1969年8月出生,2001获得南京大学博士学位,2001-2003分别在芬兰、挪威和荷兰等地进行博士后研究工作。 2004年2月至今东南大学计算机科学与工程学院二级教授、博士生导师,东南大学软件工程研究所所长。2006年入选教育部新世纪人才培养计划、2011年度中创软件人才奖获得者、2次获得教育部科学技术奖(自然科学奖)二等奖。入选江苏省“青蓝工程”、“333工程”、“六大人才高峰”等人才计划。研究方向为智能软件开发与运维、软件缺陷检测与质量提升、软件安全与可信保障。从1999年开始,先后主持国家级、省部级项目以及大型企业合作项目40多项, 在《China Science:Information Science》、《ACM Transactions on Software Engineering and Methodology》、《ACM Transactions on Privacy and Security》、《ACM Computing Surveys》、《IEEE Transactions on Dependable and Secure Computing》、《IEEE Transactions on Reliability》、《IEEE Transactions on Network Science and Engineering》、《IEEE Transactions on Network and Service Management》、《Information and Software Technology》、《Software Testing, Verification and Reliability》、《Journal of Systems and Software》《Journal of Computer Science and Technology》, 《软件学报》、《计算机学报》、《计算机研究与发展》等国内外著名期刊和重要国际会议发表学术论文200余篇,出版专著3部,教材1部,获得授权发明专利60余项。
软件系统安全保障:1)区块链供应链系统的安全保障,包括智能合约安全、共识协议安全、隐私安全以及系统韧性等方面;2)软件架构的安全保障,包括软件架构安全评估和防御、软件架构韧性评估和增强等方面。[国家级和省部级]
软件缺陷自动检测、定位和修复:包括基于深度学习和大模型的软件缺陷自动检测、定位和修复等关键技术研究和实验研究。[国家级和省部级]
代表性期刊论文
***ACM/IEEE Trans, CCF A 和 JCR Q1***
Tianyuan Hu, Jingyue Li, Bixin Li, and Andre Storhaug: Why Smart Contracts Reported as Vulnerable Were not Exploited? IEEE Transactions on Dependable and Secure Computing, in press, IF=7.0, JCR Q1, CCF A.
Ruilin Xie, Xiang Chen, Qifan He, Bixin Li, Zhanqi Cui: IATT: Interpretation Analysis based Transferable Test Generation for Convolutional Neural Networks. ACM Transactions on Software Engineering and Methodology, in press, IF=4.4, JCR Q1, CCF A.
Dongyu Cao, Jiahao He, Bixin Li, and Lulu Wang et al: TrustFabric: A Privacy-preserving Method for Hyperledger Fabric Using Trusted Execution Environment. ACM Transactions on Privacy and Security, in press, IF=3.0, JCR Q2.
Bixin Li, Zhenyu Pan, Tianyuan Hu: EvoFuzzer: An Evolutionary Fuzzer for Detecting Reentrancy Vulnerability in Smart Contracts. IEEE Transactions on Network Science and Engineering, 2024, Early Access Article. IF=6.6, JCR Q1.
Yingying Chen, Bixin Li, Yan Xiao, Xiaoning Du. PonziFinder: Attention-Based Edge-Enhanced Ponzi Contract Detection, IEEE Transactions on Reliability, 2024, Early Access Article. IF=5.9, JCR Q1.
Tianyuan Hu, Bixin Li, Zhenyu Pan, Chen Qian: Detect Defects of Solidity Smart Contract Based on the Knowledge Graph. IEEE Transactions on Reliability, 73(1): 186-202 (2024). IF=5.9, JCR Q1.
Bixin Li, Zhenyu Pan, Tianyuan Hu: ReDefender: Detecting Reentrancy Vulnerabilities in Smart Contracts Automatically. IEEE Transactions on Reliability, 71(2): 984-999 (2022). IF=5.9, JCR Q1.
Xianglong Kong, Weina Han, Li Liao, Bixin Li: An Analysis of Correctness for API Recommendation: Are the Unmatched Results Useless? Science China: Information Science, 63(9): 1-15 (2020). IF=7.3, JCR Q1, CCF A.
Lulu Wang, Bixin Li, Hareton Leung: A new method to encode calling contexts with recursions. Science China: Information Science, 59(5): 052104:1-052104:15 (2016). IF=7.3, JCR Q1, CCF A.
Bixin Li, Li Liao, Hareton Leung, Rui Song: PHAT: A Preference and Honesty Aware Trust Model for Web Services. IEEE Transaction on Network and Service Management, 11(3): 363-375 (2014). IF=6.6, JCR Q1.
Bixin Li, Lulu Wang, Hareton Leung: Profiling Selected Paths with Loops. Science China: Information Science, 57(7): 1-15 (2014). IF=7.3, JCR Q1, CCF A.
Dong Qiu, Bixin Li, Shunhui Ji, Hareton K. N. Leung: Regression Testing of Web Service: A Systematic Mapping Study. ACM Computing Surveys, 47(2): 21:1-21:46 (2014). IF=23.8, JCR Q1.
Bixin Li, Shunhui Ji, Dong Qiu, Hareton Leung, Gongyuan Zhang: Verifying the Concurrent Properties in BPEL Based Web Service Composition Process. IEEE Transaction on Network and Service Management, 10(4): 410-424 (2013). IF=6.6, JCR Q1.
Bixin Li, Qiandong Zhang, Xiaobing Sun, Hareton Leung: Using Water Wave Propagation Phenomenon to Study Software Change Impact Analysis. Advance in Engineering Software, 58: 45-53 (2013). IF=4.8, JCR Q1.
