李必信

发布者:李必信发布时间:2025-10-08浏览次数:643


代表性期刊论文


***ACM/IEEE Trans, CCF A 和 JCR Q1***


  1. Zhihao Xu, Bixin Li, and Xiaoning Du. TRAGIC: Test Oracle Generation for ISA Compliance Testing via Large Language Model. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems(in press), 2025. IF=2.8, JCR Q1, CCF A.

  2. Can Zhao, Jiaxin Pan, Bixin Li. SA.Resilience.Evaluator: Evaluate the Resilience of Software Architecture Based on Attack Surface Analysis. IEEE Transactions on Reliability(in press), 2025. IF=5.9, JCR Q1.

  3. Bixin Li, Tianyuan Hu, Xiangfei Xu, and Lulu Wang. VulFinder: Exploring Chaincode Vulnerabilities More Effectively and Efficiently Using Knowledge Graph Based Defect Pattern Matching. IEEE Transactions on Software Engineering (Early Access ). DOI: 10.1109/TSE.2025.3605379 (2025). IF=5.6, JCR Q1, CCF A.

  4. Qihao Bao,Bixin Li,Yujun Wang,and Dongyu Cao.How do Characteristic Parameters Affect the Security of Proof-of-Work Blockchain? IEEE Transaction on Network and Service Management, 22(5):4636-4650 (2025).  IF=6.6, JCR Q1.

  5. Tianyuan Hu, Jingyue Li, Bixin Li, and Andre Storhaug: Why Smart Contracts Reported as Vulnerable Were not Exploited? IEEE Transactions on Dependable and Secure Computing, 22(3):2579-2596 (2025). IF=7.0, JCR Q1, CCF A.

  6. Ruilin Xie, Xiang Chen, Qifan He, Bixin Li, Zhanqi Cui: IATT: Interpretation Analysis based Transferable Test Generation for Convolutional Neural Networks. ACM Transactions on Software Engineering and Methodology, 34(4): 1-34 (2025). IF=4.4, JCR Q1, CCF A.

  7. Yingying Chen, Bixin Li, Yan Xiao, Xiaoning Du. PonziFinder: Attention-Based Edge-Enhanced Ponzi Contract Detection, IEEE Transactions on Reliability,  74(1): 2305-2319 (2025). IF=5.9, JCR Q1.

  8. Bixin Li, Zhenyu Pan, Tianyuan Hu: EvoFuzzer: An Evolutionary Fuzzer for Detecting Reentrancy Vulnerability in Smart Contracts. IEEE Transactions on Network Science and Engineering, 11(6): 5790-5802 (2024). IF=6.6, JCR Q1.

  9. Tianyuan Hu, Bixin Li, Zhenyu Pan, Chen Qian: Detect Defects of Solidity Smart Contract Based on the Knowledge Graph. IEEE Transactions on Reliability, 73(1): 186-202 (2024). IF=5.9, JCR Q1.

  10. Tong Wang, Bixin Li: EsArCost: Estimating Repair Costs of Software Architecture Erosion using Slice Technology. Journal of System and Software, 208: 111875 (2024). IF=4.1, JCR Q1.

  11. Jiaxin Pan, Zixuan Liu, Donglin Li, Lulu Wang, Bixin Li: An Empirical Study of Software Architecture Resilience Evaluation Methods. Journal of System and Software, 202: 111726 (2023). IF=4.1, JCR Q1.

  12. Lulu Wang, Peng Hu, Xianglong Kong, Wenjie Ouyang, and Bixin Li et al.: Microservice Architecture Recovery based on Intra-service and Inter-service Features. Journal of System and Software, 204: 111754 (2023). IF=4.1, JCR Q1.

  13. Qihao Bao, Bixin Li, Tianyuan Hu, Xueyong Sun: A Survey of Blockchain Consensus Safety and Security: State-of-the-Art, Challenges, and Future work. Journal of System and Software, 196: 111555 (2023). IF=4.1, JCR Q1.

  14. Bixin Li, Zhenyu Pan, Tianyuan Hu: ReDefender: Detecting Reentrancy Vulnerabilities in Smart Contracts Automatically. IEEE Transactions on Reliability, 71(2): 984-999 (2022). IF=5.9, JCR Q1.

  15. Xianglong Kong, Weina Han, Li Liao, Bixin Li: An Analysis of Correctness for API Recommendation: Are the Unmatched Results Useless? Science China: Information Science, 63(9): 1-15 (2020). IF=7.3, JCR Q1, CCF A.

  16. Lulu Wang, Jingyue Li, Bixin Li: Tracking Runtime Concurrent Dependences in Java Threads using Thread Control Profiling. Journal of System and Software, 148: 116-131 (2019). IF=4.1, JCR Q1.

