BibTeX records: Zhiqiu Huang

download as .bib file

@article{DBLP:journals/soca/ZhangSHYW24,
  author       = {Xinbo Zhang and
                  Guohua Shen and
                  Zhiqiu Huang and
                  Yaoshen Yu and
                  Kang Wang},
  title        = {FuEPRe: a fusing embedding method with attention for post recommendation},
  journal      = {Serv. Oriented Comput. Appl.},
  volume       = {18},
  number       = {1},
  pages        = {67--79},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11761-024-00386-y},
  doi          = {10.1007/S11761-024-00386-Y},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soca/ZhangSHYW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GuoSHYCW23,
  author       = {Feifei Guo and
                  Guohua Shen and
                  Zhiqiu Huang and
                  Yang Yang and
                  Mengnan Cai and
                  Linlin Wei},
  title        = {{DABAC:} Smart Contract-Based Spatio-Temporal Domain Access Control
                  for the Internet of Things},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {36452--36463},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3257027},
  doi          = {10.1109/ACCESS.2023.3257027},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GuoSHYCW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/WangTHSYH23,
  author       = {Tiexin Wang and
                  Chao Tan and
                  Lei Huang and
                  Yize Shi and
                  Tao Yue and
                  Zhiqiu Huang},
  title        = {Simplexity testbed: {A} model-based digital twin testbed},
  journal      = {Comput. Ind.},
  volume       = {145},
  pages        = {103804},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compind.2022.103804},
  doi          = {10.1016/J.COMPIND.2022.103804},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cii/WangTHSYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/WangHHWSX23,
  author       = {Jinyong Wang and
                  Zhiqiu Huang and
                  Xiaowei Huang and
                  Tiexin Wang and
                  Guohua Shen and
                  Jian Xie},
  title        = {An accident prediction architecture based on spatio-clock stochastic
                  and hybrid model for autonomous driving safety},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {35},
  number       = {17},
  year         = {2023},
  url          = {https://doi.org/10.1002/cpe.6550},
  doi          = {10.1002/CPE.6550},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/WangHHWSX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eait/ShenYHYL23,
  author       = {Guohua Shen and
                  Sien Yang and
                  Zhiqiu Huang and
                  Yaoshen Yu and
                  Xin Li},
  title        = {The prediction of programming performance using student profiles},
  journal      = {Educ. Inf. Technol.},
  volume       = {28},
  number       = {1},
  pages        = {725--740},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10639-022-11146-w},
  doi          = {10.1007/S10639-022-11146-W},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eait/ShenYHYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcia/HuangHSWY23,
  author       = {Junan Huang and
                  Zhiqiu Huang and
                  Guohua Shen and
                  Jinyong Wang and
                  Xiaohua Yin},
  title        = {Maneuver Conditioned Vehicle Trajectory Prediction Using Self-Attention},
  journal      = {Int. J. Comput. Intell. Appl.},
  volume       = {22},
  number       = {2},
  pages        = {2350005:1--2350005:19},
  year         = {2023},
  url          = {https://doi.org/10.1142/S1469026823500050},
  doi          = {10.1142/S1469026823500050},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcia/HuangHSWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/TaoTGH023,
  author       = {Chuanqi Tao and
                  Yali Tao and
                  Hongjing Guo and
                  Zhiqiu Huang and
                  Xiaobing Sun},
  title        = {DLRegion: Coverage-guided fuzz testing of deep neural networks with
                  region-based neuron selection strategies},
  journal      = {Inf. Softw. Technol.},
  volume       = {162},
  pages        = {107266},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.infsof.2023.107266},
  doi          = {10.1016/J.INFSOF.2023.107266},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/TaoTGH023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itm/AkbarKH23,
  author       = {Muhammad Azeem Akbar and
                  Arif Ali Khan and
                  Zhiqiu Huang},
  title        = {Multicriteria decision making taxonomy of code recommendation system
                  challenges: a fuzzy-AHP analysis},
  journal      = {Inf. Technol. Manag.},
  volume       = {24},
  number       = {2},
  pages        = {115--131},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10799-021-00355-3},
  doi          = {10.1007/S10799-021-00355-3},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itm/AkbarKH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/HussainHZW23,
  author       = {Yasir Hussain and
                  Zhiqiu Huang and
                  Yu Zhou and
                  Senzhang Wang},
  title        = {Boosting source code suggestion with self-supervised Transformer Gated
                  Highway},
  journal      = {J. Syst. Softw.},
  volume       = {196},
  pages        = {111553},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jss.2022.111553},
  doi          = {10.1016/J.JSS.2022.111553},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/HussainHZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/smr/TaoGZH23,
  author       = {Chuanqi Tao and
                  Hongjing Guo and
                  Jingxuan Zhang and
                  Zhiqiu Huang},
  title        = {Supporting maintenance and testing for {AI} functions of mobile apps
                  based on user reviews: An empirical study on plant identification
                  apps},
  journal      = {J. Softw. Evol. Process.},
  volume       = {35},
  number       = {11},
  year         = {2023},
  url          = {https://doi.org/10.1002/smr.2444},
  doi          = {10.1002/SMR.2444},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/smr/TaoGZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangHQYSZ23,
  author       = {Chao Wang and
                  Zhiqiu Huang and
                  Shuren Qi and
                  Yaoshen Yu and
                  Guohua Shen and
                  Yushu Zhang},
  title        = {Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants
                  for Copy-Move Forgery Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {1064--1079},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3234861},
  doi          = {10.1109/TIFS.2023.3234861},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangHQYSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/YangXGXZHX23,
  author       = {Zhibin Yang and
                  Linquan Xing and
                  Zonghua Gu and
                  Yingmin Xiao and
                  Yong Zhou and
                  Zhiqiu Huang and
                  Lei Xue},
  title        = {Model-Based Reinforcement Learning and Neural-Network-Based Policy
                  Compression for Spacecraft Rendezvous on Resource-Constrained Embedded
                  Systems},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {19},
  number       = {1},
  pages        = {1107--1116},
  year         = {2023},
  url          = {https://doi.org/10.1109/TII.2022.3192085},
  doi          = {10.1109/TII.2022.3192085},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/YangXGXZHX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/GongZWZH23,
  author       = {Lina Gong and
                  Jingxuan Zhang and
                  Mingqiang Wei and
                  Haoxiang Zhang and
                  Zhiqiu Huang},
  title        = {What Is the Intended Usage Context of This Model? An Exploratory Study
                  of Pre-Trained Models on Various Model Repositories},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {32},
  number       = {3},
  pages        = {69:1--69:57},
  year         = {2023},
  url          = {https://doi.org/10.1145/3569934},
  doi          = {10.1145/3569934},
  timestamp    = {Tue, 15 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/GongZWZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/ZhangLLGH23,
  author       = {Jingxuan Zhang and
                  Junpeng Luo and
                  Jiahui Liang and
                  Lina Gong and
                  Zhiqiu Huang},
  title        = {An Accurate Identifier Renaming Prediction and Suggestion Approach},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {32},
  number       = {6},
  pages        = {148:1--148:51},
  year         = {2023},
  url          = {https://doi.org/10.1145/3603109},
  doi          = {10.1145/3603109},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosem/ZhangLLGH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/YangXPZH23,
  author       = {Wenhua Yang and
                  Chang Xu and
                  Minxue Pan and
                  Yu Zhou and
                  Zhiqiu Huang},
  title        = {Ensure: Towards Reliable Control of Cyber-Physical Systems Under Uncertainty},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {72},
  number       = {1},
  pages        = {289--301},
  year         = {2023},
  url          = {https://doi.org/10.1109/TR.2022.3167116},
  doi          = {10.1109/TR.2022.3167116},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tr/YangXPZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/TaoLHS23,
  author       = {Chuanqi Tao and
                  Kai Lin and
                  Zhiqiu Huang and
                  Xiaobing Sun},
  title        = {{CRAM:} Code Recommendation With Programming Context Based on Self-Attention
                  Mechanism},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {72},
  number       = {1},
  pages        = {302--316},
  year         = {2023},
  url          = {https://doi.org/10.1109/TR.2022.3171309},
  doi          = {10.1109/TR.2022.3171309},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tr/TaoLHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/GongZZWH23,
  author       = {Lina Gong and
                  Haoxiang Zhang and
                  Jingxuan Zhang and
                  Mingqiang Wei and
                  Zhiqiu Huang},
  title        = {A Comprehensive Investigation of the Impact of Class Overlap on Software
                  Defect Prediction},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {49},
  number       = {4},
  pages        = {2440--2458},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSE.2022.3220740},
  doi          = {10.1109/TSE.2022.3220740},
  timestamp    = {Tue, 15 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/GongZZWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/ZhangLGZHJ23,
  author       = {Jingxuan Zhang and
                  Siyuan Liu and
                  Lina Gong and
                  Haoxiang Zhang and
                  Zhiqiu Huang and
                  He Jiang},
  title        = {{BEQAIN:} An Effective and Efficient Identifier Normalization Approach
                  With {BERT} and the Question Answering System},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {49},
  number       = {4},
  pages        = {2597--2620},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSE.2022.3227559},
  doi          = {10.1109/TSE.2022.3227559},
  timestamp    = {Tue, 15 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/ZhangLGZHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ease/HussainH0KKA23,
  author       = {Yasir Hussain and
                  Zhiqiu Huang and
                  Yu Zhou and
                  Izhar Ahmed Khan and
                  Nasrullah Khan and
                  Muhammad Zahid Abbas},
  title        = {Optimized Tokenization Process for Open-Vocabulary Code Completion:
                  An Empirical Study},
  booktitle    = {Proceedings of the 27th International Conference on Evaluation and
                  Assessment in Software Engineering, {EASE} 2023, Oulu, Finland, June
                  14-16, 2023},
  pages        = {398--405},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3593434.3594236},
  doi          = {10.1145/3593434.3594236},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ease/HussainH0KKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/LianHW23,
  author       = {Xin Lian and
                  Zhiqiu Huang and
                  Chao Wang},
  title        = {{AKD:} Using Adversarial Knowledge Distillation to Achieve Black-box
                  Attacks},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2023, Gold
                  Coast, Australia, June 18-23, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IJCNN54540.2023.10191087},
  doi          = {10.1109/IJCNN54540.2023.10191087},
  timestamp    = {Wed, 09 Aug 2023 16:25:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/LianHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/internetware/Wang0YH23,
  author       = {Yichun Wang and
                  Zhiyi Zhang and
                  Yongming Yao and
                  Zhiqiu Huang},
  editor       = {Hong Mei and
                  Jian Lv and
                  Zhi Jin and
                  Xuandong Li and
                  Xiaohu Yang and
                  Xin Xia},
  title        = {A Fine-Grained Evaluation of Mutation Operators for Deep Learning
                  Systems: {A} Selective Mutation Approach},
  booktitle    = {Proceedings of the 14th Asia-Pacific Symposium on Internetware, Internetware
                  2023, Hangzhou, China, August 4-6, 2023},
  pages        = {123--133},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3609437.3609453},
  doi          = {10.1145/3609437.3609453},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/internetware/Wang0YH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/GuoTH23,
  author       = {Hongjing Guo and
                  Chuanqi Tao and
                  Zhiqiu Huang},
  title        = {Multi-Objective White-Box Test Input Selection for Deep Neural Network
                  Model Enhancement},
  booktitle    = {34th {IEEE} International Symposium on Software Reliability Engineering,
                  {ISSRE} 2023, Florence, Italy, October 9-12, 2023},
  pages        = {521--532},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISSRE59848.2023.00051},
  doi          = {10.1109/ISSRE59848.2023.00051},
  timestamp    = {Tue, 14 Nov 2023 16:09:47 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/GuoTH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/CaiZJLH23,
  author       = {Huangli Cai and
                  Zhiyi Zhang and
                  Yifan Jian and
                  Dan Li and
                  Zhiqiu Huang},
  title        = {{BDGSE:} {A} Symbolic Execution Technique for High {MC/DC}},
  booktitle    = {23rd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2023, Chiang Mai, Thailand, October 22-26, 2023},
  pages        = {313--324},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/QRS60937.2023.00039},
  doi          = {10.1109/QRS60937.2023.00039},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/CaiZJLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/ZhangZWCH23,
  author       = {Zhuangyu Zhang and
                  Zhiyi Zhang and
                  Ziyuan Wang and
                  Fang Chen and
                  Zhiqiu Huang},
  title        = {{BTM:} Black-Box Testing for {DNN} Based on Meta-Learning},
  booktitle    = {23rd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2023, Chiang Mai, Thailand, October 22-26, 2023},
  pages        = {581--592},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/QRS60937.2023.00063},
  doi          = {10.1109/QRS60937.2023.00063},
  timestamp    = {Tue, 23 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/ZhangZWCH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seke/LiZJLH23,
  author       = {Wei Li and
                  Zhiyi Zhang and
                  Yifan Jian and
                  Chen Liu and
                  Zhiqiu Huang},
  editor       = {Shi{-}Kuo Chang},
  title        = {DeepRank: Test Case Prioritization for Deep Neural Networks},
  booktitle    = {The 35th International Conference on Software Engineering and Knowledge
                  Engineering, {SEKE} 2023, {KSIR} Virtual Conference Center, USA, July
                  1-10, 2023},
  pages        = {262--267},
  publisher    = {{KSI} Research Inc.},
  year         = {2023},
  url          = {https://doi.org/10.18293/SEKE2023-188},
  doi          = {10.18293/SEKE2023-188},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/seke/LiZJLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/setta/XiaoYZH23,
  author       = {Yingmin Xiao and
                  Zhibin Yang and
                  Yong Zhou and
                  Zhiqiu Huang},
  editor       = {Holger Hermanns and
                  Jun Sun and
                  Lei Bu},
  title        = {Run-Time Assured Reinforcement Learning for Safe Spacecraft Rendezvous
                  with Obstacle Avoidance},
  booktitle    = {Dependable Software Engineering. Theories, Tools, and Applications
                  - 9th International Symposium, {SETTA} 2023, Nanjing, China, November
                  27-29, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14464},
  pages        = {298--313},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8664-4\_17},
  doi          = {10.1007/978-981-99-8664-4\_17},
  timestamp    = {Thu, 04 Jan 2024 08:13:47 +0100},
  biburl       = {https://dblp.org/rec/conf/setta/XiaoYZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/HaoHGS23,
  author       = {Yao Hao and
                  Zhiqiu Huang and
                  Hongjing Guo and
                  Guohua Shen},
  editor       = {Tao Zhang and
                  Xin Xia and
                  Nicole Novielli},
  title        = {Test Input Selection for Deep Neural Network Enhancement Based on
                  Multiple-Objective Optimization},
  booktitle    = {{IEEE} International Conference on Software Analysis, Evolution and
                  Reengineering, {SANER} 2023, Taipa, Macao, March 21-24, 2023},
  pages        = {534--545},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SANER56733.2023.00056},
  doi          = {10.1109/SANER56733.2023.00056},
  timestamp    = {Fri, 24 Nov 2023 12:46:34 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/HaoHGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-03790,
  author       = {Yunfei Meng and
                  Changbo Ke and
                  Zhiqiu Huang and
                  Guohua Shen and
                  Chunming Liu and
                  Xiaojie Feng},
  title        = {A Practical Runtime Security Policy Transformation Framework for Software
                  Defined Networks},
  journal      = {CoRR},
  volume       = {abs/2301.03790},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.03790},