Bixin Li, Xiaobing Sun, Hareton Leung: Combining Concept Lattice with Call Graph for Impact Analysis. Advance in Engineering Software, 53: 1-13 (2012). IF=4.8, JCR Q1.
***CCF B 和 JCR Q2***
Dongyu Cao, Hao Yin, Bixin Li. A Random Mixing Scheme for Protecting Transaction Privacy on Ethereum. Journal of Computer Sceince and Technology, 2024, Early Access Article. IF=1.7, JCR Q2.
Tianyuan Hu, Jingyue Li, Xiangfei Xu, Bixin Li. SoliTester: Detecting Exploitable External-risky Vulnerability in Smart Contracts using Contract Account Triggering Method. Journal of Software: Evolution and Process, 36(7):1-22 (2024). IF=3.8, JCR Q2.
Tong Wang, Bixin Li: EsArCost: Estimating Repair Costs of Software Architecture Erosion using Slice Technology. Journal of System and Software, 208: 111875 (2024). IF=3.8, JCR Q2.
Jiaxin Pan, Zixuan Liu, Donglin Li, Lulu Wang, Bixin Li: An Empirical Study of Software Architecture Resilience Evaluation Methods. Journal of System and Software, 202: 111726 (2023). IF=3.8, JCR Q2.
Lulu Wang, Peng Hu, Xianglong Kong, Wenjie Ouyang, and Bixin Li et al.: Microservice Architecture Recovery based on Intra-service and Inter-service Features. Journal of System and Software, 204: 111754 (2023). IF=3.8, JCR Q2.
Qihao Bao, Bixin Li, Tianyuan Hu, Xueyong Sun: A Survey of Blockchain Consensus Safety and Security: State-of-the-Art, Challenges, and Future work. Journal of System and Software, 196: 111555 (2023). IF=3.8, JCR Q2.
Lulu Wang, Bixin Li, Xianglong Kong: Type Slicing: An Accurate Object Oriented Slicing based on Sub-statement Level Dependence Graph. Information and Software Technololy, 127: 106369 (2020). IF=3.9, JCR Q2.
Lulu Wang, Jingyue Li, Bixin Li: Tracking runtime concurrent dependences in Java threads using thread control profiling.
Journal of System and Software, 148: 116-131 (2019). IF=3.8, JCR Q2.
Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li: The impacts of techniques, programs and tests on automated program repair: An empirical study. Journal of System and Software, 137: 480-496 (2018). IF=3.8, JCR Q2.
Zecheng Li, Li Liao, Hareton Leung, Bixin Li, Chao Li: Evaluating the credibility of cloud services. Computer & Electrical Engineering, 58: 161-175 (2017). IF=4.0, JCR Q2.
Dong Qiu, Bixin Li, Hareton Leung: Understanding the API usage in Java. Information and Software Technology, 73: 81-100 (2016). IF=2.9, JCR Q2.
Fei Liu, Bixin Li, Rupesh Nasre: Efficient Online Cycle Detection Technique Combining with Steensgaard Points-to Information. Software - Practice and Experience, 46(5): 601-623 (2016). IF=2.1, JCR Q2
Xiaobing Sun, Bixin Li, and Hareton K. N. Leung, et al.: MSR4SM: Using Topic Models to Effectively Mining Software Repositories for Software Maintenance Tasks. Information and Software Technology, 66: 1-12 (2015). IF=3.9, JCR Q2.
Xiaobing Sun, Hareton Leung, Bin Li, Bixin Li: Change Impact Analysis and Changeability Assessment for a Change Proposal: An Empirical Study. Journal of System and Software, 96: 51-60 (2014). IF=3.8, JCR Q2.
Bixin Li, Xiaobing Sun, Jacky Keung: FCA-CIA: An Approach of Using FCA to Support Cross-Level Change Impact Analysis for Object-Oriented Java Programs. Information and Software Technology, 55(8): 1437-1449 (2013). IF=3.9, JCR Q2.
Bixin Li, Xiaobing Sun, Hareton Leung, Sai Zhang: A Survey of Code-Based Change Impact Analysis Techniques. Software Test, Verification and Reliability, 23(8): 613-646 (2013). IF=1.5, JCR Q2.
Bixin Li, Dong Qiu, Hareton Leung, Di Wang: Automatic Test Case Selection for Regression Testing of Composite Service Based on Extensible BPEL Flow Graph. Journal of System and Software, 85(6): 1300-1324 (2012). IF=3.8, JCR Q2.
Bixin Li, Lulu Wang, Hareton Leung, Fei Liu: Profiling All Paths: A New Profiling Technique for Both Cyclic and Acyclic Paths. Journal of System and Software, 85(7): 1558-1576 (2012). IF=3.8, JCR Q2.
Pengcheng Zhang, Bixin Li, Lars Grunske: Timed Property Sequence Chart. Journal of System and Software, 83(3): 371-390 (2010). IF=3.8, JCR Q2.
Pengcheng Zhang, Henry Muccini, Bixin Li: A Classification and Comparison of Model Checking Software Architecture Techniques. Journal of System and Software, 83(5): 723-744 (2010). IF=3.8, JCR Q2.
Bixin Li, Xiaocong Fan, Jun Pang, Jianjun Zhao: A Model for Slicing JAVA Programs Hierarchically. Journal of Computer Sceince and Technology, 19(6): 848-858 (2004). IF=1.7, JCR Q2.
Bixin Li: A Technique to Analyze Information-Flow in Object-Oriented Programs. Information and Software Technology, 45(6): 305-314 (2003). IF=3.9, JCR Q2.