Jiayuan Zhou

Principal Researcher

jiayuan.zjy[at]gmail.com

resume_photo.jpeg

Toronto, Canada

Hi, I am Jiayuan Zhou, a principal researcher with Huawei Canada (Software Engineering Application Technology Lab, Huawei Canada). I lead a research team to conduct and apply cutting-edge techniques to design and implement research protocols for improving supply chain security in open source. I also collaborate closely with global researchers and product teams to help them improve OSS asset management/OSS supply chain security and integrate our solutions into the product.

I received my Ph.D. degree in Computer Science from Software Analysis and Intelligence Lab (SAIL Lab), Queen’s University, Canada under the supervision of professor Ahmed E. Hassan and professor Shaowei Wang. My thesis is about studying the extrinsic rewards in open source software communities. For example, how to leverage bounties (i.e., the monetary incentive) to address GitHub issue reports, and what is the impact of bounty in Stack Overflow. And my thesis is about mining data from GitHub, Stack Overflow, and Bountysource.

As a researcher, my research interests include intelligent vulnerability management, mining software repositories, extrinsic incentives in crowdsourced software engineering. My work has been published in premier software engineering venues (e.g.,ICSE, ASE, FSE, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, and Empirical Software Engineering). More information at: google scholar.

I also spent two years working as a senior software developer in Alibaba Group and published four patents.

news

Jan 29, 2025 Our paper was accepted by TOSEM: “An empirical study on vulnerability disclosure management of open source software systems”
Jan 13, 2025 Our paper was accepted by FSE 2025: “One-for-All Does Not Work! Enhancing Vulnerability Detection by Mixture-of-Experts (MoE)”
Jan 13, 2025 Our paper was accepted by FSE 2025: “Code Change Intention, Development Artifact and History Vulnerability: Putting Them Together for Vulnerability Fix Detection by LLM”
Jan 11, 2025 Our paper was accepted by MSR 2025: “From Industrial Practices to Academia: Uncovering the Gap in Vulnerability Research and Practice”
Nov 01, 2024 Our paper was accepted by ICSE 2025: “Similar but Patched Code Considered Harmful – The Impact of Similar but Patched Code on Recurring Vulnerability Detection and How to Remove Them”