
Pengcheng Zhang, Henry Muccini, Bixin Li: A Classification and Comparison of Model Checking Software Architecture Techniques. Journal of System and Software, 83(5): 723-744 (2010). IF=3.8, JCR Q2.
Bixin Li, Xiaocong Fan, Jun Pang, Jianjun Zhao: A Model for Slicing JAVA Programs Hierarchically. Journal of Computer Sceince and Technology, 19(6): 848-858 (2004). IF=1.7, JCR Q2.
Bixin Li: A Technique to Analyze Information-Flow in Object-Oriented Programs. Information and Software Technology, 45(6): 305-314 (2003). IF=3.9, JCR Q2.