  doi          = {10.48550/ARXIV.2301.03790},
  eprinttype    = {arXiv},
  eprint       = {2301.03790},
  timestamp    = {Thu, 19 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-03790.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-10856,
  author       = {Chao Wang and
                  Shuren Qi and
                  Zhiqiu Huang and
                  Yushu Zhang and
                  Xiaochun Cao},
  title        = {Towards an Accurate and Secure Detector against Adversarial Perturbations},
  journal      = {CoRR},
  volume       = {abs/2305.10856},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.10856},
  doi          = {10.48550/ARXIV.2305.10856},
  eprinttype    = {arXiv},
  eprint       = {2305.10856},
  timestamp    = {Thu, 25 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-10856.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-08066,
  author       = {Yu Zhao and
                  Lina Gong and
                  Haoxiang Zhang and
                  Yaoshen Yu and
                  Zhiqiu Huang},
  title        = {How to get better embeddings with code pre-trained models? An empirical
                  study},
  journal      = {CoRR},
  volume       = {abs/2311.08066},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.08066},
  doi          = {10.48550/ARXIV.2311.08066},
  eprinttype    = {arXiv},
  eprint       = {2311.08066},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-08066.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/connection/XieTYLXH22,
  author       = {Jian Xie and
                  Wenan Tan and
                  Zhibin Yang and
                  Shuming Li and
                  Linquan Xing and
                  Zhiqiu Huang},
  title        = {SysML-based compositional verification and safety analysis for safety-critical
                  cyber-physical systems},
  journal      = {Connect. Sci.},
  volume       = {34},
  number       = {1},
  pages        = {911--941},
  year         = {2022},
  url          = {https://doi.org/10.1080/09540091.2021.2017853},
  doi          = {10.1080/09540091.2021.2017853},
  timestamp    = {Mon, 16 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/connection/XieTYLXH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/KeXHX22,
  author       = {Changbo Ke and
                  Fu Xiao and
                  Zhiqiu Huang and
                  Fangxiong Xiao},
  title        = {A user requirements-oriented privacy policy self-adaption scheme in
                  cloud computing},
  journal      = {Frontiers Comput. Sci.},
  volume       = {17},
  number       = {2},
  pages        = {172203},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11704-022-1182-x},
  doi          = {10.1007/S11704-022-1182-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/KeXHX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiuZCH22,
  author       = {Linyuan Liu and
                  Haibin Zhu and
                  Shenglei Chen and
                  Zhiqiu Huang},
  title        = {Privacy regulation aware service selection for multi-provision cloud
                  service composition},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {126},
  pages        = {263--278},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2021.08.010},
  doi          = {10.1016/J.FUTURE.2021.08.010},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiuZCH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/WangH0S22,
  author       = {Jinyong Wang and
                  Zhiqiu Huang and
                  Yi Zhu and
                  Guohua Shen},
  title        = {Statistical Model Checking for Stochastic and Hybrid Autonomous Driving
                  Based on Spatio-Clock Constraints},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {32},
  number       = {4},
  pages        = {553--582},
  year         = {2022},
  url          = {https://doi.org/10.1142/S0218194022500188},
  doi          = {10.1142/S0218194022500188},
  timestamp    = {Mon, 11 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/WangH0S22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/WangZCZYH22,
  author       = {Yongchao Wang and
                  Yu Zhou and
                  Taolue Chen and
                  Jingxuan Zhang and
                  Wenhua Yang and
                  Zhiqiu Huang},
  title        = {Sequence-Aware {API} Recommendation Based on Collaborative Filtering},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {32},
  number       = {8},
  pages        = {1203--1228},
  year         = {2022},
  url          = {https://doi.org/10.1142/S0218194022500437},
  doi          = {10.1142/S0218194022500437},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/WangZCZYH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/HussainHZK22,
  author       = {Yasir Hussain and
                  Zhiqiu Huang and
                  Yu Zhou and
                  Izhar Ahmed Khan},
  title        = {Exploring the Impact of Balanced and Imbalanced Learning in Source
                  Code Suggestion},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {32},
  number       = {10},
  pages        = {1499--1526},
  year         = {2022},
  url          = {https://doi.org/10.1142/S0218194022500589},
  doi          = {10.1142/S0218194022500589},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/HussainHZK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/KeZXHM22,
  author       = {Changbo Ke and
                  Zejiang Zhu and
                  Fu Xiao and
                  Zhiqiu Huang and
                  Yunfei Meng},
  title        = {SDN-Based Privacy and Functional Authentication Scheme for Fog Nodes
                  of Smart Healthcare},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {18},
  pages        = {17989--18001},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3161935},
  doi          = {10.1109/JIOT.2022.3161935},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/KeZXHM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/YangPZH22,
  author       = {Wenhua Yang and
                  Minxue Pan and
                  Yu Zhou and
                  Zhiqiu Huang},
  title        = {Meaningful Update and Repair of Markov Decision Processes for Self-Adaptive
                  Systems},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {37},
  number       = {1},
  pages        = {106--127},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11390-021-1484-8},
  doi          = {10.1007/S11390-021-1484-8},
  timestamp    = {Thu, 07 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/YangPZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ZhangWYWZH22,
  author       = {Zhiyi Zhang and
                  Ziyuan Wang and
                  Fan Yang and
                  Jiahao Wei and
                  Yuqian Zhou and
                  Zhiqiu Huang},
  title        = {Random or heuristic? An empirical study on path search strategies
                  for test generation in {KLEE}},
  journal      = {J. Syst. Softw.},
  volume       = {188},
  pages        = {111269},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jss.2022.111269},
  doi          = {10.1016/J.JSS.2022.111269},
  timestamp    = {Thu, 15 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/ZhangWYWZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/LuoZHXS22,
  author       = {Junpeng Luo and
                  Jingxuan Zhang and
                  Zhiqiu Huang and
                  Yong Xu and
                  Chenxing Sun},
  title        = {Toward an accurate method renaming approach via structural and lexical
                  analyses},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {23},
  number       = {5},
  pages        = {732--748},
  year         = {2022},
  url          = {https://doi.org/10.1631/FITEE.2100470},
  doi          = {10.1631/FITEE.2100470},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jzusc/LuoZHXS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/ShaoHLY22,
  author       = {Yichao Shao and
                  Zhiqiu Huang and
                  Weiwei Li and
                  Yaoshen Yu},
  title        = {Fast code recommendation via approximate sub-tree matching},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {23},
  number       = {8},
  pages        = {1205--1216},
  year         = {2022},
  url          = {https://doi.org/10.1631/FITEE.2100379},
  doi          = {10.1631/FITEE.2100379},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jzusc/ShaoHLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mlc/LiCGH22,
  author       = {Weiwei Li and
                  Jin Chen and
                  Peixue Gao and
                  Zhiqiu Huang},
  title        = {Label enhancement with label-specific feature learning},
  journal      = {Int. J. Mach. Learn. Cybern.},
  volume       = {13},
  number       = {10},
  pages        = {2857--2867},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13042-022-01567-x},
  doi          = {10.1007/S13042-022-01567-X},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mlc/LiCGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/YuHSLS22,
  author       = {Yaoshen Yu and
                  Zhiqiu Huang and
                  Guohua Shen and
                  Weiwei Li and
                  Yichao Shao},
  title        = {{ASTENS-BWA:} Searching partial syntactic similar regions between
                  source code fragments via AST-based encoded sequence alignment},
  journal      = {Sci. Comput. Program.},
  volume       = {222},
  pages        = {102839},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.scico.2022.102839},
  doi          = {10.1016/J.SCICO.2022.102839},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scp/YuHSLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/YinHKSCLW22,
  author       = {Xiaohua Yin and
                  Zhiqiu Huang and
                  Shuanglong Kan and
                  Guohua Shen and
                  Zhe Chen and
                  Yang Liu and
                  Fei Wang},
  title        = {SafeOSL: Ensuring memory safety of {C} via ownership-based intermediate
                  language},
  journal      = {Softw. Pract. Exp.},
  volume       = {52},
  number       = {5},
  pages        = {1114--1142},
  year         = {2022},
  url          = {https://doi.org/10.1002/spe.3057},
  doi          = {10.1002/SPE.3057},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spe/YinHKSCLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/YangZPXZH22,
  author       = {Wenhua Yang and
                  Chong Zhang and
                  Minxue Pan and
                  Chang Xu and
                  Yu Zhou and
                  Zhiqiu Huang},
  title        = {Do Developers Really Know How to Use Git Commands? {A} Large-scale
                  Study Using Stack Overflow},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {31},
  number       = {3},
  pages        = {44:1--44:29},
  year         = {2022},
  url          = {https://doi.org/10.1145/3494518},
  doi          = {10.1145/3494518},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/YangZPXZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/KeWXHM22,
  author       = {Changbo Ke and
                  Jiayu Wu and
                  Fu Xiao and
                  Zhiqiu Huang and
                  Yunfei Meng},
  title        = {A Privacy Risk Assessment Scheme for Fog Nodes in Access Control System},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {71},
  number       = {4},
  pages        = {1513--1526},
  year         = {2022},
  url          = {https://doi.org/10.1109/TR.2021.3103906},
  doi          = {10.1109/TR.2021.3103906},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tr/KeWXHM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/KeXHMC22,
  author       = {Changbo Ke and
                  Fu Xiao and
                  Zhiqiu Huang and
                  Yunfei Meng and
                  Yan Cao},
  title        = {Ontology-Based Privacy Data Chain Disclosure Discovery Method for
                  Big Data},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {1},
  pages        = {59--68},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2019.2921583},
  doi          = {10.1109/TSC.2019.2921583},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/KeXHMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/ZhouYCHMG22,
  author       = {Yu Zhou and
                  Xinying Yang and
                  Taolue Chen and
                  Zhiqiu Huang and
                  Xiaoxing Ma and
                  Harald C. Gall},
  title        = {Boosting {API} Recommendation With Implicit Feedback},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {48},
  number       = {6},
  pages        = {2157--2172},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSE.2021.3053111},
  doi          = {10.1109/TSE.2021.3053111},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/ZhouYCHMG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictai/HuangHSXH22,
  author       = {Junan Huang and
                  Zhiqiu Huang and
                  Guohua Shen and
                  Heng Xu and
                  Gaoyang Hua},
  editor       = {Marek Z. Reformat and
                  Du Zhang and
                  Nikolaos G. Bourbakis},
  title        = {SIA-Net: Scalable Interaction-Aware Network for Vehicle Trajectory
                  Prediction Based on Self-Attention},
  booktitle    = {34th {IEEE} International Conference on Tools with Artificial Intelligence,
                  {ICTAI} 2022, Macao, China, October 31 - November 2, 2022},
  pages        = {780--787},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICTAI56018.2022.00120},
  doi          = {10.1109/ICTAI56018.2022.00120},
  timestamp    = {Tue, 25 Apr 2023 16:51:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ictai/HuangHSXH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/LiCLH22,
  author       = {Weiwei Li and
                  Jin Chen and
                  Yuqing Lu and
                  Zhiqiu Huang},
  title        = {Filling Missing Labels in Label Distribution Learning by Exploiting
                  Label-Specific Feature Selection},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2022, Padua,
                  Italy, July 18-23, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IJCNN55064.2022.9892220},
  doi          = {10.1109/IJCNN55064.2022.9892220},
  timestamp    = {Mon, 10 Oct 2022 17:40:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/LiCLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/XiongZZLH22,
  author       = {Chao Xiong and
                  Zhiyi Zhang and
                  Yuqian Zhou and
                  Chen Liu and
                  Zhiqiu Huang},
  title        = {{IEMT:} Inequality-Based Metamorphic Testing for Autonomous Driving
                  Models},
  booktitle    = {22nd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2022 - Companion, Guangzhou, China, December 5-9,
                  2022},
  pages        = {283--287},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/QRS-C57518.2022.00049},
  doi          = {10.1109/QRS-C57518.2022.00049},
  timestamp    = {Sat, 22 Apr 2023 17:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/XiongZZLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/WeiHY22,
  author       = {Cheng Wei and
                  Zhiqiu Huang and
                  Yaoshen Yu},
  title        = {Improved Methods of Pointer Mixture Network for Code Completion},
  booktitle    = {22nd {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2022, Guangzhou, China, December 5-9, 2022},
  pages        = {907--915},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/QRS57517.2022.00095},
  doi          = {10.1109/QRS57517.2022.00095},
  timestamp    = {Tue, 28 Mar 2023 19:49:47 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/WeiHY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/LinHYL22,
  author       = {Lile Lin and
                  Zhiqiu Huang and
                  Yaoshen Yu and
                  Yapeng Liu},
  title        = {Multi-Modal Code Summarization with Retrieved Summary},
  booktitle    = {22nd {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation, {SCAM} 2021, Limassol, Cyprus, October 3, 2022},
  pages        = {132--142},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SCAM55253.2022.00020},
  doi          = {10.1109/SCAM55253.2022.00020},
  timestamp    = {Mon, 23 Jan 2023 22:18:07 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/LinHYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsse/LiuHYHL22,
  author       = {Yapeng Liu and
                  Zhiqiu Huang and
                  Yaoshen Yu and
                  Yasir Hussain and
                  Lile Lin},
  title        = {Improving Code Completion by Sequence Features and Structural Features},
  booktitle    = {Proceedings of the 4th World Symposium on Software Engineering, {WSSE}
                  2022, Xiamen, China, September 28-30, 2022},
  pages        = {51--58},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3568364.3568373},
  doi          = {10.1145/3568364.3568373},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wsse/LiuHYHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-09135,
  author       = {Chao Wang and
                  Zhiqiu Huang and
                  Shu{-}Ren Qi and
                  Yaoshen Yu and
                  Guohua Shen},
  title        = {Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants
                  for Copy-Move Forgery Detection},
  journal      = {CoRR},
  volume       = {abs/2207.09135},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.09135},
  doi          = {10.48550/ARXIV.2207.09135},
  eprinttype    = {arXiv},
  eprint       = {2207.09135},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-09135.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BianSHYLZ21,
  author       = {Shuyu Bian and
                  Guohua Shen and
                  Zhiqiu Huang and
                  Yang Yang and
                  Jinghan Li and
                  Xiaoyu Zhang},
  title        = {{PABC:} {A} Patent Application System Based on Blockchain},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {4199--4210},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2020.3048004},
  doi          = {10.1109/ACCESS.2020.3048004},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/BianSHYLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MengHSK21,
  author       = {Yunfei Meng and
                  Zhiqiu Huang and
                  Guohua Shen and
                  Changbo Ke},
  title        = {A security policy model transformation and verification approach for
                  software defined networking},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102089},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102089},
  doi          = {10.1016/J.COSE.2020.102089},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MengHSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/XiaHZYWZ21,
  author       = {Yao Xia and
                  Zhiqiu Huang and
                  Yonglong Zhang and
                  Min Yuan and
                  Shangguang Wang and
                  Yu Zhou},
  title        = {{SPASC:} Strategy-proof auction mechanism with cost and QoS incentive
                  for service composition},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {33},
  number       = {9},
  year         = {2021},
  url          = {https://doi.org/10.1002/cpe.6131},
  doi          = {10.1002/CPE.6131},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/XiaHZYWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/YangBYHBFG21,
  author       = {Zhibin Yang and
                  Yang Bao and
                  Yongqiang Yang and
                  Zhiqiu Huang and
                  Jean{-}Paul Bodeveix and
                  Mamoun Filali and
                  Zonghua Gu},
  title        = {Exploiting augmented intelligence in the modeling of safety-critical
                  autonomous systems},
  journal      = {Formal Aspects Comput.},
  volume       = {33},
  number       = {3},
  pages        = {343--384},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00165-021-00543-6},
  doi          = {10.1007/S00165-021-00543-6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/YangBYHBFG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-sen/HussainH021,
  author       = {Yasir Hussain and
                  Zhiqiu Huang and
                  Yu Zhou},
  title        = {Improving source code suggestion with code embedding and enhanced
                  convolutional long short-term memory},
  journal      = {{IET} Softw.},
  volume       = {15},
  number       = {3},
  pages        = {199--213},
  year         = {2021},
  url          = {https://doi.org/10.1049/sfw2.12017},
  doi          = {10.1049/SFW2.12017},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-sen/HussainH021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/ChenSHW21,
  author       = {Kai Chen and
                  Guohua Shen and
                  Zhiqiu Huang and
                  Haijuan Wang},
  title        = {Improved Entity Linking for Simple Question Answering Over Knowledge
                  Graph},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {31},
  number       = {1},
  pages        = {55--80},
  year         = {2021},
  url          = {https://doi.org/10.1142/S0218194021400039},
  doi          = {10.1142/S0218194021400039},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijseke/ChenSHW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/ShenWHYC21,
  author       = {Guohua Shen and
                  Haijuan Wang and
                  Zhiqiu Huang and
                  Yaoshen Yu and
                  Kai Chen},
  title        = {Supporting Requirements to Code Traceability Creation by Code Comments},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {31},
  number       = {8},
  pages        = {1099--1118},
  year         = {2021},
  url          = {https://doi.org/10.1142/S0218194021500340},
  doi          = {10.1142/S0218194021500340},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/ShenWHYC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/YangZH21,
  author       = {Wenhua Yang and
                  Yu Zhou and
                  Zhiqiu Huang},
  title        = {Personalized {API} Recommendations},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {31},
  number       = {9},
  pages        = {1299--1327},
  year         = {2021},
  url          = {https://doi.org/10.1142/S021819402150042X},
  doi          = {10.1142/S021819402150042X},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/YangZH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/ZhangWGWZH21,
  author       = {Zhiyi Zhang and
                  Pu Wang and
                  Hongjing Guo and
                  Ziyuan Wang and
                  Yuqian Zhou and
                  Zhiqiu Huang},
  title        = {DeepBackground: Metamorphic testing for Deep-Learning-driven image
                  recognition systems accompanied by Background-Relevance},
  journal      = {Inf. Softw. Technol.},
  volume       = {140},
  pages        = {106701},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.infsof.2021.106701},
  doi          = {10.1016/J.INFSOF.2021.106701},
  timestamp    = {Thu, 15 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/ZhangWGWZH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/ZhangTHC21,
  author       = {Jing{-}Xuan Zhang and
                  Chuanqi Tao and
                  Zhiqiu Huang and
                  Xin Chen},
  title        = {Discovering {API} Directives from {API} Specifications with Text Classification},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {36},
  number       = {4},
  pages        = {922--943},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11390-021-0235-1},
  doi          = {10.1007/S11390-021-0235-1},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/ZhangTHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/YangQZHBF21,
  author       = {Zhibin Yang and
                  Zhikai Qiu and
                  Yong Zhou and
                  Zhiqiu Huang and
                  Jean{-}Paul Bodeveix and
                  Mamoun Filali},
  title        = {C2AADL{\_}Reverse: {A} model-driven reverse engineering approach to
                  development and verification of safety-critical software},
  journal      = {J. Syst. Archit.},
  volume       = {118},
  pages        = {102202},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sysarc.2021.102202},
  doi          = {10.1016/J.SYSARC.2021.102202},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/YangQZHBF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/XiaH21,
  author       = {Yao Xia and
                  Zhiqiu Huang},
  title        = {A strategy-proof auction mechanism for service composition based on
                  user preferences},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {22},
  number       = {2},
  pages        = {185--201},
  year         = {2021},
  url          = {https://doi.org/10.1631/FITEE.1900726},
  doi          = {10.1631/FITEE.1900726},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jzusc/XiaH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/WangSHYC21,
  author       = {Haijuan Wang and
                  Guohua Shen and
                  Zhiqiu Huang and
                  Yaoshen Yu and
                  Kai Chen},
  title        = {Analyzing close relations between target artifacts for improving IR-based
                  requirement traceability recovery},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {22},
  number       = {7},
  pages        = {957--968},
  year         = {2021},
  url          = {https://doi.org/10.1631/FITEE.2000126},
  doi          = {10.1631/FITEE.2000126},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jzusc/WangSHYC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XieTFH21,
  author       = {Jian Xie and
                  Wenan Tan and
                  BingWu Fang and
                  Zhiqiu Huang},
  title        = {Towards a Statistical Model Checking Method for Safety-Critical Cyber-Physical
                  System Verification},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {5536722:1--5536722:12},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5536722},
  doi          = {10.1155/2021/5536722},
  timestamp    = {Mon, 16 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/XieTFH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/ZhangWCCH21,
  author       = {Yuxuan Zhang and
                  Senzhang Wang and
                  Bing Chen and
                  Jiannong Cao and
                  Zhiqiu Huang},
  title        = {TrafficGAN: Network-Scale Deep Traffic Prediction With Generative
                  Adversarial Nets},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {22},
  number       = {1},
  pages        = {219--230},
  year         = {2021},
  url          = {https://doi.org/10.1109/TITS.2019.2955794},
  doi          = {10.1109/TITS.2019.2955794},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/ZhangWCCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/ZhangJRZH21,
  author       = {Jingxuan Zhang and
                  He Jiang and
                  Zhilei Ren and
                  Tao Zhang and
                  Zhiqiu Huang},
  title        = {Enriching {API} Documentation with Code Samples and Usage Scenarios
                  from Crowd Knowledge},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {47},
  number       = {6},
  pages        = {1299--1314},
  year         = {2021},
  url          = {https://doi.org/10.1109/TSE.2019.2919304},
  doi          = {10.1109/TSE.2019.2919304},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/ZhangJRZH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/ZhouSCHGP21,
  author       = {Yu Zhou and
                  Yanqi Su and
                  Taolue Chen and
                  Zhiqiu Huang and
                  Harald C. Gall and
                  Sebastiano Panichella},
  title        = {User Review-Based Change File Localization for Mobile Applications},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {47},
  number       = {12},
  pages        = {2755--2770},
  year         = {2021},
  url          = {https://doi.org/10.1109/TSE.2020.2967383},
  doi          = {10.1109/TSE.2020.2967383},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tse/ZhouSCHGP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/ZhangZH21,
  author       = {Jingxuan Zhang and
                  Weiqin Zou and
                  Zhiqiu Huang},
  title        = {An Empirical Study on the Usage and Evolution of Identifier Styles
                  in Practice},
  booktitle    = {28th Asia-Pacific Software Engineering Conference, {APSEC} 2021, Taipei,
                  Taiwan, December 6-9, 2021},
  pages        = {171--180},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/APSEC53868.2021.00025},
  doi          = {10.1109/APSEC53868.2021.00025},
  timestamp    = {Wed, 23 Feb 2022 18:55:47 +0100},
  biburl       = {https://dblp.org/rec/conf/apsec/ZhangZH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccwc/ArshadHRH21,
  author       = {Muhammad Ali Arshad and
                  Zhiqiu Huang and
                  Adnan Riaz and
                  Yasir Hussain},
  title        = {Deep Learning-Based Resolution Prediction of Software Enhancement
                  Reports},
  booktitle    = {11th {IEEE} Annual Computing and Communication Workshop and Conference,
                  {CCWC} 2021, Las Vegas, NV, USA, January 27-30, 2021},
  pages        = {492--499},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CCWC51732.2021.9375841},
  doi          = {10.1109/CCWC51732.2021.9375841},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccwc/ArshadHRH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/HuangZWH21,
  author       = {Zhiqiu Huang and
                  Yuqing Zhang and
                  Wengjie Wang and
                  Haitao He},
  title        = {Ant Hole: Data Poisoning Attack Breaking out the Boundary of Face
                  Cluster},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks Workshops, {DSN} Workshops 2021, Taipei, Taiwan, June
                  21-24, 2021},
  pages        = {71--77},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN-W52860.2021.00023},
  doi          = {10.1109/DSN-W52860.2021.00023},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/HuangZWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LiaoHW21,
  author       = {Lei Liao and
                  Zhiqiu Huang and
                  Wengjie Wang},
  title        = {A Statistical Learning Model with Deep Learning Characteristics},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks Workshops, {DSN} Workshops 2021, Taipei, Taiwan, June
                  21-24, 2021},
  pages        = {137--140},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN-W52860.2021.00032},
  doi          = {10.1109/DSN-W52860.2021.00032},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/LiaoHW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/SunHYWZ21,
  author       = {Jingxue Sun and
                  Zhiqiu Huang and
                  Ting Yang and
                  Wengjie Wang and
                  Yuqing Zhang},
  title        = {A system for detecting third-party tracking through the combination
                  of dynamic analysis and static analysis},
  booktitle    = {2021 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops 2021, Vancouver, BC, Canada, May 10-13, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484564},
  doi          = {10.1109/INFOCOMWKSHPS51825.2021.9484564},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/SunHYWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/SunYHWZ21,
  author       = {Jingxue Sun and
                  Ting Yang and
                  Zhiqiu Huang and
                  Wengjie Wang and
                  Yuqing Zhang},
  title        = {Using Dynamic Analysis to Automatically Detect Anti-Adblocker on the
                  Web},
  booktitle    = {2021 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops 2021, Vancouver, BC, Canada, May 10-13, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484639},
  doi          = {10.1109/INFOCOMWKSHPS51825.2021.9484639},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/SunYHWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/LinTH21,
  author       = {Kai Lin and
                  Chuanqi Tao and
                  Zhiqiu Huang},
  title        = {Exception Handling Recommendation Based on Self-Attention Network},
  booktitle    = {{IEEE} International Symposium on Software Reliability Engineering,
                  {ISSRE} 2021 - Workshops, Wuhan, China, October 25-28, 2021},
  pages        = {282--283},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISSREW53611.2021.00080},
  doi          = {10.1109/ISSREW53611.2021.00080},
  timestamp    = {Thu, 17 Feb 2022 11:45:39 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/LinTH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/LiangZZHS21,
  author       = {Jiahui Liang and
                  Weiqin Zou and
                  Jingxuan Zhang and
                  Zhiqiu Huang and
                  Chenxing Sun},
  title        = {A Deep Method Renaming Prediction and Refinement Approach for Java
                  Projects},
  booktitle    = {21st {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2021, Hainan, China, December 6-10, 2021},
  pages        = {404--413},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/QRS54544.2021.00052},
  doi          = {10.1109/QRS54544.2021.00052},
  timestamp    = {Wed, 16 Mar 2022 22:32:21 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/LiangZZHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/XuZZWH21,
  author       = {Yunjian Xu and
                  Zhiyi Zhang and
                  Yuqian Zhou and
                  Ziyuan Wang and
                  Zhiqiu Huang},
  title        = {DeepMnist: {A} method of white box testing based on hierarchy},
  booktitle    = {21st {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2021 - Companion, Hainan, China, December 6-10,
                  2021},
  pages        = {712--717},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/QRS-C55045.2021.00107},
  doi          = {10.1109/QRS-C55045.2021.00107},
  timestamp    = {Thu, 15 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/XuZZWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/ZhangTGH21,
  author       = {Meng Zhang and
                  Chuanqi Tao and
                  Hongjing Guo and
                  Zhiqiu Huang},
  title        = {Recovering Semantic Traceability between Requirements and Source Code
                  Using Feature Representation Techniques},
  booktitle    = {21st {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2021, Hainan, China, December 6-10, 2021},
  pages        = {873--882},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/QRS54544.2021.00096},
  doi          = {10.1109/QRS54544.2021.00096},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/ZhangTGH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/WangZCZYH21,
  author       = {Yongchao Wang and
                  Yu Zhou and
                  Taolue Chen and
                  Jingxuan Zhang and
                  Wenhua Yang and
                  Zhiqiu Huang},
  title        = {Hybrid Collaborative Filtering-Based {API} Recommendation},
  booktitle    = {21st {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2021, Hainan, China, December 6-10, 2021},
  pages        = {906--914},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/QRS54544.2021.00100},
  doi          = {10.1109/QRS54544.2021.00100},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/WangZCZYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-12935,
  author       = {Yunfei Meng and
                  Zhiqiu Huang and
                  Guohua Shen and
                  Changbo Ke},
  title        = {SDN-based Runtime Security Enforcement Approach for Privacy Preservation
                  of Dynamic Web Service Composition},
  journal      = {CoRR},
  volume       = {abs/2105.12935},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.12935},
  eprinttype    = {arXiv},
  eprint       = {2105.12935},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-12935.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HussainZAAANKK20,
  author       = {Yasir Hussain and
                  Huang Zhiqiu and
                  Muhammad Azeem Akbar and
                  Ahmed Alsanad and
                  Abeer Abdul{-}Aziz Alsanad and
                  Asif Nawaz and
                  Izhar Ahmed Khan and
                  Zaheer Ullah Khan},
  title        = {Context-Aware Trust and Reputation Model for Fog-Based IoT},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {31622--31632},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2972968},
  doi          = {10.1109/ACCESS.2020.2972968},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HussainZAAANKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangLLLH20,
  author       = {Jingxuan Zhang and
                  Siyuan Liu and
                  Junpeng Luo and
                  Jiahui Liang and
                  Zhiqiu Huang},
  title        = {Exploring the Characteristics of Identifiers: {A} Large-Scale Empirical
                  Study on 5, 000 Open Source Projects},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {140607--140620},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3013694},
  doi          = {10.1109/ACCESS.2020.3013694},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangLLLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/TaoBH20,
  author       = {Chuanqi Tao and
                  Panpan Bao and
                  Zhiqiu Huang},
  title        = {Code line generation based on deep context-awareness of onsite programming},
  journal      = {Sci. China Inf. Sci.},
  volume       = {63},
  number       = {9},
  pages        = {1--3},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11432-019-2777-2},
  doi          = {10.1007/S11432-019-2777-2},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/TaoBH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/CaoHYKW20,
