Author of the publication

A Similarity Metric for the Inputs of OO Programs and Its Application in Adaptive Random Testing.

, , , , , and . IEEE Trans. Reliab., 66 (2): 373-402 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-Domain-One-Input: Adaptive Random Testing by Orthogonal Recursive Bisection With Restriction., , , , , and . IEEE Trans. Reliab., 68 (4): 1404-1428 (2019)An efficient outlier detection method for data streams based on closed frequent patterns by considering anti-monotonic constraints., , , , , , and . Inf. Sci., (2021)A Deep End-to-End Model for Transient Stability Assessment With PMU Data., , , , , , and . IEEE Access, (2018)Elimination by Linear Association: An Effective and Efficient Static Mirror Adaptive Random Testing., , , and . IEEE Access, (2019)Privacy-Preserving Hierarchical State Estimation in Untrustworthy Cloud Environments., , , and . IEEE Trans. Smart Grid, 12 (2): 1541-1551 (2021)Distributed Framework for Detecting PMU Data Manipulation Attacks With Deep Autoencoders., , , , , and . IEEE Trans. Smart Grid, 10 (4): 4401-4410 (2019)An approach of security testing for third-party component based on state mutation., , , , and . Secur. Commun. Networks, 9 (15): 2827-2842 (2016)BiTCN_DRSN: An effective software vulnerability detection model based on an improved temporal convolutional network., , , , , and . J. Syst. Softw., (October 2023)A new semantic annotation approach for software vulnerability source code., , , , and . Int. J. Simul. Process. Model., 16 (1): 1-13 (2021)An empirical comparison of commercial and open-source web vulnerability scanners., , , and . Softw. Pract. Exp., 50 (9): 1842-1857 (2020)