Skip to content

Commit

Permalink
修改主页
Browse files Browse the repository at this point in the history
  • Loading branch information
ZhipengXue97 committed Nov 13, 2022
1 parent e812605 commit b47c022
Show file tree
Hide file tree
Showing 3 changed files with 3 additions and 3 deletions.
2 changes: 1 addition & 1 deletion authors/admin/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -536,7 +536,7 @@ <h3>


<p>I am a PhD Student at Zhejiang University, China, under the supervision of my incredible advisor
<a href="https://zpgao.github.io/" target="_blank" rel="noopener">Prof. Dr. ZhipengGao</a> and
<a href="https://zpgao.github.io/" target="_blank" rel="noopener">Prof. Dr. Zhipeng Gao</a> and
<a href="https://person.zju.edu.cn/en/0087125" target="_blank" rel="noopener">Prof. Dr. Shanping Li</a>. I did my master studies at National University of Defense Technology under the supervision of
<a href="https://scholar.google.com/citations?user=GbDudEcAAAAJ&amp;hl=en&amp;oi=ao" target="_blank" rel="noopener">Prof. Dr. Shanshan Li</a>.</p>
<p>My research interests include static analysis, code understanding and mining software repositories.</p>
Expand Down
2 changes: 1 addition & 1 deletion index.html
Original file line number Diff line number Diff line change
Expand Up @@ -593,7 +593,7 @@ <h3>
<h1>Biography</h1>