  author       = {Yan Cao and
                  Zhiqiu Huang and
                  Yaoshen Yu and
                  Changbo Ke and
                  Zihao Wang},
  title        = {A topology and risk-aware access control framework for cyber-physical
                  space},
  journal      = {Frontiers Comput. Sci.},
  volume       = {14},
  number       = {4},
  pages        = {144805},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11704-019-8454-0},
  doi          = {10.1007/S11704-019-8454-0},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/CaoHYKW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/HussainHZW20,
  author       = {Yasir Hussain and
                  Zhiqiu Huang and
                  Yu Zhou and
                  Senzhang Wang},
  title        = {Deep Transfer Learning for Source Code Modeling},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {30},
  number       = {5},
  pages        = {649--668},
  year         = {2020},
  url          = {https://doi.org/10.1142/S0218194020500230},
  doi          = {10.1142/S0218194020500230},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijseke/HussainHZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/TaoGH20,
  author       = {Chuanqi Tao and
                  Hongjing Guo and
                  Zhiqiu Huang},
  title        = {Identifying security issues for mobile applications based on user
                  review summarization},
  journal      = {Inf. Softw. Technol.},
  volume       = {122},
  pages        = {106290},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.infsof.2020.106290},
  doi          = {10.1016/J.INFSOF.2020.106290},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/TaoGH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/HussainHZW20,
  author       = {Yasir Hussain and
                  Zhiqiu Huang and
                  Yu Zhou and
                  Senzhang Wang},
  title        = {CodeGRU: Context-aware deep learning with gated recurrent unit for
                  source code modeling},
  journal      = {Inf. Softw. Technol.},
  volume       = {125},
  pages        = {106309},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.infsof.2020.106309},
  doi          = {10.1016/J.INFSOF.2020.106309},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/HussainHZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/YangPZH20,
  author       = {Wenhua Yang and
                  Minxue Pan and
                  Yu Zhou and
                  Zhiqiu Huang},
  title        = {Developer portraying: {A} quick approach to understanding developers
                  on {OSS} platforms},
  journal      = {Inf. Softw. Technol.},
  volume       = {125},
  pages        = {106336},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.infsof.2020.106336},
  doi          = {10.1016/J.INFSOF.2020.106336},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/YangPZH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/LiZJH20,
  author       = {Weiwei Li and
                  Wenzhou Zhang and
                  Xiuyi Jia and
                  Zhiqiu Huang},
  title        = {Effort-Aware semi-Supervised just-in-Time defect prediction},
  journal      = {Inf. Softw. Technol.},
  volume       = {126},
  pages        = {106364},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.infsof.2020.106364},
  doi          = {10.1016/J.INFSOF.2020.106364},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/LiZJH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/Yang0Y0H20,
  author       = {Wenhua Yang and
                  Chang Xu and
                  Haibo Ye and
                  Yu Zhou and
                  Zhiqiu Huang},
  title        = {{\unicode{26234}}{\unicode{33021}}{\unicode{21270}}{\unicode{20449}}{\unicode{24687}}{\unicode{29289}}{\unicode{29702}}{\unicode{31995}}{\unicode{32479}}{\unicode{20013}}{\unicode{38750}}{\unicode{30830}}{\unicode{23450}}{\unicode{24615}}{\unicode{30340}}{\unicode{20998}}{\unicode{31867}}{\unicode{30740}}{\unicode{31350}}
                  (Taxonomy of Uncertainty Factors in Intelligence-oriented Cyber-physical
                  Systems)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {47},
  number       = {3},
  pages        = {11--18},
  year         = {2020},
  url          = {https://doi.org/10.11896/jsjkx.191100052},
  doi          = {10.11896/JSJKX.191100052},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsjkx/Yang0Y0H20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/Zhang0H20,
  author       = {Yunfan Zhang and
                  Yu Zhou and
                  Zhiqiu Huang},
  title        = {{\unicode{22522}}{\unicode{20110}}{\unicode{35821}}{\unicode{20041}}{\unicode{30456}}{\unicode{20284}}{\unicode{24230}}{\unicode{30340}}API{\unicode{20351}}{\unicode{29992}}{\unicode{27169}}{\unicode{24335}}{\unicode{25512}}{\unicode{33616}}
                  (Semantic Similarity Based {API} Usage Pattern Recommendation)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {47},
  number       = {3},
  pages        = {34--40},
  year         = {2020},
  url          = {https://doi.org/10.11896/jsjkx.190300053},
  doi          = {10.11896/JSJKX.190300053},
  timestamp    = {Mon, 27 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsjkx/Zhang0H20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/DuSHYW20,
  author       = {Tianbao Du and
                  Guohua Shen and
                  Zhi{-}qiu Huang and
                  Yaoshen Yu and
                  Dexiang Wu},
  title        = {Automatic traceability link recovery via active learning},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {21},
  number       = {8},
  pages        = {1217--1225},
  year         = {2020},
  url          = {https://doi.org/10.1631/FITEE.1900222},
  doi          = {10.1631/FITEE.1900222},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jzusc/DuSHYW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/NawazHWAAG20,
  author       = {Asif Nawaz and
                  Zhiqiu Huang and
                  Senzhang Wang and
                  Muhammad Azeem Akbar and
                  Hussain Alsalman and
                  Abdu Gumaei},
  title        = {{GPS} Trajectory Completion Using End-to-End Bidirectional Convolutional
                  Recurrent Encoder-Decoder Architecture with Attention Mechanism},
  journal      = {Sensors},
  volume       = {20},
  number       = {18},
  pages        = {5143},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20185143},
  doi          = {10.3390/S20185143},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/NawazHWAAG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/smr/AkbarMHKS20,
  author       = {Muhammad Azeem Akbar and
                  Sajjad Mahmood and
                  Zhiqiu Huang and
                  Arif Ali Khan and
                  Mohammad Shameem},
  title        = {Readiness model for requirements change management in global software
                  development},
  journal      = {J. Softw. Evol. Process.},
  volume       = {32},
  number       = {10},
  year         = {2020},
  url          = {https://doi.org/10.1002/smr.2264},
  doi          = {10.1002/SMR.2264},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/smr/AkbarMHKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/MengHSK20,
  author       = {Yunfei Meng and
                  Zhiqiu Huang and
                  Guohua Shen and
                  Changbo Ke},
  title        = {SDN-Based Security Enforcement Framework for Data Sharing Systems
                  of Smart Healthcare},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {17},
  number       = {1},
  pages        = {308--318},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNSM.2019.2941214},
  doi          = {10.1109/TNSM.2019.2941214},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/MengHSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/WangYHLZBF20,
  author       = {Fei Wang and
                  Zhibin Yang and
                  Zhi{-}qiu Huang and
                  Chengwei Liu and
                  Yong Zhou and
                  Jean{-}Paul Bodeveix and
                  Mamoun Filali},
  title        = {An Approach to Generate the Traceability Between Restricted Natural
                  Language Requirements and {AADL} Models},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {69},
  number       = {1},
  pages        = {154--173},
  year         = {2020},
  url          = {https://doi.org/10.1109/TR.2019.2936072},
  doi          = {10.1109/TR.2019.2936072},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/WangYHLZBF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsas/WangCCPH20,
  author       = {Senzhang Wang and
                  Jiannong Cao and
                  Hao Chen and
                  Hao Peng and
                  Zhiqiu Huang},
  title        = {SeqST-GAN: Seq2Seq Generative Adversarial Nets for Multi-step Urban
                  Crowd Flow Prediction},
  journal      = {{ACM} Trans. Spatial Algorithms Syst.},
  volume       = {6},
  number       = {4},
  pages        = {22:1--22:24},
  year         = {2020},
  url          = {https://doi.org/10.1145/3378889},
  doi          = {10.1145/3378889},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsas/WangCCPH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/NawazHWN20,
  author       = {Asif Nawaz and
                  Zhiqiu Huang and
                  Senzhang Wang and
                  Amara Naseer},
  title        = {Deep neural architecture for geospatial trajectory completion over
                  occupancy gridmap},
  booktitle    = {13th {IEEE} International Conference on Cloud Computing, {CLOUD} 2020,
                  Virtual Event, 18-24 October 2020},
  pages        = {37--39},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CLOUD49709.2020.00018},
  doi          = {10.1109/CLOUD49709.2020.00018},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/NawazHWN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/NawazHW20,
  author       = {Asif Nawaz and
                  Zhiqiu Huang and
                  Senzhang Wang},
  editor       = {Xin Wang and
                  Rui Zhang and
                  Young{-}Koo Lee and
                  Le Sun and
                  Yang{-}Sae Moon},
  title        = {{SSMDL:} Semi-supervised Multi-task Deep Learning for Transportation
                  Mode Classification and Path Prediction with {GPS} Trajectories},
  booktitle    = {Web and Big Data - 4th International Joint Conference, APWeb-WAIM
                  2020, Tianjin, China, September 18-20, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12318},
  pages        = {391--405},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-60290-1\_31},
  doi          = {10.1007/978-3-030-60290-1\_31},
  timestamp    = {Fri, 16 Oct 2020 12:50:03 +0200},
  biburl       = {https://dblp.org/rec/conf/apweb/NawazHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/WangMCH20,
  author       = {Senzhang Wang and
                  Hao Miao and
                  Hao Chen and
                  Zhiqiu Huang},
  editor       = {Mathieu d'Aquin and
                  Stefan Dietze and
                  Claudia Hauff and
                  Edward Curry and
                  Philippe Cudr{\'{e}}{-}Mauroux},
  title        = {Multi-task Adversarial Spatial-Temporal Networks for Crowd Flow Prediction},
  booktitle    = {{CIKM} '20: The 29th {ACM} International Conference on Information
                  and Knowledge Management, Virtual Event, Ireland, October 19-23, 2020},
  pages        = {1555--1564},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3340531.3412054},
  doi          = {10.1145/3340531.3412054},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/WangMCH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ease/AkbarH0MHH20,
  author       = {Muhammad Azeem Akbar and
                  Zhiqiu Huang and
                  Yu Zhou and
                  Faisal Mehmood and
                  Yasir Hussain and
                  Muhammad Hamza},
  editor       = {Jingyue Li and
                  Letizia Jaccheri and
                  Torgeir Dings{\o}yr and
                  Ruzanna Chitchyan},
  title        = {Towards continues code recommendation and implementation system: An
                  Initial Framework},
  booktitle    = {{EASE} '20: Evaluation and Assessment in Software Engineering, Trondheim,
                  Norway, April 15-17, 2020},
  pages        = {439--444},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3383219.3383282},
  doi          = {10.1145/3383219.3383282},
  timestamp    = {Thu, 07 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ease/AkbarH0MHH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/internetware/FangH0C20,
  author       = {Liyu Fang and
                  Zhiqiu Huang and
                  Yu Zhou and
                  Taolue Chen},
  title        = {Adaptive Code Completion with Meta-learning},
  booktitle    = {Internetware'20: 12th Asia-Pacific Symposium on Internetware, Singapore,
                  November 1-3, 2020},
  pages        = {116--125},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3457913.3457933},
  doi          = {10.1145/3457913.3457933},
  timestamp    = {Mon, 26 Jul 2021 11:43:54 +0200},
  biburl       = {https://dblp.org/rec/conf/internetware/FangH0C20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/internetware/YuHZLS20,
  author       = {Yaoshen Yu and
                  Zhiqiu Huang and
                  Yu Zhou and
                  Weiwei Li and
                  Yichao Shao},
  title        = {ASPDup: AST-Sequence-based Progressive Duplicate Code Detection Tool
                  for Onsite Programming Code},
  booktitle    = {Internetware'20: 12th Asia-Pacific Symposium on Internetware, Singapore,
                  November 1-3, 2020},
  pages        = {260--264},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3457913.3457938},
  doi          = {10.1145/3457913.3457938},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/internetware/YuHZLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicase/GuoTH20,
  author       = {Hongjing Guo and
                  Chuanqi Tao and
                  Zhiqiu Huang},
  editor       = {Jing Liu and
                  Honghao Gao and
                  Yuyu Yin and
                  Zhongqin Bi},
  title        = {Metamorphic Testing for Plant Identification Mobile Applications Based
                  on Test Contexts},
  booktitle    = {Mobile Computing, Applications, and Services - 11th {EAI} International
                  Conference, MobiCASE 2020, Shanghai, China, September 12, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {341},
  pages        = {209--223},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64214-3\_15},
  doi          = {10.1007/978-3-030-64214-3\_15},
  timestamp    = {Tue, 09 May 2023 16:44:52 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicase/GuoTH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/WangZZH20,
  author       = {Pu Wang and
                  Zhiyi Zhang and
                  Yuqian Zhou and
                  Zhiqiu Huang},
  title        = {Test Data Augmentation for Image Recognition Software},
  booktitle    = {20th {IEEE} International Conference on Software Quality, Reliability
                  and Security Companion, {QRS} Companion 2020, Macau, China, December
                  11-14, 2020},
  pages        = {280--284},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/QRS-C51114.2020.00054},
  doi          = {10.1109/QRS-C51114.2020.00054},
  timestamp    = {Thu, 15 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/WangZZH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-01264,
  author       = {Yu Zhou and
                  Xinying Yang and
                  Taolue Chen and
                  Zhiqiu Huang and
                  Xiaoxing Ma and
                  Harald C. Gall},
  title        = {Boosting {API} Recommendation with Implicit Feedback},
  journal      = {CoRR},
  volume       = {abs/2002.01264},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.01264},
  eprinttype    = {arXiv},
  eprint       = {2002.01264},
  timestamp    = {Mon, 10 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-01264.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-06834,
  author       = {Yunfei Meng and
                  Zhiqiu Huang and
                  Senzhang Wang and
                  Guohua Shen and
                  Changbo Ke},
  title        = {SOM-based DDoS Defense Mechanism using {SDN} for the Internet of Things},
  journal      = {CoRR},
  volume       = {abs/2003.06834},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.06834},
  eprinttype    = {arXiv},
  eprint       = {2003.06834},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-06834.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-13206,
  author       = {Yunfei Meng and
                  Zhiqiu Huang and
                  Guohua Shen and
                  Changbo Ke},
  title        = {A Security Policy Model Transformation and Verification Approach for
                  Software Defined Networking},
  journal      = {CoRR},
  volume       = {abs/2005.13206},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.13206},
  eprinttype    = {arXiv},
  eprint       = {2005.13206},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-13206.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YeSGH19,
  author       = {Haibo Ye and
                  Li Sheng and
                  Tao Gu and
                  Zhiqiu Huang},
  title        = {SELoc: Collect Your Location Data Using Only a Barometer Sensor},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {88705--88717},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2925460},
  doi          = {10.1109/ACCESS.2019.2925460},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YeSGH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WuSHCD19,
  author       = {Dexiang Wu and
                  Guohua Shen and
                  Zhi{-}qiu Huang and
                  Yan Cao and
                  Tianbao Du},
  title        = {A Trust-Aware Task Offloading Framework in Mobile Edge Computing},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {150105--150119},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2947306},
  doi          = {10.1109/ACCESS.2019.2947306},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WuSHCD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CaoHKXW19,
  author       = {Yan Cao and
                  Zhiqiu Huang and
                  Changbo Ke and
                  Jian Xie and
                  Jin Wang},
  title        = {A topology-aware access control model for collaborative cyber-physical
                  spaces: Specification and verification},
  journal      = {Comput. Secur.},
  volume       = {87},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.02.013},
  doi          = {10.1016/J.COSE.2019.02.013},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CaoHKXW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangHLWY19,
  author       = {Yong Wang and
                  Zhiqiu Huang and
                  Yong Li and
                  Rongcun Wang and
