当前位置: X-MOL首页全球导师 国内导师 › 李必信

个人简介

1969年8月出生,2001获得南京大学博士学位,2001-2003分别在芬兰、挪威和荷兰等地进行博士后研究工作。 2004年2月至今东南大学计算机科学与工程学院二级教授、博士生导师,东南大学软件工程研究所所长。2006年入选教育部新世纪人才培养计划、2011年度中创软件人才奖获得者、2次获得教育部科学技术奖(自然科学奖)二等奖。入选江苏省“青蓝工程”、“333工程”、“六大人才高峰”等人才计划。研究方向为智能软件开发与运维、软件缺陷检测与质量提升、软件安全与可信保障。从1999年开始,先后主持国家级、省部级项目以及大型企业合作项目40多项, 在《China Science:Information Science》、《ACM Transactions on Software Engineering and Methodology》、《ACM Computing Surveys》、 《IEEE Transactions on Software Engineering 》、 《IEEE Transactions on Dependable and Secure Computing》、《IEEE Transactions on Reliability》、《IEEE Transactions on Network Science and Engineering》、《IEEE Transactions on Network and Service Management》、《Information and Software Technology》、《Software Testing, Verification and Reliability》、《Journal of Systems and Software》《Journal of Computer Science and Technology》, 《软件学报》、《计算机学报》、《计算机研究与发展》等国内外著名期刊和重要国际会议发表学术论文200余篇,出版专著3部,教材1部,获得授权发明专利60余项。

研究领域

智能化软件开发和维护、软件缺陷检测与质量提升、软件安全与可信保障 智能软件开发与运维、软件缺陷检测与质量提升、软件安全与可信保障 软件系统安全保障 : 1)区块链供应链系统的安全保障,包括智能合约安全、共识协议安全、隐私安全以及系统韧性等方面;2)软件架构的安全保障,包括软件架构安全评估和防御、软件架构韧性评估和增强等方面。 软件缺陷自动检测、定位和修复 : 包括基于深度学习和大模型的软件缺陷自动检测、定位和修复等关键技术研究和实验研究。

