Jingyue Li

Jingyue Li
  • Professor at Norwegian University of Science and Technology

About

156
Publications
58,564
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,666
Citations
Current institution
Norwegian University of Science and Technology
Current position
  • Professor

Publications

Publications (156)
Preprint
The advent of large language models (LLMs) like GitHub Copilot has significantly enhanced programmers' productivity, particularly in code generation. However, these models often struggle with real-world tasks without fine-tuning. As LLMs grow larger and more performant, fine-tuning for specialized tasks becomes increasingly expensive. Parameter-eff...
Article
Consensus rule changes in public permissionless blockchains are challenging. Changes can be contentious, and getting all participants to agree could be tedious. Notably, Bitcoin has seen centralisation tendencies in mining and development. However, how these tendencies influence governance processes of consensus evolution has received minimal atten...
Article
Due to well-hidden and stage-triggered properties of second-order SQL injections in web applications, current approaches are ineffective in addressing them and still report high false negatives and false positives. To reduce false results, we propose a Proxy-based static analysis and dynamic execution mechanism towards detecting, locating and preve...
Article
Full-text available
Release notes (RNs) refer to the technical documentation that offers users, developers, and other stakeholders comprehensive information about the changes and updates of a new software version. Producing high-quality RNs can be challenging, and it remains unknown what issues developers commonly encounter and what effective strategies can be adopted...
Article
Smart contract security is crucial for blockchain applications. While studies suggest that only a small fraction of reported vulnerabilities are exploited, no follow-up research has investigated the reasons behind this. Our goal is to understand the factors contributing to the low exploitation rate to improve vulnerability detection and defense mec...
Article
The vulnerability in smart contracts (SCs) on the blockchain system may lead to severe security compromises. The SC can be invoked from an externally owned account (EOA) or a contract account (CA). The account a user creates to receive or send ether is an EOA. A CA contains codes that can interact with SCs. In Solidity SC, some vulnerabilities can...
Preprint
Context: The increasing use of artificial neural network (ANN) classifiers in systems, especially safety-critical systems (SCSs), requires ensuring their robustness against out-of-distribution (OOD) shifts in operation, which are changes in the underlying data distribution from the data training the classifier. However, measuring the robustness of...
Article
The runtime evolution of a system concerns the ability to make changes during runtime without disrupting the service. Blockchain systems need to provide continuous service and integrity. Similar challenges have been observed in centrally controlled distributed systems or mobile applications that handle runtime evolution, mainly by supporting compat...
Preprint
Full-text available
Many open source projects provide good first issues (GFIs) to attract and retain newcomers. Although several automated GFI recommenders have been proposed, existing recommenders are limited to recommending generic GFIs without considering differences between individual newcomers. However, we observe mismatches between generic GFIs and the diverse b...
Article
Full-text available
By adopting agile and lean practices, DevOps aims to achieve rapid value delivery by speeding up development and deployment cycles, which however lead to more security concerns that cannot be fully addressed by an isolated security role only in the final stage of development. DevSecOps promotes security as a shared responsibility integrated into th...
Preprint
Full-text available
p>Smart contract security is essential for blockchain applications. Studies show that few of the reported vulnerabilities are exploited. However, no follow-up study is performed to why the reported vulnerabilities are not exploited. We aim to understand the reasons for the low exploitation rate to help improve vulnerability detection practices. We...
Preprint
Full-text available
p>The manuscript has been submitted to IEEE TSE.</p
Preprint
Full-text available
p> This version of the preprint was published by a mistake. View the latest version: https://www.researchgate.net/publication/370956968_Runtime_Evolution_of_Bitcoin's_Consensus_Rules (May 2023) The manuscript has been submitted to IEEE TSE.</p
Preprint
Full-text available
p>Cyber-physical systems are becoming more intelligent with the adoption of heterogeneous sensor networks and machine learning capabilities that deal with an increasing amount of input data. While this complexity aims to solve problems in various domains, it adds new challenges for the system assurance. One is the rise of the number of abnormal beh...
Preprint
Full-text available
p>Cyber-physical systems are becoming more intelligent with the adoption of heterogeneous sensor networks and machine learning capabilities that deal with an increasing amount of input data. While this complexity aims to solve problems in various domains, it adds new challenges for the system assurance. One is the rise of the number of abnormal beh...
Preprint
Full-text available
Blockchain systems run consensus rules as code to agree on the state of the distributed ledger and secure the network. Changing these rules can be risky and challenging. In addition, it can often be controversial and take much effort to make all the necessary participants agree to adopt a change. Arguably, Bitcoin has seen centralisation tendencies...
Preprint
Full-text available
p>Smart contract security is essential for blockchain applications. Studies show that few of the reported vulnerabilities are exploited. However, no follow-up study is performed to why the reported vulnerabilities are not exploited. We aim to understand the reasons for the low exploitation rate to help improve vulnerability detection practices. We...
Preprint
Full-text available
p>Smart contract security is essential for blockchain applications. Studies show that few of the reported vulnerabilities are exploited. However, no follow-up study is performed to why the reported vulnerabilities are not exploited. We aim to understand the reasons for the low exploitation rate to help improve vulnerability detection practices. We...
Preprint
Full-text available
p>As smart contracts process digital assets, their security is essential for blockchain applications. Many approaches have been proposed to detect smart contract vulnerabilities. Studies show that few of the reported vulnerabilities are exploited and hypothesize that many of the reported vulnerabilities are false positives. However, no follow-up st...
Article
Cyber-physical systems are becoming more intelligent with the adoption of heterogeneous sensor networks and machine learning capabilities that deal with an increasing amount of input data. While this complexity aims to solve problems in various domains, it adds new challenges for the system assurance. One issue is the rise in the number of abnormal...
Preprint
Full-text available
p> Blockchain as a disruptive technology and a driver for social change has exhibited great potential to promote sustainable practices and help organizations and governments achieve the United Nations’ Sustainable Development Goals (SDGs). Literature reviews on blockchain and sustainability exist, but they often focus only on topics related to one...
Article
Full-text available
Enterprise Architecture (EA) has been applied widely in industry as it brings substantial benefits to ease communication and improve business-IT alignment. However, due to its high complexity and cost, EA still plays a limited role in many organizations. Existing research recommends realizing more of the EA potential. EA can be developed for specif...
Chapter
Due to recent developments in object detection systems, and the realistic threat of black-box adversarial attacks on object detector models, we argue the need for a contextual understanding of the attacks from the users’ perspective. Existing literature reviews either do not provide complete and up-to-date summaries of such attacks or focus on the...
Article
Full-text available
With the increasing development of artificial intelligence (AI) technologies, deep learning-driven approaches have been widely applied to predicate different machinery failures. One key challenge of failure prediction is to collect sufficient data, especially data of various failure types, to train the data-driven models. Existing studies focus on...
Preprint
Full-text available
p>The manuscript has been submitted to IEEE TSE.</p
Preprint
Full-text available
p>The manuscript has been submitted to IEEE TSE.</p
Preprint
Full-text available
p> Blockchain as a disruptive technology and a driver for social change has exhibited great potential to promote sustainable practices and help organizations and governments achieve the United Nations’ Sustainable Development Goals (SDGs). Literature reviews on blockchain and sustainability exist, but they often focus only on topics related to one...
Article
An intelligent traffic management system (ITMS) benefits from an accurate and global awareness of the traffic status obtained through traffic data. A growing body of literature recognizes the importance of modern vehicles (MVs) equipped with sensing devices to estimate the traffic data to generate knowledge about the traffic scene. One critical iss...
Article
Estimating vehicles’ locations is one of the key components in intelligent traffic management systems (ITMSs) for increasing traffic scene awareness. Traditionally, stationary sensors have been employed in this regard. The development of advanced sensing and communication technologies on modern vehicles (MVs) makes it feasible to use such vehicles...
Preprint
Blockchain technology has achieved increased interest over the last few years. Transferring data and value across different blockchains is one of the biggest obstacles to further expansion. Blockchain interoperability allows different networks to communicate and transfer data between them and are increasingly crucial for blockchain applications. Ho...
Preprint
Full-text available
Estimating vehicles' locations is one of the key components in intelligent traffic management systems (ITMSs) for increasing traffic scene awareness. Traditionally, stationary sensors have been employed in this regard. The development of advanced sensing and communication technologies on modern vehicles (MVs) makes it feasible to use such vehicles...
Chapter
A primary concern of Intelligent Traffic Management Systems (ITMSs) is to collect the required traffic data. Vehicle position is one of the most important data types to manage traffic effectively. In this regard, Global Positioning System (GPS) receivers are widely used; however, their estimation accuracy is affected by several parameters, such as...
Preprint
Full-text available
Blockchain as a disruptive technology and a driver for social changes has been applied to a wide range of applications, exhibiting a great potential to promote sustainable practices and help organizations and governments to achieve United Nations' Sustainable Development Goals (SDG). Literature reviews on blockchain and sustainability exist, but th...
Preprint
Full-text available
Blockchain as a disruptive technology and a driver for social changes has been applied to a wide range of applications, exhibiting a great potential to promote sustainable practices and help organizations and governments to achieve United Nations' Sustainable Development Goals (SDG). Literature reviews on blockchain and sustainability exist, but th...
Article
Full-text available
Sustainable development is crucial to securing the future of humanity. Blockchain as a disruptive technology and a driver for social change has exhibited great potential to promote sustainable practices and help organizations and governments achieve the United Nations’ Sustainable Development Goals (SDGs). Existing literature reviews on blockchain...
Conference Paper
Object detectors are increasingly deployed in safety-critical systems, including autonomous vehicles. Recent studies have found that object detectors based on convolutional neural networks are fundamentally vulnerable to adversarial attacks. Adversarial attacks on object detectors involve adding a carefully chosen perturbation to the input, which c...
Article
Full-text available
Most existing surveys and reviews on web application vulnerability detection (WAVD) approaches focus on comparing and summarizing the approaches’ technical details. Although some studies have analyzed the efficiency and effectiveness of specific methods, there is a lack of a comprehensive and systematic analysis of the efficiency and effectiveness...
Article
Full-text available
Digital technologies are growing in importance for accelerating firms’ circular economy transition. However, so far, the focus has primarily been on the technical aspects of implementing these technologies with limited research on the organizational resources and capabilities required for successfully leveraging digital technologies for circular ec...
Conference Paper
Full-text available
Neural networks (NNs) have shown remarkable performance of perception in their application in autonomous vehicles (AVs). However, NNs are intrinsically vulnerable to perturbations, such as occurrences outside of the training sets, scene noise, instrument noise, image translation, and rotation, or small changes intentionally added to the original im...
Chapter
Alignment is one of the most important benefits that Enterprise Architecture (EA) could bring to organizations. However, it is still unclear what mechanism EA uses to help organizations achieve alignment. Related research is very scattered, making it difficult to accumulate relevant knowledge and experiences, and thus, the more successful EA applic...
Chapter
This article presents a systematic mapping study of published scientific papers on Enterprise Architecture (EA) and agility. More specifically, we reviewed studies on applying agile practices to EA and applying EA to the organization’s agility. A categorical structure is proposed for classifying the research results based on the extracted topics di...
Article
Full-text available
Today, most organizations are undergoing a digital transformation. At the same time, the gravity of environmental issues has put sustainability and the circular economy at the top of corporate agendas. To this end, information systems, in particular business analytics, are being highlighted as essential enablers of an accelerated circular economy t...
Conference Paper
Full-text available
Despite benefits Enterprise Architecture (EA) has brought, EA has also been challenged due to its complexity, heavy workload demands, and poor user acceptance. Researchers and practitioners proposed to use EA in an agile and "business outcome-driven" way. This means that EA should not primarily be developed and used according to a pre-defined frame...
Preprint
Full-text available
Blockchain is an emerging technology with potential to address issues related to sustainability. Literature reviews on blockchain and sustainability exist, but there is a need to consolidate existing results, in particular, in terms of Sustainable Development Goals (SDG). This extended abstract presents an ongoing tertiary study based on existing l...
Preprint
Full-text available
Blockchain technologies originate from cryptocurrencies. Thus, most blockchain technologies assume an environment with a fast and stable network. However, in some blockchain-based systems, e.g., supply chain management (SCM) systems, some Internet of Things (IOT) nodes can only rely on the low-quality network sometimes to achieve consensus. Thus, i...
Chapter
There is evidence that accessing online traffic data is a key factor to facilitate intelligent traffic management, especially at intersections. With the advent of autonomous vehicles (AVs), new options for collecting such data appear. To date, much research has been performed on machine learning to provide safe motion planning and to control modern...
Article
Full-text available
Digital technologies (DTs), such as the Internet of Things (IoT), big data, and data analytics, are considered essential enablers of the circular economy (CE). However, as both CE and DTs are emerging fields, there exists little systematic guidance on how DTs can be applied to capture the full potential of circular strategies for improving resource...
Conference Paper
Code enforcing access control policies often has high inherent complexity , making it challenging to test using only classical review and testing techniques. To more thoroughly test such code, it is strategic to also use program analysis tools, which often can find subtle, critical bugs going unnoticed to humans. These powerful tools are however ra...
Article
The development of smart cities becomes increasingly reliant on leveraging modern technologies such as Internet of Things (IoT), big data, cloud computing, and Artificial Intelligence (AI). While the importance of applying such technologies has been widely recognized, they might not have been effectively discussed in the early design phase. As a wi...