                  Qiao Yu},
  title        = {Spectrum-Based Fault Localization Framework to Support Fault Understanding},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {102-D},
  number       = {4},
  pages        = {863--866},
  year         = {2019},
  url          = {https://doi.org/10.1587/transinf.2018EDL8233},
  doi          = {10.1587/TRANSINF.2018EDL8233},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangHLWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/KeHW19,
  author       = {Changbo Ke and
                  Zhiqiu Huang and
                  Jiayu Wu},
  title        = {{\unicode{38754}}{\unicode{21521}}{\unicode{22823}}{\unicode{25968}}{\unicode{25454}}{\unicode{30340}}{\unicode{38544}}{\unicode{31169}}{\unicode{21457}}{\unicode{24067}}{\unicode{26292}}{\unicode{38706}}{\unicode{26816}}{\unicode{27979}}{\unicode{26041}}{\unicode{27861}}
                  (Big Data Oriented Privacy Disclosure Detection Method for Information
                  Release)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {46},
  number       = {10},
  pages        = {148--153},
  year         = {2019},
  url          = {https://doi.org/10.11896/jsjkx.190100050},
  doi          = {10.11896/JSJKX.190100050},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/KeHW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ZhouYYCH19,
  author       = {Yu Zhou and
                  Xin Yan and
                  Wenhua Yang and
                  Taolue Chen and
                  Zhiqiu Huang},
  title        = {Augmenting Java method comments generation with context information
                  based on neural networks},
  journal      = {J. Syst. Softw.},
  volume       = {156},
  pages        = {328--340},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jss.2019.07.087},
  doi          = {10.1016/J.JSS.2019.07.087},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/ZhouYYCH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/YeDGH19,
  author       = {Haibo Ye and
                  Kai Dong and
                  Tao Gu and
                  Zhiqiu Huang},
  title        = {SMinder: Detect a Left-behind Phone using Sensor-based Context Awareness},
  journal      = {Mob. Networks Appl.},
  volume       = {24},
  number       = {1},
  pages        = {171--183},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11036-017-0987-6},
  doi          = {10.1007/S11036-017-0987-6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/YeDGH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/WangZLYH19,
  author       = {Senzhang Wang and
                  Xiaoming Zhang and
                  Fengxiang Li and
                  Philip S. Yu and
                  Zhiqiu Huang},
  title        = {Efficient Traffic Estimation With Multi-Sourced Data by Parallel Coupled
                  Hidden Markov Model},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {20},
  number       = {8},
  pages        = {3010--3023},
  year         = {2019},
  url          = {https://doi.org/10.1109/TITS.2018.2870948},
  doi          = {10.1109/TITS.2018.2870948},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/WangZLYH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/AiHLZY19,
  author       = {Lei Ai and
                  Zhiqiu Huang and
                  Weiwei Li and
                  Yu Zhou and
                  Yaoshen Yu},
  editor       = {Vladimir Getov and
                  Jean{-}Luc Gaudiot and
                  Nariyoshi Yamai and
                  Stelvio Cimato and
                  J. Morris Chang and
                  Yuuichi Teranishi and
                  Ji{-}Jiang Yang and
                  Hong Va Leong and
                  Hossain Shahriar and
                  Michiharu Takemoto and
                  Dave Towey and
                  Hiroki Takakura and
                  Atilla El{\c{c}}i and
                  Susumu Takeuchi and
                  Satish Puri},
  title        = {{SENSORY:} Leveraging Code Statement Sequence Information for Code
                  Snippets Recommendation},
  booktitle    = {43rd {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1},
  pages        = {27--36},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/COMPSAC.2019.00014},
  doi          = {10.1109/COMPSAC.2019.00014},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/AiHLZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-00884,
  author       = {Yasir Hussain and
                  Zhiqiu Huang and
                  Senzhang Wang and
                  Yu Zhou},
  title        = {CodeGRU: Context-aware Deep Learning with Gated Recurrent Unit for
                  Source Code Modeling},
  journal      = {CoRR},
  volume       = {abs/1903.00884},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.00884},
  eprinttype    = {arXiv},
  eprint       = {1903.00884},
  timestamp    = {Tue, 15 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-00884.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-00894,
  author       = {Yu Zhou and
                  Yanqi Su and
                  Taolue Chen and
                  Zhiqiu Huang and
                  Harald C. Gall and
                  Sebastiano Panichella},
  title        = {User Review-Based Change File Localization for Mobile Applications},
  journal      = {CoRR},
  volume       = {abs/1903.00894},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.00894},
  eprinttype    = {arXiv},
  eprint       = {1903.00894},
  timestamp    = {Tue, 15 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-00894.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-10201,
  author       = {Yunfei Meng and
                  Zhiqiu Huang and
                  Senzhang Wang and
                  Yu Zhou and
                  Guohua Shen and
                  Changbo Ke},
  title        = {Behavior-aware Service Access Control Mechanism using Security Policy
                  Monitoring for {SOA} Systems},
  journal      = {CoRR},
  volume       = {abs/1908.10201},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.10201},
  eprinttype    = {arXiv},
  eprint       = {1908.10201},
  timestamp    = {Tue, 15 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-10201.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-05493,
  author       = {Yasir Hussain and
                  Zhiqiu Huang and
                  Yu Zhou and
                  Senzhang Wang},
  title        = {Deep Transfer Learning for Source Code Modeling},
  journal      = {CoRR},
  volume       = {abs/1910.05493},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.05493},
  eprinttype    = {arXiv},
  eprint       = {1910.05493},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-05493.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-06500,
  author       = {Yasir Hussain and
                  Zhiqiu Huang and
                  Yu Zhou and
                  Senzhang Wang},
  title        = {DeepVS: An Efficient and Generic Approach for Source Code Modeling
                  Usage},
  journal      = {CoRR},
  volume       = {abs/1910.06500},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.06500},
  eprinttype    = {arXiv},
  eprint       = {1910.06500},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-06500.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangHFL18,
  author       = {Yong Wang and
                  Zhiqiu Huang and
                  BingWu Fang and
                  Yong Li},
  title        = {Spectrum-Based Fault Localization via Enlarging Non-Fault Region to
                  Improve Fault Absolute Ranking},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {8925--8933},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2796849},
  doi          = {10.1109/ACCESS.2018.2796849},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangHFL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YeYYGH18,
  author       = {Haibo Ye and
                  Wenhua Yang and
                  Yunyu Yao and
                  Tao Gu and
                  Zhiqiu Huang},
  title        = {BTrack: Using Barometer for Energy Efficient Location Tracking on
                  Mountain Roads},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {66998--67009},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2879311},
  doi          = {10.1109/ACCESS.2018.2879311},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YeYYGH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/FangGHW18,
  author       = {Liming Fang and
                  Chunpeng Ge and
                  Zhiqiu Huang and
                  Jiandong Wang},
  title        = {Privacy preserving cloud data sharing system with flexible control},
  journal      = {Comput. Electr. Eng.},
  volume       = {70},
  pages        = {978--986},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.compeleceng.2018.02.048},
  doi          = {10.1016/J.COMPELECENG.2018.02.048},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/FangGHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/KanH18,
  author       = {Shuanglong Kan and
                  Zhiqiu Huang},
  title        = {Partial Order Reduction for the full Class of State/Event Linear Temporal
                  Logic},
  journal      = {Comput. J.},
  volume       = {61},
  number       = {5},
  pages        = {629--644},
  year         = {2018},
  url          = {https://doi.org/10.1093/comjnl/bxx064},
  doi          = {10.1093/COMJNL/BXX064},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/KanH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/MengHZK18,
  author       = {Yunfei Meng and
                  Zhiqiu Huang and
                  Yu Zhou and
                  Changbo Ke},
  title        = {Privacy-aware cloud service selection approach based on P-Spec policy
                  models and privacy sensitivities},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {86},
  pages        = {1--11},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2018.03.013},
  doi          = {10.1016/J.FUTURE.2018.03.013},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/MengHZK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangHWY18,
  author       = {Yong Wang and
                  Zhiqiu Huang and
                  Rongcun Wang and
                  Qiao Yu},
  title        = {Spectrum-Based Fault Localization Using Fault Triggering Model to
                  Refine Fault Ranking List},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {101-D},
  number       = {10},
  pages        = {2436--2446},
  year         = {2018},
  url          = {https://doi.org/10.1587/transinf.2017EDP7386},
  doi          = {10.1587/TRANSINF.2017EDP7386},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangHWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/JiangHMC18,
  author       = {Jia{-}xin Jiang and
                  Zhi{-}qiu Huang and
                  Wei{-}wei Ma and
                  Yan Cao},
  title        = {Using information flow analysis to detect implicit information leaks
                  for web service composition},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {19},
  number       = {4},
  pages        = {494--502},
  year         = {2018},
  url          = {https://doi.org/10.1631/FITEE.1601371},
  doi          = {10.1631/FITEE.1601371},
  timestamp    = {Thu, 05 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jzusc/JiangHMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/PengHLLFW18,
  author       = {Huanfeng Peng and
                  Zhi{-}qiu Huang and
                  LinYuan Liu and
                  Yong Li and
                  Dajuan Fan and
                  Yu{-}qing Wang},
  title        = {Preserving privacy information flow security in composite service
                  evolution},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {19},
  number       = {5},
  pages        = {626--638},
  year         = {2018},
  url          = {https://doi.org/10.1631/FITEE.1700359},
  doi          = {10.1631/FITEE.1700359},
  timestamp    = {Mon, 09 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jzusc/PengHLLFW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/KanH18,
  author       = {Shuanglong Kan and
                  Zhiqiu Huang},
  title        = {Detecting safety-related components in statecharts through traceability
                  and model slicing},
  journal      = {Softw. Pract. Exp.},
  volume       = {48},
  number       = {3},
  pages        = {428--448},
  year         = {2018},
  url          = {https://doi.org/10.1002/spe.2526},
  doi          = {10.1002/SPE.2526},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/KanH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/YuanH18,
  author       = {Min Yuan and
                  Zhiqiu Huang},
  title        = {Efficient Verification of Service-Based Applications for Flexible
                  Modeling},
  booktitle    = {2018 {IEEE} International Conference on Services Computing, {SCC}
                  2018, San Francisco, CA, USA, July 2-7, 2018},
  pages        = {97--104},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SCC.2018.00020},
  doi          = {10.1109/SCC.2018.00020},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/YuanH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/HussainH18,
  author       = {Yasir Hussain and
                  Zhiqiu Huang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {TRFIoT: Trust and Reputation Model for Fog-based IoT},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {VI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11068},
  pages        = {187--198},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00021-9\_18},
  doi          = {10.1007/978-3-030-00021-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/HussainH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/ChenYLQH18,
  author       = {Zhe Chen and
                  Junqi Yan and
                  Wenming Li and
                  Ju Qian and
                  Zhiqiu Huang},
  editor       = {Michel Chaudron and
                  Ivica Crnkovic and
                  Marsha Chechik and
                  Mark Harman},
  title        = {Runtime verification of memory safety via source transformation},
  booktitle    = {Proceedings of the 40th International Conference on Software Engineering:
                  Companion Proceeedings, {ICSE} 2018, Gothenburg, Sweden, May 27 -
                  June 03, 2018},
  pages        = {264--265},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3183440.3194962},
  doi          = {10.1145/3183440.3194962},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/ChenYLQH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/memocode/XuYHZLXBF18,
  author       = {Jinmiao Xu and
                  Zhibin Yang and
                  Zhiqiu Huang and
                  Yong Zhou and
                  Chengwei Liu and
                  Lei Xue and
                  Jean{-}Paul Bodeveix and
                  Mamoun Filali},
  title        = {Hierarchical Behavior Annex: Towards an {AADL} Functional Specification
                  Extension},
  booktitle    = {16th {ACM/IEEE} International Conference on Formal Methods and Models
                  for System Design, {MEMOCODE} 2018, Beijing, China, October 15-18,
                  2018},
  pages        = {88--98},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MEMCOD.2018.8557005},
  doi          = {10.1109/MEMCOD.2018.8557005},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/memocode/XuYHZLXBF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KeHC17,
  author       = {Changbo Ke and
                  Zhiqiu Huang and
                  Xiaohui Cheng},
  title        = {Privacy Disclosure Checking Method Applied on Collaboration Interactions
                  Among SaaS Services},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {15080--15092},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2710091},
  doi          = {10.1109/ACCESS.2017.2710091},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KeHC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiHWF17,
  author       = {Yong Li and
                  Zhiqiu Huang and
                  Yong Wang and
                  BingWu Fang},
  title        = {Evaluating Data Filter on Cross-Project Defect Prediction: Comparison
                  and Improvements},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {25646--25656},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2771460},
  doi          = {10.1109/ACCESS.2017.2771460},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiHWF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiKH17,
  author       = {Weiwei Li and
                  Shuanglong Kan and
                  Zhiqiu Huang},
  title        = {A Better Translation From {LTL} to Transition-Based Generalized B{\"{u}}chi
                  Automata},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {27081--27090},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2773123},
  doi          = {10.1109/ACCESS.2017.2773123},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/0008HLF17,
  author       = {Yong Wang and
                  Zhiqiu Huang and
                  Yong Li and
                  BingWu Fang},
  title        = {Lightweight fault localization combined with fault context to improve
                  fault absolute rank},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {9},
  pages        = {092113:1--092113:16},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-017-9112-2},
  doi          = {10.1007/S11432-017-9112-2},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/0008HLF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/ZhangHD18,
  author       = {Chi Zhang and
                  Zhiqiu Huang and
                  Zewen Ding},
  title        = {{\unicode{25903}}{\unicode{25345}}{\unicode{25277}}{\unicode{35937}}{\unicode{35299}}{\unicode{37322}}{\unicode{30340}}{\unicode{38745}}{\unicode{24577}}{\unicode{20998}}{\unicode{26512}}{\unicode{26041}}{\unicode{27861}}{\unicode{30340}}{\unicode{24418}}{\unicode{24335}}{\unicode{21270}}{\unicode{20307}}{\unicode{31995}}{\unicode{30740}}{\unicode{31350}}
                  (Research on Static Analysis Formalism Supporting Abstract Interpretation)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {44},
  number       = {12},
  pages        = {126--130},
  year         = {2017},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2017.12.025},
  doi          = {10.11896/J.ISSN.1002-137X.2017.12.025},
  timestamp    = {Fri, 20 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/ZhangHD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/KeHX18,
  author       = {Changbo Ke and
                  Zhiqiu Huang and
                  Fu Xiao},
  title        = {{\unicode{22522}}{\unicode{20110}}{\unicode{26412}}{\unicode{20307}}{\unicode{27010}}{\unicode{24565}}{\unicode{30456}}{\unicode{20284}}{\unicode{24230}}{\unicode{30340}}{\unicode{36719}}{\unicode{20214}}{\unicode{26500}}{\unicode{20214}}{\unicode{26816}}{\unicode{32034}}{\unicode{26041}}{\unicode{27861}}
                  (Software Component Retrieval Method Based on Ontology Concept Similarity)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {44},
