[1] 曹思聪, 孙小兵, 薄莉莉, 吴潇雪, 李斌, 陈厅, 罗夏朴, 张涛, 刘维. 基于结构感知图神经网络的多类别漏洞检测方法[J]. 软件学报, 2025, 36(11): 5045-5061. CCF推荐计算领域高质量科技期刊T1类
[2] S. Cao, X. Sun, R. Widyasari, D. Lo, X. Wu, L. Bo, J. Zhang, B. Li, W. Liu, D. Wu, Y. Chen. A Systematic Literature Review on Explainability for ML/DL-based Software Engineering[J]. ACM Computing Surveys, 2025, 58(4): 95:1-95:34. 中科院一区
[3] S. Cao, X. Sun, L. Bo, R. Wu, B. Li, X. Wu, C. Tao, T. Zhang, W. Liu. Learning to Detect Memory-related Vulnerabilities[J]. ACM Transactions on Software Engineering and Methodology, 2024, 33(2): 43:1-43:35. CCF推荐A类
[4] S. Cao, X. Sun, X. Wu, D. Lo, L. Bo, B. Li, W. Liu. COCA: Improving and Explaining Graph Neural Network-Based Vulnerability Detection Systems[C]. IEEE/ACM International Conference on Software Engineering (ICSE), 2024: 155:1-155:13. CCF推荐A类
[5] S. Cao, X. Sun, X. Wu, D. Lo, L. Bo, B. Li, X. Liu, X. Lin, W. Liu. SNOPY: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection[C]. IEEE/ACM International Conference on Automated Software Engineering (ASE), 2024: 606-618. CCF推荐A类
[6] S. Cao, X. Sun, X. Yang, X. Wu, W. Liu, B. Li. Hierarchy-Aware Representation Learning for Industrial IoT Vulnerability Classification[J]. IEEE Transactions on Industrial Informatics, 2024, 20(10): 11763-11773. 中科院一区
[7] S. Cao, B. He, X. Sun, Y. Ouyang, C. Zhang, X. Wu, T. Su, L. Bo, B. Li, C. Ma, J. Li, T. Wei. ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing[C]. IEEE Symposium on Security and Privacy (S&P), 2023: 2726-2743. CCF推荐A类
[8] S. Cao, X. Sun, X. Wu, L. Bo, B. Li, R. Wu, W. Liu, B. He, Y. Ouyang, J. Li. Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation[C]. IEEE/ACM International Conference on Software Engineering (ICSE), 2023: 397-409. CCF推荐A类
[9] S. Cao, X. Sun, L. Bo, R. Wu, B. Li, C. Tao. MVD: Memory-related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks[C]. IEEE/ACM International Conference on Software Engineering (ICSE), 2022: 1456-1468. CCF推荐A类
[10] Z. Ye, X. Sun, S. Cao(通讯), L. Bo, B. Li. Well Begun is Half Done: Location-Aware and Trace-Guided Iterative Automated Vulnerability Repair[C]. IEEE/ACM International Conference on Software Engineering (ICSE), 2026. CCF推荐A类
[11] X. Zhou, S. Cao(通讯), X. Sun, D. Lo. Large Language Model for Vulnerability Detection and Repair: Literature Review and the Road Ahead[J]. ACM Transactions on Software Engineering and Methodology, 2025, 34(5): 145:1-145:31. CCF推荐A类
[12] X. Sun, M. Zhou, S. Cao(通讯), X. Wu, L. Bo, D. Wu, B. Li, Y. Xiang. HgtJIT: Just-in-Time Vulnerability Detection Based on Heterogeneous Graph Transformer[J]. IEEE Transactions on Dependable and Secure Computing, 2025, 22(6): 6522-6538. CCF推荐A类
[13] X. Gao, X. Sun, S. Cao(通讯), K. Huang, D. Wu, X. Liu, X. Lin, Y. Xiang. MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem[C]. USENIX Security Symposium (Security), 2025: 4741-4758. CCF推荐A类
[14] X. Sun, X. Gao, S. Cao(通讯), L. Bo, X. Wu, K. Huang. 1+1>2: Integrating Deep Code Behaviors with Metadata Features for Malicious PyPI Package Detection[C]. IEEE/ACM International Conference on Automated Software Engineering (ASE), 2024: 1159-1170. CCF推荐A类
[15] Z. Ye, X. Sun, L. Bo, S. Cao, X. Ren, L. Qi, J. Zhang. KG4VA: Constructing Vulnerability Knowledge Graph for Software Vulnerability Assessment[J]. IEEE Transactions on Services Computing, 2025, 18(6): 3932-9345. CCF推荐A类