Article
Full-text available
Context: Neural Network (NN) algorithms have been successfully adopted in a number of Safety-Critical Cyber-Physical Systems (SCCPSs). Testing and Verification (T&V) of NN-based control software in safety-critical domains are gaining interest and attention from both software engineering and safety engineering researchers and practitioners. Objectiv...
Book
Full-text available
Working with this focus area provides you with insight into what IoT technologies are suitable for fulfilling your tracking, tracing and monitoring needs. It can assist you in setting-up and running pilots or trials, support you in analysing the data collected and help to identify ways of improving the system before scaling up. If you are already u...
Article
Full-text available
Recent advancements in artificial intelligence (AI) technologies have induced tremendous growth in innovation and automation. Although these AI technologies offer significant benefits, they can be used maliciously. Highly targeted and evasive attacks in benign carrier applications, such as DeepLocker, have demonstrated the intentional use of AI for...
Chapter
Full-text available
With the development of information technology, industry data is increasingly generated during the manufacturing process. Companies often want to utilize the data they collected for more than the initial purposes. In this paper, we report a case study with an industrial equipment manufacturer to analyze the operation data and the failure records of...
Chapter
Full-text available
With the onset the digitalization and Industry 4.0, the maintenance function and asset management in a company is forming towards Smart Maintenance. An essential application in smart maintenance is to improve the maintenance planning function with better criticality assessment. With the aid from artificial intelligence it is considered that mainten...
Preprint
Full-text available
Context: Neural Network (NN) algorithms have been successfully adopted in a number of Safety-Critical Cyber-Physical Systems (SCCPSs). Testing and Verification (T&V) of NN-based control software in safety-critical domains are gaining interest and attention from both software engineering and safety engineering researchers and practitioners. Objectiv...
Article
Full-text available
This paper puts forward the Circular Strategies Scanner: a framework that introduces a taxonomy of circular strategies developed for use by manufacturing companies engaging in circular economy (CE) oriented innovation. Currently, a range of frameworks exists that propose a vision for how to operate in a CE, by identifying and organising relevant ci...
Chapter
Full-text available
To date, data science and analytics have received much attention from organizations seeking to explore how to use their massive volumes of data to create value and accelerate the adoption of Circular Economy (CE) concepts. The correct utilization of analytics with circular strategies may enable a step change that goes beyond incremental efficiency...
Article
Full-text available
Over the past several decades, the development of technologies and production of autonomous vehicles have enhanced the need for intelligent intersection management systems. Subsequently, growing interest in studying the traffic management of autonomous vehicles at intersections has been evident, which indicates a critical need to conduct a systemat...
Article
Full-text available
Anomaly in mechanical systems may cause equipment to break down with serious safety, environment, and economic impact. Since many mechanical equipment usually operates under tough working environments, which makes them vulnerable to types of faults, anomaly detection for mechanical equipment usually requires considerable domain knowledge. However,...
Preprint
Full-text available
To date, data science and analytics have received much attention from organizations seeking to explore how to use their massive volumes of data to create value and accelerate the adoption of Circular Economy (CE) concepts. The correct utilization of analytics with circular strategies may enable a step change that goes beyond incremental efficiency...
Article
Full-text available
Purpose Within critical-infrastructure industries, bow-tie analysis is an established way of eliciting requirements for safety and reliability concerns. Because of the ever-increasing digitalisation and coupling between the cyber and physical world, security has become an additional concern in these industries. The purpose of this paper is to evalu...
Conference Paper
Securing information systems has become a high priority as our reliance on them increases. Global multi-billion dollar companies have their critical information regularly exposed, costing them money and impairing their users' privacy. To defend against security breaches, IDE-integrated plugins to detect and remove security vulnerabilities in the fi...
Chapter
Full-text available
This paper presents a novel HDPS-BPSO maintenance scheduling strategy for backlash error compensation in a machining center through binary particle swarm optimization (BPSO) and data-driven regression methods. During the experiment, a hierarchical diagnosis and prognosis system (HDPS) was leveraged to predict the potential backlash error first. The...
Chapter
Full-text available
Bow-tie analysis includes a graphical representation for depicting threats and consequences related to unwanted events, and shows how preventive and reactive barriers can provide control over such situations. This kind of analysis has traditionally been used to elicit requirements for safety and reliability engineering, but as a consequence of the...

Network

Cited By