default search action
Jiamou Sun
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Jiamou Sun, Zhenchang Xing, Xin Xia, Qinghua Lu, Xiwei Xu, Liming Zhu:
Aspect-level Information Discrepancies across Heterogeneous Vulnerability Reports: Severity, Types and Detection Methods. ACM Trans. Softw. Eng. Methodol. 33(2): 49:1-49:38 (2024) - [c12]Jiamou Sun, Jieshan Chen, Zhenchang Xing, Qinghua Lu, Xiwei Xu, Liming Zhu:
Where is it? Tracing the Vulnerability-relevant Files from Vulnerability Reports. ICSE 2024: 200:1-200:13 - [c11]Zewei Shi, Ruoxi Sun, Jieshan Chen, Jiamou Sun, Minhui Xue:
The Invisible Game on the Internet: A Case Study of Decoding Deceptive Patterns. WWW (Companion Volume) 2024: 521-524 - [i8]Zewei Shi, Ruoxi Sun, Jieshan Chen, Jiamou Sun, Minhui Xue:
The Invisible Game on the Internet: A Case Study of Decoding Deceptive Patterns. CoRR abs/2402.03569 (2024) - [i7]Linyi Han, Shidong Pan, Zhenchang Xing, Jiamou Sun, Sofonias Yitagesu, Xiaowang Zhang, Zhiyong Feng:
Don't Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-tail Software through Feature Inference. CoRR abs/2405.07430 (2024) - [i6]Jieshan Chen, Zhen Wang, Jiamou Sun, Wenbo Zou, Zhenchang Xing, Qinghua Lu, Qing Huang, Xiwei Xu:
From Exploration to Revelation: Detecting Dark Patterns in Mobile Apps. CoRR abs/2411.18084 (2024) - 2023
- [c10]Jiamou Sun, Zhenchang Xing, Qinghua Lu, Xiwei Xu, Liming Zhu:
A Multi-faceted Vulnerability Searching Website Powered by Aspect-level Vulnerability Knowledge Graph. ICSE Companion 2023: 60-63 - [c9]Jiamou Sun, Zhenchang Xing, Qinghua Lu, Xiwei Xu, Liming Zhu, Thong Hoang, Dehai Zhao:
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation. ICSE 2023: 970-982 - [c8]Jieshan Chen, Jiamou Sun, Sidong Feng, Zhenchang Xing, Qinghua Lu, Xiwei Xu, Chunyang Chen:
Unveiling the Tricks: Automated Detection of Dark Patterns in Mobile Applications. UIST 2023: 114:1-114:20 - [c7]Xiangwei Li, Xiaoning Ren, Yinxing Xue, Zhenchang Xing, Jiamou Sun:
Prediction of Vulnerability Characteristics Based on Vulnerability Description and Prompt Learning. SANER 2023: 604-615 - [i5]Jiamou Sun, Zhenchang Xing, Qinghua Lu, Xiwei Xu, Liming Zhu, Thong Hoang, Dehai Zhao:
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation. CoRR abs/2302.07445 (2023) - [i4]Jieshan Chen, Jiamou Sun, Sidong Feng, Zhenchang Xing, Qinghua Lu, Xiwei Xu, Chunyang Chen:
Unveiling the Tricks: Automated Detection of Dark Patterns in Mobile Applications. CoRR abs/2308.05898 (2023) - [i3]Terry Yue Zhuo, Xiaoning Du, Zhenchang Xing, Jiamou Sun, Haowei Quan, Li Li, Liming Zhu:
Pop Quiz! Do Pre-trained Code Models Possess Knowledge of Correct API Names? CoRR abs/2309.07804 (2023) - 2022
- [j2]Hao Guo, Sen Chen, Zhenchang Xing, Xiaohong Li, Yude Bai, Jiamou Sun:
Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions. ACM Trans. Softw. Eng. Methodol. 31(3): 49:1-49:27 (2022) - [c6]Jiamou Sun, Zhenchang Xing, Xiwei Xu, Liming Zhu, Qinghua Lu:
Heterogeneous Vulnerability Report Traceability Recovery by Vulnerability Aspect Matching. ICSME 2022: 175-186 - [c5]Xianchang Luo, Yinxing Xue, Zhenchang Xing, Jiamou Sun:
PRCBERT: Prompt Learning for Requirement Classification using BERT-based Pretrained Language Models. ASE 2022: 75:1-75:13 - 2021
- [c4]Jiamou Sun, Zhenchang Xing, Xin Peng, Xiwei Xu, Liming Zhu:
Task-Oriented API Usage Examples Prompting Powered By Programming Task Knowledge Graph. ICSME 2021: 448-459 - [i2]Jiamou Sun, Zhenchang Xing, Hao Guo, Deheng Ye, Xiaohong Li, Xiwei Xu, Liming Zhu:
Generating Informative CVE Description From ExploitDB Posts by Extractive Summarization. CoRR abs/2101.01431 (2021) - 2020
- [c3]Xiaoxue Ren, Jiamou Sun, Zhenchang Xing, Xin Xia, Jianling Sun:
Demystify official API usage directives with crowdsourced API misuse scenarios, erroneous code examples and patches. ICSE 2020: 925-936 - [i1]Jiamou Sun, Zhenchang Xing, Xin Peng, Xiwei Xu, Liming Zhu:
Task-Oriented API Usage Examples Prompting Powered By Programming Task Knowledge Graph. CoRR abs/2006.07058 (2020)
2010 – 2019
- 2019
- [c2]Jiamou Sun, Zhenchang Xing, Rui Chu, Heilai Bai, Jinshui Wang, Xin Peng:
Know-How in Programming Tasks: From Textual Tutorials to Task-Oriented Knowledge Graph. ICSME 2019: 257-268 - 2018
- [j1]Chunyang Chen, Xi Chen, Jiamou Sun, Zhenchang Xing, Guoqiang Li:
Data-Driven Proactive Policy Assurance of Post Quality in Community q&a Sites. Proc. ACM Hum. Comput. Interact. 2(CSCW): 33:1-33:22 (2018) - [c1]Hongwei Li, Sirui Li, Jiamou Sun, Zhenchang Xing, Xin Peng, Mingwei Liu, Xuejiao Zhao:
Improving API Caveats Accessibility by Mining API Caveats Knowledge Graph. ICSME 2018: 183-193
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint