Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Zhiqiu Huang
@article{DBLP:journals/soca/ZhangSHYW24, author = {Xinbo Zhang and Guohua Shen and Zhiqiu Huang and Yaoshen Yu and Kang Wang}, title = {FuEPRe: a fusing embedding method with attention for post recommendation}, journal = {Serv. Oriented Comput. Appl.}, volume = {18}, number = {1}, pages = {67--79}, year = {2024}, url = {https://doi.org/10.1007/s11761-024-00386-y}, doi = {10.1007/S11761-024-00386-Y}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soca/ZhangSHYW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GuoSHYCW23, author = {Feifei Guo and Guohua Shen and Zhiqiu Huang and Yang Yang and Mengnan Cai and Linlin Wei}, title = {{DABAC:} Smart Contract-Based Spatio-Temporal Domain Access Control for the Internet of Things}, journal = {{IEEE} Access}, volume = {11}, pages = {36452--36463}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3257027}, doi = {10.1109/ACCESS.2023.3257027}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GuoSHYCW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/WangTHSYH23, author = {Tiexin Wang and Chao Tan and Lei Huang and Yize Shi and Tao Yue and Zhiqiu Huang}, title = {Simplexity testbed: {A} model-based digital twin testbed}, journal = {Comput. Ind.}, volume = {145}, pages = {103804}, year = {2023}, url = {https://doi.org/10.1016/j.compind.2022.103804}, doi = {10.1016/J.COMPIND.2022.103804}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cii/WangTHSYH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/WangHHWSX23, author = {Jinyong Wang and Zhiqiu Huang and Xiaowei Huang and Tiexin Wang and Guohua Shen and Jian Xie}, title = {An accident prediction architecture based on spatio-clock stochastic and hybrid model for autonomous driving safety}, journal = {Concurr. Comput. Pract. Exp.}, volume = {35}, number = {17}, year = {2023}, url = {https://doi.org/10.1002/cpe.6550}, doi = {10.1002/CPE.6550}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/WangHHWSX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eait/ShenYHYL23, author = {Guohua Shen and Sien Yang and Zhiqiu Huang and Yaoshen Yu and Xin Li}, title = {The prediction of programming performance using student profiles}, journal = {Educ. Inf. Technol.}, volume = {28}, number = {1}, pages = {725--740}, year = {2023}, url = {https://doi.org/10.1007/s10639-022-11146-w}, doi = {10.1007/S10639-022-11146-W}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eait/ShenYHYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcia/HuangHSWY23, author = {Junan Huang and Zhiqiu Huang and Guohua Shen and Jinyong Wang and Xiaohua Yin}, title = {Maneuver Conditioned Vehicle Trajectory Prediction Using Self-Attention}, journal = {Int. J. Comput. Intell. Appl.}, volume = {22}, number = {2}, pages = {2350005:1--2350005:19}, year = {2023}, url = {https://doi.org/10.1142/S1469026823500050}, doi = {10.1142/S1469026823500050}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcia/HuangHSWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/TaoTGH023, author = {Chuanqi Tao and Yali Tao and Hongjing Guo and Zhiqiu Huang and Xiaobing Sun}, title = {DLRegion: Coverage-guided fuzz testing of deep neural networks with region-based neuron selection strategies}, journal = {Inf. Softw. Technol.}, volume = {162}, pages = {107266}, year = {2023}, url = {https://doi.org/10.1016/j.infsof.2023.107266}, doi = {10.1016/J.INFSOF.2023.107266}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/TaoTGH023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itm/AkbarKH23, author = {Muhammad Azeem Akbar and Arif Ali Khan and Zhiqiu Huang}, title = {Multicriteria decision making taxonomy of code recommendation system challenges: a fuzzy-AHP analysis}, journal = {Inf. Technol. Manag.}, volume = {24}, number = {2}, pages = {115--131}, year = {2023}, url = {https://doi.org/10.1007/s10799-021-00355-3}, doi = {10.1007/S10799-021-00355-3}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itm/AkbarKH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/HussainHZW23, author = {Yasir Hussain and Zhiqiu Huang and Yu Zhou and Senzhang Wang}, title = {Boosting source code suggestion with self-supervised Transformer Gated Highway}, journal = {J. Syst. Softw.}, volume = {196}, pages = {111553}, year = {2023}, url = {https://doi.org/10.1016/j.jss.2022.111553}, doi = {10.1016/J.JSS.2022.111553}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/HussainHZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/smr/TaoGZH23, author = {Chuanqi Tao and Hongjing Guo and Jingxuan Zhang and Zhiqiu Huang}, title = {Supporting maintenance and testing for {AI} functions of mobile apps based on user reviews: An empirical study on plant identification apps}, journal = {J. Softw. Evol. Process.}, volume = {35}, number = {11}, year = {2023}, url = {https://doi.org/10.1002/smr.2444}, doi = {10.1002/SMR.2444}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/smr/TaoGZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangHQYSZ23, author = {Chao Wang and Zhiqiu Huang and Shuren Qi and Yaoshen Yu and Guohua Shen and Yushu Zhang}, title = {Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {1064--1079}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3234861}, doi = {10.1109/TIFS.2023.3234861}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangHQYSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/YangXGXZHX23, author = {Zhibin Yang and Linquan Xing and Zonghua Gu and Yingmin Xiao and Yong Zhou and Zhiqiu Huang and Lei Xue}, title = {Model-Based Reinforcement Learning and Neural-Network-Based Policy Compression for Spacecraft Rendezvous on Resource-Constrained Embedded Systems}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {19}, number = {1}, pages = {1107--1116}, year = {2023}, url = {https://doi.org/10.1109/TII.2022.3192085}, doi = {10.1109/TII.2022.3192085}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/YangXGXZHX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/GongZWZH23, author = {Lina Gong and Jingxuan Zhang and Mingqiang Wei and Haoxiang Zhang and Zhiqiu Huang}, title = {What Is the Intended Usage Context of This Model? An Exploratory Study of Pre-Trained Models on Various Model Repositories}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {32}, number = {3}, pages = {69:1--69:57}, year = {2023}, url = {https://doi.org/10.1145/3569934}, doi = {10.1145/3569934}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/GongZWZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/ZhangLLGH23, author = {Jingxuan Zhang and Junpeng Luo and Jiahui Liang and Lina Gong and Zhiqiu Huang}, title = {An Accurate Identifier Renaming Prediction and Suggestion Approach}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {32}, number = {6}, pages = {148:1--148:51}, year = {2023}, url = {https://doi.org/10.1145/3603109}, doi = {10.1145/3603109}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosem/ZhangLLGH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/YangXPZH23, author = {Wenhua Yang and Chang Xu and Minxue Pan and Yu Zhou and Zhiqiu Huang}, title = {Ensure: Towards Reliable Control of Cyber-Physical Systems Under Uncertainty}, journal = {{IEEE} Trans. Reliab.}, volume = {72}, number = {1}, pages = {289--301}, year = {2023}, url = {https://doi.org/10.1109/TR.2022.3167116}, doi = {10.1109/TR.2022.3167116}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tr/YangXPZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/TaoLHS23, author = {Chuanqi Tao and Kai Lin and Zhiqiu Huang and Xiaobing Sun}, title = {{CRAM:} Code Recommendation With Programming Context Based on Self-Attention Mechanism}, journal = {{IEEE} Trans. Reliab.}, volume = {72}, number = {1}, pages = {302--316}, year = {2023}, url = {https://doi.org/10.1109/TR.2022.3171309}, doi = {10.1109/TR.2022.3171309}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tr/TaoLHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/GongZZWH23, author = {Lina Gong and Haoxiang Zhang and Jingxuan Zhang and Mingqiang Wei and Zhiqiu Huang}, title = {A Comprehensive Investigation of the Impact of Class Overlap on Software Defect Prediction}, journal = {{IEEE} Trans. Software Eng.}, volume = {49}, number = {4}, pages = {2440--2458}, year = {2023}, url = {https://doi.org/10.1109/TSE.2022.3220740}, doi = {10.1109/TSE.2022.3220740}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/GongZZWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/ZhangLGZHJ23, author = {Jingxuan Zhang and Siyuan Liu and Lina Gong and Haoxiang Zhang and Zhiqiu Huang and He Jiang}, title = {{BEQAIN:} An Effective and Efficient Identifier Normalization Approach With {BERT} and the Question Answering System}, journal = {{IEEE} Trans. Software Eng.}, volume = {49}, number = {4}, pages = {2597--2620}, year = {2023}, url = {https://doi.org/10.1109/TSE.2022.3227559}, doi = {10.1109/TSE.2022.3227559}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/ZhangLGZHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ease/HussainH0KKA23, author = {Yasir Hussain and Zhiqiu Huang and Yu Zhou and Izhar Ahmed Khan and Nasrullah Khan and Muhammad Zahid Abbas}, title = {Optimized Tokenization Process for Open-Vocabulary Code Completion: An Empirical Study}, booktitle = {Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, {EASE} 2023, Oulu, Finland, June 14-16, 2023}, pages = {398--405}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3593434.3594236}, doi = {10.1145/3593434.3594236}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ease/HussainH0KKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/LianHW23, author = {Xin Lian and Zhiqiu Huang and Chao Wang}, title = {{AKD:} Using Adversarial Knowledge Distillation to Achieve Black-box Attacks}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2023, Gold Coast, Australia, June 18-23, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IJCNN54540.2023.10191087}, doi = {10.1109/IJCNN54540.2023.10191087}, timestamp = {Wed, 09 Aug 2023 16:25:09 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/LianHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/internetware/Wang0YH23, author = {Yichun Wang and Zhiyi Zhang and Yongming Yao and Zhiqiu Huang}, editor = {Hong Mei and Jian Lv and Zhi Jin and Xuandong Li and Xiaohu Yang and Xin Xia}, title = {A Fine-Grained Evaluation of Mutation Operators for Deep Learning Systems: {A} Selective Mutation Approach}, booktitle = {Proceedings of the 14th Asia-Pacific Symposium on Internetware, Internetware 2023, Hangzhou, China, August 4-6, 2023}, pages = {123--133}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3609437.3609453}, doi = {10.1145/3609437.3609453}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/internetware/Wang0YH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/GuoTH23, author = {Hongjing Guo and Chuanqi Tao and Zhiqiu Huang}, title = {Multi-Objective White-Box Test Input Selection for Deep Neural Network Model Enhancement}, booktitle = {34th {IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2023, Florence, Italy, October 9-12, 2023}, pages = {521--532}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISSRE59848.2023.00051}, doi = {10.1109/ISSRE59848.2023.00051}, timestamp = {Tue, 14 Nov 2023 16:09:47 +0100}, biburl = {https://dblp.org/rec/conf/issre/GuoTH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/CaiZJLH23, author = {Huangli Cai and Zhiyi Zhang and Yifan Jian and Dan Li and Zhiqiu Huang}, title = {{BDGSE:} {A} Symbolic Execution Technique for High {MC/DC}}, booktitle = {23rd {IEEE} International Conference on Software Quality, Reliability, and Security, {QRS} 2023, Chiang Mai, Thailand, October 22-26, 2023}, pages = {313--324}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/QRS60937.2023.00039}, doi = {10.1109/QRS60937.2023.00039}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qrs/CaiZJLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/ZhangZWCH23, author = {Zhuangyu Zhang and Zhiyi Zhang and Ziyuan Wang and Fang Chen and Zhiqiu Huang}, title = {{BTM:} Black-Box Testing for {DNN} Based on Meta-Learning}, booktitle = {23rd {IEEE} International Conference on Software Quality, Reliability, and Security, {QRS} 2023, Chiang Mai, Thailand, October 22-26, 2023}, pages = {581--592}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/QRS60937.2023.00063}, doi = {10.1109/QRS60937.2023.00063}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qrs/ZhangZWCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seke/LiZJLH23, author = {Wei Li and Zhiyi Zhang and Yifan Jian and Chen Liu and Zhiqiu Huang}, editor = {Shi{-}Kuo Chang}, title = {DeepRank: Test Case Prioritization for Deep Neural Networks}, booktitle = {The 35th International Conference on Software Engineering and Knowledge Engineering, {SEKE} 2023, {KSIR} Virtual Conference Center, USA, July 1-10, 2023}, pages = {262--267}, publisher = {{KSI} Research Inc.