代表性期刊论文
Can Zhao, Jiaxin Pan, Bixin Li. SA.Resilience.Evaluator: Evaluate the Resilience of Software Architecture Based on Attack Surface Analysis. IEEE Transactions on Reliability (in press), 2025. IF=5.9, JCR Q1.
Zhihao Xu, Bixin Li, Xiaoning Du, Lulu Wang, Li Liao, and Ying Zhou. TRAGIC: Test Oracle Generation for ISA Compliance Testing via Large Language Model. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (Early Access ). DOI: 10.1109/TCAD.2025.3632771(2025). IF=2.8, JCR Q1, CCF A.
Bixin Li, Tianyuan Hu, Xiangfei Xu, and Lulu Wang. VulFinder: Exploring Chaincode Vulnerabilities More Effectively and Efficiently Using Knowledge Graph Based Defect Pattern Matching. IEEE Transactions on Software Engineering (Early Access ). DOI: 10.1109/TSE.2025.3605379 (2025). IF=5.6, JCR Q1, CCF A.
Tianyuan Hu, Jingyue Li, Bixin Li, and Andre Storhaug: Why Smart Contracts Reported as Vulnerable Were not Exploited? IEEE Transactions on Dependable and Secure Computing, 22(3):2579-2596 (2025). IF=7.0, JCR Q1, CCF A.
Ruilin Xie, Xiang Chen, Qifan He, Bixin Li, Zhanqi Cui: IATT: Interpretation Analysis based Transferable Test Generation for Convolutional Neural Networks. ACM Transactions on Software Engineering and Methodology, 34(4): 1-34 (2025). IF=4.4, JCR Q1, CCF A.
Qihao Bao,Bixin Li,Yujun Wang,and Dongyu Cao.How do Characteristic Parameters Affect the Security of Proof-of-Work Blockchain? IEEE Transaction on Network and Service Management, 22(5):4636-4650 (2025). IF=6.6, JCR Q1.
Yingying Chen, Bixin Li, Yan Xiao, Xiaoning Du. PonziFinder: Attention-Based Edge-Enhanced Ponzi Contract Detection, IEEE Transactions on Reliability, 74(1): 2305-2319 (2025). IF=5.9, JCR Q1.
Bixin Li, Zhenyu Pan, Tianyuan Hu: EvoFuzzer: An Evolutionary Fuzzer for Detecting Reentrancy Vulnerability in Smart Contracts. IEEE Transactions on Network Science and Engineering, 11(6): 5790-5802 (2024). IF=6.6, JCR Q1.
Tianyuan Hu, Bixin Li, Zhenyu Pan, Chen Qian: Detect Defects of Solidity Smart Contract Based on the Knowledge Graph. IEEE Transactions on Reliability, 73(1): 186-202 (2024). IF=5.9, JCR Q1.
Tong Wang, Bixin Li: EsArCost: Estimating Repair Costs of Software Architecture Erosion using Slice Technology. Journal of System and Software, 208: 111875 (2024). IF=4.1, JCR Q1.
Jiaxin Pan, Zixuan Liu, Donglin Li, Lulu Wang, Bixin Li: An Empirical Study of Software Architecture Resilience Evaluation Methods. Journal of System and Software, 202: 111726 (2023). IF=4.1, JCR Q1.
Lulu Wang, Peng Hu, Xianglong Kong, Wenjie Ouyang, and Bixin Li et al.: Microservice Architecture Recovery based on Intra-service and Inter-service Features. Journal of System and Software, 204: 111754 (2023). IF=4.1, JCR Q1.
Qihao Bao, Bixin Li, Tianyuan Hu, Xueyong Sun: A Survey of Blockchain Consensus Safety and Security: State-of-the-Art, Challenges, and Future work. Journal of System and Software, 196: 111555 (2023). IF=4.1, JCR Q1.
Bixin Li, Zhenyu Pan, Tianyuan Hu: ReDefender: Detecting Reentrancy Vulnerabilities in Smart Contracts Automatically. IEEE Transactions on Reliability, 71(2): 984-999 (2022). IF=5.9, JCR Q1.
Xianglong Kong, Weina Han, Li Liao, Bixin Li: An Analysis of Correctness for API Recommendation: Are the Unmatched Results Useless? Science China: Information Science, 63(9): 1-15 (2020). IF=7.3, JCR Q1, CCF A.
Lulu Wang, Jingyue Li, Bixin Li: Tracking Runtime Concurrent Dependences in Java Threads using Thread Control Profiling. Journal of System and Software, 148: 116-131 (2019). IF=4.1, JCR Q1.
Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li: The Impacts of Techniques, Programs and Tests on Automated Program Repair: An Empirical Study. Journal of System and Software, 137: 480-496 (2018). IF=3.8, JCR Q2.
Lulu Wang, Bixin Li, Hareton Leung: A new method to encode calling contexts with recursions. Science China: Information Science, 59(5): 052104:1-052104:15 (2016). IF=7.3, JCR Q1, CCF A.
Xiaobing Sun, Hareton Leung, Bin Li, Bixin Li: Change Impact Analysis and Changeability Assessment for a Change Proposal: An Empirical Study. Journal of System and Software, 96: 51-60 (2014). IF=4.1, JCR Q1.