  number       = {12},
  pages        = {144--149},
  year         = {2017},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2017.12.028},
  doi          = {10.11896/J.ISSN.1002-137X.2017.12.028},
  timestamp    = {Fri, 20 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/KeHX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/logcom/KanHCLH17,
  author       = {Shuanglong Kan and
                  Zhiqiu Huang and
                  Zhe Chen and
                  Weiwei Li and
                  Yutao Huang},
  title        = {Partial order reduction for checking {LTL} formulae with the next-time
                  operator},
  journal      = {J. Log. Comput.},
  volume       = {27},
  number       = {4},
  pages        = {1095--1131},
  year         = {2017},
  url          = {https://doi.org/10.1093/logcom/exw004},
  doi          = {10.1093/LOGCOM/EXW004},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/logcom/KanHCLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paa/FangHLW17,
  author       = {BingWu Fang and
                  Zhiqiu Huang and
                  Yong Li and
                  Yong Wang},
  title        = {{\(\upsilon\)}-Support vector machine based on discriminant sparse
                  neighborhood preserving embedding},
  journal      = {Pattern Anal. Appl.},
  volume       = {20},
  number       = {4},
  pages        = {1077--1089},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10044-016-0547-x},
  doi          = {10.1007/S10044-016-0547-X},
  timestamp    = {Tue, 30 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/paa/FangHLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/ZhuHZ17,
  author       = {Yi Zhu and
                  Zhiqiu Huang and
                  Hang Zhou},
  title        = {Modeling and verification of Web services composition based on model
                  transformation},
  journal      = {Softw. Pract. Exp.},
  volume       = {47},
  number       = {5},
  pages        = {709--730},
  year         = {2017},
  url          = {https://doi.org/10.1002/spe.2434},
  doi          = {10.1002/SPE.2434},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/ZhuHZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sqj/LiuSHY17,
  author       = {Yinling Liu and
                  Guohua Shen and
                  Zhiqiu Huang and
                  Zhibin Yang},
  title        = {Quantitative risk analysis of safety-critical embedded systems},
  journal      = {Softw. Qual. J.},
  volume       = {25},
  number       = {2},
  pages        = {503--527},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11219-015-9302-6},
  doi          = {10.1007/S11219-015-9302-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sqj/LiuSHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tois/WangZCHSYLH17,
  author       = {Senzhang Wang and
                  Xiaoming Zhang and
                  Jianping Cao and
                  Lifang He and
                  Leon Stenneth and
                  Philip S. Yu and
                  Zhoujun Li and
                  Zhiqiu Huang},
  title        = {Computing Urban Traffic Congestions by Incorporating Sparse {GPS}
                  Probe Data and Social Media Data},
  journal      = {{ACM} Trans. Inf. Syst.},
  volume       = {35},
  number       = {4},
  pages        = {40:1--40:30},
  year         = {2017},
  url          = {https://doi.org/10.1145/3057281},
  doi          = {10.1145/3057281},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tois/WangZCHSYLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/ZhouGCHPG17,
  author       = {Yu Zhou and
                  Ruihang Gu and
                  Taolue Chen and
                  Zhiqiu Huang and
                  Sebastiano Panichella and
                  Harald C. Gall},
  editor       = {Sebasti{\'{a}}n Uchitel and
                  Alessandro Orso and
                  Martin P. Robillard},
  title        = {Analyzing APIs documentation and code to detect directive defects},
  booktitle    = {Proceedings of the 39th International Conference on Software Engineering,
                  {ICSE} 2017, Buenos Aires, Argentina, May 20-28, 2017},
  pages        = {27--37},
  publisher    = {{IEEE} / {ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICSE.2017.11},
  doi          = {10.1109/ICSE.2017.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/ZhouGCHPG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mlicom/KhudadadH17,
  author       = {Mirza Khudadad and
                  Zhiqiu Huang},
  editor       = {Xuemai Gu and
                  Gongliang Liu and
                  Bo Li},
  title        = {Intrusion Detection with Tree-Based Data Mining Classification Techniques
                  by Using {KDD}},
  booktitle    = {Machine Learning and Intelligent Communications - Second International
                  Conference, {MLICOM} 2017, Weihai, China, August 5-6, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {227},
  pages        = {294--303},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73447-7\_33},
  doi          = {10.1007/978-3-319-73447-7\_33},
  timestamp    = {Thu, 01 Aug 2019 13:46:15 +0200},
  biburl       = {https://dblp.org/rec/conf/mlicom/KhudadadH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mlicom/ZhangHX17,
  author       = {Qi Zhang and
                  Zhiqiu Huang and
                  Jian Xie},
  editor       = {Xuemai Gu and
                  Gongliang Liu and
                  Bo Li},
  title        = {Distributed System Model Using SysML and Event-B},
  booktitle    = {Machine Learning and Intelligent Communications - Second International
                  Conference, {MLICOM} 2017, Weihai, China, August 5-6, 2017, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {226},
  pages        = {326--336},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73564-1\_32},
  doi          = {10.1007/978-3-319-73564-1\_32},
  timestamp    = {Mon, 16 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mlicom/ZhangHX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/SuZLHLT17,
  author       = {Shenghui Su and
                  Jianhua Zheng and
                  Shuwang L{\"{u}} and
                  Zhiqiu Huang and
                  Zhoujun Li and
                  Zhenmin Tang},
  editor       = {G. Alan Wang and
                  Michael Chau and
                  Hsinchun Chen},
  title        = {Idology and Its Applications in Public Security and Network Security},
  booktitle    = {Intelligence and Security Informatics - 12th Pacific Asia Workshop,
                  {PAISI} 2017, Jeju Island, South Korea, May 23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10241},
  pages        = {129--149},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-57463-9\_9},
  doi          = {10.1007/978-3-319-57463-9\_9},
  timestamp    = {Wed, 04 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/SuZLHLT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/GeSWHFR16,
  author       = {Chunpeng Ge and
                  Willy Susilo and
                  Jiandong Wang and
                  Zhiqiu Huang and
                  Liming Fang and
                  Yongjun Ren},
  title        = {A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles},
  journal      = {Comput. J.},
  volume       = {59},
  number       = {7},
  pages        = {970--982},
  year         = {2016},
  url          = {https://doi.org/10.1093/comjnl/bxv100},
  doi          = {10.1093/COMJNL/BXV100},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/GeSWHFR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijar/LiHJC16,
  author       = {Weiwei Li and
                  Zhiqiu Huang and
                  Xiuyi Jia and
                  Xinye Cai},
  title        = {Neighborhood based decision-theoretic rough set models},
  journal      = {Int. J. Approx. Reason.},
  volume       = {69},
  pages        = {1--17},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijar.2015.11.005},
  doi          = {10.1016/J.IJAR.2015.11.005},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijar/LiHJC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/ZhuHZZX16,
  author       = {Yi Zhu and
                  Zhiqiu Huang and
                  Guangquan Zhang and
                  Hang Zhou and
                  Fangxiong Xiao},
  title        = {Multi-Resource Modeling of Real-Time Software Based on Resource Timed
                  Process Algebra},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {26},
  number       = {7},
  pages        = {1099--1116},
  year         = {2016},
  url          = {https://doi.org/10.1142/S0218194016500388},
  doi          = {10.1142/S0218194016500388},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/ZhuHZZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/ZhuHT16,
  author       = {Youwen Zhu and
                  Zhiqiu Huang and
                  Tsuyoshi Takagi},
  title        = {Secure and controllable k-NN query over encrypted cloud data with
                  key confidentiality},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {89},
  pages        = {1--12},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jpdc.2015.11.004},
  doi          = {10.1016/J.JPDC.2015.11.004},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/ZhuHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/ZhangHS18,
  author       = {Xueming Zhang and
                  Zhiqiu Huang and
                  Yi Sun},
  title        = {{\unicode{22522}}{\unicode{20110}}RBAC{\unicode{30340}}{\unicode{38544}}{\unicode{31169}}{\unicode{35775}}{\unicode{38382}}{\unicode{25511}}{\unicode{21046}}{\unicode{30740}}{\unicode{31350}}
                  (Research on Privacy Access Control Based on {RBAC)}},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {43},
  number       = {1},
  pages        = {166--171},
  year         = {2016},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2016.01.038},
  doi          = {10.11896/J.ISSN.1002-137X.2016.01.038},
  timestamp    = {Fri, 20 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/ZhangHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/ChenHCK16,
  author       = {Guangying Chen and
                  Zhiqiu Huang and
                  Zhe Chen and
                  Shuanglong Kan},
  title        = {{\unicode{38754}}{\unicode{21521}}DO-333{\unicode{30340}}{\unicode{35167}}{\unicode{32541}}{\unicode{32764}}{\unicode{25511}}{\unicode{21046}}{\unicode{21333}}{\unicode{20803}}{\unicode{23433}}{\unicode{20840}}{\unicode{24615}}{\unicode{20998}}{\unicode{26512}}
                  (Safety Analysis of Slat and Flap Control Unit for {DO-333)}},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {43},
  number       = {5},
  pages        = {150--156},
  year         = {2016},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2016.05.028},
  doi          = {10.11896/J.ISSN.1002-137X.2016.05.028},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/ChenHCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/LiHL16,
  author       = {Weiwei Li and
                  Zhiqiu Huang and
                  Qing Li},
  title        = {Three-way decisions based software defect prediction},
  journal      = {Knowl. Based Syst.},
  volume       = {91},
  pages        = {263--274},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.knosys.2015.09.035},
  doi          = {10.1016/J.KNOSYS.2015.09.035},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/LiHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/KanHC16,
  author       = {Shuanglong Kan and
                  Zhiqiu Huang and
                  Zhe Chen},
  editor       = {Kazuhiro Ogata and
                  Mark Lawford and
                  Shaoying Liu},
  title        = {Partial Order Reduction for State/Event Systems},
  booktitle    = {Formal Methods and Software Engineering - 18th International Conference
                  on Formal Engineering Methods, {ICFEM} 2016, Tokyo, Japan, November
                  14-18, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10009},
  pages        = {329--345},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47846-3\_21},
  doi          = {10.1007/978-3-319-47846-3\_21},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfem/KanHC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/WangHSYLH16,
  author       = {Senzhang Wang and
                  Lifang He and
                  Leon Stenneth and
                  Philip S. Yu and
                  Zhoujun Li and
                  Zhiqiu Huang},
  editor       = {Chi{-}Yin Chow and
                  Prem Prakash Jayaraman and
                  Wei Wu},
  title        = {Estimating Urban Traffic Congestions with Multi-sourced Data},
  booktitle    = {{IEEE} 17th International Conference on Mobile Data Management, {MDM}
                  2016, Porto, Portugal, June 13-16, 2016},
  pages        = {82--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MDM.2016.25},
  doi          = {10.1109/MDM.2016.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/WangHSYLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/WangH16,
  author       = {Yong Wang and
                  Zhiqiu Huang},
  title        = {Weighted Control Flow Subgraph to Support Debugging Activities},
  booktitle    = {2016 {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2016, Companion, Vienna, Austria, August 1-3,
                  2016},
  pages        = {131--134},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/QRS-C.2016.21},
  doi          = {10.1109/QRS-C.2016.21},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/WangH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sate/WangHLF16,
  author       = {Yong Wang and
                  Zhiqiu Huang and
                  Yong Li and
                  BingWu Fang},
  title        = {Lightweight Fault Localization Combining with Fault-Context},
  booktitle    = {International Conference on Software Analysis, Testing and Evolution,
                  {SATE} 2016, Kunming, China, November 3-4, 2016},
  pages        = {96--101},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/SATE.2016.23},
  doi          = {10.1109/SATE.2016.23},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/sate/WangHLF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SuZHLTWL16,
  author       = {Shenghui Su and
                  Jianhua Zheng and
                  Zhiqiu Huang and
                  Zhoujun Li and
                  Zhenmin Tang and
                  Jian Wang and
                  Shuwang L{\"{u}}},
  title        = {Idology and Its Applications in Public Security and Network Security},
  journal      = {CoRR},
  volume       = {abs/1609.05601},
  year         = {2016},
  url          = {http://arxiv.org/abs/1609.05601},
  eprinttype    = {arXiv},
  eprint       = {1609.05601},
  timestamp    = {Wed, 04 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SuZHLTWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ZhangLHWZ15,
  author       = {Yonglong Zhang and
                  Bin Li and
                  Zhiqiu Huang and
                  Jin Wang and
                  Junwu Zhu},
  title        = {{SGAM:} strategy-proof group buying-based auction mechanism for virtual
                  machine allocation in clouds},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {27},
  number       = {18},
  pages        = {5577--5589},
  year         = {2015},
  url          = {https://doi.org/10.1002/cpe.3605},
  doi          = {10.1002/CPE.3605},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/ZhangLHWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhouHWH15,
  author       = {Yu Zhou and
                  Yankai Huang and
                  Ou Wei and
                  Zhiqiu Huang},
  title        = {Verifying specifications with associated attributes in graph transformation
                  systems},
  journal      = {Frontiers Comput. Sci.},
  volume       = {9},
  number       = {3},
  pages        = {364--374},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11704-015-4290-4},
  doi          = {10.1007/S11704-015-4290-4},
  timestamp    = {Tue, 15 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhouHWH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/KeWXH15,
  author       = {Changbo Ke and
                  Ruchuan Wang and
                  Fu Xiao and
                  Zhiqiu Huang},
  title        = {Requirement-Oriented Privacy Protection Analysis Architecture in Cloud
                  Computing},
  journal      = {J. Commun.},
  volume       = {10},
  number       = {1},
  pages        = {55--63},
  year         = {2015},
  url          = {https://doi.org/10.12720/jcm.10.1.55-63},
  doi          = {10.12720/JCM.10.1.55-63},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcm/KeWXH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/NiHWH18,
  author       = {Chuan Ni and
                  Zhiqiu Huang and
                  Shanshan Wang and
                  Chuanlin Huang},
  title        = {{\unicode{22522}}{\unicode{20110}}{\unicode{23646}}{\unicode{24615}}{\unicode{30340}}{\unicode{25903}}{\unicode{25345}}{\unicode{31574}}{\unicode{30053}}{\unicode{26412}}{\unicode{20307}}{\unicode{25512}}{\unicode{29702}}{\unicode{30340}}{\unicode{35775}}{\unicode{38382}}{\unicode{25511}}{\unicode{21046}}{\unicode{26041}}{\unicode{27861}}{\unicode{30740}}{\unicode{31350}}
                  (Attribute-based Access Control Method Supporting Policies Ontology
                  Reasoning)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {42},
  number       = {3},
  pages        = {96--101},
  year         = {2015},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2015.03.020},
  doi          = {10.11896/J.ISSN.1002-137X.2015.03.020},
  timestamp    = {Mon, 27 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsjkx/NiHWH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/WuHWC15,
  author       = {Zhipeng Wu and
                  Zhiqiu Huang and
                  Shanshan Wang and
                  Dejian Cao},
  title        = {{\unicode{19968}}{\unicode{31181}}{\unicode{22522}}{\unicode{20110}}{\unicode{25925}}{\unicode{38556}}{\unicode{25193}}{\unicode{23637}}SysML{\unicode{27963}}{\unicode{21160}}{\unicode{22270}}{\unicode{30340}}{\unicode{23433}}{\unicode{20840}}{\unicode{24615}}{\unicode{39564}}{\unicode{35777}}{\unicode{26694}}{\unicode{26550}}{\unicode{30740}}{\unicode{31350}}
                  (Research on Framework of Safety Verification Based on Fault-extended
                  SysML Activity Diagram)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {42},
  number       = {7},
  pages        = {222--228},
  year         = {2015},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2015.07.048},
  doi          = {10.11896/J.ISSN.1002-137X.2015.07.048},
  timestamp    = {Mon, 27 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsjkx/WuHWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/ZhouHH15,
  author       = {Liang Zhou and
                  Zhiqiu Huang and
                  Chuanlin Huang},
  title        = {{\unicode{25925}}{\unicode{38556}}{\unicode{26641}}{\unicode{39046}}{\unicode{22495}}{\unicode{26412}}{\unicode{20307}}{\unicode{21450}}SWRL{\unicode{35268}}{\unicode{21017}}{\unicode{30340}}{\unicode{26500}}{\unicode{24314}}{\unicode{26041}}{\unicode{27861}}{\unicode{30740}}{\unicode{31350}}