}, year = {2023}, url = {https://doi.org/10.18293/SEKE2023-188}, doi = {10.18293/SEKE2023-188}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/seke/LiZJLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/setta/XiaoYZH23, author = {Yingmin Xiao and Zhibin Yang and Yong Zhou and Zhiqiu Huang}, editor = {Holger Hermanns and Jun Sun and Lei Bu}, title = {Run-Time Assured Reinforcement Learning for Safe Spacecraft Rendezvous with Obstacle Avoidance}, booktitle = {Dependable Software Engineering. Theories, Tools, and Applications - 9th International Symposium, {SETTA} 2023, Nanjing, China, November 27-29, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14464}, pages = {298--313}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8664-4\_17}, doi = {10.1007/978-981-99-8664-4\_17}, timestamp = {Thu, 04 Jan 2024 08:13:47 +0100}, biburl = {https://dblp.org/rec/conf/setta/XiaoYZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/HaoHGS23, author = {Yao Hao and Zhiqiu Huang and Hongjing Guo and Guohua Shen}, editor = {Tao Zhang and Xin Xia and Nicole Novielli}, title = {Test Input Selection for Deep Neural Network Enhancement Based on Multiple-Objective Optimization}, booktitle = {{IEEE} International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2023, Taipa, Macao, March 21-24, 2023}, pages = {534--545}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SANER56733.2023.00056}, doi = {10.1109/SANER56733.2023.00056}, timestamp = {Fri, 24 Nov 2023 12:46:34 +0100}, biburl = {https://dblp.org/rec/conf/wcre/HaoHGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-03790, author = {Yunfei Meng and Changbo Ke and Zhiqiu Huang and Guohua Shen and Chunming Liu and Xiaojie Feng}, title = {A Practical Runtime Security Policy Transformation Framework for Software Defined Networks}, journal = {CoRR}, volume = {abs/2301.03790}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.03790}, doi = {10.48550/ARXIV.2301.03790}, eprinttype = {arXiv}, eprint = {2301.03790}, timestamp = {Thu, 19 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-03790.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-10856, author = {Chao Wang and Shuren Qi and Zhiqiu Huang and Yushu Zhang and Xiaochun Cao}, title = {Towards an Accurate and Secure Detector against Adversarial Perturbations}, journal = {CoRR}, volume = {abs/2305.10856}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.10856}, doi = {10.48550/ARXIV.2305.10856}, eprinttype = {arXiv}, eprint = {2305.10856}, timestamp = {Thu, 25 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-10856.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-08066, author = {Yu Zhao and Lina Gong and Haoxiang Zhang and Yaoshen Yu and Zhiqiu Huang}, title = {How to get better embeddings with code pre-trained models? An empirical study}, journal = {CoRR}, volume = {abs/2311.08066}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.08066}, doi = {10.48550/ARXIV.2311.08066}, eprinttype = {arXiv}, eprint = {2311.08066}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-08066.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/connection/XieTYLXH22, author = {Jian Xie and Wenan Tan and Zhibin Yang and Shuming Li and Linquan Xing and Zhiqiu Huang}, title = {SysML-based compositional verification and safety analysis for safety-critical cyber-physical systems}, journal = {Connect. Sci.}, volume = {34}, number = {1}, pages = {911--941}, year = {2022}, url = {https://doi.org/10.1080/09540091.2021.2017853}, doi = {10.1080/09540091.2021.2017853}, timestamp = {Mon, 16 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/connection/XieTYLXH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/KeXHX22, author = {Changbo Ke and Fu Xiao and Zhiqiu Huang and Fangxiong Xiao}, title = {A user requirements-oriented privacy policy self-adaption scheme in cloud computing}, journal = {Frontiers Comput. Sci.}, volume = {17}, number = {2}, pages = {172203}, year = {2022}, url = {https://doi.org/10.1007/s11704-022-1182-x}, doi = {10.1007/S11704-022-1182-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/KeXHX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiuZCH22, author = {Linyuan Liu and Haibin Zhu and Shenglei Chen and Zhiqiu Huang}, title = {Privacy regulation aware service selection for multi-provision cloud service composition}, journal = {Future Gener. Comput. Syst.}, volume = {126}, pages = {263--278}, year = {2022}, url = {https://doi.org/10.1016/j.future.2021.08.010}, doi = {10.1016/J.FUTURE.2021.08.010}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/LiuZCH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/WangH0S22, author = {Jinyong Wang and Zhiqiu Huang and Yi Zhu and Guohua Shen}, title = {Statistical Model Checking for Stochastic and Hybrid Autonomous Driving Based on Spatio-Clock Constraints}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {32}, number = {4}, pages = {553--582}, year = {2022}, url = {https://doi.org/10.1142/S0218194022500188}, doi = {10.1142/S0218194022500188}, timestamp = {Mon, 11 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/WangH0S22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/WangZCZYH22, author = {Yongchao Wang and Yu Zhou and Taolue Chen and Jingxuan Zhang and Wenhua Yang and Zhiqiu Huang}, title = {Sequence-Aware {API} Recommendation Based on Collaborative Filtering}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {32}, number = {8}, pages = {1203--1228}, year = {2022}, url = {https://doi.org/10.1142/S0218194022500437}, doi = {10.1142/S0218194022500437}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/WangZCZYH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/HussainHZK22, author = {Yasir Hussain and Zhiqiu Huang and Yu Zhou and Izhar Ahmed Khan}, title = {Exploring the Impact of Balanced and Imbalanced Learning in Source Code Suggestion}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {32}, number = {10}, pages = {1499--1526}, year = {2022}, url = {https://doi.org/10.1142/S0218194022500589}, doi = {10.1142/S0218194022500589}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/HussainHZK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/KeZXHM22, author = {Changbo Ke and Zejiang Zhu and Fu Xiao and Zhiqiu Huang and Yunfei Meng}, title = {SDN-Based Privacy and Functional Authentication Scheme for Fog Nodes of Smart Healthcare}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {18}, pages = {17989--18001}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3161935}, doi = {10.1109/JIOT.2022.3161935}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/KeZXHM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/YangPZH22, author = {Wenhua Yang and Minxue Pan and Yu Zhou and Zhiqiu Huang}, title = {Meaningful Update and Repair of Markov Decision Processes for Self-Adaptive Systems}, journal = {J. Comput. Sci. Technol.}, volume = {37}, number = {1}, pages = {106--127}, year = {2022}, url = {https://doi.org/10.1007/s11390-021-1484-8}, doi = {10.1007/S11390-021-1484-8}, timestamp = {Thu, 07 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/YangPZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ZhangWYWZH22, author = {Zhiyi Zhang and Ziyuan Wang and Fan Yang and Jiahao Wei and Yuqian Zhou and Zhiqiu Huang}, title = {Random or heuristic? An empirical study on path search strategies for test generation in {KLEE}}, journal = {J. Syst. Softw.}, volume = {188}, pages = {111269}, year = {2022}, url = {https://doi.org/10.1016/j.jss.2022.111269}, doi = {10.1016/J.JSS.2022.111269}, timestamp = {Thu, 15 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/ZhangWYWZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/LuoZHXS22, author = {Junpeng Luo and Jingxuan Zhang and Zhiqiu Huang and Yong Xu and Chenxing Sun}, title = {Toward an accurate method renaming approach via structural and lexical analyses}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {23}, number = {5}, pages = {732--748}, year = {2022}, url = {https://doi.org/10.1631/FITEE.2100470}, doi = {10.1631/FITEE.2100470}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jzusc/LuoZHXS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/ShaoHLY22, author = {Yichao Shao and Zhiqiu Huang and Weiwei Li and Yaoshen Yu}, title = {Fast code recommendation via approximate sub-tree matching}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {23}, number = {8}, pages = {1205--1216}, year = {2022}, url = {https://doi.org/10.1631/FITEE.2100379}, doi = {10.1631/FITEE.2100379}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jzusc/ShaoHLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mlc/LiCGH22, author = {Weiwei Li and Jin Chen and Peixue Gao and Zhiqiu Huang}, title = {Label enhancement with label-specific feature learning}, journal = {Int. J. Mach. Learn. Cybern.}, volume = {13}, number = {10}, pages = {2857--2867}, year = {2022}, url = {https://doi.org/10.1007/s13042-022-01567-x}, doi = {10.1007/S13042-022-01567-X}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mlc/LiCGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/YuHSLS22, author = {Yaoshen Yu and Zhiqiu Huang and Guohua Shen and Weiwei Li and Yichao Shao}, title = {{ASTENS-BWA:} Searching partial syntactic similar regions between source code fragments via AST-based encoded sequence alignment}, journal = {Sci. Comput. Program.}, volume = {222}, pages = {102839}, year = {2022}, url = {https://doi.org/10.1016/j.scico.2022.102839}, doi = {10.1016/J.SCICO.2022.102839}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scp/YuHSLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/YinHKSCLW22, author = {Xiaohua Yin and Zhiqiu Huang and Shuanglong Kan and Guohua Shen and Zhe Chen and Yang Liu and Fei Wang}, title = {SafeOSL: Ensuring memory safety of {C} via ownership-based intermediate language}, journal = {Softw. Pract. Exp.}, volume = {52}, number = {5}, pages = {1114--1142}, year = {2022}, url = {https://doi.org/10.1002/spe.3057}, doi = {10.1002/SPE.3057}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spe/YinHKSCLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/YangZPXZH22, author = {Wenhua Yang and Chong Zhang and Minxue Pan and Chang Xu and Yu Zhou and Zhiqiu Huang}, title = {Do Developers Really Know How to Use Git Commands? {A} Large-scale Study Using Stack Overflow}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {31}, number = {3}, pages = {44:1--44:29}, year = {2022}, url = {https://doi.org/10.1145/3494518}, doi = {10.1145/3494518}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/YangZPXZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/KeWXHM22, author = {Changbo Ke and Jiayu Wu and Fu Xiao and Zhiqiu Huang and Yunfei Meng}, title = {A Privacy Risk Assessment Scheme for Fog Nodes in Access Control System}, journal = {{IEEE} Trans. Reliab.}, volume = {71}, number = {4}, pages = {1513--1526}, year = {2022}, url = {https://doi.org/10.1109/TR.2021.3103906}, doi = {10.1109/TR.2021.3103906}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tr/KeWXHM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/KeXHMC22, author = {Changbo Ke and Fu Xiao and Zhiqiu Huang and Yunfei Meng and Yan Cao}, title = {Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {1}, pages = {59--68}, year = {2022}, url = {https://doi.org/10.1109/TSC.2019.2921583}, doi = {10.1109/TSC.2019.2921583}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/KeXHMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/ZhouYCHMG22, author = {Yu Zhou and Xinying Yang and Taolue Chen and Zhiqiu Huang and Xiaoxing Ma and Harald C. Gall}, title = {Boosting {API} Recommendation With Implicit Feedback}, journal = {{IEEE} Trans. Software Eng.}, volume = {48}, number = {6}, pages = {2157--2172}, year = {2022}, url = {https://doi.org/10.1109/TSE.2021.3053111}, doi = {10.1109/TSE.2021.3053111}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/ZhouYCHMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictai/HuangHSXH22, author = {Junan Huang and Zhiqiu Huang and Guohua Shen and Heng Xu and Gaoyang Hua}, editor = {Marek Z. Reformat and Du Zhang and Nikolaos G. Bourbakis}, title = {SIA-Net: Scalable Interaction-Aware Network for Vehicle Trajectory Prediction Based on Self-Attention}, booktitle = {34th {IEEE} International Conference on Tools with Artificial Intelligence, {ICTAI} 2022, Macao, China, October 31 - November 2, 2022}, pages = {780--787}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICTAI56018.2022.00120}, doi = {10.1109/ICTAI56018.2022.00120}, timestamp = {Tue, 25 Apr 2023 16:51:01 +0200}, biburl = {https://dblp.org/rec/conf/ictai/HuangHSXH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/LiCLH22, author = {Weiwei Li and Jin Chen and Yuqing Lu and Zhiqiu Huang}, title = {Filling Missing Labels in Label Distribution Learning by Exploiting Label-Specific Feature Selection}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2022, Padua, Italy, July 18-23, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IJCNN55064.2022.9892220}, doi = {10.1109/IJCNN55064.2022.9892220}, timestamp = {Mon, 10 Oct 2022 17:40:09 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/LiCLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/XiongZZLH22, author = {Chao Xiong and Zhiyi Zhang and Yuqian Zhou and Chen Liu and Zhiqiu Huang}, title = {{IEMT:} Inequality-Based Metamorphic Testing for Autonomous Driving Models}, booktitle = {22nd {IEEE} International Conference on Software Quality, Reliability, and Security, {QRS} 2022 - Companion, Guangzhou, China, December 5-9, 2022}, pages = {283--287}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/QRS-C57518.2022.00049}, doi = {10.1109/QRS-C57518.2022.00049}, timestamp = {Sat, 22 Apr 2023 17:02:06 +0200}, biburl = {https://dblp.org/rec/conf/qrs/XiongZZLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/WeiHY22, author = {Cheng Wei and Zhiqiu Huang and Yaoshen Yu}, title = {Improved Methods of Pointer Mixture Network for Code Completion}, booktitle = {22nd {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2022, Guangzhou, China, December 5-9, 2022}, pages = {907--915}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/QRS57517.2022.00095}, doi = {10.1109/QRS57517.2022.00095}, timestamp = {Tue, 28 Mar 2023 19:49:47 +0200}, biburl = {https://dblp.org/rec/conf/qrs/WeiHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/LinHYL22, author = {Lile Lin and Zhiqiu Huang and Yaoshen Yu and Yapeng Liu}, title = {Multi-Modal Code Summarization with Retrieved Summary}, booktitle = {22nd {IEEE} International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2021, Limassol, Cyprus, October 3, 2022}, pages = {132--142}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SCAM55253.2022.00020}, doi = {10.1109/SCAM55253.2022.00020}, timestamp = {Mon, 23 Jan 2023 22:18:07 +0100}, biburl = {https://dblp.org/rec/conf/scam/LinHYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsse/LiuHYHL22, author = {Yapeng Liu and Zhiqiu Huang and Yaoshen Yu and Yasir Hussain and Lile Lin}, title = {Improving Code Completion by Sequence Features and Structural Features}, booktitle = {Proceedings of the 4th World Symposium on Software Engineering, {WSSE} 2022, Xiamen, China, September 28-30, 2022}, pages = {51--58}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3568364.3568373}, doi = {10.1145/3568364.3568373}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wsse/LiuHYHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-09135, author = {Chao Wang and Zhiqiu Huang and Shu{-}Ren Qi and Yaoshen Yu and Guohua Shen}, title = {Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection}, journal = {CoRR}, volume = {abs/2207.09135}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.09135}, doi = {10.48550/ARXIV.2207.09135}, eprinttype = {arXiv}, eprint = {2207.09135}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-09135.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BianSHYLZ21, author = {Shuyu Bian and Guohua Shen and Zhiqiu Huang and Yang Yang and Jinghan Li and Xiaoyu Zhang}, title = {{PABC:} {A} Patent Application System Based on Blockchain}, journal = {{IEEE} Access}, volume = {9}, pages = {4199--4210}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2020.3048004}, doi = {10.1109/ACCESS.2020.3048004}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/BianSHYLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MengHSK21, author = {Yunfei Meng and Zhiqiu Huang and Guohua Shen and Changbo Ke}, title = {A security policy model transformation and verification approach for software defined networking}, journal = {Comput. Secur.}, volume = {100}, pages = {102089}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102089}, doi = {10.1016/J.COSE.2020.102089}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MengHSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/XiaHZYWZ21, author = {Yao Xia and Zhiqiu Huang and Yonglong Zhang and Min Yuan and Shangguang Wang and Yu Zhou}, title = {{SPASC:} Strategy-proof auction mechanism with cost and QoS incentive for service composition}, journal = {Concurr. Comput. Pract. Exp.}, volume = {33}, number = {9}, year = {2021}, url = {https://doi.org/10.1002/cpe.6131}, doi = {10.1002/CPE.6131}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/XiaHZYWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/YangBYHBFG21, author = {Zhibin Yang and Yang Bao and Yongqiang Yang and Zhiqiu Huang and Jean{-}Paul Bodeveix and Mamoun Filali and Zonghua Gu}, title = {Exploiting augmented intelligence in the modeling of safety-critical autonomous systems}, journal = {Formal Aspects Comput.}, volume = {33}, number = {3}, pages = {343--384}, year = {2021}, url = {https://doi.org/10.1007/s00165-021-00543-6}, doi = {10.1007/S00165-021-00543-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/YangBYHBFG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-sen/HussainH021, author = {Yasir Hussain and Zhiqiu Huang and Yu Zhou}, title = {Improving source code suggestion with code embedding and enhanced convolutional long short-term memory}, journal = {{IET} Softw.}, volume = {15}, number = {3}, pages = {199--213}, year = {2021}, url = {https://doi.org/10.1049/sfw2.12017}, doi = {10.1049/SFW2.12017}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-sen/HussainH021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/ChenSHW21, author = {Kai Chen and Guohua Shen and Zhiqiu Huang and Haijuan Wang}, title = {Improved Entity Linking for Simple Question Answering Over Knowledge Graph}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {31}, number = {1}, pages = {55--80}, year = {2021}, url = {https://doi.org/10.1142/S0218194021400039}, doi = {10.1142/S0218194021400039}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijseke/ChenSHW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/ShenWHYC21, author = {Guohua Shen and Haijuan Wang and Zhiqiu Huang and Yaoshen Yu and Kai Chen}, title = {Supporting Requirements to Code Traceability Creation by Code Comments}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {31}, number = {8}, pages = {1099--1118}, year = {2021}, url = {https://doi.org/10.1142/S0218194021500340}, doi = {10.1142/S0218194021500340}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/ShenWHYC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/YangZH21, author = {Wenhua Yang and Yu Zhou and Zhiqiu Huang}, title = {Personalized {API} Recommendations}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {31}, number = {9}, pages = {1299--1327}, year = {2021}, url = {https://doi.org/10.1142/S021819402150042X}, doi = {10.1142/S021819402150042X}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/YangZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/ZhangWGWZH21, author = {Zhiyi Zhang and Pu Wang and Hongjing Guo and Ziyuan Wang and Yuqian Zhou and Zhiqiu Huang}, title = {DeepBackground: Metamorphic testing for Deep-Learning-driven image recognition systems accompanied by Background-Relevance}, journal = {Inf. Softw. Technol.}, volume = {140}, pages = {106701}, year = {2021}, url = {https://doi.org/10.1016/j.infsof.2021.106701}, doi = {10.1016/J.INFSOF.2021.106701}, timestamp = {Thu, 15 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/ZhangWGWZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/ZhangTHC21, author = {Jing{-}Xuan Zhang and Chuanqi Tao and Zhiqiu Huang and Xin Chen}, title = {Discovering {API} Directives from {API} Specifications with Text Classification}, journal = {J. Comput. Sci. Technol.}, volume = {36}, number = {4}, pages = {922--943}, year = {2021}, url = {https://doi.org/10.1007/s11390-021-0235-1}, doi = {10.1007/S11390-021-0235-1}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/ZhangTHC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/YangQZHBF21, author = {Zhibin Yang and Zhikai Qiu and Yong Zhou and Zhiqiu Huang and Jean{-}Paul Bodeveix and Mamoun Filali}, title = {C2AADL{\_}Reverse: {A} model-driven reverse engineering approach to development and verification of safety-critical software}, journal = {J. Syst. Archit.}, volume = {118}, pages = {102202}, year = {2021}, url = {https://doi.org/10.1016/j.sysarc.2021.102202}, doi = {10.1016/J.SYSARC.2021.102202}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/YangQZHBF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/XiaH21, author = {Yao Xia and Zhiqiu Huang}, title = {A strategy-proof auction mechanism for service composition based on user preferences}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {22}, number = {2}, pages = {185--201}, year = {2021}, url = {https://doi.org/10.1631/FITEE.1900726}, doi = {10.1631/FITEE.1900726}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jzusc/XiaH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/WangSHYC21, author = {Haijuan Wang and Guohua Shen and Zhiqiu Huang and Yaoshen Yu and Kai Chen}, title = {Analyzing close relations between target artifacts for improving IR-based requirement traceability recovery}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {22}, number = {7}, pages = {957--968}, year = {2021}, url = {https://doi.org/10.1631/FITEE.2000126}, doi = {10.1631/FITEE.2000126}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jzusc/WangSHYC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XieTFH21, author = {Jian Xie and Wenan Tan and BingWu Fang and Zhiqiu Huang}, title = {Towards a Statistical Model Checking Method for Safety-Critical Cyber-Physical System Verification}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5536722:1--5536722:12}, year = {2021}, url = {https://doi.org/10.1155/2021/5536722}, doi = {10.1155/2021/5536722}, timestamp = {Mon, 16 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/XieTFH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/ZhangWCCH21, author = {Yuxuan Zhang and Senzhang Wang and Bing Chen and Jiannong Cao and Zhiqiu Huang}, title = {TrafficGAN: Network-Scale Deep Traffic Prediction With Generative Adversarial Nets}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {22}, number = {1}, pages = {219--230}, year = {2021}, url = {https://doi.org/10.1109/TITS.2019.2955794}, doi = {10.1109/TITS.2019.2955794}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/ZhangWCCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/ZhangJRZH21, author = {Jingxuan Zhang and He Jiang and Zhilei Ren and Tao Zhang and Zhiqiu Huang}, title = {Enriching {API} Documentation with Code Samples and Usage Scenarios from Crowd Knowledge}, journal = {{IEEE} Trans. Software Eng.}, volume = {47}, number = {6}, pages = {1299--1314}, year = {2021}, url = {https://doi.org/10.1109/TSE.2019.2919304}, doi = {10.1109/TSE.2019.2919304}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/ZhangJRZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/ZhouSCHGP21, author = {Yu Zhou and Yanqi Su and Taolue Chen and Zhiqiu Huang and Harald C. Gall and Sebastiano Panichella}, title = {User Review-Based Change File Localization for Mobile Applications}, journal = {{IEEE} Trans. Software Eng.}, volume = {47}, number = {12}, pages = {2755--2770}, year = {2021}, url = {https://doi.org/10.1109/TSE.2020.2967383}, doi = {10.1109/TSE.2020.2967383}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tse/ZhouSCHGP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsec/ZhangZH21, author = {Jingxuan Zhang and Weiqin Zou and Zhiqiu Huang}, title = {An Empirical Study on the Usage and Evolution of Identifier Styles in Practice}, booktitle = {28th Asia-Pacific Software Engineering Conference, {APSEC} 2021, Taipei, Taiwan, December 6-9, 2021}, pages = {171--180}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/APSEC53868.2021.00025}, doi = {10.1109/APSEC53868.2021.00025}, timestamp = {Wed, 23 Feb 2022 18:55:47 +0100}, biburl = {https://dblp.org/rec/conf/apsec/ZhangZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccwc/ArshadHRH21, author = {Muhammad Ali Arshad and Zhiqiu Huang and Adnan Riaz and Yasir Hussain}, title = {Deep Learning-Based Resolution Prediction of Software Enhancement Reports}, booktitle = {11th {IEEE} Annual Computing and Communication Workshop and Conference, {CCWC} 2021, Las Vegas, NV, USA, January 27-30, 2021}, pages = {492--499}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CCWC51732.2021.9375841}, doi = {10.1109/CCWC51732.2021.9375841}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccwc/ArshadHRH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/HuangZWH21, author = {Zhiqiu Huang and Yuqing Zhang and Wengjie Wang and Haitao He}, title = {Ant Hole: Data Poisoning Attack Breaking out the Boundary of Face Cluster}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks Workshops, {DSN} Workshops 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {71--77}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN-W52860.2021.00023}, doi = {10.1109/DSN-W52860.2021.00023}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/HuangZWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LiaoHW21, author = {Lei Liao and Zhiqiu Huang and Wengjie Wang}, title = {A Statistical Learning Model with Deep Learning Characteristics}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks Workshops, {DSN} Workshops 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {137--140}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN-W52860.2021.00032}, doi = {10.1109/DSN-W52860.2021.00032}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/LiaoHW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/SunHYWZ21, author = {Jingxue Sun and Zhiqiu Huang and Ting Yang and Wengjie Wang and Yuqing Zhang}, title = {A system for detecting third-party tracking through the combination of dynamic analysis and static analysis}, booktitle = {2021 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2021, Vancouver, BC, Canada, May 10-13, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484564}, doi = {10.1109/INFOCOMWKSHPS51825.2021.9484564}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/SunHYWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/SunYHWZ21, author = {Jingxue Sun and Ting Yang and Zhiqiu Huang and Wengjie Wang and Yuqing Zhang}, title = {Using Dynamic Analysis to Automatically Detect Anti-Adblocker on the Web}, booktitle = {2021 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2021, Vancouver, BC, Canada, May 10-13, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484639}, doi = {10.1109/INFOCOMWKSHPS51825.2021.9484639}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/SunYHWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/LinTH21, author = {Kai Lin and Chuanqi Tao and Zhiqiu Huang}, title = {Exception Handling Recommendation Based on Self-Attention Network}, booktitle = {{IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2021 - Workshops, Wuhan, China, October 25-28, 2021}, pages = {282--283}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISSREW53611.2021.00080}, doi = {10.1109/ISSREW53611.2021.00080}, timestamp = {Thu, 17 Feb 2022 11:45:39 +0100}, biburl = {https://dblp.org/rec/conf/issre/LinTH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/LiangZZHS21, author = {Jiahui Liang and Weiqin Zou and Jingxuan Zhang and Zhiqiu Huang and Chenxing Sun}, title = {A Deep Method Renaming Prediction and Refinement Approach for Java Projects}, booktitle = {21st {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2021, Hainan, China, December 6-10, 2021}, pages = {404--413}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/QRS54544.2021.00052}, doi = {10.1109/QRS54544.2021.00052}, timestamp = {Wed, 16 Mar 2022 22:32:21 +0100}, biburl = {https://dblp.org/rec/conf/qrs/LiangZZHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/XuZZWH21, author = {Yunjian Xu and Zhiyi Zhang and Yuqian Zhou and Ziyuan Wang and Zhiqiu Huang}, title = {DeepMnist: {A} method of white box testing based on hierarchy}, booktitle = {21st {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2021 - Companion, Hainan, China, December 6-10, 2021}, pages = {712--717}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/QRS-C55045.2021.00107}, doi = {10.1109/QRS-C55045.2021.00107}, timestamp = {Thu, 15 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/qrs/XuZZWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/ZhangTGH21, author = {Meng Zhang and Chuanqi Tao and Hongjing Guo and Zhiqiu Huang}, title = {Recovering Semantic Traceability between Requirements and Source Code Using Feature Representation Techniques}, booktitle = {21st {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2021, Hainan, China, December 6-10, 2021}, pages = {873--882}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/QRS54544.2021.00096}, doi = {10.1109/QRS54544.2021.00096}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qrs/ZhangTGH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/WangZCZYH21, author = {Yongchao Wang and Yu Zhou and Taolue Chen and Jingxuan Zhang and Wenhua Yang and Zhiqiu Huang}, title = {Hybrid Collaborative Filtering-Based {API} Recommendation}, booktitle = {21st {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2021, Hainan, China, December 6-10, 2021}, pages = {906--914}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/QRS54544.2021.00100}, doi = {10.1109/QRS54544.2021.00100}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qrs/WangZCZYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-12935, author = {Yunfei Meng and Zhiqiu Huang and Guohua Shen and Changbo Ke}, title = {SDN-based Runtime Security Enforcement Approach for Privacy Preservation of Dynamic Web Service Composition}, journal = {CoRR}, volume = {abs/2105.12935}, year = {2021}, url = {https://arxiv.org/abs/2105.12935}, eprinttype = {arXiv}, eprint = {2105.12935}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-12935.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HussainZAAANKK20, author = {Yasir Hussain and Huang Zhiqiu and Muhammad Azeem Akbar and Ahmed Alsanad and Abeer Abdul{-}Aziz Alsanad and Asif Nawaz and Izhar Ahmed Khan and Zaheer Ullah Khan}, title = {Context-Aware Trust and Reputation Model for Fog-Based IoT}, journal = {{IEEE} Access}, volume = {8}, pages = {31622--31632}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2972968}, doi = {10.1109/ACCESS.2020.2972968}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HussainZAAANKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangLLLH20, author = {Jingxuan Zhang and Siyuan Liu and Junpeng Luo and Jiahui Liang and Zhiqiu Huang}, title = {Exploring the Characteristics of Identifiers: {A} Large-Scale Empirical Study on 5, 000 Open Source Projects}, journal = {{IEEE} Access}, volume = {8}, pages = {140607--140620}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3013694}, doi = {10.1109/ACCESS.2020.3013694}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangLLLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/TaoBH20, author = {Chuanqi Tao and Panpan Bao and Zhiqiu Huang}, title = {Code line generation based on deep context-awareness of onsite programming}, journal = {Sci. China Inf. Sci.}, volume = {63}, number = {9}, pages = {1--3}, year = {2020}, url = {https://doi.org/10.1007/s11432-019-2777-2}, doi = {10.1007/S11432-019-2777-2}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/TaoBH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/CaoHYKW20, author = {Yan Cao and Zhiqiu Huang and Yaoshen Yu and Changbo Ke and Zihao Wang}, title = {A topology and risk-aware access control framework for cyber-physical space}, journal = {Frontiers Comput. Sci.}, volume = {14}, number = {4}, pages = {144805}, year = {2020}, url = {https://doi.org/10.1007/s11704-019-8454-0}, doi = {10.1007/S11704-019-8454-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/CaoHYKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/HussainHZW20, author = {Yasir Hussain and Zhiqiu Huang and Yu Zhou and Senzhang Wang}, title = {Deep Transfer Learning for Source Code Modeling}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {30}, number = {5}, pages = {649--668}, year = {2020}, url = {https://doi.org/10.1142/S0218194020500230}, doi = {10.1142/S0218194020500230}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijseke/HussainHZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/TaoGH20, author = {Chuanqi Tao and Hongjing Guo and Zhiqiu Huang}, title = {Identifying security issues for mobile applications based on user review summarization}, journal = {Inf. Softw. Technol.}, volume = {122}, pages = {106290}, year = {2020}, url = {https://doi.org/10.1016/j.infsof.2020.106290}, doi = {10.1016/J.INFSOF.2020.106290}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/TaoGH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/HussainHZW20, author = {Yasir Hussain and Zhiqiu Huang and Yu Zhou and Senzhang Wang}, title = {CodeGRU: Context-aware deep learning with gated recurrent unit for source code modeling}, journal = {Inf. Softw. Technol.}, volume = {125}, pages = {106309}, year = {2020}, url = {https://doi.org/10.1016/j.infsof.2020.106309}, doi = {10.1016/J.INFSOF.2020.106309}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/HussainHZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/YangPZH20, author = {Wenhua Yang and Minxue Pan and Yu Zhou and Zhiqiu Huang}, title = {Developer portraying: {A} quick approach to understanding developers on {OSS} platforms}, journal = {Inf. Softw. Technol.}, volume = {125}, pages = {106336}, year = {2020}, url = {https://doi.org/10.1016/j.infsof.2020.106336}, doi = {10.1016/J.INFSOF.2020.106336}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/YangPZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/LiZJH20, author = {Weiwei Li and Wenzhou Zhang and Xiuyi Jia and Zhiqiu Huang}, title = {Effort-Aware semi-Supervised just-in-Time defect prediction}, journal = {Inf. Softw. Technol.}, volume = {126}, pages = {106364}, year = {2020}, url = {https://doi.org/10.1016/j.infsof.2020.106364}, doi = {10.1016/J.INFSOF.2020.106364}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/LiZJH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/Yang0Y0H20, author = {Wenhua Yang and Chang Xu and Haibo Ye and Yu Zhou and Zhiqiu Huang}, title = {{\unicode{26234}}{\unicode{33021}}{\unicode{21270}}{\unicode{20449}}{\unicode{24687}}{\unicode{29289}}{\unicode{29702}}{\unicode{31995}}{\unicode{32479}}{\unicode{20013}}{\unicode{38750}}{\unicode{30830}}{\unicode{23450}}{\unicode{24615}}{\unicode{30340}}{\unicode{20998}}{\unicode{31867}}{\unicode{30740}}{\unicode{31350}} (Taxonomy of Uncertainty Factors in Intelligence-oriented Cyber-physical Systems)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {47}, number = {3}, pages = {11--18}, year = {2020}, url = {https://doi.org/10.11896/jsjkx.191100052}, doi = {10.11896/JSJKX.191100052}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/Yang0Y0H20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/Zhang0H20, author = {Yunfan Zhang and Yu Zhou and Zhiqiu Huang}, title = {{\unicode{22522}}{\unicode{20110}}{\unicode{35821}}{\unicode{20041}}{\unicode{30456}}{\unicode{20284}}{\unicode{24230}}{\unicode{30340}}API{\unicode{20351}}{\unicode{29992}}{\unicode{27169}}{\unicode{24335}}{\unicode{25512}}{\unicode{33616}} (Semantic Similarity Based {API} Usage Pattern Recommendation)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {47}, number = {3}, pages = {34--40}, year = {2020}, url = {https://doi.org/10.11896/jsjkx.190300053}, doi = {10.11896/JSJKX.190300053}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/Zhang0H20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/DuSHYW20, author = {Tianbao Du and Guohua Shen and Zhi{-}qiu Huang and Yaoshen Yu and Dexiang Wu}, title = {Automatic traceability link recovery via active learning}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {21}, number = {8}, pages = {1217--1225}, year = {2020}, url = {https://doi.org/10.1631/FITEE.1900222}, doi = {10.1631/FITEE.1900222}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jzusc/DuSHYW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/NawazHWAAG20, author = {Asif Nawaz and Zhiqiu Huang and Senzhang Wang and Muhammad Azeem Akbar and Hussain Alsalman and Abdu Gumaei}, title = {{GPS} Trajectory Completion Using End-to-End Bidirectional Convolutional Recurrent Encoder-Decoder Architecture with Attention Mechanism}, journal = {Sensors}, volume = {20}, number = {18}, pages = {5143}, year = {2020}, url = {https://doi.org/10.3390/s20185143}, doi = {10.3390/S20185143}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/NawazHWAAG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/smr/AkbarMHKS20, author = {Muhammad Azeem Akbar and Sajjad Mahmood and Zhiqiu Huang and Arif Ali Khan and Mohammad Shameem}, title = {Readiness model for requirements change management in global software development}, journal = {J. Softw. Evol. Process.}, volume = {32}, number = {10}, year = {2020}, url = {https://doi.org/10.1002/smr.2264}, doi = {10.1002/SMR.2264}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/smr/AkbarMHKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/MengHSK20, author = {Yunfei Meng and Zhiqiu Huang and Guohua Shen and Changbo Ke}, title = {SDN-Based Security Enforcement Framework for Data Sharing Systems of Smart Healthcare}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {17}, number = {1}, pages = {308--318}, year = {2020}, url = {https://doi.org/10.1109/TNSM.2019.2941214}, doi = {10.1109/TNSM.2019.2941214}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/MengHSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/WangYHLZBF20, author = {Fei Wang and Zhibin Yang and Zhi{-}qiu Huang and Chengwei Liu and Yong Zhou and Jean{-}Paul Bodeveix and Mamoun Filali}, title = {An Approach to Generate the Traceability Between Restricted Natural Language Requirements and {AADL} Models}, journal = {{IEEE} Trans. Reliab.}, volume = {69}, number = {1}, pages = {154--173}, year = {2020}, url = {https://doi.org/10.1109/TR.2019.2936072}, doi = {10.1109/TR.2019.2936072}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/WangYHLZBF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsas/WangCCPH20, author = {Senzhang Wang and Jiannong Cao and Hao Chen and Hao Peng and Zhiqiu Huang}, title = {SeqST-GAN: Seq2Seq Generative Adversarial Nets for Multi-step Urban Crowd Flow Prediction}, journal = {{ACM} Trans. Spatial Algorithms Syst.