


Остановите войну!
for scientists:
Bin Luo 0003
Person information

- affiliation (PhD 2000): Nanjing University, Software Institute, State Key Laboratory for Novel Software Technology, China
Other persons with the same name
- Bin Luo — disambiguation page
- Bin Luo 0001
— Anhui University, School of Computer Science and Technology, Hefei, China (and 1 more)
- Bin Luo 0002
— Nanchang University, School of Information Engineering, China (and 1 more)
- Bin Luo 0004 — University of Hong Kong, Department of Electrical and Electronic Engineering, Hong Kong
- Bin Luo 0005
— Wuhan University, State Key Laboratory of Information Engineering in Surveying, Mapping and Remote Sensing, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j32]Fei Ye
, Yunzhi Zheng, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
TamForen: A tamper-proof cloud forensic framework. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j31]Chuanyi Li, Jidong Ge, Kun Cheng, Bin Luo, Victor Chang:
Statute recommendation: Re-ranking statutes by modeling case-statute relation with interpretable hand-crafted features. Inf. Sci. 607: 1023-1040 (2022) - [j30]Li Kong, Chuanyi Li, Jidong Ge, Vincent Ng, Bin Luo:
Predicting Product Review Helpfulness - A Hybrid Method. IEEE Trans. Serv. Comput. 15(4): 2213-2225 (2022) - [c83]Changan Niu, Chuanyi Li, Vincent Ng, Jidong Ge, Liguo Huang, Bin Luo:
SPT-Code: Sequence-to-Sequence Pre-Training for Learning Source Code Representations. ICSE 2022: 1-13 - [c82]Ze Tang, Xiaoyu Shen, Chuanyi Li, Jidong Ge, Liguo Huang, Zheling Zhu, Bin Luo:
AST-Trans: Code Summarization with Efficient Tree-Structured Attention. ICSE 2022: 150-162 - [c81]Changan Niu, Chuanyi Li, Bin Luo, Vincent Ng:
Deep Learning Meets Software Engineering: A Survey on Pre-Trained Models of Source Code. IJCAI 2022: 5546-5555 - [i9]Changan Niu, Chuanyi Li, Vincent Ng, Jidong Ge, Liguo Huang, Bin Luo:
SPT-Code: Sequence-to-Sequence Pre-Training for Learning Source Code Representations. CoRR abs/2201.01549 (2022) - [i8]Wenkang Zhong, Chuanyi Li, Jidong Ge, Bin Luo:
Neural Program Repair: Systems, Challenges and Solutions. CoRR abs/2202.10868 (2022) - [i7]Changan Niu, Chuanyi Li, Bin Luo, Vincent Ng:
Deep Learning Meets Software Engineering: A Survey on Pre-Trained Models of Source Code. CoRR abs/2205.11739 (2022) - [i6]Weisong Sun, Chunrong Fang, Yuchen Chen, Quanjun Zhang, Guanhong Tao, Tingxu Han, Yifei Ge, Yudu You, Bin Luo:
An Extractive-and-Abstractive Framework for Source Code Summarization. CoRR abs/2206.07245 (2022) - 2021
- [j29]Yi Feng, Chuanyi Li, Jidong Ge, Bin Luo, Vincent Ng:
Recommending Statutes: A Portable Method Based on Neural Networks. ACM Trans. Knowl. Discov. Data 15(2): 16:1-16:22 (2021) - [j28]Yu Liang, Jidong Ge
, Sheng Zhang
, Jie Wu
, Lingwei Pan
, Tengfei Zhang, Bin Luo:
