Author of the publication

A Scenario-Based Approach to Predicting Software Defects Using Compressed C4.5 Model.

, , , , , and . COMPSAC, page 406-415. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on the throwing mechanism and loss characteristics of three-dimensional disturbance comb., , , , and . Comput. Electron. Agric., (2022)Research and Implementation of Cross-site Scripting Defense Method Based on Moving Target Defense Technology., , , and . ICSAI, page 818-822. IEEE, (2018)AndrOpGAN: An Opcode GAN for Android Malware Obfuscations., , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 12-25. Springer, (2020)Liveness Reasoning with Isabelle/HOL., , and . TPHOLs, volume 5674 of Lecture Notes in Computer Science, page 485-499. Springer, (2009)Formal Threat Analysis for Ad-Hoc Routing Protocol: Modelling and Checking the Sybil Attack., , , and . Intell. Autom. Soft Comput., 17 (8): 1035-1047 (2011)