}, volume = {6}, number = {4}, pages = {22:1--22:24}, year = {2020}, url = {https://doi.org/10.1145/3378889}, doi = {10.1145/3378889}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsas/WangCCPH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/NawazHWN20, author = {Asif Nawaz and Zhiqiu Huang and Senzhang Wang and Amara Naseer}, title = {Deep neural architecture for geospatial trajectory completion over occupancy gridmap}, booktitle = {13th {IEEE} International Conference on Cloud Computing, {CLOUD} 2020, Virtual Event, 18-24 October 2020}, pages = {37--39}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CLOUD49709.2020.00018}, doi = {10.1109/CLOUD49709.2020.00018}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEcloud/NawazHWN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apweb/NawazHW20, author = {Asif Nawaz and Zhiqiu Huang and Senzhang Wang}, editor = {Xin Wang and Rui Zhang and Young{-}Koo Lee and Le Sun and Yang{-}Sae Moon}, title = {{SSMDL:} Semi-supervised Multi-task Deep Learning for Transportation Mode Classification and Path Prediction with {GPS} Trajectories}, booktitle = {Web and Big Data - 4th International Joint Conference, APWeb-WAIM 2020, Tianjin, China, September 18-20, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12318}, pages = {391--405}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60290-1\_31}, doi = {10.1007/978-3-030-60290-1\_31}, timestamp = {Fri, 16 Oct 2020 12:50:03 +0200}, biburl = {https://dblp.org/rec/conf/apweb/NawazHW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/WangMCH20, author = {Senzhang Wang and Hao Miao and Hao Chen and Zhiqiu Huang}, editor = {Mathieu d'Aquin and Stefan Dietze and Claudia Hauff and Edward Curry and Philippe Cudr{\'{e}}{-}Mauroux}, title = {Multi-task Adversarial Spatial-Temporal Networks for Crowd Flow Prediction}, booktitle = {{CIKM} '20: The 29th {ACM} International Conference on Information and Knowledge Management, Virtual Event, Ireland, October 19-23, 2020}, pages = {1555--1564}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3340531.3412054}, doi = {10.1145/3340531.3412054}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cikm/WangMCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ease/AkbarH0MHH20, author = {Muhammad Azeem Akbar and Zhiqiu Huang and Yu Zhou and Faisal Mehmood and Yasir Hussain and Muhammad Hamza}, editor = {Jingyue Li and Letizia Jaccheri and Torgeir Dings{\o}yr and Ruzanna Chitchyan}, title = {Towards continues code recommendation and implementation system: An Initial Framework}, booktitle = {{EASE} '20: Evaluation and Assessment in Software Engineering, Trondheim, Norway, April 15-17, 2020}, pages = {439--444}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3383219.3383282}, doi = {10.1145/3383219.3383282}, timestamp = {Thu, 07 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ease/AkbarH0MHH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/internetware/FangH0C20, author = {Liyu Fang and Zhiqiu Huang and Yu Zhou and Taolue Chen}, title = {Adaptive Code Completion with Meta-learning}, booktitle = {Internetware'20: 12th Asia-Pacific Symposium on Internetware, Singapore, November 1-3, 2020}, pages = {116--125}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3457913.3457933}, doi = {10.1145/3457913.3457933}, timestamp = {Mon, 26 Jul 2021 11:43:54 +0200}, biburl = {https://dblp.org/rec/conf/internetware/FangH0C20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/internetware/YuHZLS20, author = {Yaoshen Yu and Zhiqiu Huang and Yu Zhou and Weiwei Li and Yichao Shao}, title = {ASPDup: AST-Sequence-based Progressive Duplicate Code Detection Tool for Onsite Programming Code}, booktitle = {Internetware'20: 12th Asia-Pacific Symposium on Internetware, Singapore, November 1-3, 2020}, pages = {260--264}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3457913.3457938}, doi = {10.1145/3457913.3457938}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/internetware/YuHZLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicase/GuoTH20, author = {Hongjing Guo and Chuanqi Tao and Zhiqiu Huang}, editor = {Jing Liu and Honghao Gao and Yuyu Yin and Zhongqin Bi}, title = {Metamorphic Testing for Plant Identification Mobile Applications Based on Test Contexts}, booktitle = {Mobile Computing, Applications, and Services - 11th {EAI} International Conference, MobiCASE 2020, Shanghai, China, September 12, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {341}, pages = {209--223}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64214-3\_15}, doi = {10.1007/978-3-030-64214-3\_15}, timestamp = {Tue, 09 May 2023 16:44:52 +0200}, biburl = {https://dblp.org/rec/conf/mobicase/GuoTH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/WangZZH20, author = {Pu Wang and Zhiyi Zhang and Yuqian Zhou and Zhiqiu Huang}, title = {Test Data Augmentation for Image Recognition Software}, booktitle = {20th {IEEE} International Conference on Software Quality, Reliability and Security Companion, {QRS} Companion 2020, Macau, China, December 11-14, 2020}, pages = {280--284}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/QRS-C51114.2020.00054}, doi = {10.1109/QRS-C51114.2020.00054}, timestamp = {Thu, 15 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/qrs/WangZZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-01264, author = {Yu Zhou and Xinying Yang and Taolue Chen and Zhiqiu Huang and Xiaoxing Ma and Harald C. Gall}, title = {Boosting {API} Recommendation with Implicit Feedback}, journal = {CoRR}, volume = {abs/2002.01264}, year = {2020}, url = {https://arxiv.org/abs/2002.01264}, eprinttype = {arXiv}, eprint = {2002.01264}, timestamp = {Mon, 10 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-01264.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-06834, author = {Yunfei Meng and Zhiqiu Huang and Senzhang Wang and Guohua Shen and Changbo Ke}, title = {SOM-based DDoS Defense Mechanism using {SDN} for the Internet of Things}, journal = {CoRR}, volume = {abs/2003.06834}, year = {2020}, url = {https://arxiv.org/abs/2003.06834}, eprinttype = {arXiv}, eprint = {2003.06834}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-06834.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-13206, author = {Yunfei Meng and Zhiqiu Huang and Guohua Shen and Changbo Ke}, title = {A Security Policy Model Transformation and Verification Approach for Software Defined Networking}, journal = {CoRR}, volume = {abs/2005.13206}, year = {2020}, url = {https://arxiv.org/abs/2005.13206}, eprinttype = {arXiv}, eprint = {2005.13206}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-13206.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YeSGH19, author = {Haibo Ye and Li Sheng and Tao Gu and Zhiqiu Huang}, title = {SELoc: Collect Your Location Data Using Only a Barometer Sensor}, journal = {{IEEE} Access}, volume = {7}, pages = {88705--88717}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2925460}, doi = {10.1109/ACCESS.2019.2925460}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YeSGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WuSHCD19, author = {Dexiang Wu and Guohua Shen and Zhi{-}qiu Huang and Yan Cao and Tianbao Du}, title = {A Trust-Aware Task Offloading Framework in Mobile Edge Computing}, journal = {{IEEE} Access}, volume = {7}, pages = {150105--150119}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2947306}, doi = {10.1109/ACCESS.2019.2947306}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WuSHCD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CaoHKXW19, author = {Yan Cao and Zhiqiu Huang and Changbo Ke and Jian Xie and Jin Wang}, title = {A topology-aware access control model for collaborative cyber-physical spaces: Specification and verification}, journal = {Comput. Secur.}, volume = {87}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.02.013}, doi = {10.1016/J.COSE.2019.02.013}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CaoHKXW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangHLWY19, author = {Yong Wang and Zhiqiu Huang and Yong Li and Rongcun Wang and Qiao Yu}, title = {Spectrum-Based Fault Localization Framework to Support Fault Understanding}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {102-D}, number = {4}, pages = {863--866}, year = {2019}, url = {https://doi.org/10.1587/transinf.2018EDL8233}, doi = {10.1587/TRANSINF.2018EDL8233}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/WangHLWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/KeHW19, author = {Changbo Ke and Zhiqiu Huang and Jiayu Wu}, title = {{\unicode{38754}}{\unicode{21521}}{\unicode{22823}}{\unicode{25968}}{\unicode{25454}}{\unicode{30340}}{\unicode{38544}}{\unicode{31169}}{\unicode{21457}}{\unicode{24067}}{\unicode{26292}}{\unicode{38706}}{\unicode{26816}}{\unicode{27979}}{\unicode{26041}}{\unicode{27861}} (Big Data Oriented Privacy Disclosure Detection Method for Information Release)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {46}, number = {10}, pages = {148--153}, year = {2019}, url = {https://doi.org/10.11896/jsjkx.190100050}, doi = {10.11896/JSJKX.190100050}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/KeHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ZhouYYCH19, author = {Yu Zhou and Xin Yan and Wenhua Yang and Taolue Chen and Zhiqiu Huang}, title = {Augmenting Java method comments generation with context information based on neural networks}, journal = {J. Syst. Softw.}, volume = {156}, pages = {328--340}, year = {2019}, url = {https://doi.org/10.1016/j.jss.2019.07.087}, doi = {10.1016/J.JSS.2019.07.087}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/ZhouYYCH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/YeDGH19, author = {Haibo Ye and Kai Dong and Tao Gu and Zhiqiu Huang}, title = {SMinder: Detect a Left-behind Phone using Sensor-based Context Awareness}, journal = {Mob. Networks Appl.}, volume = {24}, number = {1}, pages = {171--183}, year = {2019}, url = {https://doi.org/10.1007/s11036-017-0987-6}, doi = {10.1007/S11036-017-0987-6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/YeDGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/WangZLYH19, author = {Senzhang Wang and Xiaoming Zhang and Fengxiang Li and Philip S. Yu and Zhiqiu Huang}, title = {Efficient Traffic Estimation With Multi-Sourced Data by Parallel Coupled Hidden Markov Model}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {20}, number = {8}, pages = {3010--3023}, year = {2019}, url = {https://doi.org/10.1109/TITS.2018.2870948}, doi = {10.1109/TITS.2018.2870948}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/WangZLYH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/AiHLZY19, author = {Lei Ai and Zhiqiu Huang and Weiwei Li and Yu Zhou and Yaoshen Yu}, editor = {Vladimir Getov and Jean{-}Luc Gaudiot and Nariyoshi Yamai and Stelvio Cimato and J. Morris Chang and Yuuichi Teranishi and Ji{-}Jiang Yang and Hong Va Leong and Hossain Shahriar and Michiharu Takemoto and Dave Towey and Hiroki Takakura and Atilla El{\c{c}}i and Susumu Takeuchi and Satish Puri}, title = {{SENSORY:} Leveraging Code Statement Sequence Information for Code Snippets Recommendation}, booktitle = {43rd {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1}, pages = {27--36}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/COMPSAC.2019.00014}, doi = {10.1109/COMPSAC.2019.00014}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/compsac/AiHLZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-00884, author = {Yasir Hussain and Zhiqiu Huang and Senzhang Wang and Yu Zhou}, title = {CodeGRU: Context-aware Deep Learning with Gated Recurrent Unit for Source Code Modeling}, journal = {CoRR}, volume = {abs/1903.00884}, year = {2019}, url = {http://arxiv.org/abs/1903.00884}, eprinttype = {arXiv}, eprint = {1903.00884}, timestamp = {Tue, 15 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-00884.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-00894, author = {Yu Zhou and Yanqi Su and Taolue Chen and Zhiqiu Huang and Harald C. Gall and Sebastiano Panichella}, title = {User Review-Based Change File Localization for Mobile Applications}, journal = {CoRR}, volume = {abs/1903.00894}, year = {2019}, url = {http://arxiv.org/abs/1903.00894}, eprinttype = {arXiv}, eprint = {1903.00894}, timestamp = {Tue, 15 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-00894.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-10201, author = {Yunfei Meng and Zhiqiu Huang and Senzhang Wang and Yu Zhou and Guohua Shen and Changbo Ke}, title = {Behavior-aware Service Access Control Mechanism using Security Policy Monitoring for {SOA} Systems}, journal = {CoRR}, volume = {abs/1908.10201}, year = {2019}, url = {http://arxiv.org/abs/1908.10201}, eprinttype = {arXiv}, eprint = {1908.10201}, timestamp = {Tue, 15 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-10201.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-05493, author = {Yasir Hussain and Zhiqiu Huang and Yu Zhou and Senzhang Wang}, title = {Deep Transfer Learning for Source Code Modeling}, journal = {CoRR}, volume = {abs/1910.05493}, year = {2019}, url = {http://arxiv.org/abs/1910.05493}, eprinttype = {arXiv}, eprint = {1910.05493}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-05493.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-06500, author = {Yasir Hussain and Zhiqiu Huang and Yu Zhou and Senzhang Wang}, title = {DeepVS: An Efficient and Generic Approach for Source Code Modeling Usage}, journal = {CoRR}, volume = {abs/1910.06500}, year = {2019}, url = {http://arxiv.org/abs/1910.06500}, eprinttype = {arXiv}, eprint = {1910.06500}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-06500.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangHFL18, author = {Yong Wang and Zhiqiu Huang and BingWu Fang and Yong Li}, title = {Spectrum-Based Fault Localization via Enlarging Non-Fault Region to Improve Fault Absolute Ranking}, journal = {{IEEE} Access}, volume = {6}, pages = {8925--8933}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2796849}, doi = {10.1109/ACCESS.2018.2796849}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangHFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YeYYGH18, author = {Haibo Ye and Wenhua Yang and Yunyu Yao and Tao Gu and Zhiqiu Huang}, title = {BTrack: Using Barometer for Energy Efficient Location Tracking on Mountain Roads}, journal = {{IEEE} Access}, volume = {6}, pages = {66998--67009}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2879311}, doi = {10.1109/ACCESS.2018.2879311}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YeYYGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/FangGHW18, author = {Liming Fang and Chunpeng Ge and Zhiqiu Huang and Jiandong Wang}, title = {Privacy preserving cloud data sharing system with flexible control}, journal = {Comput. Electr. Eng.