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

1. Zhihao Xu, Bixin Li , and Xiaoning Du. TRAGIC: Test Oracle Generation for ISA Compliance Testing via Large Language Model. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems(in press), 2025. IF=2.8, JCR Q1, CCF A . 2. Can Zhao, Jiaxin Pan, Bixin Li . SA.Resilience.Evaluator: Evaluate the Resilience of Software Architecture Based on Attack Surface Analysis. IEEE Transactions on Reliability(in press), 2025. IF=5.9, JCR Q1. 3. Bixin Li , Tianyuan Hu, Xiangfei Xu, and Lulu Wang. VulFinder: Exploring Chaincode Vulnerabilities More Effectively and Efficiently Using Knowledge Graph Based Defect Pattern Matching. IEEE Transactions on Software Engineering (Early Access ). DOI: 10.1109/TSE.2025.3605379 (2025). IF=5.6, JCR Q1, CCF A . 4. Qihao Bao, Bixin Li ,Yujun Wang,and Dongyu Cao.How do Characteristic Parameters Affect the Security of Proof-of-Work Blockchain? IEEE Transaction on Network and Service Management, 22(5):4636-4650 (2025). IF=6.6, JCR Q1. 5. Tianyuan Hu, Jingyue Li, Bixin Li , and Andre Storhaug: Why Smart Contracts Reported as Vulnerable Were not Exploited? IEEE Transactions on Dependable and Secure Computing, 22(3):2579-2596 (2025). IF=7.0, JCR Q1, CCF A . 6. Ruilin Xie, Xiang Chen, Qifan He, Bixin Li , Zhanqi Cui: IATT: Interpretation Analysis based Transferable Test Generation for Convolutional Neural Networks. ACM Transactions on Software Engineering and Methodology, 34(4): 1-34 (2025). IF=4.4, JCR Q1, CCF A . 7. Yingying Chen, Bixin Li , Yan Xiao, Xiaoning Du. PonziFinder: Attention-Based Edge-Enhanced Ponzi Contract Detection, IEEE Transactions on Reliability, 74(1): 2305-2319 (2025). IF=5.9, JCR Q1. 8. Bixin Li , Zhenyu Pan, Tianyuan Hu: EvoFuzzer: An Evolutionary Fuzzer for Detecting Reentrancy Vulnerability in Smart Contracts. IEEE Transactions on Network Science and Engineering, 11(6): 5790-5802 (2024). IF=6.6, JCR Q1. 9. Tianyuan Hu, Bixin Li , Zhenyu Pan, Chen Qian: Detect Defects of Solidity Smart Contract Based on the Knowledge Graph. IEEE Transactions on Reliability, 73(1): 186-202 (2024). IF=5.9, JCR Q1. 10. Tong Wang, Bixin Li : EsArCost: Estimating Repair Costs of Software Architecture Erosion using Slice Technology. Journal of System and Software, 208: 111875 (2024). IF=4.1, JCR Q1. 11. Jiaxin Pan, Zixuan Liu, Donglin Li, Lulu Wang, Bixin Li : An Empirical Study of Software Architecture Resilience Evaluation Methods. Journal of System and Software, 202: 111726 (2023). IF=4.1, JCR Q1. 12. Lulu Wang, Peng Hu, Xianglong Kong, Wenjie Ouyang, and Bixin Li et al.: Microservice Architecture Recovery based on Intra-service and Inter-service Features. Journal of System and Software, 204: 111754 (2023). IF=4.1, JCR Q1. 13. Qihao Bao, Bixin Li , Tianyuan Hu, Xueyong Sun: A Survey of Blockchain Consensus Safety and Security: State-of-the-Art, Challenges, and Future work. Journal of System and Software, 196: 111555 (2023). IF=4.1, JCR Q1. 14. Bixin Li , Zhenyu Pan, Tianyuan Hu: ReDefender: Detecting Reentrancy Vulnerabilities in Smart Contracts Automatically. IEEE Transactions on Reliability, 71(2): 984-999 (2022). IF=5.9, JCR Q1. 15. Xianglong Kong, Weina Han, Li Liao, Bixin Li : An Analysis of Correctness for API Recommendation: Are the Unmatched Results Useless? Science China: Information Science, 63(9): 1-15 (2020). IF=7.3, JCR Q1, CCF A . 16. Lulu Wang, Jingyue Li, Bixin Li : Tracking Runtime Concurrent Dependences in Java Threads using Thread Control Profiling. Journal of System and Software, 148: 116-131 (2019). IF=4.1, JCR Q1. 17. Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li : The Impacts of Techniques, Programs and Tests on Automated Program Repair: An Empirical Study. Journal of System and Software, 137: 480-496 (2018). IF=3.8, JCR Q2. 18. Lulu Wang, Bixin Li , Hareton Leung: A new method to encode calling contexts with recursions. Science China: Information Science, 59(5): 052104:1-052104:15 (2016). IF=7.3, JCR Q1, CCF A . 19. Xiaobing Sun, Hareton Leung, Bin Li, Bixin Li : Change Impact Analysis and Changeability Assessment for a Change Proposal: An Empirical Study. Journal of System and Software, 96: 51-60 (2014). IF=4.1, JCR Q1. 20. Bixin Li , Lulu Wang, Hareton Leung: Profiling Selected Paths with Loops. Science China: Information Science, 57(7): 1-15 (2014). IF=7.3, JCR Q1, CCF A . 21. Dong Qiu, Bixin Li , Shunhui Ji, Hareton K. N. Leung: Regression Testing of Web Service: A Systematic Mapping Study. ACM Computing Surveys, 47(2): 21:1-21:46 (2014). IF=23.8, JCR Q1. 22. Bixin Li , Li Liao, Hareton Leung, Rui Song: PHAT: A Preference and Honesty Aware Trust Model for Web Services. IEEE Transaction on Network and Service Management, 11(3): 363-375 (2014). IF=6.6, JCR Q1. 23. Bixin Li , Shunhui Ji, Dong Qiu, Hareton Leung, Gongyuan Zhang: Verifying the Concurrent Properties in BPEL Based Web Service Composition Process. IEEE Transaction on Network and Service Management, 10(4): 410-424 (2013). IF=6.6, JCR Q1. 24. Bixin Li , Qiandong Zhang, Xiaobing Sun, Hareton Leung: Using Water Wave Propagation Phenomenon to Study Software Change Impact Analysis. Advance in Engineering Software, 58: 45-53 (2013). IF=4.8, JCR Q1. 25. Bixin Li , Xiaobing Sun, Hareton Leung: Combining Concept Lattice with Call Graph for Impact Analysis. Advance in Engineering Software, 53: 1-13 (2012). IF=4.8, JCR Q1. 26. Bixin Li , Dong Qiu, Hareton Leung, Di Wang: Automatic Test Case Selection for Regression Testing of Composite Service Based on Extensible BPEL Flow Graph. Journal of System and Software, 85(6): 1300-1324 (2012). IF=4.1, JCR Q1. 27. Bixin Li , Lulu Wang, Hareton Leung, Fei Liu: Profiling All Paths: A New Profiling Technique for Both Cyclic and Acyclic Paths. Journal of System and Software, 85(7): 1558-1576 (2012). IF=4.1, JCR Q1. 28. Pengcheng Zhang, Bixin Li , Lars Grunske: Timed Property Sequence Chart. Journal of System and Software, 83(3): 371-390 (2010). IF=4.1, JCR Q1. 29. Pengcheng Zhang, Henry Muccini, Bixin Li : A Classification and Comparison of Model Checking Software Architecture Techniques. Journal of System and Software, 83(5): 723-744 (2010). IF=4.1, JCR Q1. 30. Tianyuan Hu, Bixin Li : Dynamic Information Utilization for Securing Ethereum Smart Contracts: A Literature Review. Information and Software Technololy, 182: 107719 (2025). IF=3.9, JCR Q2. 31. Dongyu Cao, Hao Yin, Bixin Li . A Random Mixing Scheme for Protecting Transaction Privacy on Ethereum. Journal of Computer Sceince and Technology, 40(3):1-17 (2025). IF=1.7, JCR Q2. 32. Tianyuan Hu, Jingyue Li, Xiangfei Xu, Bixin Li . SoliTester: Detecting Exploitable External-risky Vulnerability in Smart Contracts using Contract Account Triggering Method. Journal of Software: Evolution and Process, 36(7):1-22 (2024). IF=3.8, JCR Q2. 33. Lulu Wang, Bixin Li , Xianglong Kong: Type Slicing: An Accurate Object Oriented Slicing based on Sub-statement Level Dependence Graph. Information and Software Technololy, 127: 106369 (2020). IF=3.9, JCR Q2. 34. Zecheng Li, Li Liao, Hareton Leung, Bixin Li , Chao Li: Evaluating the Credibility of Cloud Services. Computer & Electrical Engineering, 58: 161-175 (2017). IF=4.0, JCR Q2. 