Interaction-Oriented Service Entity Placement in Edge Computing. IEEE Trans. Mob. Comput. 20(3): 1064-1075 (2021) - [c80]Yi Feng, Ting Wang, Chuanyi Li, Vincent Ng, Jidong Ge, Bin Luo, Yucheng Hu, Xiaopeng Zhang:
Don't Miss the Potential Customers! Retrieving Similar Ads to Improve User Targeting. EMNLP (Findings) 2021: 1493-1503 - [c79]Xuanyu Liu, Ang Li, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Understanding Digital Forensic Characteristics of Smart Speaker Ecosystems. GLOBECOM 2021: 1-6 - [c78]Shiwen Song, Xuanyu Liu, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction. GLOBECOM 2021: 1-6 - [c77]Feifei Zhang, Jidong Ge, Chifong Wong, Sheng Zhang, Chuanyi Li, Bin Luo:
Optimizing Federated Edge Learning on Non-IID Data via Neural Architecture Search. GLOBECOM 2021: 1-6 - [c76]Li Lin, Xuanyu Liu, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
A Non-Intrusive Method for Smart Speaker Forensics. ICC 2021: 1-6 - [c75]Ze Tang, Chuanyi Li, Jidong Ge, Xiaoyu Shen, Zheling Zhu, Bin Luo:
AST-Transformer: Encoding Abstract Syntax Trees Efficiently for Code Summarization. ASE 2021: 1193-1195 - [c74]Xuanyu Liu, Qiang Zeng, Xiaojiang Du, Siva Likitha Valluru, Chenglong Fu, Xiao Fu, Bin Luo:
SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes. RAID 2021: 33-47 - [i5]Jidong Ge, Yunyun Huang, Xiaoyu Shen, Chuanyi Li, Wei Hu, Bin Luo:
Learning Fine-grained Fact-Article Correspondence in Legal Cases. CoRR abs/2104.10726 (2021) - [i4]Xixi Wang, Bo Jiang, Xiao Wang, Bin Luo:
MutualFormer: Multi-Modality Representation Learning via Mutual Transformer. CoRR abs/2112.01177 (2021) - [i3]Ze Tang, Chuanyi Li, Jidong Ge, Xiaoyu Shen, Zheling Zhu, Bin Luo:
AST-Transformer: Encoding Abstract Syntax Trees Efficiently for Code Summarization. CoRR abs/2112.01184 (2021) - [i2]Yunyun Huang, Xiaoyu Shen, Chuanyi Li, Jidong Ge, Bin Luo:
Dependency Learning for Legal Judgment Prediction with a Unified Text-to-Text Transformer. CoRR abs/2112.06370 (2021) - 2020
- [j27]Chuanyi Li
, Jidong Ge
, Lijie Wen
, Li Kong, Victor Chang
, Liguo Huang
, Bin Luo:
A novel completeness definition of event logs and corresponding generation algorithm. Expert Syst. J. Knowl. Eng. 37(4) (2020) - [j26]Li Kong, Chuanyi Li, Jidong Ge
, Feifei Zhang, Yi Feng, Zhongjin Li, Bin Luo:
Leveraging multiple features for document sentiment classification. Inf. Sci. 518: 39-55 (2020) - [c73]Li Kong, Chuanyi Li, Jidong Ge, Bin Luo, Vincent Ng:
Identifying Exaggerated Language. EMNLP (1) 2020: 7024-7034 - [c72]Yuzhe Chen, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani
:
Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network. GLOBECOM 2020: 1-6 - [c71]Yun Luo, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani
:
Forensic Model for DDoS Attack. GLOBECOM 2020: 1-6 - [c70]Sixian Sun, Xiao Fu, Bin Luo, Xiaojiang Du:
Detecting and Mitigating ARP Attacks in SDN-Based Cloud Environment. INFOCOM Workshops 2020: 659-664 - [c69]Chuanyi Li, Jidong Ge, Victor Chang, Bin Luo:
