Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault localization based on statement frequency., , , and . Inf. Sci., (2016)Fuzzy timed petri net definitions, properties, and applications., , , and . Math. Comput. Model., 41 (2-3): 345-360 (2005)Causality-Guided Counterfactual Debiasing for Anomaly Detection of Cyber-Physical Systems., , , and . IEEE Trans. Ind. Informatics, 20 (3): 4582-4593 (March 2024)Reachable Set Estimation and Safety Verification of Nonlinear Systems via Iterative Sums of Squares Programming., , and . J. Syst. Sci. Complex., 35 (3): 1154-1172 (2022)Accelerator Virtualization Framework Based on Inter-VM Exitless Communication., , , , , , and . Int. J. Softw. Informatics, 11 (2): 169-193 (2021)Towards an understanding of intra-defect associations: Implications for defect prediction., , , , , and . J. Syst. Softw., (January 2024)Hypergraph partitioning for the parallel computing of fuzzy differential equations., , and . Fuzzy Sets Syst., (2013)A Learn-to-Rank Method for Model-Based Regression Test Case Prioritization., , and . IEEE Access, (2021)A Spammer Identification Method for Class Imbalanced Weibo Datasets., , and . IEEE Access, (2019)Modelling and Verification of Web Navigation., , , and . ICWE, volume 5648 of Lecture Notes in Computer Science, page 181-188. Springer, (2009)