奈飞

李必信

发布者:李必信发布时间:2025-11-15浏览次数:780


代表性期刊论文


  1. Can Zhao, Jiaxin Pan, Bixin Li. SA.Resilience.Evaluator: Evaluate the Resilience of Software Architecture Based on Attack Surface Analysis. IEEE Transactions on Reliability (in press), 2025. IF=5.9, JCR Q1.

  2. Zhihao Xu, Bixin Li, Xiaoning Du, Lulu Wang, Li Liao, and Ying Zhou. TRAGIC: Test Oracle Generation for ISA Compliance Testing via Large Language Model. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (Early Access ). DOI: 10.1109/TCAD.2025.3632771(2025). IF=2.8, JCR Q1, CCF A.

  3. Bixin Li, Tianyuan Hu, Xiangfei Xu, and Lulu Wang. VulFinder: Exploring Chaincode Vulnerabilities More Effectively and Efficiently Using Knowledge Graph Based Defect Pattern Matching. IEEE Transactions on Software Engineering (Early Access ). DOI: 10.1109/TSE.2025.3605379 (2025). IF=5.6, JCR Q1, CCF A.

  4. Tianyuan Hu, Jingyue Li, Bixin Li, and Andre Storhaug: Why Smart Contracts Reported as Vulnerable Were not Exploited? IEEE Transactions on Dependable and Secure Computing, 22(3):2579-2596 (2025). IF=7.0, JCR Q1, CCF A.

  5. Ruilin Xie, Xiang Chen, Qifan He, Bixin Li, Zhanqi Cui: IATT: Interpretation Analysis based Transferable Test Generation for Convolutional Neural Networks. ACM Transactions on Software Engineering and Methodology, 34(4): 1-34 (2025). IF=4.4, JCR Q1, CCF A.

  6. Qihao Bao,Bixin Li,Yujun Wang,and Dongyu Cao.How do Characteristic Parameters Affect the Security of Proof-of-Work Blockchain? IEEE Transaction on Network and Service Management, 22(5):4636-4650 (2025).  IF=6.6, JCR Q1.

  7. Yingying Chen, Bixin Li, Yan Xiao, Xiaoning Du. PonziFinder: Attention-Based Edge-Enhanced Ponzi Contract Detection, IEEE Transactions on Reliability, 74(1): 2305-2319 (2025). IF=5.9, JCR Q1.

  8. Bixin Li, Zhenyu Pan, Tianyuan Hu: EvoFuzzer: An Evolutionary Fuzzer for Detecting Reentrancy Vulnerability in Smart Contracts. IEEE Transactions on Network Science and Engineering, 11(6): 5790-5802 (2024). IF=6.6, JCR Q1.

  9. Tianyuan Hu, Bixin Li, Zhenyu Pan, Chen Qian: Detect Defects of Solidity Smart Contract Based on the Knowledge Graph. IEEE Transactions on Reliability, 73(1): 186-202 (2024). IF=5.9, JCR Q1.

  10. Tong Wang, Bixin Li: EsArCost: Estimating Repair Costs of Software Architecture Erosion using Slice Technology. Journal of System and Software, 208: 111875 (2024). IF=4.1, JCR Q1.

  11. Jiaxin Pan, Zixuan Liu, Donglin Li, Lulu Wang, Bixin Li: An Empirical Study of Software Architecture Resilience Evaluation Methods. Journal of System and Software, 202: 111726 (2023). IF=4.1, JCR Q1.

  12. Lulu Wang, Peng Hu, Xianglong Kong, Wenjie Ouyang, and Bixin Li et al.: Microservice Architecture Recovery based on Intra-service and Inter-service Features. Journal of System and Software, 204: 111754 (2023). IF=4.1, JCR Q1.

  13. Qihao Bao, Bixin Li, Tianyuan Hu, Xueyong Sun: A Survey of Blockchain Consensus Safety and Security: State-of-the-Art, Challenges, and Future work. Journal of System and Software, 196: 111555 (2023). IF=4.1, JCR Q1.

  14. Bixin Li, Zhenyu Pan, Tianyuan Hu: ReDefender: Detecting Reentrancy Vulnerabilities in Smart Contracts Automatically. IEEE Transactions on Reliability, 71(2): 984-999 (2022). IF=5.9, JCR Q1.

  15. Xianglong Kong, Weina Han, Li Liao, Bixin Li: An Analysis of Correctness for API Recommendation: Are the Unmatched Results Useless? Science China: Information Science, 63(9): 1-15 (2020). IF=7.3, JCR Q1, CCF A.

  16. Lulu Wang, Jingyue Li, Bixin Li: Tracking Runtime Concurrent Dependences in Java Threads using Thread Control Profiling. Journal of System and Software, 148: 116-131 (2019). IF=4.1, JCR Q1.

  17. Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li: The Impacts of Techniques, Programs and Tests on Automated Program Repair: An Empirical Study. Journal of System and Software, 137: 480-496 (2018). IF=3.8, JCR Q2.

  18. Lulu Wang, Bixin Li, Hareton Leung: A new method to encode calling contexts with recursions. Science China: Information Science, 59(5): 052104:1-052104:15 (2016). IF=7.3, JCR Q1, CCF A.

  19. Xiaobing Sun, Hareton Leung, Bin Li, Bixin Li: Change Impact Analysis and Changeability Assessment for a Change Proposal: An Empirical Study. Journal of System and Software, 96: 51-60 (2014). IF=4.1, JCR Q1.