  17. Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li: The Impacts of Techniques, Programs and Tests on Automated Program Repair: An Empirical Study. Journal of System and Software, 137: 480-496 (2018). IF=3.8, JCR Q2.

  18. Lulu Wang, Bixin Li, Hareton Leung: A new method to encode calling contexts with recursions. Science China: Information Science, 59(5): 052104:1-052104:15 (2016). IF=7.3, JCR Q1, CCF A.

  19. Xiaobing Sun, Hareton Leung, Bin Li, Bixin Li: Change Impact Analysis and Changeability Assessment for a Change Proposal: An Empirical Study. Journal of System and Software, 96: 51-60 (2014). IF=4.1, JCR Q1.

  20. Bixin Li, Lulu Wang, Hareton Leung: Profiling Selected Paths with Loops. Science China: Information Science, 57(7): 1-15 (2014). IF=7.3, JCR Q1, CCF A.

  21. Dong Qiu, Bixin Li, Shunhui Ji, Hareton K. N. Leung: Regression Testing of Web Service: A Systematic Mapping Study. ACM Computing Surveys, 47(2): 21:1-21:46 (2014). IF=23.8, JCR Q1.

  22. Bixin Li, Li Liao, Hareton Leung, Rui Song: PHAT: A Preference and Honesty Aware Trust Model for Web Services. IEEE Transaction on Network and Service Management, 11(3): 363-375 (2014). IF=6.6, JCR Q1.

  23. Bixin Li, Shunhui Ji, Dong Qiu, Hareton Leung, Gongyuan Zhang: Verifying the Concurrent Properties in BPEL Based Web Service Composition Process. IEEE Transaction on Network and Service Management, 10(4): 410-424 (2013). IF=6.6, JCR Q1.

  24. Bixin Li, Qiandong Zhang, Xiaobing Sun, Hareton Leung: Using Water Wave Propagation Phenomenon to Study Software Change Impact Analysis. Advance in Engineering Software, 58: 45-53 (2013). IF=4.8, JCR Q1.

  25. Bixin Li, Xiaobing Sun, Hareton Leung: Combining Concept Lattice with Call Graph for Impact Analysis. Advance in Engineering Software, 53: 1-13 (2012). IF=4.8, JCR Q1.

  26. Bixin Li, Dong Qiu, Hareton Leung, Di Wang: Automatic Test Case Selection for Regression Testing of Composite Service Based on Extensible BPEL Flow Graph. Journal of System and Software, 85(6): 1300-1324 (2012). IF=4.1, JCR Q1.

  27. Bixin Li, Lulu Wang, Hareton Leung, Fei Liu: Profiling All Paths: A New Profiling Technique for Both Cyclic and Acyclic Paths. Journal of System and Software, 85(7): 1558-1576 (2012). IF=4.1, JCR Q1.

  28. Pengcheng Zhang, Bixin Li, Lars Grunske: Timed Property Sequence Chart. Journal of System and Software, 83(3): 371-390 (2010). IF=4.1, JCR Q1.

  29. Pengcheng Zhang, Henry Muccini, Bixin Li: A Classification and Comparison of Model Checking Software Architecture Techniques. Journal of System and Software, 83(5): 723-744 (2010). IF=4.1, JCR Q1.



***CCF B 和 JCR Q2***


  1. Tianyuan Hu, Bixin Li: Dynamic Information Utilization for Securing Ethereum Smart Contracts: A Literature Review. Information and Software Technololy, 182: 107719 (2025).  IF=3.9, JCR Q2.

  2. Dongyu Cao, Hao Yin, Bixin Li. A Random Mixing Scheme for Protecting Transaction Privacy on Ethereum. Journal of  Computer Sceince and  Technology, 40(3):1-17 (2025).  IF=1.7, JCR Q2.

  3. Tianyuan Hu, Jingyue Li, Xiangfei Xu, Bixin Li. SoliTester: Detecting Exploitable External-risky Vulnerability in Smart Contracts using Contract Account Triggering Method. Journal of Software: Evolution and Process, 36(7):1-22 (2024). IF=3.8, JCR Q2.

  4. Lulu Wang, Bixin Li, Xianglong Kong: Type Slicing: An Accurate Object Oriented Slicing based on Sub-statement Level Dependence Graph. Information and Software Technololy, 127: 106369 (2020). IF=3.9, JCR Q2.

  5. Zecheng Li, Li Liao, Hareton Leung, Bixin Li,Chao Li: Evaluating the Credibility of Cloud Services. Computer & Electrical Engineering, 58: 161-175 (2017). IF=4.0, JCR Q2.

