Cheng, Xiaotong
933  Ergebnisse:
Personensuche X
?
2

A method to identify overfitting program repair patches bas..:

Dong, Yukun ; Cheng, Xiaotong ; Yang, Yufei...
Science of Computer Programming.  235 (2024)  - p. 103105 , 2024
 
?
7

DeKeDVer: A deep learning-based multi-type software vulnera..:

Dong, Yukun ; Tang, Yeer ; Cheng, Xiaotong.
Information and Software Technology.  163 (2023)  - p. 107290 , 2023
 
?
8

Tandem Guest‐Host‐Receptor Recognitions Precisely Guide Cip..:

Zhan, Wenjun ; Xu, Lingling ; Liu, Zhiyu...
Angewandte Chemie International Edition.  62 (2023)  32 - p. , 2023
 
?
11

A Bandit Online Convex Optimization Approach To Distributed..:

, In: ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),
 
?
12

Distributed Task Management in Fog Computing: A Socially Co..:

Cheng, Xiaotong ; Maghsudi, Setareh
IEEE Transactions on Green Communications and Networking.  7 (2023)  3 - p. 1486-1500 , 2023
 
?
13

Enhanced Pavlovian-to-instrumental transfer in internet gam..:

Qin, Cheng ; Feng, Shuang ; Chen, Yuwen...
Journal of Behavioral Addictions.  12 (2023)  2 - p. 471-479 , 2023
 
?
14

SedSVD: Statement-level software vulnerability detection ba..:

Dong, Yukun ; Tang, Yeer ; Cheng, Xiaotong..
Information and Software Technology.  158 (2023)  - p. 107168 , 2023
 
?
15

Brain structural alterations in internet gaming disorder: F..:

Tian, Ming-Yuan ; Zhou, Xin-Yi ; Liao, Xiao-Yuan...
Progress in Neuro-Psychopharmacology and Biological Psychiatry.  127 (2023)  - p. 110806 , 2023
 
1-15