  20. Bixin Li, Lulu Wang, Hareton Leung: Profiling Selected Paths with Loops. Science China: Information Science, 57(7): 1-15 (2014). IF=7.3, JCR Q1, CCF A.

  21. Dong Qiu, Bixin Li, Shunhui Ji, Hareton K. N. Leung: Regression Testing of Web Service: A Systematic Mapping Study. ACM Computing Surveys, 47(2): 21:1-21:46 (2014). IF=23.8, JCR Q1.

  22. Bixin Li, Li Liao, Hareton Leung, Rui Song: PHAT: A Preference and Honesty Aware Trust Model for Web Services. IEEE Transaction on Network and Service Management, 11(3): 363-375 (2014). IF=6.6, JCR Q1.

  23. Bixin Li, Shunhui Ji, Dong Qiu, Hareton Leung, Gongyuan Zhang: Verifying the Concurrent Properties in BPEL Based Web Service Composition Process. IEEE Transaction on Network and Service Management, 10(4): 410-424 (2013). IF=6.6, JCR Q1.

  24. Bixin Li, Qiandong Zhang, Xiaobing Sun, Hareton Leung: Using Water Wave Propagation Phenomenon to Study Software Change Impact Analysis. Advance in Engineering Software, 58: 45-53 (2013). IF=4.8, JCR Q1.

  25. Bixin Li, Xiaobing Sun, Hareton Leung: Combining Concept Lattice with Call Graph for Impact Analysis. Advance in Engineering Software, 53: 1-13 (2012). IF=4.8, JCR Q1.

  26. Bixin Li, Dong Qiu, Hareton Leung, Di Wang: Automatic Test Case Selection for Regression Testing of Composite Service Based on Extensible BPEL Flow Graph. Journal of System and Software, 85(6): 1300-1324 (2012). IF=4.1, JCR Q1.

  27. Bixin Li, Lulu Wang, Hareton Leung, Fei Liu: Profiling All Paths: A New Profiling Technique for Both Cyclic and Acyclic Paths. Journal of System and Software, 85(7): 1558-1576 (2012). IF=4.1, JCR Q1.

  28. Pengcheng Zhang, Bixin Li, Lars Grunske: Timed Property Sequence Chart. Journal of System and Software, 83(3): 371-390 (2010). IF=4.1, JCR Q1.

  29. Pengcheng Zhang, Henry Muccini, Bixin Li: A Classification and Comparison of Model Checking Software Architecture Techniques. Journal of System and Software, 83(5): 723-744 (2010). IF=4.1, JCR Q1.




代表性会议论文


  1. Zaixing Zhang, Jianming Chang, Tianyuan Hu, Lulu Wang, Bixin Li: Towards Task-Harmonious Vulnerability Assessment Based on LLM. ICPC 2025: 49-59. CCF B

  2. Mei Han, Lulu Wang, Jianming Chang, Bixin Li, Chunguang Zhang: Learning Graph-based Patch Representations for Identifying and Assessing Silent Vulnerability Fixes. ISSRE 2024: 120-131. CCF B

  3. Xinyun Cheng, Xianglong Kong, Li Liao, Bixin Li: A Combined Method for Usage of NLP Libraries Towards Analyzing Software Documents. CAiSE 2020: 515-529. CCF B

  4. Renhao Xiong, David Lo, Bixin Li: Distinguishing Similar Design Pattern Instances through Temporal Behavior Analysis. SANER 2020: 296-307. CCF B

  5. Rensong Xie, Xianglong Kong, Lulu Wang, Ying Zhou, Bixin Li: HiRec: API Recommendation using Hierarchical Context. ISSRE 2019: 369-379. CCF B

  6. Tong Wang, Dongdong Wang, Ying Zhou, Bixin Li: Software Multiple-Level Change Detection Based on Two-Step MPAT Matching. SANER 2019: 4-14. CCF B

  7. Renhao Xiong, Bixin Li Accurate Design Pattern Detection Based on Idiomatic Implementation Matching in Java Language Context. SANER 2019: 163-174. CCF B

  8. Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li: Experience Report: How do Techniques, Programs, and Tests Impact Automated Program Repair? ISSRE 2015: 194-204. CCF B

  9. Dong Qiu, Bixin Li, Zhendong Su: An Empirical Analysis of the Co-evolution of Schema and Code in Database Applications. ESEC/SIGSOFT FSE 2013: 125-135. CCF A

  10. Xiaobing Sun, Bixin Li: Using Formal Concept Analysis to Support Change Analysis. ASE 2011: 641-645. CCF A

  11. Bixin Li, Dong Qiu, Shunhui Ji, Di Wang: Automatic Test Case Selection and Generation for Regression Testing of Composite Service based on Extensible BPEL Flow Graph. ICSM 2010: 1-10. CCF B

  12. Pengcheng Zhang, Lars Grunske, Antony Tang, Bixin Li: A Formal Syntax for Probabilistic Timed Property Sequence Charts. ASE 2009: 500-504. CCF A

  13. Pengcheng Zhang, Bixin Li, Henry Muccini, Yu Zhou, Mingjie Sun: Data-Enriched Modeling and Verification of WS-CDL Based on UML Models. ICWS 2008: 752-753. CCF B


  • 相关链接
  • 联系方式
  • 通信地址:南京市江宁区奈飞 路2号奈飞 九龙湖校区计算机奈飞
  • 邮政编码:211189
  • ​办公地点:奈飞 九龙湖校区计算机楼
  • 奈飞微信公众号