<p>I am a PhD Student at Zhejiang University, China, under the supervision of my incredible advisor
<a href="https://zpgao.github.io/" target="_blank" rel="noopener">Prof. Dr. ZhipengGao</a> and
<a href="https://zpgao.github.io/" target="_blank" rel="noopener">Prof. Dr. Zhipeng Gao</a> and
<a href="https://person.zju.edu.cn/en/0087125" target="_blank" rel="noopener">Prof. Dr. Shanping Li</a>. I did my master studies at National University of Defense Technology under the supervision of
<a href="https://scholar.google.com/citations?user=GbDudEcAAAAJ&amp;hl=en&amp;oi=ao" target="_blank" rel="noopener">Prof. Dr. Shanshan Li</a>.</p>
<p>My research interests include static analysis, code understanding and mining software repositories.</p>
Expand Down
2 changes: 1 addition & 1 deletion index.json
Original file line number Diff line number Diff line change
@@ -1 +1 @@
[{"authors":["admin"],"categories":null,"content":"I am a PhD Student at Zhejiang University, China, under the supervision of my incredible advisor Prof. Dr. ZhipengGao and Prof. Dr. Shanping Li. I did my master studies at National University of Defense Technology under the supervision of Prof. Dr. Shanshan Li.\nMy research interests include static analysis, code understanding and mining software repositories.\n","date":1654041600,"expirydate":-62135596800,"kind":"taxonomy","lang":"en","lastmod":1654041600,"objectID":"2525497d367e79493fd32b198b28f040","permalink":"https://zhipengxue97.github.io/authors/admin/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/authors/admin/","section":"authors","summary":"I am a PhD Student at Zhejiang University, China, under the supervision of my incredible advisor Prof. Dr. ZhipengGao and Prof. Dr. Shanping Li. I did my master studies at National University of Defense Technology under the supervision of Prof.","tags":null,"title":"Zhipeng Xue","type":"authors"},{"authors":["Zhipeng Xue","Zhijie Jiang","Chenlin Huang","Rulin Xu","Xiangbing Huang","Liumin Hu"],"categories":null,"content":"","date":1654041600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1654041600,"objectID":"7c90ad6b354615f1cad50153cf0bc97d","permalink":"https://zhipengxue97.github.io/publication/seed-semantic-graph-based-deep-detection-for-type-4-clone/","publishdate":"2022-06-01T00:00:00Z","relpermalink":"/publication/seed-semantic-graph-based-deep-detection-for-type-4-clone/","section":"publication","summary":"Type-4 clones refer to a pair of code snippets with similar semantics but written in different syntax, which challenges the existing code clone detection techniques. Previous studies, however, highly rely on syntactic structures and textual tokens, which cannot precisely represent the semantic information of code and might introduce non-negligible noise into the detection models. To overcome these limitations, we design a novel semantic graph-based deep detection approach, called SEED. For a pair of code snippets, SEED constructs a semantic graph of each code snippet based on intermediate representation to represent the code semantic more precisely compared to the representations based on lexical and syntactic analysis. To accommodate the characteristics of Type-4 clones, a semantic graph is constructed focusing on the operators and API calls instead of all tokens. Then, SEED generates the feature vectors by using the graph match network and performs clone detection based on the similarity among the vectors. Extensive experiments show that our approach significantly outperforms two baseline approaches over two public datasets and one customized dataset. Especially, SEED outperforms other baseline methods by an average of 25.2% in the form of F1-Score. Our experiments demonstrate that SEED can reach state-of-the-art and be useful for Type-4 clone detection in practice.","tags":["Code Clone","Code Understanding","Deep Learning"],"title":"SEED: Semantic Graph Based Deep Detection for Type-4 Clone","type":"publication"},{"authors":["Zhipeng Xue","Yuanliang Zhang","Rulin Xu"],"categories":null,"content":"","date":1652659200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1652659200,"objectID":"6a3d4207439854507b58e3b461ed8629","permalink":"https://zhipengxue97.github.io/publication/clone-based-usage-pattern-mining/","publishdate":"2022-05-16T00:00:00Z","relpermalink":"/publication/clone-based-usage-pattern-mining/","section":"publication","summary":"When programmers retrieve a code method and want to reuse it, they need to understand the usage patterns of the retrieved method. However, it is difficult to obtain usage information of the retrieved method since this method may only have a brief comment and few available usage examples. In this paper, we propose an approach, called LUPIN (cLone-based Usage Pattern mIniNg), to mine the usage patterns of these methods, which do not widely appeared in the code repository. The key idea of LUPIN is that the cloned code of the target method may have a similar usage pattern, and we can collect more usage information of the target method from cloned code usage examples. From the amplified usage examples, we mine the usage pattern of the target method by frequent subsequence mining after program slicing and code normalization. Our evaluation shows that LUPIN can mine four categories of usage patterns with an average precision of 0.65.","tags":["Code Clone","Usage Pattern Mining","Software Repositories Mining"],"title":"Clone-based Code Method Usage Pattern Mining","type":"publication"},{"authors":["Chenglong Zhou","Haoran Liu","Yuanliang Zhang","Zhipeng Xue","Qing Liao","JinJing Zhao","Ji Wang"],"categories":null,"content":"","date":1622505600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1622505600,"objectID":"3bd6da95770c09f71d23cc3b68402856","permalink":"https://zhipengxue97.github.io/publication/deep-understanding-of-runtime-configuration-intention/","publishdate":"2021-06-01T00:00:00Z","relpermalink":"/publication/deep-understanding-of-runtime-configuration-intention/","section":"publication","summary":"The runtime environment and workload of software are constantly changing, requiring users to make appropriate adjustments to accommodate these changes. The runtime configuration, however, as the interface for users to manipulate software behavior often requires domain-specific knowledge to understand. This usually results in users spending a considerable amount of time wading through document and user manuals trying to understand the runtime configuration. In this paper, we study the possibility of understanding the intention of runtime configuration options through their documents, even sometimes it is difficult for users to understand. Based on these studies, we classify the runtime configuration option’s intention into six categories. Accordingly, we design runtime Configuration Intention Classifier (CIC), a supervised approach based on CNN to classify the runtime configuration option’s intention according to its document. CIC integrates the features of runtime configuration names and descriptions according to different levels of granularity and predicts the intention of runtime configuration options accordingly. Extensive experiments show that our approach can achieve an accuracy of 85.6% and outperform nine comparative approaches by up to 16.6% over the dataset we customized.","tags":["Configuration","Deep Learning"],"title":"Deep Understanding of Runtime Configuration Intention","type":"publication"}]