  6. Dong Qiu, Bixin Li, Hareton Leung: Understanding the API usage in Java. Information and Software Technology, 73: 81-100 (2016). IF=2.9, JCR Q2.

  7. Fei Liu, Bixin Li, Rupesh Nasre: Efficient Online Cycle Detection Technique Combining with Steensgaard Points-to Information. Software - Practice and Experience, 46(5): 601-623 (2016). IF=2.1, JCR Q2

  8. Xiaobing Sun, Bixin Li, and Hareton K. N. Leung, et al.: MSR4SM: Using Topic Models to Effectively Mining Software Repositories for Software Maintenance Tasks. Information and Software Technology, 66: 1-12 (2015). IF=3.9, JCR Q2.

  9. Bixin Li, Xiaobing Sun, Jacky Keung: FCA-CIA: An Approach of Using FCA to Support Cross-Level Change Impact Analysis for Object-Oriented Java Programs. Information and Software Technology, 55(8): 1437-1449 (2013). IF=3.9, JCR Q2.

  10. Bixin Li, Xiaobing Sun, Hareton Leung, Sai Zhang: A Survey of Code-Based Change Impact Analysis Techniques. Software Test, Verification and Reliability, 23(8): 613-646 (2013). IF=1.5, JCR Q2.

  11. Bixin Li, Xiaocong Fan, Jun Pang, Jianjun Zhao: A Model for Slicing JAVA Programs Hierarchically. Journal of Computer Sceince and Technology, 19(6): 848-858 (2004).  IF=1.7, JCR Q2.

  12. Bixin Li: A Technique to Analyze Information-Flow in Object-Oriented Programs. Information and Software Technology, 45(6): 305-314 (2003). IF=3.9, JCR Q2.



代表性会议论文


  1. Zaixing Zhang, Jianming Chang, Tianyuan Hu, Lulu Wang, Bixin Li: Towards Task-Harmonious Vulnerability Assessment Based on LLM. ICPC 2025: 49-59. CCF B

  2. Mei Han, Lulu Wang, Jianming Chang, Bixin Li, Chunguang Zhang: Learning Graph-based Patch Representations for Identifying and Assessing Silent Vulnerability Fixes. ISSRE 2024: 120-131. CCF B

  3. Xinyun Cheng, Xianglong Kong, Li Liao, Bixin Li: A Combined Method for Usage of NLP Libraries Towards Analyzing Software Documents. CAiSE 2020: 515-529. CCF B

  4. Renhao Xiong, David Lo, Bixin Li: Distinguishing Similar Design Pattern Instances through Temporal Behavior Analysis. SANER 2020: 296-307. CCF B

  5. Rensong Xie, Xianglong Kong, Lulu Wang, Ying Zhou, Bixin Li: HiRec: API Recommendation using Hierarchical Context. ISSRE 2019: 369-379. CCF B

  6. Tong Wang, Dongdong Wang, Ying Zhou, Bixin Li: Software Multiple-Level Change Detection Based on Two-Step MPAT Matching. SANER 2019: 4-14. CCF B

  7. Renhao Xiong, Bixin Li Accurate Design Pattern Detection Based on Idiomatic Implementation Matching in Java Language Context. SANER 2019: 163-174. CCF B

  8. Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li: Experience Report: How do Techniques, Programs, and Tests Impact Automated Program Repair? ISSRE 2015: 194-204. CCF B

  9. Dong Qiu, Bixin Li, Zhendong Su: An Empirical Analysis of the Co-evolution of Schema and Code in Database Applications. ESEC/SIGSOFT FSE 2013: 125-135. CCF A

  10. Xiaobing Sun, Bixin Li: Using Formal Concept Analysis to Support Change Analysis. ASE 2011: 641-645. CCF A

  11. Bixin Li, Dong Qiu, Shunhui Ji, Di Wang: Automatic Test Case Selection and Generation for Regression Testing of Composite Service based on Extensible BPEL Flow Graph. ICSM 2010: 1-10. CCF B

  12. Pengcheng Zhang, Lars Grunske, Antony Tang, Bixin Li: A Formal Syntax for Probabilistic Timed Property Sequence Charts. ASE 2009: 500-504. CCF A

  13. Pengcheng Zhang, Bixin Li, Henry Muccini, Yu Zhou, Mingjie Sun: Data-Enriched Modeling and Verification of WS-CDL Based on UML Models. ICWS 2008: 752-753. CCF B


  • 联系方式
  • 通信地址:南京市江宁区必威betway中文官网路2号必威betway中文官网九龙湖校区计算机学院
  • 邮政编码:211189
  • ​办公地点:必威betway中文官网九龙湖校区计算机楼
  • 学院微信公众号