Bixin Li, Lulu Wang, Hareton Leung: Profiling Selected Paths with Loops. Science China: Information Science, 57(7): 1-15 (2014). IF=7.3, JCR Q1, CCF A.
Dong Qiu, Bixin Li, Shunhui Ji, Hareton K. N. Leung: Regression Testing of Web Service: A Systematic Mapping Study. ACM Computing Surveys, 47(2): 21:1-21:46 (2014). IF=23.8, JCR Q1.
Bixin Li, Li Liao, Hareton Leung, Rui Song: PHAT: A Preference and Honesty Aware Trust Model for Web Services. IEEE Transaction on Network and Service Management, 11(3): 363-375 (2014). IF=6.6, JCR Q1.
Bixin Li, Shunhui Ji, Dong Qiu, Hareton Leung, Gongyuan Zhang: Verifying the Concurrent Properties in BPEL Based Web Service Composition Process. IEEE Transaction on Network and Service Management, 10(4): 410-424 (2013). IF=6.6, JCR Q1.
Bixin Li, Qiandong Zhang, Xiaobing Sun, Hareton Leung: Using Water Wave Propagation Phenomenon to Study Software Change Impact Analysis. Advance in Engineering Software, 58: 45-53 (2013). IF=4.8, JCR Q1.
Bixin Li, Xiaobing Sun, Hareton Leung: Combining Concept Lattice with Call Graph for Impact Analysis. Advance in Engineering Software, 53: 1-13 (2012). IF=4.8, JCR Q1.
Bixin Li, Dong Qiu, Hareton Leung, Di Wang: Automatic Test Case Selection for Regression Testing of Composite Service Based on Extensible BPEL Flow Graph. Journal of System and Software, 85(6): 1300-1324 (2012). IF=4.1, JCR Q1.
Bixin Li, Lulu Wang, Hareton Leung, Fei Liu: Profiling All Paths: A New Profiling Technique for Both Cyclic and Acyclic Paths. Journal of System and Software, 85(7): 1558-1576 (2012). IF=4.1, JCR Q1.
Pengcheng Zhang, Bixin Li, Lars Grunske: Timed Property Sequence Chart. Journal of System and Software, 83(3): 371-390 (2010). IF=4.1, JCR Q1.
Pengcheng Zhang, Henry Muccini, Bixin Li: A Classification and Comparison of Model Checking Software Architecture Techniques. Journal of System and Software, 83(5): 723-744 (2010). IF=4.1, JCR Q1.
代表性会议论文
Zaixing Zhang, Jianming Chang, Tianyuan Hu, Lulu Wang, Bixin Li: Towards Task-Harmonious Vulnerability Assessment Based on LLM. ICPC 2025: 49-59. CCF B
Mei Han, Lulu Wang, Jianming Chang, Bixin Li, Chunguang Zhang: Learning Graph-based Patch Representations for Identifying and Assessing Silent Vulnerability Fixes. ISSRE 2024: 120-131. CCF B
Xinyun Cheng, Xianglong Kong, Li Liao, Bixin Li: A Combined Method for Usage of NLP Libraries Towards Analyzing Software Documents. CAiSE 2020: 515-529. CCF B
Renhao Xiong, David Lo, Bixin Li: Distinguishing Similar Design Pattern Instances through Temporal Behavior Analysis. SANER 2020: 296-307. CCF B
Rensong Xie, Xianglong Kong, Lulu Wang, Ying Zhou, Bixin Li: HiRec: API Recommendation using Hierarchical Context. ISSRE 2019: 369-379. CCF B
Tong Wang, Dongdong Wang, Ying Zhou, Bixin Li: Software Multiple-Level Change Detection Based on Two-Step MPAT Matching. SANER 2019: 4-14. CCF B
Renhao Xiong, Bixin Li Accurate Design Pattern Detection Based on Idiomatic Implementation Matching in Java Language Context. SANER 2019: 163-174. CCF B
Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li: Experience Report: How do Techniques, Programs, and Tests Impact Automated Program Repair? ISSRE 2015: 194-204. CCF B
Dong Qiu, Bixin Li, Zhendong Su: An Empirical Analysis of the Co-evolution of Schema and Code in Database Applications. ESEC/SIGSOFT FSE 2013: 125-135. CCF A
Xiaobing Sun, Bixin Li: Using Formal Concept Analysis to Support Change Analysis. ASE 2011: 641-645. CCF A
Bixin Li, Dong Qiu, Shunhui Ji, Di Wang: Automatic Test Case Selection and Generation for Regression Testing of Composite Service based on Extensible BPEL Flow Graph. ICSM 2010: 1-10. CCF B
Pengcheng Zhang, Lars Grunske, Antony Tang, Bixin Li: A Formal Syntax for Probabilistic Timed Property Sequence Charts. ASE 2009: 500-504. CCF A
Pengcheng Zhang, Bixin Li, Henry Muccini, Yu Zhou, Mingjie Sun: Data-Enriched Modeling and Verification of WS-CDL Based on UML Models. ICWS 2008: 752-753. CCF B