[{"authors":["admin"],"categories":null,"content":"I am a PhD Student at Zhejiang University, China, under the supervision of my incredible advisor Prof. Dr. Zhipeng Gao and Prof. Dr. Shanping Li. I did my master studies at National University of Defense Technology under the supervision of Prof. Dr. Shanshan Li.\nMy research interests include static analysis, code understanding and mining software repositories.\n","date":1654041600,"expirydate":-62135596800,"kind":"taxonomy","lang":"en","lastmod":1654041600,"objectID":"2525497d367e79493fd32b198b28f040","permalink":"https://zhipengxue97.github.io/authors/admin/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/authors/admin/","section":"authors","summary":"I am a PhD Student at Zhejiang University, China, under the supervision of my incredible advisor Prof. Dr. Zhipeng Gao and Prof. Dr. Shanping Li. I did my master studies at National University of Defense Technology under the supervision of Prof.","tags":null,"title":"Zhipeng Xue","type":"authors"},{"authors":["Zhipeng Xue","Zhijie Jiang","Chenlin Huang","Rulin Xu","Xiangbing Huang","Liumin Hu"],"categories":null,"content":"","date":1654041600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1654041600,"objectID":"7c90ad6b354615f1cad50153cf0bc97d","permalink":"https://zhipengxue97.github.io/publication/seed-semantic-graph-based-deep-detection-for-type-4-clone/","publishdate":"2022-06-01T00:00:00Z","relpermalink":"/publication/seed-semantic-graph-based-deep-detection-for-type-4-clone/","section":"publication","summary":"Type-4 clones refer to a pair of code snippets with similar semantics but written in different syntax, which challenges the existing code clone detection techniques. Previous studies, however, highly rely on syntactic structures and textual tokens, which cannot precisely represent the semantic information of code and might introduce non-negligible noise into the detection models. To overcome these limitations, we design a novel semantic graph-based deep detection approach, called SEED. For a pair of code snippets, SEED constructs a semantic graph of each code snippet based on intermediate representation to represent the code semantic more precisely compared to the representations based on lexical and syntactic analysis. To accommodate the characteristics of Type-4 clones, a semantic graph is constructed focusing on the operators and API calls instead of all tokens. Then, SEED generates the feature vectors by using the graph match network and performs clone detection based on the similarity among the vectors. Extensive experiments show that our approach significantly outperforms two baseline approaches over two public datasets and one customized dataset. Especially, SEED outperforms other baseline methods by an average of 25.2% in the form of F1-Score. Our experiments demonstrate that SEED can reach state-of-the-art and be useful for Type-4 clone detection in practice.","tags":["Code Clone","Code Understanding","Deep Learning"],"title":"SEED: Semantic Graph Based Deep Detection for Type-4 Clone","type":"publication"},{"authors":["Zhipeng Xue","Yuanliang Zhang","Rulin Xu"],"categories":null,"content":"","date":1652659200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1652659200,"objectID":"6a3d4207439854507b58e3b461ed8629","permalink":"https://zhipengxue97.github.io/publication/clone-based-usage-pattern-mining/","publishdate":"2022-05-16T00:00:00Z","relpermalink":"/publication/clone-based-usage-pattern-mining/","section":"publication","summary":"When programmers retrieve a code method and want to reuse it, they need to understand the usage patterns of the retrieved method. However, it is difficult to obtain usage information of the retrieved method since this method may only have a brief comment and few available usage examples. In this paper, we propose an approach, called LUPIN (cLone-based Usage Pattern mIniNg), to mine the usage patterns of these methods, which do not widely appeared in the code repository. The key idea of LUPIN is that the cloned code of the target method may have a similar usage pattern, and we can collect more usage information of the target method from cloned code usage examples. From the amplified usage examples, we mine the usage pattern of the target method by frequent subsequence mining after program slicing and code normalization. Our evaluation shows that LUPIN can mine four categories of usage patterns with an average precision of 0.65.","tags":["Code Clone","Usage Pattern Mining","Software Repositories Mining"],"title":"Clone-based Code Method Usage Pattern Mining","type":"publication"},{"authors":["Chenglong Zhou","Haoran Liu","Yuanliang Zhang","Zhipeng Xue","Qing Liao","JinJing Zhao","Ji Wang"],"categories":null,"content":"","date":1622505600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1622505600,"objectID":"3bd6da95770c09f71d23cc3b68402856","permalink":"https://zhipengxue97.github.io/publication/deep-understanding-of-runtime-configuration-intention/","publishdate":"2021-06-01T00:00:00Z","relpermalink":"/publication/deep-understanding-of-runtime-configuration-intention/","section":"publication","summary":"The runtime environment and workload of software are constantly changing, requiring users to make appropriate adjustments to accommodate these changes. The runtime configuration, however, as the interface for users to manipulate software behavior often requires domain-specific knowledge to understand. This usually results in users spending a considerable amount of time wading through document and user manuals trying to understand the runtime configuration. In this paper, we study the possibility of understanding the intention of runtime configuration options through their documents, even sometimes it is difficult for users to understand. Based on these studies, we classify the runtime configuration option’s intention into six categories. Accordingly, we design runtime Configuration Intention Classifier (CIC), a supervised approach based on CNN to classify the runtime configuration option’s intention according to its document. CIC integrates the features of runtime configuration names and descriptions according to different levels of granularity and predicts the intention of runtime configuration options accordingly. Extensive experiments show that our approach can achieve an accuracy of 85.6% and outperform nine comparative approaches by up to 16.6% over the dataset we customized.","tags":["Configuration","Deep Learning"],"title":"Deep Understanding of Runtime Configuration Intention","type":"publication"}]

0 comments on commit b47c022

Please sign in to comment.