                  (Construction Method for Fault Tree Domain Ontology Supporting {SWRL}
                  Rules)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {42},
  number       = {8},
  pages        = {198--202},
  year         = {2015},
  url          = {http://www.jsjkx.com/CN/Y2015/V42/I8/198},
  doi          = {Y2015/V42/I8/198},
  timestamp    = {Mon, 27 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsjkx/ZhouHH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/0001HW15,
  author       = {Liming Fang and
                  Zhiqiu Huang and
                  Jiandong Wang},
  title        = {{\unicode{26631}}{\unicode{20934}}{\unicode{27169}}{\unicode{22411}}{\unicode{19979}}{\unicode{22686}}{\unicode{24378}}{\unicode{30340}}{\unicode{26080}}{\unicode{38656}}{\unicode{23433}}{\unicode{20840}}{\unicode{20449}}{\unicode{36947}}{\unicode{30340}}{\unicode{24102}}{\unicode{20851}}{\unicode{38190}}{\unicode{35789}}{\unicode{25628}}{\unicode{32034}}{\unicode{30340}}{\unicode{20844}}{\unicode{38053}}{\unicode{21152}}{\unicode{23494}}
                  (Secure Channel Free Searchable Encryption in Standard Model)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {42},
  number       = {11},
  pages        = {197--202},
  year         = {2015},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2015.11.041},
  doi          = {10.11896/J.ISSN.1002-137X.2015.11.041},
  timestamp    = {Mon, 27 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsjkx/0001HW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/WangSHMLLL15,
  author       = {Fei Wang and
                  Guohua Shen and
                  Zhiqiu Huang and
                  Lin Ma and
                  Chang Liu and
                  Haifeng Li and
                  Lili Liao},
  title        = {{\unicode{19968}}{\unicode{31181}}{\unicode{32467}}{\unicode{21512}}{\unicode{32447}}{\unicode{24615}}{\unicode{26102}}{\unicode{24207}}{\unicode{36923}}{\unicode{36753}}{\unicode{21644}}{\unicode{25925}}{\unicode{38556}}{\unicode{26641}}{\unicode{30340}}{\unicode{36719}}{\unicode{20214}}{\unicode{23433}}{\unicode{20840}}{\unicode{39564}}{\unicode{35777}}{\unicode{26041}}{\unicode{27861}}
                  (Method Combining Linear Temporal Logic and Fault Tree for Software
                  Safety Verification)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {42},
  number       = {12},
  pages        = {71--75},
  year         = {2015},
  url          = {http://www.jsjkx.com/CN/Y2015/V42/I12/71},
  doi          = {Y2015/V42/I12/71},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsjkx/WangSHMLLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/HuangHHWW15,
  author       = {Chuanlin Huang and
                  Zhiqiu Huang and
                  Jun Hu and
                  Zhipeng Wu and
                  Siqi Wang},
  title        = {A MDE-Based Approach to the Safety Verification of Extended SysML
                  Activity Diagram},
  journal      = {J. Softw.},
  volume       = {10},
  number       = {1},
  pages        = {56--70},
  year         = {2015},
  url          = {https://doi.org/10.17706/jsw.10.1.56-70},
  doi          = {10.17706/JSW.10.1.56-70},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/HuangHHWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/ChenGHZLL15,
  author       = {Zhe Chen and
                  Yi Gu and
                  Zhiqiu Huang and
                  Jun Zheng and
                  Chang Liu and
                  Ziyi Liu},
  title        = {Model checking aircraft controller software: a case study},
  journal      = {Softw. Pract. Exp.},
  volume       = {45},
  number       = {7},
  pages        = {989--1017},
  year         = {2015},
  url          = {https://doi.org/10.1002/spe.2242},
  doi          = {10.1002/SPE.2242},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spe/ChenGHZLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhuHHT15,
  author       = {Youwen Zhu and
                  Zhiqiu Huang and
                  Liusheng Huang and
                  Tsuyoshi Takagi},
  title        = {On the Security of {A} Privacy-Preserving Product Calculation Scheme},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {3},
  pages        = {373--374},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2014.2345404},
  doi          = {10.1109/TDSC.2014.2345404},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhuHHT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/ChenWHX15,
  author       = {Zhe Chen and
                  Ou Wei and
                  Zhiqiu Huang and
                  Hongwei Xi},
  title        = {Formal Semantics of Runtime Monitoring, Verification, Enforcement
                  and Control},
  booktitle    = {2015 International Symposium on Theoretical Aspects of Software Engineering,
                  {TASE} 2015, Nanjing, China, September 12-14, 2015},
  pages        = {63--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/TASE.2015.11},
  doi          = {10.1109/TASE.2015.11},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tase/ChenWHX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2015,
  editor       = {Zhiqiu Huang and
                  Xingming Sun and
                  Junzhou Luo and
                  Jian Wang},
  title        = {Cloud Computing and Security - First International Conference, {ICCCS}
                  2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9483},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27051-7},
  doi          = {10.1007/978-3-319-27051-7},
  isbn         = {978-3-319-27050-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FanHT14,
  author       = {Dajuan Fan and
                  Zhiqiu Huang and
                  Lei Tang},
  title        = {A Correctness Assurance Approach to Automatic Synthesis of Composite
                  Web Services},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {97-D},
  number       = {6},
  pages        = {1535--1545},
  year         = {2014},
  url          = {https://doi.org/10.1587/transinf.E97.D.1535},
  doi          = {10.1587/TRANSINF.E97.D.1535},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FanHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jam/KeHLSX14,
  author       = {Changbo Ke and
                  Zhiqiu Huang and
                  Weiwei Li and
                  Yi Sun and
                  Fangxiong Xiao},
  title        = {Service Outsourcing Character Oriented Privacy Conflict Detection
                  Method in Cloud Computing},
  journal      = {J. Appl. Math.},
  volume       = {2014},
  pages        = {240425:1--240425:11},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/240425},
  doi          = {10.1155/2014/240425},
  timestamp    = {Thu, 16 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jam/KeHLSX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/LuHK14,
  author       = {Jiajun Lu and
                  Zhiqiu Huang and
                  Changbo Ke},
  title        = {Verification of Behavior-aware Privacy Requirements in Web Services
                  Composition},
  journal      = {J. Softw.},
  volume       = {9},
  number       = {4},
  pages        = {944--951},
  year         = {2014},
  url          = {https://doi.org/10.4304/jsw.9.4.944-951},
  doi          = {10.4304/JSW.9.4.944-951},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/LuHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/GeSHK14,
  author       = {Qiang Ge and
                  Guohua Shen and
                  Zhiqiu Huang and
                  Changbo Ke},
  title        = {The Application of {SWRL} Based Ontology Inference for Privacy Protection},
  journal      = {J. Softw.},
  volume       = {9},
  number       = {5},
  pages        = {1217--1222},
  year         = {2014},
  url          = {https://doi.org/10.4304/jsw.9.5.1217-1222},
  doi          = {10.4304/JSW.9.5.1217-1222},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/GeSHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/SunHK14,
  author       = {Yi Sun and
                  Zhiqiu Huang and
                  Changbo Ke},
  title        = {Using Game Theory to Analyze Strategic Choices of Service Providers
                  and Service Requesters},
  journal      = {J. Softw.},
  volume       = {9},
  number       = {11},
  pages        = {2918--2924},
  year         = {2014},
  url          = {https://doi.org/10.4304/jsw.9.11.2918-2924},
  doi          = {10.4304/JSW.9.11.2918-2924},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/SunHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbd/ZhangLHWZP14,
  author       = {Yonglong Zhang and
                  Bin Li and
                  Zhiqiu Huang and
                  Jin Wang and
                  Junwu Zhu and
                  Huanfeng Peng},
  title        = {Strategy-Proof Auction Mechanism with Group Price for Virtual Machine
                  Allocation in Clouds},
  booktitle    = {Second International Conference on Advanced Cloud and Big Data, {CBD}
                  2014, Huangshan, China, November 20-22, 2014},
  pages        = {60--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CBD.2014.17},
  doi          = {10.1109/CBD.2014.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cbd/ZhangLHWZP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/semweb/ShenLWSWHK14,
  author       = {Guohua Shen and
                  Yinling Liu and
                  Fei Wang and
                  Jia Si and
                  Zi Wang and
                  Zhiqiu Huang and
                  Dazhou Kang},
  editor       = {Pavel Shvaiko and
                  J{\'{e}}r{\^{o}}me Euzenat and
                  Ming Mao and
                  Ernesto Jim{\'{e}}nez{-}Ruiz and
                  Juanzi Li and
                  Axel Ngonga},
  title        = {OMReasoner: combination of multi-matchers for ontology matching: results
                  for {OAEI} 2014},
  booktitle    = {Proceedings of the 9th International Workshop on Ontology Matching
                  collocated with the 13th International Semantic Web Conference {(ISWC}
                  2014), Riva del Garda, Trentino, Italy, October 20, 2014},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1317},
  pages        = {142--148},
  publisher    = {CEUR-WS.org},
  year         = {2014},
  url          = {https://ceur-ws.org/Vol-1317/oaei14\_paper6.pdf},
  timestamp    = {Mon, 26 Jun 2023 20:39:38 +0200},
  biburl       = {https://dblp.org/rec/conf/semweb/ShenLWSWHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/YuHWZ13,
  author       = {Ruiqiang Yu and
                  Zhiqiu Huang and
                  Lin Wang and
                  Hongjie Zhang},
  title        = {Analyzing Temporal Constraints for Web Services Composition},
  journal      = {J. Softw.},
  volume       = {8},
  number       = {5},
  pages        = {1051--1057},
  year         = {2013},
  url          = {https://doi.org/10.4304/jsw.8.5.1051-1057},
  doi          = {10.4304/JSW.8.5.1051-1057},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/YuHWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/KeHT13,
  author       = {Changbo Ke and
                  Zhiqiu Huang and
                  Mei Tang},
  title        = {Supporting negotiation mechanism privacy authority method in cloud
                  computing},
  journal      = {Knowl. Based Syst.},
  volume       = {51},
  pages        = {48--59},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.knosys.2013.07.001},
  doi          = {10.1016/J.KNOSYS.2013.07.001},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/KeHT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/XuHHWZ13,
  author       = {Bingfeng Xu and
                  Zhiqiu Huang and
                  Jun Hu and
                  Ou Wei and
                  Yu Zhou},
  editor       = {Anders Andersen and
                  Chang Xu},
  title        = {Minimal cut sequence generation for state/event fault trees},
  booktitle    = {Proceedings of the 2013 Middleware Doctoral Symposium, {MDS} 2013,
                  Beijing, China, December 9-13, 2013},
  pages        = {3:1--3:6},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2541534.2541592},
  doi          = {10.1145/2541534.2541592},
  timestamp    = {Tue, 15 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/middleware/XuHHWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rskt/LiHJ13,
  author       = {Weiwei Li and
                  Zhiqiu Huang and
                  Xiuyi Jia},
  editor       = {Pawan Lingras and
                  Marcin Wolski and
                  Chris Cornelis and
                  Sushmita Mitra and
                  Piotr Wasilewski},
  title        = {Two-Phase Classification Based on Three-Way Decisions},
  booktitle    = {Rough Sets and Knowledge Technology - 8th International Conference,
                  {RSKT} 2013, Halifax, NS, Canada, October 11-14, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8171},
  pages        = {338--345},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41299-8\_32},
  doi          = {10.1007/978-3-642-41299-8\_32},
  timestamp    = {Sun, 02 Oct 2022 16:14:18 +0200},
  biburl       = {https://dblp.org/rec/conf/rskt/LiHJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cai/CaiWH12,
  author       = {Xinye Cai and
                  Ou Wei and
                  Zhiqiu Huang},
  title        = {Evolutionary Approaches for Multi-Objective Next Release Problem},
  journal      = {Comput. Informatics},
  volume       = {31},
  number       = {4},
  pages        = {847},
  year         = {2012},
  url          = {http://www.cai.sk/ojs/index.php/cai/article/view/1108},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cai/CaiWH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/KeH12,
  author       = {Changbo Ke and
                  Zhiqiu Huang},
  title        = {Self-adaptive semantic web service matching method},
  journal      = {Knowl. Based Syst.},
  volume       = {35},
  pages        = {41--48},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.knosys.2012.04.018},
  doi          = {10.1016/J.KNOSYS.2012.04.018},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/KeH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ZhouYH12,
  author       = {Yu Zhou and
                  Xuefeng Yan and
                  Zhiqiu Huang},
  editor       = {Xiaoying Bai and
                  Fevzi Belli and
                  Elisa Bertino and
                  Carl K. Chang and
                  Atilla El{\c{c}}i and
                  Cristina Cerschi Seceleanu and
                  Haihua Xie and
                  Mohammad Zulkernine},
  title        = {A Graph Transformation Based Approach for Modeling Component-Level
                  Migration in Mobile Environments},
  booktitle    = {36th Annual {IEEE} Computer Software and Applications Conference Workshops,
                  {COMPSAC} 2012, Izmir, Turkey, July 16-20, 2012},
  pages        = {152--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/COMPSACW.2012.37},
  doi          = {10.1109/COMPSACW.2012.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/ZhouYH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seke/ShenHTGZ12,
  author       = {Guohua Shen and
                  Zhiqiu Huang and
                  Changbao Tian and
                  Qiang Ge and
                  Wei Zhang},
  title        = {Feature modeling and Verification based on Description Logics},
  booktitle    = {Proceedings of the 24th International Conference on Software Engineering
                  {\&} Knowledge Engineering (SEKE'2012), Hotel Sofitel, Redwood
                  City, San Francisco Bay, {USA} July 1-3, 2012},
  pages        = {422--425},
  publisher    = {Knowledge Systems Institute Graduate School},
  year         = {2012},
  timestamp    = {Thu, 12 Mar 2020 11:30:50 +0100},
  biburl       = {https://dblp.org/rec/conf/seke/ShenHTGZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/semweb/ShenTGZLHK12,
  author       = {Guohua Shen and
                  Changbao Tian and
                  Qiang Ge and
                  Yiquan Zhu and
                  Lili Liao and
                  Zhiqiu Huang and
                  Dazhou Kang},
  editor       = {Pavel Shvaiko and
                  J{\'{e}}r{\^{o}}me Euzenat and
                  Anastasios Kementsietsidis and
                  Ming Mao and
                  Natasha Fridman Noy and
                  Heiner Stuckenschmidt},
  title        = {OMReasoner: using multi-matchers and reasoner for ontology matching:
                  results for {OAEI} 2012},
  booktitle    = {Proceedings of the 7th International Workshop on Ontology Matching,
                  Boston, MA, USA, November 11, 2012},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {946},
  publisher    = {CEUR-WS.org},
  year         = {2012},
  url          = {https://ceur-ws.org/Vol-946/oaei12\_paper9.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:08 +0100},
  biburl       = {https://dblp.org/rec/conf/semweb/ShenTGZLHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LiuZHX11,
  author       = {LinYuan Liu and
                  Haibin Zhu and
                  Zhiqiu Huang and
                  Dongqing Xie},
  title        = {Minimal privacy authorization in web services collaboration},
  journal      = {Comput. Stand. Interfaces},
  volume       = {33},
  number       = {3},
  pages        = {332--343},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.csi.2010.09.001},
  doi          = {10.1016/J.CSI.2010.09.001},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/LiuZHX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/LiuZH11,
  author       = {LinYuan Liu and
                  Haibin Zhu and
                  Zhiqiu Huang},
  title        = {Analysis of the minimal privacy disclosure for web services collaborations
                  with role mechanisms},
  journal      = {Expert Syst. Appl.},
  volume       = {38},
  number       = {4},
  pages        = {4540--4549},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.eswa.2010.09.128},
  doi          = {10.1016/J.ESWA.2010.09.128},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/LiuZH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jwsr/XiaoHCHLY11,
  author       = {Fangxiong Xiao and
                  Zhiqiu Huang and
                  Zining Cao and
                  Jun Hu and
                  LinYuan Liu and
                  Min Yuan},
  title        = {Unified Modelling Functional and Non-Functional Aspects of Web Services
                  Composition Using {PTCCS} 1},
  journal      = {Int. J. Web Serv. Res.},
  volume       = {8},
  number       = {4},
  pages        = {47--80},
  year         = {2011},
  url          = {https://doi.org/10.4018/ijwsr.2011100103},
  doi          = {10.4018/IJWSR.2011100103},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jwsr/XiaoHCHLY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/semweb/ShenJZJHH11,
  author       = {Guohua Shen and
                  Lantao Jin and
                  Ziyue Zhao and
                  Zhe Jia and