35. Dong Qiu, Bixin Li , Hareton Leung: Understanding the API usage in Java. Information and Software Technology, 73: 81-100 (2016). IF=2.9, JCR Q2. 36. Fei Liu, Bixin Li , Rupesh Nasre: Efficient Online Cycle Detection Technique Combining with Steensgaard Points-to Information. Software - Practice and Experience, 46(5): 601-623 (2016). IF=2.1, JCR Q2 37. Xiaobing Sun, Bixin Li , and Hareton K. N. Leung, et al.: MSR4SM: Using Topic Models to Effectively Mining Software Repositories for Software Maintenance Tasks. Information and Software Technology, 66: 1-12 (2015). IF=3.9, JCR Q2. 38. Bixin Li , Xiaobing Sun, Jacky Keung: FCA-CIA: An Approach of Using FCA to Support Cross-Level Change Impact Analysis for Object-Oriented Java Programs. Information and Software Technology, 55(8): 1437-1449 (2013). IF=3.9, JCR Q2. 39. Bixin Li , Xiaobing Sun, Hareton Leung, Sai Zhang: A Survey of Code-Based Change Impact Analysis Techniques. Software Test, Verification and Reliability, 23(8): 613-646 (2013). IF=1.5, JCR Q2. 40. Bixin Li , Xiaocong Fan, Jun Pang, Jianjun Zhao: A Model for Slicing JAVA Programs Hierarchically. Journal of Computer Sceince and Technology, 19(6): 848-858 (2004). IF=1.7, JCR Q2. 41. Bixin Li : A Technique to Analyze Information-Flow in Object-Oriented Programs. Information and Software Technology, 45(6): 305-314 (2003). IF=3.9, JCR Q2 . 42. Zaixing Zhang, Jianming Chang, Tianyuan Hu, Lulu Wang, Bixin Li : Towards Task-Harmonious Vulnerability Assessment Based on LLM. ICPC 2025: 49-59. CCF B 43. Mei Han, Lulu Wang, Jianming Chang, Bixin Li , Chunguang Zhang: Learning Graph-based Patch Representations for Identifying and Assessing Silent Vulnerability Fixes. ISSRE 2024: 120-131. CCF B 44. Xinyun Cheng, Xianglong Kong, Li Liao, Bixin Li : A Combined Method for Usage of NLP Libraries Towards Analyzing Software Documents. CAiSE 2020: 515-529. CCF B 45. Renhao Xiong, David Lo, Bixin Li : Distinguishing Similar Design Pattern Instances through Temporal Behavior Analysis. SANER 2020: 296-307. CCF B 46. Rensong Xie, Xianglong Kong, Lulu Wang, Ying Zhou, Bixin Li : HiRec: API Recommendation using Hierarchical Context. ISSRE 2019: 369-379. CCF B 47. Tong Wang, Dongdong Wang, Ying Zhou, Bixin Li : Software Multiple-Level Change Detection Based on Two-Step MPAT Matching. SANER 2019: 4-14. CCF B 48. Renhao Xiong, Bixin Li Accurate Design Pattern Detection Based on Idiomatic Implementation Matching in Java Language Context. SANER 2019: 163-174. CCF B 49. Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li : Experience Report: How do Techniques, Programs, and Tests Impact Automated Program Repair? ISSRE 2015: 194-204. CCF B 50. Dong Qiu, Bixin Li , Zhendong Su: An Empirical Analysis of the Co-evolution of Schema and Code in Database Applications. ESEC/SIGSOFT FSE 2013: 125-135. CCF A 51. Xiaobing Sun, Bixin Li : Using Formal Concept Analysis to Support Change Analysis. ASE 2011: 641-645. CCF A 52. Bixin Li , Dong Qiu, Shunhui Ji, Di Wang: Automatic Test Case Selection and Generation for Regression Testing of Composite Service based on Extensible BPEL Flow Graph. ICSM 2010: 1-10. CCF B 53. Pengcheng Zhang, Lars Grunske, Antony Tang, Bixin Li : A Formal Syntax for Probabilistic Timed Property Sequence Charts. ASE 2009: 500-504. CCF A 54. Pengcheng Zhang, Bixin Li , Henry Muccini, Yu Zhou, Mingjie Sun: Data-Enriched Modeling and Verification of WS-CDL Based on UML Models. ICWS 2008: 752-753. CCF B

推荐链接
down
wechat
bug