Name
Affiliation
Papers
BIN LUO
State Key Laboratory for Novel Software Technology, Nanjing University, Software Institute, Nanjing University, Nanjing, 210093, PR China
58
Collaborators
Citations 
PageRank 
108
66
21.04
Referers 
Referees 
References 
231
785
272
Search Limit
100785
Title
Citations
PageRank
Year
AST-Trans: Code Summarization with Efficient Tree-Structured Attention00.342022
SPT-Code: Sequence-to-Sequence Pre-Training for Learning Source Code Representations00.342022
TamForen: A tamper-proof cloud forensic framework00.342022
Deep Learning Meets Software Engineering: A Survey on Pre-Trained Models of Source Code00.342022
Statute recommendation: Re-ranking statutes by modeling case-statute relation with interpretable hand-crafted features00.342022
AST-transformer: encoding abstract syntax trees efficiently for code summarization00.342021
Understanding Digital Forensic Characteristics of Smart Speaker Ecosystems00.342021
Recommending Statutes: A Portable Method Based on Neural Networks00.342021
SniffMislead - Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes.30.382021
Learning Fine-Grained Fact-Article Correspondence in Legal Cases00.342021
Interaction-Oriented Service Entity Placement in Edge Computing30.382021
Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction00.342021
A Non-Intrusive Method for Smart Speaker Forensics00.342021
Don't Miss the Potential Customers! Retrieving Similar Ads to Improve User Targeting.00.342021
Optimizing Federated Edge Learning on Non-IID Data via Neural Architecture Search00.342021
Detecting And Mitigating Arp Attacks In Sdn-Based Cloud Environment00.342020
Forensic Model for DDoS Attack.00.342020
Leveraging multiple features for document sentiment classification.20.362020
A novel completeness definition of event logs and corresponding generation algorithm00.342020
Efficient Service Entity Chain Placement in Mobile Edge Computing.00.342020
A Design of Firewall Based on Feedback of Intrusion Detection System in Cloud Environment.00.342019
Modeling and deploying hybrid tenant requests with shared networklets.00.342019
Online learning offloading framework for heterogeneous mobile edge computing system.30.422019
A Utility-based Optimization Framework for Edge Service Entity Caching10.372019
File-Level Socio-Technical Congruence and its Relationship with Bug Proneness in OSS Projects00.342019
Improving Statute Prediction via Mining Correlations between Statutes.00.342019
Apply event extraction techniques to the judicial field00.342019
A load-aware resource allocation and task scheduling for the emerging cloudlet system.30.372018
Does Socio-Technical Congruence Have an Effect on Continuous Integration Build Failures? An Empirical Study on 10 GitHub Projects00.342018
Statutes Recommendation Using Classification And Co-Occurrence Between Statutes00.342018
Cost and Energy Aware Scheduling Algorithm for Scientific Workflows with Deadline Constraint in Clouds.190.632018
Monitoring User-Intent of Cloud-Based Networked Applications in Cognitive Networks.00.342018
A Novel Convolutional Neural Network For Statutes Recommendation00.342018
PTM: A Topic Model for the Inferring of the Penalty.20.382018
Word Embedding Based Document Similarity for the Inferring of Penalty.20.392018
Construction Of Microblog-Specific Chinese Sentiment Lexicon Based On Representation Learning00.342018
Topic Model Based Text Similarity Measure for Chinese Judgment Document.10.412017
Knowledge Graph Construction Based on Judicial Data with Social Media10.352017
Automatically Classify Chinese Judgment Documents Utilizing Machine Learning Algorithms10.362017
A Method of the Association Statistics between the Cause of Action and the Statutes00.342017
Design and Implementation of Visual Modeling Tool for Evidence Chain00.342017
Eyes Understand the Sketch!: Gaze-Aided Stroke Grouping of Hand-Drawn Flowcharts.10.352017
Build Evidence Chain Relational Model Based on Chinese Judgment Documents.00.342017
Information Extraction from Chinese Judgment Documents00.342017
Checking the Statutes in Chinese Judgment Document Based on Editing Distance Algorithm00.342017
Statutes Recommendation Based on Text Similarity00.342017
Software cybernetics in BPM: Modeling software behavior as feedback for evolution by a novel discovery method based on augmented event logs.00.342017
Cluster Correction on Polysemy and Synonymy00.342017
Autopatchdroid: A Framework For Patching Inter-App Vulnerabilities In Android Application10.362017
Salient Object Detection via Video Spatio-Temporal Difference and Coherence00.342016
  • 1
  • 2