Retrieving Similar Software from Large-scale Open-source Repository by Constructing Representation of Project Description. IoTBDS 2020: 296-303 - [c68]Yu Liang, Jidong Ge, Sheng Zhang, Changan Niu, Wei Song, Bin Luo:
Efficient Service Entity Chain Placement in Mobile Edge Computing. MSN 2020: 182-189
2010 – 2019
- 2019
- [j25]Xiao Fu, Rui Yang, Xiaojiang Du, Bin Luo, Mohsen Guizani
:
Timing Channel in IaaS: How to Identify and Investigate. IEEE Access 7: 1-11 (2019) - [j24]Yu Liang, Jidong Ge
, Sheng Zhang
, Bin Luo:
Modeling and deploying hybrid tenant requests with shared networklets. Comput. Networks 153: 63-72 (2019) - [j23]Feifei Zhang, Jidong Ge
, Chifong Wong, Chuanyi Li, Xingguo Chen, Sheng Zhang, Bin Luo, He Zhang, Victor Chang
:
Online learning offloading framework for heterogeneous mobile edge computing system. J. Parallel Distributed Comput. 128: 167-183 (2019) - [j22]Weiqiang Zhang
, Shing-Chi Cheung
, Zhenyu Chen, Yuming Zhou, Bin Luo:
File-level socio-technical congruence and its relationship with bug proneness in OSS projects. J. Syst. Softw. 156: 21-40 (2019) - [j21]Yu Liang, Jidong Ge
, Sheng Zhang
, Jie Wu
, Ze Tang, Bin Luo:
A Utility-Based Optimization Framework for Edge Service Entity Caching. IEEE Trans. Parallel Distributed Syst. 30(11): 2384-2395 (2019) - [j20]Chuanyi Li, Jidong Ge
, Zhongjin Li, Liguo Huang, Hongji Yang, Bin Luo:
Monitoring Interactions Across Multi Business Processes with Token Carried Data. IEEE Trans. Serv. Comput. 12(6): 941-954 (2019) - [c67]Yi Feng, Chuanyi Li, Jidong Ge, Bin Luo:
Improving Statute Prediction via Mining Correlations between Statutes. ACML 2019: 710-725 - [c66]Meng Chen, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Cloud Database Encryption Technology Based on Combinatorial Encryption. GLOBECOM 2019: 1-5 - [c65]Xiaoyu Ma, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
A Design of Firewall Based on Feedback of Intrusion Detection System in Cloud Environment. GLOBECOM 2019: 1-6 - [c64]Chuanyi Li, Yu Sheng, Jidong Ge, Bin Luo:
Apply event extraction techniques to the judicial field. UbiComp/ISWC Adjunct 2019: 492-497 - [c63]Linxia Yao, Jidong Ge, Chuanyi Li, Yuan Yao, Zhenhao Li, Jin Zeng, Bin Luo, Victor Chang
:
Word Segmentation for Chinese Judicial Documents. ICPCSEE (1) 2019: 466-478 - [c62]Mengting He, Zhongyue Li, Yanshu Wei, Jidong Ge, Peitang Ling, Chuanyi Li, Ting Lei, Bin Luo:
Evaluation System for Reasoning Description of Judgment Documents Based on TensorFlow CNN. ICPCSEE (1) 2019: 518-533 - [c61]Peitang Ling, Zian Wang, Yi Feng, Jidong Ge, Mengting He, Chuanyi Li, Bin Luo:
Statute Recommendation Based on Word Embedding. ICPCSEE (1) 2019: 534-548 - [c60]Li Kong, Chuanyi Li, Jidong Ge, Zhongjin Li, Feifei Zhang, Bin Luo:
An Efficient Heuristic Method for Repairing Event Logs Independent of Process Models. IoTBDS 2019: 83-93 - 2018
- [j19]Sixian Sun
, Xiao Fu, Hao Ruan, Xiaojiang Du, Bin Luo, Mohsen Guizani
:
Real-Time Behavior Analysis and Identification for Android Application. IEEE Access 6: 38041-38051 (2018) - [j18]Feifei Zhang, Jidong Ge, Zhongjin Li, Chuanyi Li, Chifong Wong, Li Kong, Bin Luo, Victor I. Chang
:
A load-aware resource allocation and task scheduling for the emerging cloudlet system. Future Gener. Comput. Syst. 87: 438-456 (2018) - [j17]Tieke He, Hao Lian, Zemin Qin, Zhenyu Chen, Bin Luo:
PTM: A Topic Model for the Inferring of the Penalty. J. Comput. Sci. Technol. 33(4): 756-767 (2018) - [j16]Chuanyi Li, Liguo Huang, Jidong Ge, Bin Luo, Vincent Ng:
Automatically classifying user requests in crowdsourcing requirements engineering. J. Syst. Softw. 138: 108-123 (2018) - [j15]Lei Huang
, Bin Luo:
Video-based salient object detection via spatio-temporal difference and coherence. Multim. Tools Appl. 77(9): 10685-10699 (2018) - [j14]Zhongjin Li, Jidong Ge, Haiyang Hu, Wei Song
, Hao Hu, Bin Luo:
Cost and Energy Aware Scheduling Algorithm for Scientific Workflows with Deadline Constraint in Clouds. IEEE Trans. Serv. Comput. 11(4): 713-726 (2018) - [c59]Tieke He, Hao Lian, Zemin Qin, Zhipeng Zou, Bin Luo:
Word Embedding Based Document Similarity for the Inferring of Penalty. WISA 2018: 240-251 - [c58]Xuanyu Liu, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Monitoring User-Intent of Cloud-Based Networked Applications in Cognitive Networks. GLOBECOM 2018: 1-7 - [c57]Yixuan Dong, Yemao Zhou, Chuanyi Li, Jidong Ge, Yali Han, Mengting He, Dekuan Liu, Xiaoyu Zhou, Bin Luo:
Establish Evidence Chain Model on Chinese Criminal Judgment Documents Using Text Similarity Measure. ICPCSEE (2) 2018: 27-40 - [c56]Linxia Yao, Haojie Huang, Jidong Ge, Simeng Zhao, Peitang Ling, Ting Lei, Mengting He, Bin Luo:
The Construction Approach of Statutes Database. ICPCSEE (1) 2018: 140-150 - [c55]Zhongyue Li, Chuhan Zhuang, Jidong Ge, Chuanyi Li, Ting Lei, Peitang Ling, Mengting He, Bin Luo:
Predicting Statutes Based on Causes of Action and Content of Statutes. ICPCSEE (2) 2018: 477-492 - [c54]Li Kong, Chuanyi Li, Jidong Ge, Yufan Yang, Feifei Zhang, Bin Luo:
Construction of Microblog-Specific Chinese Sentiment Lexicon Based on Representation Learning. PRICAI (1) 2018: 204-216 - [c53]Yi Feng, Jidong Ge, Chuanyi Li, Li Kong, Feifei Zhang, Bin Luo:
Statutes Recommendation Using Classification and Co-occurrence Between Statutes. PRICAI 2018: 326-334 - [c52]Xiaosong Zhou, Chuanyi Li, Jidong Ge, Zhongjin Li, Xiaoyu Zhou, Bin Luo:
Automatically Classifying Chinese Judgment Documents Using Character-Level Convolutional Neural Networks. PRICAI 2018: 430-437 - [c51]Chuanyi Li, Jingjing Ye, Jidong Ge, Li Kong, Haiyang Hu, Bin Luo:
A Novel Convolutional Neural Network for Statutes Recommendation. PRICAI (1) 2018: 851-863 - [c50]Weiqiang Zhang, Zhenyu Chen, Bin Luo:
Does Socio-Technical Congruence Have an Effect on Continuous Integration Build Failures? An Empirical Study on 10 GitHub Projects. QRS 2018: 333-343 - [i1]Xiao Fu, Rui Yang, Xiaojiang Du, Bin Luo:
Timing Channel in IaaS: How to Identify and Investigate. CoRR abs/1804.01634 (2018) - 2017
- [j13]Zhongjin Li, Jidong Ge
, Chuanyi Li, Hongji Yang, Haiyang Hu, Bin Luo, Victor Chang
:
Energy cost minimization with job security guarantee in Internet data center. Future Gener. Comput. Syst. 73: 63-78 (2017) - [j12]Yingxin Cheng, Xiao Fu, Xiaojiang Du, Bin Luo, Mohsen Guizani:
A lightweight live memory forensic approach based on hardware virtualization. Inf. Sci. 379: 23-41 (2017) - [j11]Chuanyi Li, Jidong Ge
, Liguo Huang, Haiyang Hu, Budan Wu, Hao Hu, Bin Luo:
Software cybernetics in BPM: Modeling software behavior as feedback for evolution by a novel discovery method based on augmented event logs. J. Syst. Softw. 124: 260-273 (2017) - [j10]Lei Huang
, Bin Luo:
Tag refinement of micro-videos by learning from multiple data sources. Multim. Tools Appl. 76(19): 20341-20358 (2017) - [j9]Xiao Fu, Yun Gao, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Security Threats to Hadoop: Data Leakage Attacks and Investigation. IEEE Netw. 31(2): 67-71 (2017) - [c49]Yi Feng, Jidong Ge, Yemao Zhou, Chuanyi Li, Zhongjin Li, Xiaoyu Zhou, Bin Luo:
A Method of the Association Statistics between the Cause of Action and the Statutes. WISA 2017: 23-26 - [c48]Zemin Qin, Hao Lian, Tieke He, Bin Luo:
Cluster Correction on Polysemy and Synonymy. WISA 2017: 136-138 - [c47]Yuanliang Chen, Jidong Ge, Yi Feng, Yemao Zhou, Chuanyi Li, Zhongjin Li, Bin Luo:
Design and Implementation of Visual Modeling Tool for Evidence Chain. WISA 2017: 168-171 - [c46]Yufan Yang, Yi Feng, Jidong Ge, Yemao Zhou, Jin Zeng, Chuanyi Li, Bin Luo:
Checking the Statutes in Chinese Judgment Document Based on Editing Distance Algorithm. WISA 2017: 197-200 - [c45]Jin Zeng, Jidong Ge, Yemao Zhou, Yi Feng, Chuanyi Li, Zhongjin Li, Bin Luo:
Statutes Recommendation Based on Text Similarity. WISA 2017: 201-204 - [c44]Hao Lian, Zemin Qin, Tieke He, Bin Luo:
Knowledge Graph Construction Based on Judicial Data with Social Media. WISA 2017: 225-227 - [c43]Chuhan Zhuang, Yemao Zhou, Jidong Ge, Zhongjin Li, Chuanyi Li, Xiaoyu Zhou, Bin Luo:
Information Extraction from Chinese Judgment Documents. WISA 2017: 240-244 - [c42]Miaomiao Lei, Jidong Ge, Zhongjin Li, Chuanyi Li, Yemao Zhou, Xiaoyu Zhou, Bin Luo:
Automatically Classify Chinese Judgment Documents Utilizing Machine Learning Algorithms. DASFAA Workshops 2017: 3-17 - [c41]Jiayun Xie, Xiao Fu, Xiaojiang Du, Bin Luo, Mohsen Guizani:
AutoPatchDroid: A framework for patching inter-app vulnerabilities in android application. ICC 2017: 1-6 - [c40]Hao Ruan, Xiao Fu, Xuanyu Liu, Xiaojiang Du, Bin Luo:
Analyzing Android Application in Real-Time at Kernel Level. ICCCN 2017: 1-9 - [c39]Yue Wang, Jidong Ge, Yemao Zhou, Yi Feng, Chuanyi Li, Zhongjin Li, Xiaoyu Zhou, Bin Luo:
Topic Model Based Text Similarity Measure for Chinese Judgment Document. ICPCSEE (2) 2017: 42-54 - [c38]Siyuan Kong, Yemao Zhou, Jidong Ge, Zhongjin Li, Chuanyi Li, Yi Feng, Xiaoyu Zhou, Bin Luo:
Build Evidence Chain Relational Model Based on Chinese Judgment Documents. ICPCSEE (2) 2017: 94-107 - [c37]Feifei Zhang, Jidong Ge, Zhongjin Li, Chuanyi Li, Zifeng Huang, Li Kong, Bin Luo:
Task Offloading for Scientific Workflow Application in Mobile Cloud. IoTBDS 2017: 136-148 - [c36]Beibei Chao, Xiaoyan Zhao, Dapeng Shi, Guihuan Feng, Bin Luo:
Eyes Understand the Sketch!: Gaze-Aided Stroke Grouping of Hand-Drawn Flowcharts. IUI 2017: 79-83 - [c35]Lei Huang, Bin Luo:
Personalized Micro-Video Recommendation via Hierarchical User Interest Modeling. PCM (1) 2017: 564-574 - [c34]Yabin Wang, Tieke He, Weiqiang Zhang, Chunrong Fang, Bin Luo:
Exploring the Influence of Feature Selection Techniques on Bug Report Prioritization. SEKE 2017: 179-184 - [c33]Xuanyu Liu, Xiao Fu, Bin Luo, Xiaojiang Du:
Distributed Cloud Forensic System with Decentralization and Multi-participation. WICON 2017: 181-196 - 2016
- [j8]Zhongjin Li, Jidong Ge
, Hongji Yang, Liguo Huang, Haiyang Hu, Hao Hu, Bin Luo:
A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds. Future Gener. Comput. Syst. 65: 140-152 (2016) - [j7]Chuanyi Li, Jidong Ge
, Liguo Huang, Haiyang Hu, Budan Wu, Hongji Yang, Hao Hu, Bin Luo:
Process mining with token carried data. Inf. Sci. 328: 558-576 (2016) - [j6]Wei Wang, Eryu Ding, Bin Luo:
基于抽象状态的类的行为规格化方法 (Behavior Specification Method of Class Based on Abstract State). 计算机科学 43(Z6): 457-460 (2016) - [j5]Tieke He, Hongzhi Yin, Zhenyu Chen, Xiaofang Zhou
, Shazia W. Sadiq
, Bin Luo:
A Spatial-Temporal Topic Model for the Semantic Annotation of POIs in LBSNs. ACM Trans. Intell. Syst. Technol. 8(1): 12:1-12:24 (2016) - [c32]Xiaohan Song, Guihuan Feng, Bin Luo:
iReference: Make the Reference Details Under Your Nose. CCHI 2016: 4:1-4:5 - [c31]Lei Huang, Bin Luo:
Salient Object Detection via Video Spatio-Temporal Difference and Coherence. CIS 2016: 218-222 - [c30]Ziqi Wang, Rui Yang, Xiao Fu, Xiaojiang Du, Bin Luo:
A shared memory based cross-VM side channel attacks in IaaS cloud. INFOCOM Workshops 2016: 181-186 - [c29]Zhongjin Li, Jidong Ge, Chuanyi Li, Hongji Yang, Haiyang Hu, Bin Luo:
Energy Cost Minimization with Risk Rate Constraint for Internet Data Center in Deregulated Electricity Markets. IoTBD 2016: 407-418 - [c28]Rui Yang, Xiao Fu, Xiaojiang Du, Bin Luo:
Investigating Timing Channel in IaaS. MobiMedia 2016: 84-89 - 2015
- [j4]Quan Chen, Dapeng Shi, Guihuan Feng, Xiaoyan Zhao, Bin Luo:
基于语法描述语言的在线手绘流程图识别 (On-line Handwritten Flowchart Recognition Based on Grammar Description Language). 计算机科学 42(Z11): 113-118 (2015) - [j3]Xiao Fu, Xiaojiang Du, Bin Luo:
Data correlation-based analysis methods for automatic memory forensic. Secur. Commun. Networks 8(18): 4213-4226 (2015) - [c27]Mengyu Dou, Tieke He, Hongzhi Yin, Xiaofang Zhou
, Zhenyu Chen, Bin Luo:
Predicting Passengers in Public Transportation Using Smart Card Data. ADC 2015: 28-40 - [c26]Tieke He, Hongzhi Yin, Zhenyu Chen, Xiaofang Zhou
, Bin Luo:
Predicting Users' Purchasing Behaviors Using Their Browsing History. ADC 2015: 129-141 - [c25]Yun Gao, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Haddle: A Framework for Investigating Data Leakage Attacks in Hadoop. GLOBECOM 2015: 1-6 - [c24]Yiheng Duan, Xiao Fu, Bin Luo, Ziqi Wang, Jin Shi, Xiaojiang Du:
Detective: Automatically identify and analyze malware processes in forensic scenarios via DLLs. ICC 2015: 5691-5696 - [c23]Feng Liu, Chongjun Wang, Jidong Ge, Bin Luo:
PCFBPI: A Point Clustering Feature Based Policy Iteration Algorithm. ICTAI 2015: 119-124 - [c22]Xiao Fu, Xiaojiang Du, Bin Luo, Jin Shi, Zhitao Guan, Yuhua Wang:
Correlating processes for automatic memory evidence analysis. INFOCOM Workshops 2015: 115-120 - 2014
- [j2]Yabin Wang, Ruizhi Gao, Zhenyu Chen, W. Eric Wong, Bin Luo:
WAS: A weighted attribute-based strategy for cluster test selection. J. Syst. Softw. 98: 44-58 (2014) - [c21]Zhenyu Chen, Bin Luo:
Quasi-crowdsourcing testing for educational projects. ICSE Companion 2014: 272-275 - [c20]Yingxin Cheng, Xiao Fu, Bin Luo, Rui Yang, Hao Ruan:
Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensics. ISC 2014: 255-272 - [c19]Feng Liu, Bin Luo:
POPVI: A Probability-Based Optimal Policy Value Iteration Algorithm. PRICAI 2014: 627-639 - [c18]Zhenyu Chen, Atif M. Memon, Bin Luo:
Combining research and education of software testing: a preliminary study. SAC 2014: 1179-1180 - 2013
- [c17]Jian Zhang, Xiao Fu, Xiaojiang Du, Bin Luo, Zhihong Zhao:
A Method to Automatically Filter Log Evidences for Intrusion Forensics. ICDCS Workshops 2013: 39-44 - [c16]You Wang, Zhihao Zhao, Danni Wang, Guihuan Feng, Bin Luo:
How screen size influences Chinese readability. OZCHI 2013: 277-280 - [c15]Min Li, Zhiwei Jiang, Bin Luo, Jiubin Tang, Qing Gu, Daoxu Chen:
Product and User Dependent Social Network Models for Recommender Systems. PAKDD (2) 2013: 13-24 - [c14]Zebao Gao, Zhenyu Chen, Yang Feng, Bin Luo:
Mining Sequential Patterns of Predicates for Fault Localization and Understanding. SERE 2013: 109-118 - [c13]Huan Yang, Jidong Ge, Quanjiang Yu, Chuanyi Li, Zhihong Zhao, Hao Hu, Bin Luo:
A Task Selecting Algorithm for Personal Schedules in Workflow Systems. WISE Workshops 2013: 133-143 - 2012
- [j1]Dongyi Wang, JiDong Ge, Hao Hu, Bin Luo, LiGuo Huang:
Discovering process models from event multiset. Expert Syst. Appl. 39(15): 11970-11978 (2012) - [c12]Guihuan Feng, Bin Luo:
An Experience of Teaching HCI to Undergraduate Software Engineering Students. CSEE&T 2012: 125-129 - [c11]Yabin Wang, Zhenyu Chen, Yang Feng, Bin Luo, Yijie Yang:
Using Weighted Attributes to Improve Cluster Test Selection. SERE 2012: 138-146 - 2011
- [c10]