                  Wenmin He and
                  Zhiqiu Huang},
  editor       = {Pavel Shvaiko and
                  J{\'{e}}r{\^{o}}me Euzenat and
                  Tom Heath and
                  Christoph Quix and
                  Ming Mao and
                  Isabel F. Cruz},
  title        = {OMReasoner: using reasoner for ontology matching: results for {OAEI}
                  2011},
  booktitle    = {Proceedings of the 6th International Workshop on Ontology Matching,
                  Bonn, Germany, October 24, 2011},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {814},
  publisher    = {CEUR-WS.org},
  year         = {2011},
  url          = {https://ceur-ws.org/Vol-814/oaei11\_paper13.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:04 +0100},
  biburl       = {https://dblp.org/rec/conf/semweb/ShenJZJHH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasfaa/ZhaoH10,
  author       = {Xiaofei Zhao and
                  Zhiqiu Huang},
  editor       = {Masatoshi Yoshikawa and
                  Xiaofeng Meng and
                  Takayuki Yumoto and
                  Qiang Ma and
                  Lifeng Sun and
                  Chiemi Watanabe},
  title        = {Checking Structural Integrity for Metadata Repository Systems by Means
                  of Description Logics},
  booktitle    = {Database Systems for Advanced Applications, 15th International Conference,
                  {DASFAA} 2010, International Workshops: GDM, BenchmarX, MCIS, SNSMW,
                  DIEW, UDM, Tsukuba, Japan, April 1-4, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6193},
  pages        = {118--129},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14589-6\_13},
  doi          = {10.1007/978-3-642-14589-6\_13},
  timestamp    = {Tue, 25 Feb 2020 17:21:37 +0100},
  biburl       = {https://dblp.org/rec/conf/dasfaa/ZhaoH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/YuanHLY10,
  author       = {Min Yuan and
                  Zhiqiu Huang and
                  Xiang Li and
                  Yan Yan},
  title        = {Towards a Formal Verification Approach for Business Process Coordination},
  booktitle    = {{IEEE} International Conference on Web Services, {ICWS} 2010, Miami,
                  Florida, USA, July 5-10, 2010},
  pages        = {361--368},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICWS.2010.100},
  doi          = {10.1109/ICWS.2010.100},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/YuanHLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isica/FangZHZ10,
  author       = {Yuankang Fang and
                  Ziyang Zhen and
                  Zhiqiu Huang and
                  Chao Zhang},
  editor       = {Zhihua Cai and
                  Chengyu Hu and
                  Zhuo Kang and
                  Yong Liu},
  title        = {Multi-objective Fuzzy Clustering Method for Image Segmentation Based
                  on Variable-Length Intelligent Optimization Algorithm},
  booktitle    = {Advances in Computation and Intelligence - 5th International Symposium,
                  {ISICA} 2010, Wuhan, China, October 22-24, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6382},
  pages        = {329--337},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16493-4\_34},
  doi          = {10.1007/978-3-642-16493-4\_34},
  timestamp    = {Mon, 09 Mar 2020 14:52:47 +0100},
  biburl       = {https://dblp.org/rec/conf/isica/FangZHZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qsic/ZhuHCZY10,
  author       = {Yi Zhu and
                  Zhiqiu Huang and
                  Zining Cao and
                  Hang Zhou and
                  Min Yuan},
  editor       = {Ji Wang and
                  W. K. Chan and
                  Fei{-}Ching Kuo},
  title        = {An {MDE} Based Approach for Generating Software Architecture Models
                  from Formal Specifications},
  booktitle    = {Proceedings of the 10th International Conference on Quality Software,
                  {QSIC} 2010, Zhangjiajie, China, 14-15 July 2010},
  pages        = {373--376},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/QSIC.2010.13},
  doi          = {10.1109/QSIC.2010.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qsic/ZhuHCZY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sose/TuXH10,
  author       = {Lizhong Tu and
                  Fangxiong Xiao and
                  Zhiqiu Huang},
  title        = {Modeling Service Composition Using Priced Probabilistic Process Algebra},
  booktitle    = {The Fifth {IEEE} International Symposium on Service-Oriented System
                  Engineering, {SOSE} 2010, June 4-5, 2010, Nanjing, China},
  pages        = {35--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SOSE.2010.21},
  doi          = {10.1109/SOSE.2010.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sose/TuXH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/XuHW10,
  author       = {Bingfeng Xu and
                  Zhiqiu Huang and
                  Ou Wei},
  title        = {Making Architectural Decisions Based on Requirements: Analysis and
                  Combination of Risk-Based and Quality Attribute-Based Methods},
  booktitle    = {Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing:
                  7th International Conference on Ubiquitous Intelligence {\&} Computing
                  and 7th International Conference on Autonomic {\&} Trusted Computing,
                  {UIC-ATC} 2010, 26-29 October 2010, Xi'an, China},
  pages        = {392--397},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/UIC-ATC.2010.74},
  doi          = {10.1109/UIC-ATC.2010.74},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/XuHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wism/FangH10,
  author       = {Yuankang Fang and
                  Zhiqiu Huang},
  editor       = {Fu Lee Wang and
                  Zhiguo Gong and
                  Xiangfeng Luo and
                  Jingsheng Lei},
  title        = {An Improved Algorithm for Session Identification on Web Log},
  booktitle    = {Web Information Systems and Mining - International Conference, {WISM}
                  2010, Sanya, China, October 23-24, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6318},
  pages        = {53--60},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16515-3\_8},
  doi          = {10.1007/978-3-642-16515-3\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wism/FangH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/ShenHZZY09,
  author       = {Guohua Shen and
                  Zhiqiu Huang and
                  Yuping Zhang and
                  Xiaodong Zhu and
                  Jun Yang},
  title        = {A Semantic Model for Matchmaking of Web Services Based on Description
                  Logics},
  journal      = {Fundam. Informaticae},
  volume       = {96},
  number       = {1-2},
  pages        = {211--226},
  year         = {2009},
  url          = {https://doi.org/10.3233/FI-2009-175},
  doi          = {10.3233/FI-2009-175},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/ShenHZZY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/YuanHHLZ09,
  author       = {Min Yuan and
                  Zhiqiu Huang and
                  Jun Hu and
                  Xiang Li and
                  Yi Zhu},
  title        = {Ensuring Coordination of Multi-business Interactions},
  booktitle    = {2009 {IEEE} International Conference on Services Computing {(SCC}
                  2009), 21-25 September 2009, Bangalore, India},
  pages        = {356--363},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SCC.2009.82},
  doi          = {10.1109/SCC.2009.82},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/YuanHHLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csie/ShenHZY09,
  author       = {Guohua Shen and
                  Zhiqiu Huang and
                  Xiaodong Zhu and
                  Jun Yang},
  editor       = {Mark Burgin and
                  Masud H. Chowdhury and
                  Chan H. Ham and
                  Simone A. Ludwig and
                  Weilian Su and
                  Sumanth Yenduri},
  title        = {Reasoning about Web Services with Dynamic Description Logics},
  booktitle    = {{CSIE} 2009, 2009 {WRI} World Congress on Computer Science and Information
                  Engineering, March 31 - April 2, 2009, Los Angeles, California, USA,
                  7 Volumes},
  pages        = {106--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSIE.2009.232},
  doi          = {10.1109/CSIE.2009.232},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csie/ShenHZY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cts/LiuHZ09,
  author       = {LinYuan Liu and
                  Zhiqiu Huang and
                  Haibin Zhu},
  editor       = {William K. McQuay and
                  Waleed W. Smari},
  title        = {Role-based consistency verification for privacy-aware Web services},
  booktitle    = {2009 International Symposium on Collaborative Technologies and Systems,
                  {CTS} 2009, Baltimore, Maryland, USA, May 18-22, 2009},
  pages        = {423--430},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CTS.2009.5067510},
  doi          = {10.1109/CTS.2009.5067510},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cts/LiuHZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/XiaoHCHL09,
  author       = {Fangxiong Xiao and
                  Zhiqiu Huang and
                  Zining Cao and
                  Jun Hu and
                  LinYuan Liu},
  title        = {Modeling Cost-Aware Web Services Composition Using {PTCCS}},
  booktitle    = {{IEEE} International Conference on Web Services, {ICWS} 2009, Los
                  Angeles, CA, USA, 6-10 July 2009},
  pages        = {461--468},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICWS.2009.56},
  doi          = {10.1109/ICWS.2009.56},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/XiaoHCHL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/YuanHX09,
  author       = {Min Yuan and
                  Zhiqiu Huang and
                  Fangxiong Xiao},
  title        = {Modeling and Analysis of Flexible Transaction for Web Services},
  booktitle    = {{IEEE} International Conference on Web Services, {ICWS} 2009, Los
                  Angeles, CA, USA, 6-10 July 2009},
  pages        = {1008--1009},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICWS.2009.137},
  doi          = {10.1109/ICWS.2009.137},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/YuanHX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/internetware/HuangHL09,
  author       = {Feng Huang and
                  Zhiqiu Huang and
                  LinYuan Liu},
  editor       = {Fuqing Yang and
                  Hong Mei and
                  Jian Lv},
  title        = {A DL-based method for access control policy conflict detecting},
  booktitle    = {Proceedings of the First Asia-Pacific Symposium on Internetware, Internetware
                  2009, Beijing, China, October 17 - 18, 2009},
  pages        = {16},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1640206.1640222},
  doi          = {10.1145/1640206.1640222},
  timestamp    = {Tue, 09 May 2023 08:00:06 +0200},
  biburl       = {https://dblp.org/rec/conf/internetware/HuangHL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seke/YuanHZL09,
  author       = {Min Yuan and
                  Zhiqiu Huang and
                  Jian Zhao and
                  Xiang Li},
  title        = {Modeling and Verification of Automatic Multi-business Transactions},
  booktitle    = {Proceedings of the 21st International Conference on Software Engineering
                  {\&} Knowledge Engineering (SEKE'2009), Boston, Massachusetts,
                  USA, July 1-3, 2009},
  pages        = {274--279},
  publisher    = {Knowledge Systems Institute Graduate School},
  year         = {2009},
  timestamp    = {Thu, 12 Mar 2020 11:30:49 +0100},
  biburl       = {https://dblp.org/rec/conf/seke/YuanHZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/ZhuH08,
  author       = {Xiaodong Zhu and
                  Zhiqiu Huang},
  title        = {Conceptual modeling rules extracting for data streams},
  journal      = {Knowl. Based Syst.},
  volume       = {21},
  number       = {8},
  pages        = {934--940},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.knosys.2008.04.003},
  doi          = {10.1016/J.KNOSYS.2008.04.003},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/ZhuH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csse/ZhangHCX08,
  author       = {Junhua Zhang and
                  Zhiqiu Huang and
                  Zining Cao and
                  Fangxiong Xiao},
  title        = {Counterexample Generation for Probabilistic Timed Automata Model Checking},
  booktitle    = {International Conference on Computer Science and Software Engineering,
                  {CSSE} 2008, Volume 2: Software Engineering, December 12-14, 2008,
                  Wuhan, China},
  pages        = {210--214},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSSE.2008.371},
  doi          = {10.1109/CSSE.2008.371},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csse/ZhangHCX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/XiaoHHYZ08,
  author       = {Fangxiong Xiao and
                  Zhiqiu Huang and
                  Jun Hu and
                  Min Yuan and
                  Junhua Zhang},
  title        = {Support Web Services Composition with Optimal Cost Using {PPA}},
  booktitle    = {2008 {IEEE} International Conference on Web Services {(ICWS} 2008),
                  September 23-26, 2008, Beijing, China},
  pages        = {760--761},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICWS.2008.50},
  doi          = {10.1109/ICWS.2008.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/XiaoHHYZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycs/ZhouHZ08,
  author       = {Hang Zhou and
                  Zhiqiu Huang and
                  Yi Zhu},
  title        = {Polymorphism Sequence Diagrams Test Data Automatic Generation Based
                  on {OCL}},
  booktitle    = {Proceedings of the 9th International Conference for Young Computer
                  Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21,
                  2008},
  pages        = {1235--1240},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICYCS.2008.50},
  doi          = {10.1109/ICYCS.2008.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icycs/ZhouHZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscsct/ZhuHZ08,
  author       = {Yi Zhu and
                  Zhiqiu Huang and
                  Hang Zhou},
  title        = {A Formal Method Support for Resource Modeling of Web Services Composition},
  booktitle    = {2008 International Symposium on Computer Science and Computational
                  Technology, {ISCSCT} 2008, 20-22 December 2008, Shanghai, China, 2
                  Volumes},
  pages        = {370--375},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISCSCT.2008.239},
  doi          = {10.1109/ISCSCT.2008.239},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscsct/ZhuHZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rskt/ZhuHS08,
  author       = {Xiaodong Zhu and
                  Zhiqiu Huang and
                  Guohua Shen},
  editor       = {Guoyin Wang and
                  Tianrui Li and
                  Jerzy W. Grzymala{-}Busse and
                  Duoqian Miao and
                  Andrzej Skowron and
                  Yiyu Yao},
  title        = {Description Logic Based Consistency Checking upon Data Mining Metadata},
  booktitle    = {Rough Sets and Knowledge Technology, Third International Conference,
                  {RSKT} 2008, Chengdu, China, May 17-19, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5009},
  pages        = {475--482},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79721-0\_65},
  doi          = {10.1007/978-3-540-79721-0\_65},
  timestamp    = {Thu, 15 Jul 2021 13:46:36 +0200},
  biburl       = {https://dblp.org/rec/conf/rskt/ZhuHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fskd/ZhuHYS07,
  author       = {Xiaodong Zhu and
                  Zhiqiu Huang and
                  Shuqun Yang and
                  Guohua Shen},
  editor       = {J. Lei},
  title        = {Fuzzy Implication Methods in Fuzzy Logic},
  booktitle    = {Fourth International Conference on Fuzzy Systems and Knowledge Discovery,
                  {FSKD} 2007, 24-27 August 2007, Haikou, Hainan, China, Proceedings,
                  Volume 1},
  pages        = {154--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FSKD.2007.327},
  doi          = {10.1109/FSKD.2007.327},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fskd/ZhuHYS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iita/ShenHZWX07,
  author       = {Guohua Shen and
                  Zhiqiu Huang and
                  Xiaodong Zhu and
                  Lei Wang and
                  Gaoyou Xiang},
  editor       = {Fei Yu and
                  Renfa Li and
                  Guiping Liao},
  title        = {Using Description Logics Reasoner for Ontology Matching},
  booktitle    = {Proceedings of the Workshop on Intelligent Information Technology
                  Application, {IITA} 2007, Zhang Jiajie, China, December 2-3, 2007},
  pages        = {30--33},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IITA.2007.95},
  doi          = {10.1109/IITA.2007.95},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iita/ShenHZWX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/ZhaoH06,
  author       = {Xiaofei Zhao and
                  Zhiqiu Huang},
  editor       = {David W. Embley and
                  Antoni Oliv{\'{e}} and
                  Sudha Ram},
  title        = {A Formal Framework for Reasoning on Metadata Based on {CWM}},
  booktitle    = {Conceptual Modeling - {ER} 2006, 25th International Conference on
                  Conceptual Modeling, Tucson, AZ, USA, November 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4215},
  pages        = {371--384},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11901181\_28},
  doi          = {10.1007/11901181\_28},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/er/ZhaoH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/owled/ShenHZZ06,
  author       = {Guohua Shen and
                  Zhiqiu Huang and
                  Xiaodong Zhu and
                  Xiaofei Zhao},
  editor       = {Bernardo Cuenca Grau and
                  Pascal Hitzler and
                  Conor Shankey and
                  Evan Wallace},
  title        = {Research on the Rules of Mapping from Relational Model to {OWL}},
  booktitle    = {Proceedings of the OWLED*06 Workshop on {OWL:} Experiences and Directions,
                  Athens, Georgia, USA, November 10-11, 2006},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {216},
  publisher    = {CEUR-WS.org},
  year         = {2006},
  url          = {https://ceur-ws.org/Vol-216/submission\_5.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:02 +0100},
  biburl       = {https://dblp.org/rec/conf/owled/ShenHZZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics