近期发表的主要论文
[1]. A2SPPNet: Attentive Atrous Spatial Pyramid Pooling Network for Salient Object Detection. IEEE Transactions on Multimedia , IEEE Transaction on Multimedia, 2021
[2]. MiniSeg: An Extremely Minimum Network for Efficient COVID-19 Segmentation. The 35th AAAI Conference on Artificial Intelligence, AAAI 2021
[3]. Improving Deep CNN Architectures with Variable-Length Training Samples for Text-Independent Speaker Verification, INTERSPEECH2021
[4]. Sharing runtime permission issues for developers based on similar-app review mining[J]. Journal of Systems and Software, 2021.12
[5]. Visual Sentiment Classification via Low-rank Regularization and Label Relaxation,IEEE Transactions on Cognitive and Developmental Systems,2021
[6]. Vector-based attentive pooling for text-independent speaker verification,INTERSPEECH2020
[7]. Dilated residual networks with multi-level attention for speaker verification, Neurocomputing,2020
[8]. Callback2Vec: Callback-aware Hierarchical Embedding for Mobile Application[J]. Information Sciences, 2020.7
[9]. Early Prediction for Mode Anomaly in Generative Adversarial Network Training: An Empirical Study,Information Science, 534(2020) 117-138
[10]. Review Sharing via Deep Semi-supervised Code Clone Detection[J]. IEEE Access 8(2020): 24948-24965.( Date of Publication: 2020-1-14)
[11]. A Simple Saliency Detection Approach via Automatic Top-down Feature Fusion. Neurocomputing 388: 124–34.( Available online: 2020-1-13)
[12]. Deep Attentive Factorization Machine for App Recommendation Service. ICWS 2019
[13]. AutoPer: Automatic Recommender for Runtime-Permission in Android Applications. Compsac 2019. July15-19,USA.
[14]. Bi-dimensional Representation of Patients for Diagnosis Prediction,Compsac2019,July5-19,USA.
[15]. Systematic Comprehension for Developer Reply in Mobile System Forum,SANER 2019.
[16]. Android应用Activity启动环研究. 计算机学报,2019,42(39):1-19.
[17]. Automatic Feature Exploration and an Application in Defect Prediction. IEEE Access 7 (2019): 112097-112112.
[18]. A Projection-based Approach for Memory Leak Detection,Compsac2018,July 22-27,Japan.
[19]. TRAC: A Therapeutic Regimen-oriented Access Control Model in Healthcare,Compsac2018,July 22-27,Japan.
[20]. Application of Markov Model in SQL Injection Detection;Compsac2017
[21]. GEMS: An Extract Method Refactoring Recommender,ISSRE2017
[22]. 基于策略推导的访问控制漏洞测试用例生成方法,计算机学报,2017年12月
[23]. 面向移动应用软件信息泄露的模型检测研究,计算机学报,2016年39期
[24]. 基于隐含信息的半监督学习方法研究, 通信学报,2015,36(10)
[25]. 基于SVM方法的神经网络呼吸音识别算法,通信学报,2014年10月25日
[26]. 一个网构软件可信实体模型及基于评估的信任模型,中国科学 信息科学,2013年第43卷第1期:108-125
[27]. 基于递推链代数与迭代序列敛散性的死循环检测,计算机学报,2013年11月
[28]. A Dynamic SQL Injection Vulnerability Test Case Generation Model Based on the Multiple Phases Detection Approach,Compsac 2013,July 2013
[29]. An Evaluation Model for Dependability of Internet-scale Software on Basis of Bayesian Networks and Trustworthiness,Journal of Systems and Software,Sept.17,2013
[30].基于贝叶斯网络的网构软件可信性评估模型,计算机研究与发展,2012年5月
出版教材:《软件测试技术》,人民邮电出版社,2011
翻译教材:《深度强化学习:基于Python的理论及实践》,机械工业出版社,2021