}, volume = {70}, pages = {978--986}, year = {2018}, url = {https://doi.org/10.1016/j.compeleceng.2018.02.048}, doi = {10.1016/J.COMPELECENG.2018.02.048}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/FangGHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KanH18, author = {Shuanglong Kan and Zhiqiu Huang}, title = {Partial Order Reduction for the full Class of State/Event Linear Temporal Logic}, journal = {Comput. J.}, volume = {61}, number = {5}, pages = {629--644}, year = {2018}, url = {https://doi.org/10.1093/comjnl/bxx064}, doi = {10.1093/COMJNL/BXX064}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/KanH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/MengHZK18, author = {Yunfei Meng and Zhiqiu Huang and Yu Zhou and Changbo Ke}, title = {Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities}, journal = {Future Gener. Comput. Syst.}, volume = {86}, pages = {1--11}, year = {2018}, url = {https://doi.org/10.1016/j.future.2018.03.013}, doi = {10.1016/J.FUTURE.2018.03.013}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/MengHZK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangHWY18, author = {Yong Wang and Zhiqiu Huang and Rongcun Wang and Qiao Yu}, title = {Spectrum-Based Fault Localization Using Fault Triggering Model to Refine Fault Ranking List}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {101-D}, number = {10}, pages = {2436--2446}, year = {2018}, url = {https://doi.org/10.1587/transinf.2017EDP7386}, doi = {10.1587/TRANSINF.2017EDP7386}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangHWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/JiangHMC18, author = {Jia{-}xin Jiang and Zhi{-}qiu Huang and Wei{-}wei Ma and Yan Cao}, title = {Using information flow analysis to detect implicit information leaks for web service composition}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {19}, number = {4}, pages = {494--502}, year = {2018}, url = {https://doi.org/10.1631/FITEE.1601371}, doi = {10.1631/FITEE.1601371}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jzusc/JiangHMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/PengHLLFW18, author = {Huanfeng Peng and Zhi{-}qiu Huang and LinYuan Liu and Yong Li and Dajuan Fan and Yu{-}qing Wang}, title = {Preserving privacy information flow security in composite service evolution}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {19}, number = {5}, pages = {626--638}, year = {2018}, url = {https://doi.org/10.1631/FITEE.1700359}, doi = {10.1631/FITEE.1700359}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jzusc/PengHLLFW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/KanH18, author = {Shuanglong Kan and Zhiqiu Huang}, title = {Detecting safety-related components in statecharts through traceability and model slicing}, journal = {Softw. Pract. Exp.}, volume = {48}, number = {3}, pages = {428--448}, year = {2018}, url = {https://doi.org/10.1002/spe.2526}, doi = {10.1002/SPE.2526}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/KanH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/YuanH18, author = {Min Yuan and Zhiqiu Huang}, title = {Efficient Verification of Service-Based Applications for Flexible Modeling}, booktitle = {2018 {IEEE} International Conference on Services Computing, {SCC} 2018, San Francisco, CA, USA, July 2-7, 2018}, pages = {97--104}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SCC.2018.00020}, doi = {10.1109/SCC.2018.00020}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/YuanH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HussainH18, author = {Yasir Hussain and Zhiqiu Huang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {TRFIoT: Trust and Reputation Model for Fog-based IoT}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {11068}, pages = {187--198}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00021-9\_18}, doi = {10.1007/978-3-030-00021-9\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/HussainH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/ChenYLQH18, author = {Zhe Chen and Junqi Yan and Wenming Li and Ju Qian and Zhiqiu Huang}, editor = {Michel Chaudron and Ivica Crnkovic and Marsha Chechik and Mark Harman}, title = {Runtime verification of memory safety via source transformation}, booktitle = {Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, {ICSE} 2018, Gothenburg, Sweden, May 27 - June 03, 2018}, pages = {264--265}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3183440.3194962}, doi = {10.1145/3183440.3194962}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/ChenYLQH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/memocode/XuYHZLXBF18, author = {Jinmiao Xu and Zhibin Yang and Zhiqiu Huang and Yong Zhou and Chengwei Liu and Lei Xue and Jean{-}Paul Bodeveix and Mamoun Filali}, title = {Hierarchical Behavior Annex: Towards an {AADL} Functional Specification Extension}, booktitle = {16th {ACM/IEEE} International Conference on Formal Methods and Models for System Design, {MEMOCODE} 2018, Beijing, China, October 15-18, 2018}, pages = {88--98}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MEMCOD.2018.8557005}, doi = {10.1109/MEMCOD.2018.8557005}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/memocode/XuYHZLXBF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KeHC17, author = {Changbo Ke and Zhiqiu Huang and Xiaohui Cheng}, title = {Privacy Disclosure Checking Method Applied on Collaboration Interactions Among SaaS Services}, journal = {{IEEE} Access}, volume = {5}, pages = {15080--15092}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2710091}, doi = {10.1109/ACCESS.2017.2710091}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KeHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiHWF17, author = {Yong Li and Zhiqiu Huang and Yong Wang and BingWu Fang}, title = {Evaluating Data Filter on Cross-Project Defect Prediction: Comparison and Improvements}, journal = {{IEEE} Access}, volume = {5}, pages = {25646--25656}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2771460}, doi = {10.1109/ACCESS.2017.2771460}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiHWF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiKH17, author = {Weiwei Li and Shuanglong Kan and Zhiqiu Huang}, title = {A Better Translation From {LTL} to Transition-Based Generalized B{\"{u}}chi Automata}, journal = {{IEEE} Access}, volume = {5}, pages = {27081--27090}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2773123}, doi = {10.1109/ACCESS.2017.2773123}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/0008HLF17, author = {Yong Wang and Zhiqiu Huang and Yong Li and BingWu Fang}, title = {Lightweight fault localization combined with fault context to improve fault absolute rank}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {9}, pages = {092113:1--092113:16}, year = {2017}, url = {https://doi.org/10.1007/s11432-017-9112-2}, doi = {10.1007/S11432-017-9112-2}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/0008HLF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/ZhangHD18, author = {Chi Zhang and Zhiqiu Huang and Zewen Ding}, title = {{\unicode{25903}}{\unicode{25345}}{\unicode{25277}}{\unicode{35937}}{\unicode{35299}}{\unicode{37322}}{\unicode{30340}}{\unicode{38745}}{\unicode{24577}}{\unicode{20998}}{\unicode{26512}}{\unicode{26041}}{\unicode{27861}}{\unicode{30340}}{\unicode{24418}}{\unicode{24335}}{\unicode{21270}}{\unicode{20307}}{\unicode{31995}}{\unicode{30740}}{\unicode{31350}} (Research on Static Analysis Formalism Supporting Abstract Interpretation)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {44}, number = {12}, pages = {126--130}, year = {2017}, url = {https://doi.org/10.11896/j.issn.1002-137X.2017.12.025}, doi = {10.11896/J.ISSN.1002-137X.2017.12.025}, timestamp = {Fri, 20 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/ZhangHD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/KeHX18, author = {Changbo Ke and Zhiqiu Huang and Fu Xiao}, title = {{\unicode{22522}}{\unicode{20110}}{\unicode{26412}}{\unicode{20307}}{\unicode{27010}}{\unicode{24565}}{\unicode{30456}}{\unicode{20284}}{\unicode{24230}}{\unicode{30340}}{\unicode{36719}}{\unicode{20214}}{\unicode{26500}}{\unicode{20214}}{\unicode{26816}}{\unicode{32034}}{\unicode{26041}}{\unicode{27861}} (Software Component Retrieval Method Based on Ontology Concept Similarity)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {44}, number = {12}, pages = {144--149}, year = {2017}, url = {https://doi.org/10.11896/j.issn.1002-137X.2017.12.028}, doi = {10.11896/J.ISSN.1002-137X.2017.12.028}, timestamp = {Fri, 20 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/KeHX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/logcom/KanHCLH17, author = {Shuanglong Kan and Zhiqiu Huang and Zhe Chen and Weiwei Li and Yutao Huang}, title = {Partial order reduction for checking {LTL} formulae with the next-time operator}, journal = {J. Log. Comput.}, volume = {27}, number = {4}, pages = {1095--1131}, year = {2017}, url = {https://doi.org/10.1093/logcom/exw004}, doi = {10.1093/LOGCOM/EXW004}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/logcom/KanHCLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/paa/FangHLW17, author = {BingWu Fang and Zhiqiu Huang and Yong Li and Yong Wang}, title = {{\(\upsilon\)}-Support vector machine based on discriminant sparse neighborhood preserving embedding}, journal = {Pattern Anal. Appl.}, volume = {20}, number = {4}, pages = {1077--1089}, year = {2017}, url = {https://doi.org/10.1007/s10044-016-0547-x}, doi = {10.1007/S10044-016-0547-X}, timestamp = {Tue, 30 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/paa/FangHLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/ZhuHZ17, author = {Yi Zhu and Zhiqiu Huang and Hang Zhou}, title = {Modeling and verification of Web services composition based on model transformation}, journal = {Softw. Pract. Exp.}, volume = {47}, number = {5}, pages = {709--730}, year = {2017}, url = {https://doi.org/10.1002/spe.2434}, doi = {10.1002/SPE.2434}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/ZhuHZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sqj/LiuSHY17, author = {Yinling Liu and Guohua Shen and Zhiqiu Huang and Zhibin Yang}, title = {Quantitative risk analysis of safety-critical embedded systems}, journal = {Softw. Qual. J.}, volume = {25}, number = {2}, pages = {503--527}, year = {2017}, url = {https://doi.org/10.1007/s11219-015-9302-6}, doi = {10.1007/S11219-015-9302-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sqj/LiuSHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tois/WangZCHSYLH17, author = {Senzhang Wang and Xiaoming Zhang and Jianping Cao and Lifang He and Leon Stenneth and Philip S. Yu and Zhoujun Li and Zhiqiu Huang}, title = {Computing Urban Traffic Congestions by Incorporating Sparse {GPS} Probe Data and Social Media Data}, journal = {{ACM} Trans. Inf. Syst.}, volume = {35}, number = {4}, pages = {40:1--40:30}, year = {2017}, url = {https://doi.org/10.1145/3057281}, doi = {10.1145/3057281}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tois/WangZCHSYLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/ZhouGCHPG17, author = {Yu Zhou and Ruihang Gu and Taolue Chen and Zhiqiu Huang and Sebastiano Panichella and Harald C. Gall}, editor = {Sebasti{\'{a}}n Uchitel and Alessandro Orso and Martin P. Robillard}, title = {Analyzing APIs documentation and code to detect directive defects}, booktitle = {Proceedings of the 39th International Conference on Software Engineering, {ICSE} 2017, Buenos Aires, Argentina, May 20-28, 2017}, pages = {27--37}, publisher = {{IEEE} / {ACM}}, year = {2017}, url = {https://doi.org/10.1109/ICSE.2017.11}, doi = {10.1109/ICSE.2017.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/ZhouGCHPG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mlicom/KhudadadH17, author = {Mirza Khudadad and Zhiqiu Huang}, editor = {Xuemai Gu and Gongliang Liu and Bo Li}, title = {Intrusion Detection with Tree-Based Data Mining Classification Techniques by Using {KDD}}, booktitle = {Machine Learning and Intelligent Communications - Second International Conference, {MLICOM} 2017, Weihai, China, August 5-6, 2017, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {227}, pages = {294--303}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73447-7\_33}, doi = {10.1007/978-3-319-73447-7\_33}, timestamp = {Thu, 01 Aug 2019 13:46:15 +0200}, biburl = {https://dblp.org/rec/conf/mlicom/KhudadadH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mlicom/ZhangHX17, author = {Qi Zhang and Zhiqiu Huang and Jian Xie}, editor = {Xuemai Gu and Gongliang Liu and Bo Li}, title = {Distributed System Model Using SysML and Event-B}, booktitle = {Machine Learning and Intelligent Communications - Second International Conference, {MLICOM} 2017, Weihai, China, August 5-6, 2017, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {226}, pages = {326--336}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73564-1\_32}, doi = {10.1007/978-3-319-73564-1\_32}, timestamp = {Mon, 16 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mlicom/ZhangHX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/SuZLHLT17, author = {Shenghui Su and Jianhua Zheng and Shuwang L{\"{u}} and Zhiqiu Huang and Zhoujun Li and Zhenmin Tang}, editor = {G. Alan Wang and Michael Chau and Hsinchun Chen}, title = {Idology and Its Applications in Public Security and Network Security}, booktitle = {Intelligence and Security Informatics - 12th Pacific Asia Workshop, {PAISI} 2017, Jeju Island, South Korea, May 23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10241}, pages = {129--149}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57463-9\_9}, doi = {10.1007/978-3-319-57463-9\_9}, timestamp = {Wed, 04 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/SuZLHLT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GeSWHFR16, author = {Chunpeng Ge and Willy Susilo and Jiandong Wang and Zhiqiu Huang and Liming Fang and Yongjun Ren}, title = {A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles}, journal = {Comput. J.}, volume = {59}, number = {7}, pages = {970--982}, year = {2016}, url = {https://doi.org/10.1093/comjnl/bxv100}, doi = {10.1093/COMJNL/BXV100}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GeSWHFR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijar/LiHJC16, author = {Weiwei Li and Zhiqiu Huang and Xiuyi Jia and Xinye Cai}, title = {Neighborhood based decision-theoretic rough set models}, journal = {Int. J. Approx. Reason.}, volume = {69}, pages = {1--17}, year = {2016}, url = {https://doi.org/10.1016/j.ijar.2015.11.005}, doi = {10.1016/J.IJAR.2015.11.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijar/LiHJC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/ZhuHZZX16, author = {Yi Zhu and Zhiqiu Huang and Guangquan Zhang and Hang Zhou and Fangxiong Xiao}, title = {Multi-Resource Modeling of Real-Time Software Based on Resource Timed Process Algebra}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {26}, number = {7}, pages = {1099--1116}, year = {2016}, url = {https://doi.org/10.1142/S0218194016500388}, doi = {10.1142/S0218194016500388}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/ZhuHZZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/ZhuHT16, author = {Youwen Zhu and Zhiqiu Huang and Tsuyoshi Takagi}, title = {Secure and controllable k-NN query over encrypted cloud data with key confidentiality}, journal = {J. Parallel Distributed Comput.}, volume = {89}, pages = {1--12}, year = {2016}, url = {https://doi.org/10.1016/j.jpdc.2015.11.004}, doi = {10.1016/J.JPDC.2015.11.004}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/ZhuHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/ZhangHS18, author = {Xueming Zhang and Zhiqiu Huang and Yi Sun}, title = {{\unicode{22522}}{\unicode{20110}}RBAC{\unicode{30340}}{\unicode{38544}}{\unicode{31169}}{\unicode{35775}}{\unicode{38382}}{\unicode{25511}}{\unicode{21046}}{\unicode{30740}}{\unicode{31350}} (Research on Privacy Access Control Based on {RBAC)}}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {43}, number = {1}, pages = {166--171}, year = {2016}, url = {https://doi.org/10.11896/j.issn.1002-137X.2016.01.038}, doi = {10.11896/J.ISSN.1002-137X.2016.01.038}, timestamp = {Fri, 20 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/ZhangHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/ChenHCK16, author = {Guangying Chen and Zhiqiu Huang and Zhe Chen and Shuanglong Kan}, title = {{\unicode{38754}}{\unicode{21521}}DO-333{\unicode{30340}}{\unicode{35167}}{\unicode{32541}}{\unicode{32764}}{\unicode{25511}}{\unicode{21046}}{\unicode{21333}}{\unicode{20803}}{\unicode{23433}}{\unicode{20840}}{\unicode{24615}}{\unicode{20998}}{\unicode{26512}} (Safety Analysis of Slat and Flap Control Unit for {DO-333)}}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {43}, number = {5}, pages = {150--156}, year = {2016}, url = {https://doi.org/10.11896/j.issn.1002-137X.2016.05.028}, doi = {10.11896/J.ISSN.1002-137X.2016.05.028}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/ChenHCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/LiHL16, author = {Weiwei Li and Zhiqiu Huang and Qing Li}, title = {Three-way decisions based software defect prediction}, journal = {Knowl. Based Syst.}, volume = {91}, pages = {263--274}, year = {2016}, url = {https://doi.org/10.1016/j.knosys.2015.09.035}, doi = {10.1016/J.KNOSYS.2015.09.035}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/LiHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/KanHC16, author = {Shuanglong Kan and Zhiqiu Huang and Zhe Chen}, editor = {Kazuhiro Ogata and Mark Lawford and Shaoying Liu}, title = {Partial Order Reduction for State/Event Systems}, booktitle = {Formal Methods and Software Engineering - 18th International Conference on Formal Engineering Methods, {ICFEM} 2016, Tokyo, Japan, November 14-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10009}, pages = {329--345}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47846-3\_21}, doi = {10.1007/978-3-319-47846-3\_21}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfem/KanHC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/WangHSYLH16, author = {Senzhang Wang and Lifang He and Leon Stenneth and Philip S. Yu and Zhoujun Li and Zhiqiu Huang}, editor = {Chi{-}Yin Chow and Prem Prakash Jayaraman and Wei Wu}, title = {Estimating Urban Traffic Congestions with Multi-sourced Data}, booktitle = {{IEEE} 17th International Conference on Mobile Data Management, {MDM} 2016, Porto, Portugal, June 13-16, 2016}, pages = {82--91}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MDM.2016.25}, doi = {10.1109/MDM.2016.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/WangHSYLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/WangH16, author = {Yong Wang and Zhiqiu Huang}, title = {Weighted Control Flow Subgraph to Support Debugging Activities}, booktitle = {2016 {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2016, Companion, Vienna, Austria, August 1-3, 2016}, pages = {131--134}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/QRS-C.2016.21}, doi = {10.1109/QRS-C.2016.21}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/qrs/WangH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sate/WangHLF16, author = {Yong Wang and Zhiqiu Huang and Yong Li and BingWu Fang}, title = {Lightweight Fault Localization Combining with Fault-Context}, booktitle = {International Conference on Software Analysis, Testing and Evolution, {SATE} 2016, Kunming, China, November 3-4, 2016}, pages = {96--101}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/SATE.2016.23}, doi = {10.1109/SATE.2016.23}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/sate/WangHLF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SuZHLTWL16, author = {Shenghui Su and Jianhua Zheng and Zhiqiu Huang and Zhoujun Li and Zhenmin Tang and Jian Wang and Shuwang L{\"{u}}}, title = {Idology and Its Applications in Public Security and Network Security}, journal = {CoRR}, volume = {abs/1609.05601}, year = {2016}, url = {http://arxiv.org/abs/1609.05601}, eprinttype = {arXiv}, eprint = {1609.05601}, timestamp = {Wed, 04 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SuZHLTWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ZhangLHWZ15, author = {Yonglong Zhang and Bin Li and Zhiqiu Huang and Jin Wang and Junwu Zhu}, title = {{SGAM:} strategy-proof group buying-based auction mechanism for virtual machine allocation in clouds}, journal = {Concurr. Comput. Pract. Exp.}, volume = {27}, number = {18}, pages = {5577--5589}, year = {2015}, url = {https://doi.org/10.1002/cpe.3605}, doi = {10.1002/CPE.3605}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/ZhangLHWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhouHWH15, author = {Yu Zhou and Yankai Huang and Ou Wei and Zhiqiu Huang}, title = {Verifying specifications with associated attributes in graph transformation systems}, journal = {Frontiers Comput. Sci.}, volume = {9}, number = {3}, pages = {364--374}, year = {2015}, url = {https://doi.org/10.1007/s11704-015-4290-4}, doi = {10.1007/S11704-015-4290-4}, timestamp = {Tue, 15 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/ZhouHWH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/KeWXH15, author = {Changbo Ke and Ruchuan Wang and Fu Xiao and Zhiqiu Huang}, title = {Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing}, journal = {J. Commun.}, volume = {10}, number = {1}, pages = {55--63}, year = {2015}, url = {https://doi.org/10.12720/jcm.10.1.55-63}, doi = {10.12720/JCM.10.1.55-63}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcm/KeWXH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/NiHWH18, author = {Chuan Ni and Zhiqiu Huang and Shanshan Wang and Chuanlin Huang}, title = {{\unicode{22522}}{\unicode{20110}}{\unicode{23646}}{\unicode{24615}}{\unicode{30340}}{\unicode{25903}}{\unicode{25345}}{\unicode{31574}}{\unicode{30053}}{\unicode{26412}}{\unicode{20307}}{\unicode{25512}}{\unicode{29702}}{\unicode{30340}}{\unicode{35775}}{\unicode{38382}}{\unicode{25511}}{\unicode{21046}}{\unicode{26041}}{\unicode{27861}}{\unicode{30740}}{\unicode{31350}} (Attribute-based Access Control Method Supporting Policies Ontology Reasoning)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {42}, number = {3}, pages = {96--101}, year = {2015}, url = {https://doi.org/10.11896/j.issn.1002-137X.2015.03.020}, doi = {10.11896/J.ISSN.1002-137X.2015.03.020}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/NiHWH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/WuHWC15, author = {Zhipeng Wu and Zhiqiu Huang and Shanshan Wang and Dejian Cao}, title = {{\unicode{19968}}{\unicode{31181}}{\unicode{22522}}{\unicode{20110}}{\unicode{25925}}{\unicode{38556}}{\unicode{25193}}{\unicode{23637}}SysML{\unicode{27963}}{\unicode{21160}}{\unicode{22270}}{\unicode{30340}}{\unicode{23433}}{\unicode{20840}}{\unicode{24615}}{\unicode{39564}}{\unicode{35777}}{\unicode{26694}}{\unicode{26550}}{\unicode{30740}}{\unicode{31350}} (Research on Framework of Safety Verification Based on Fault-extended SysML Activity Diagram)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {42}, number = {7}, pages = {222--228}, year = {2015}, url = {https://doi.org/10.11896/j.issn.1002-137X.2015.07.048}, doi = {10.11896/J.ISSN.1002-137X.2015.07.048}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/WuHWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/ZhouHH15, author = {Liang Zhou and Zhiqiu Huang and Chuanlin Huang}, title = {{\unicode{25925}}{\unicode{38556}}{\unicode{26641}}{\unicode{39046}}{\unicode{22495}}{\unicode{26412}}{\unicode{20307}}{\unicode{21450}}SWRL{\unicode{35268}}{\unicode{21017}}{\unicode{30340}}{\unicode{26500}}{\unicode{24314}}{\unicode{26041}}{\unicode{27861}}{\unicode{30740}}{\unicode{31350}} (Construction Method for Fault Tree Domain Ontology Supporting {SWRL} Rules)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {42}, number = {8}, pages = {198--202}, year = {2015}, url = {http://www.jsjkx.com/CN/Y2015/V42/I8/198}, doi = {Y2015/V42/I8/198}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/ZhouHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/0001HW15, author = {Liming Fang and Zhiqiu Huang and Jiandong Wang}, title = {{\unicode{26631}}{\unicode{20934}}{\unicode{27169}}{\unicode{22411}}{\unicode{19979}}{\unicode{22686}}{\unicode{24378}}{\unicode{30340}}{\unicode{26080}}{\unicode{38656}}{\unicode{23433}}{\unicode{20840}}{\unicode{20449}}{\unicode{36947}}{\unicode{30340}}{\unicode{24102}}{\unicode{20851}}{\unicode{38190}}{\unicode{35789}}{\unicode{25628}}{\unicode{32034}}{\unicode{30340}}{\unicode{20844}}{\unicode{38053}}{\unicode{21152}}{\unicode{23494}} (Secure Channel Free Searchable Encryption in Standard Model)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {42}, number = {11}, pages = {197--202}, year = {2015}, url = {https://doi.org/10.11896/j.issn.1002-137X.2015.11.041}, doi = {10.11896/J.ISSN.1002-137X.2015.11.041}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/0001HW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/WangSHMLLL15, author = {Fei Wang and Guohua Shen and Zhiqiu Huang and Lin Ma and Chang Liu and Haifeng Li and Lili Liao}, title = {{\unicode{19968}}{\unicode{31181}}{\unicode{32467}}{\unicode{21512}}{\unicode{32447}}{\unicode{24615}}{\unicode{26102}}{\unicode{24207}}{\unicode{36923}}{\unicode{36753}}{\unicode{21644}}{\unicode{25925}}{\unicode{38556}}{\unicode{26641}}{\unicode{30340}}{\unicode{36719}}{\unicode{20214}}{\unicode{23433}}{\unicode{20840}}{\unicode{39564}}{\unicode{35777}}{\unicode{26041}}{\unicode{27861}} (Method Combining Linear Temporal Logic and Fault Tree for Software Safety Verification)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {42}, number = {12}, pages = {71--75}, year = {2015}, url = {http://www.jsjkx.com/CN/Y2015/V42/I12/71}, doi = {Y2015/V42/I12/71}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/WangSHMLLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/HuangHHWW15, author = {Chuanlin Huang and Zhiqiu Huang and Jun Hu and Zhipeng Wu and Siqi Wang}, title = {A MDE-Based Approach to the Safety Verification of Extended SysML Activity Diagram}, journal = {J. Softw.}, volume = {10}, number = {1}, pages = {56--70}, year = {2015}, url = {https://doi.org/10.17706/jsw.10.1.56-70}, doi = {10.17706/JSW.10.1.56-70}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/HuangHHWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/ChenGHZLL15, author = {Zhe Chen and Yi Gu and Zhiqiu Huang and Jun Zheng and Chang Liu and Ziyi Liu}, title = {Model checking aircraft controller software: a case study}, journal = {Softw. Pract. Exp.}, volume = {45}, number = {7}, pages = {989--1017}, year = {2015}, url = {https://doi.org/10.1002/spe.2242}, doi = {10.1002/SPE.2242}, timestamp = {Wed, 28 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spe/ChenGHZLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhuHHT15, author = {Youwen Zhu and Zhiqiu Huang and Liusheng Huang and Tsuyoshi Takagi}, title = {On the Security of {A} Privacy-Preserving Product Calculation Scheme}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {3}, pages = {373--374}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2345404}, doi = {10.1109/TDSC.2014.2345404}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhuHHT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tase/ChenWHX15, author = {Zhe Chen and Ou Wei and Zhiqiu Huang and Hongwei Xi}, title = {Formal Semantics of Runtime Monitoring, Verification, Enforcement and Control}, booktitle = {2015 International Symposium on Theoretical Aspects of Software Engineering, {TASE} 2015, Nanjing, China, September 12-14, 2015}, pages = {63--70}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/TASE.2015.11}, doi = {10.1109/TASE.2015.11}, timestamp = {Wed, 28 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tase/ChenWHX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2015, editor = {Zhiqiu Huang and Xingming Sun and Junzhou Luo and Jian Wang}, title = {Cloud Computing and Security - First International Conference, {ICCCS} 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9483}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27051-7}, doi = {10.1007/978-3-319-27051-7}, isbn = {978-3-319-27050-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FanHT14, author = {Dajuan Fan and Zhiqiu Huang and Lei Tang}, title = {A Correctness Assurance Approach to Automatic Synthesis of Composite Web Services}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {97-D}, number = {6}, pages = {1535--1545}, year = {2014}, url = {https://doi.org/10.1587/transinf.E97.D.1535}, doi = {10.1587/TRANSINF.E97.D.1535}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FanHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jam/KeHLSX14, author = {Changbo Ke and Zhiqiu Huang and Weiwei Li and Yi Sun and Fangxiong Xiao}, title = {Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing}, journal = {J. Appl. Math.}, volume = {2014}, pages = {240425:1--240425:11}, year = {2014}, url = {https://doi.org/10.1155/2014/240425}, doi = {10.1155/2014/240425}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jam/KeHLSX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/LuHK14, author = {Jiajun Lu and Zhiqiu Huang and Changbo Ke}, title = {Verification of Behavior-aware Privacy Requirements in Web Services Composition}, journal = {J. Softw.}, volume = {9}, number = {4}, pages = {944--951}, year = {2014}, url = {https://doi.org/10.4304/jsw.9.4.944-951}, doi = {10.4304/JSW.9.4.944-951}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/LuHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/GeSHK14, author = {Qiang Ge and Guohua Shen and Zhiqiu Huang and Changbo Ke}, title = {The Application of {SWRL} Based Ontology Inference for Privacy Protection}, journal = {J. Softw.}, volume = {9}, number = {5}, pages = {1217--1222}, year = {2014}, url = {https://doi.org/10.4304/jsw.9.5.1217-1222}, doi = {10.4304/JSW.9.5.1217-1222}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/GeSHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/SunHK14, author = {Yi Sun and Zhiqiu Huang and Changbo Ke}, title = {Using Game Theory to Analyze Strategic Choices of Service Providers and Service Requesters}, journal = {J. Softw.}, volume = {9}, number = {11}, pages = {2918--2924}, year = {2014}, url = {https://doi.org/10.4304/jsw.9.11.2918-2924}, doi = {10.4304/JSW.9.11.2918-2924}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/SunHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbd/ZhangLHWZP14, author = {Yonglong Zhang and Bin Li and Zhiqiu Huang and Jin Wang and Junwu Zhu and Huanfeng Peng}, title = {Strategy-Proof Auction Mechanism with Group Price for Virtual Machine Allocation in Clouds}, booktitle = {Second International Conference on Advanced Cloud and Big Data, {CBD} 2014, Huangshan, China, November 20-22, 2014}, pages = {60--68}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CBD.2014.17}, doi = {10.1109/CBD.2014.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cbd/ZhangLHWZP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/semweb/ShenLWSWHK14, author = {Guohua Shen and Yinling Liu and Fei Wang and Jia Si and Zi Wang and Zhiqiu Huang and Dazhou Kang}, editor = {Pavel Shvaiko and J{\'{e}}r{\^{o}}me Euzenat and Ming Mao and Ernesto Jim{\'{e}}nez{-}Ruiz and Juanzi Li and Axel Ngonga}, title = {OMReasoner: combination of multi-matchers for ontology matching: results for {OAEI} 2014}, booktitle = {Proceedings of the 9th International Workshop on Ontology Matching collocated with the 13th International Semantic Web Conference {(ISWC} 2014), Riva del Garda, Trentino, Italy, October 20, 2014}, series = {{CEUR} Workshop Proceedings}, volume = {1317}, pages = {142--148}, publisher = {CEUR-WS.org}, year = {2014}, url = {https://ceur-ws.org/Vol-1317/oaei14\_paper6.pdf}, timestamp = {Mon, 26 Jun 2023 20:39:38 +0200}, biburl = {https://dblp.org/rec/conf/semweb/ShenLWSWHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/YuHWZ13, author = {Ruiqiang Yu and Zhiqiu Huang and Lin Wang and Hongjie Zhang}, title = {Analyzing Temporal Constraints for Web Services Composition}, journal = {J. Softw.}, volume = {8}, number = {5}, pages = {1051--1057}, year = {2013}, url = {https://doi.org/10.4304/jsw.8.5.1051-1057}, doi = {10.4304/JSW.8.5.1051-1057}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/YuHWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/KeHT13, author = {Changbo Ke and Zhiqiu Huang and Mei Tang}, title = {Supporting negotiation mechanism privacy authority method in cloud computing}, journal = {Knowl. Based Syst.}, volume = {51}, pages = {48--59}, year = {2013}, url = {https://doi.org/10.1016/j.knosys.2013.07.001}, doi = {10.1016/J.KNOSYS.2013.07.001}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/KeHT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/XuHHWZ13, author = {Bingfeng Xu and Zhiqiu Huang and Jun Hu and Ou Wei and Yu Zhou}, editor = {Anders Andersen and Chang Xu}, title = {Minimal cut sequence generation for state/event fault trees}, booktitle = {Proceedings of the 2013 Middleware Doctoral Symposium, {MDS} 2013, Beijing, China, December 9-13, 2013}, pages = {3:1--3:6}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2541534.2541592}, doi = {10.1145/2541534.2541592}, timestamp = {Tue, 15 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/middleware/XuHHWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rskt/LiHJ13, author = {Weiwei Li and Zhiqiu Huang and Xiuyi Jia}, editor = {Pawan Lingras and Marcin Wolski and Chris Cornelis and Sushmita Mitra and Piotr Wasilewski}, title = {Two-Phase Classification Based on Three-Way Decisions}, booktitle = {Rough Sets and Knowledge Technology - 8th International Conference, {RSKT} 2013, Halifax, NS, Canada, October 11-14, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8171}, pages = {338--345}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41299-8\_32}, doi = {10.1007/978-3-642-41299-8\_32}, timestamp = {Sun, 02 Oct 2022 16:14:18 +0200}, biburl = {https://dblp.org/rec/conf/rskt/LiHJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cai/CaiWH12, author = {Xinye Cai and Ou Wei and Zhiqiu Huang}, title = {Evolutionary Approaches for Multi-Objective Next Release Problem}, journal = {Comput. Informatics}, volume = {31}, number = {4}, pages = {847}, year = {2012}, url = {http://www.cai.sk/ojs/index.php/cai/article/view/1108}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cai/CaiWH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/KeH12, author = {Changbo Ke and Zhiqiu Huang}, title = {Self-adaptive semantic web service matching method}, journal = {Knowl. Based Syst.}, volume = {35}, pages = {41--48}, year = {2012}, url = {https://doi.org/10.1016/j.knosys.2012.04.018}, doi = {10.1016/J.KNOSYS.2012.04.018}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/KeH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ZhouYH12, author = {Yu Zhou and Xuefeng Yan and Zhiqiu Huang}, editor = {Xiaoying Bai and Fevzi Belli and Elisa Bertino and Carl K. Chang and Atilla El{\c{c}}i and Cristina Cerschi Seceleanu and Haihua Xie and Mohammad Zulkernine}, title = {A Graph Transformation Based Approach for Modeling Component-Level Migration in Mobile Environments}, booktitle = {36th Annual {IEEE} Computer Software and Applications Conference Workshops, {COMPSAC} 2012, Izmir, Turkey, July 16-20, 2012}, pages = {152--157}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/COMPSACW.2012.37}, doi = {10.1109/COMPSACW.2012.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/ZhouYH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seke/ShenHTGZ12, author = {Guohua Shen and Zhiqiu Huang and Changbao Tian and Qiang Ge and Wei Zhang}, title = {Feature modeling and Verification based on Description Logics}, booktitle = {Proceedings of the 24th International Conference on Software Engineering {\&} Knowledge Engineering (SEKE'2012), Hotel Sofitel, Redwood City, San Francisco Bay, {USA} July 1-3, 2012}, pages = {422--425}, publisher = {Knowledge Systems Institute Graduate School}, year = {2012}, timestamp = {Thu, 12 Mar 2020 11:30:50 +0100}, biburl = {https://dblp.org/rec/conf/seke/ShenHTGZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/semweb/ShenTGZLHK12, author = {Guohua Shen and Changbao Tian and Qiang Ge and Yiquan Zhu and Lili Liao and Zhiqiu Huang and Dazhou Kang}, editor = {Pavel Shvaiko and J{\'{e}}r{\^{o}}me Euzenat and Anastasios Kementsietsidis and Ming Mao and Natasha Fridman Noy and Heiner Stuckenschmidt}, title = {OMReasoner: using multi-matchers and reasoner for ontology matching: results for {OAEI} 2012}, booktitle = {Proceedings of the 7th International Workshop on Ontology Matching, Boston, MA, USA, November 11, 2012}, series = {{CEUR} Workshop Proceedings}, volume = {946}, publisher = {CEUR-WS.org}, year = {2012}, url = {https://ceur-ws.org/Vol-946/oaei12\_paper9.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:08 +0100}, biburl = {https://dblp.org/rec/conf/semweb/ShenTGZLHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LiuZHX11, author = {LinYuan Liu and Haibin Zhu and Zhiqiu Huang and Dongqing Xie}, title = {Minimal privacy authorization in web services collaboration}, journal = {Comput. Stand. Interfaces}, volume = {33}, number = {3}, pages = {332--343}, year = {2011}, url = {https://doi.org/10.1016/j.csi.2010.09.001}, doi = {10.1016/J.CSI.2010.09.001}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LiuZHX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/LiuZH11, author = {LinYuan Liu and Haibin Zhu and Zhiqiu Huang}, title = {Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms}, journal = {Expert Syst. Appl.}, volume = {38}, number = {4}, pages = {4540--4549}, year = {2011}, url = {https://doi.org/10.1016/j.eswa.2010.09.128}, doi = {10.1016/J.ESWA.2010.09.128}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/LiuZH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jwsr/XiaoHCHLY11, author = {Fangxiong Xiao and Zhiqiu Huang and Zining Cao and Jun Hu and LinYuan Liu and Min Yuan}, title = {Unified Modelling Functional and Non-Functional Aspects of Web Services Composition Using {PTCCS} 1}, journal = {Int. J. Web Serv. Res.}, volume = {8}, number = {4}, pages = {47--80}, year = {2011}, url = {https://doi.org/10.4018/ijwsr.2011100103}, doi = {10.4018/IJWSR.2011100103}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jwsr/XiaoHCHLY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/semweb/ShenJZJHH11, author = {Guohua Shen and Lantao Jin and Ziyue Zhao and Zhe Jia and Wenmin He and Zhiqiu Huang}, editor = {Pavel Shvaiko and J{\'{e}}r{\^{o}}me Euzenat and Tom Heath and Christoph Quix and Ming Mao and Isabel F. Cruz}, title = {OMReasoner: using reasoner for ontology matching: results for {OAEI} 2011}, booktitle = {Proceedings of the 6th International Workshop on Ontology Matching, Bonn, Germany, October 24, 2011}, series = {{CEUR} Workshop Proceedings}, volume = {814}, publisher = {CEUR-WS.org}, year = {2011}, url = {https://ceur-ws.org/Vol-814/oaei11\_paper13.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:04 +0100}, biburl = {https://dblp.org/rec/conf/semweb/ShenJZJHH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasfaa/ZhaoH10, author = {Xiaofei Zhao and Zhiqiu Huang}, editor = {Masatoshi Yoshikawa and Xiaofeng Meng and Takayuki Yumoto and Qiang Ma and Lifeng Sun and Chiemi Watanabe}, title = {Checking Structural Integrity for Metadata Repository Systems by Means of Description Logics}, booktitle = {Database Systems for Advanced Applications, 15th International Conference, {DASFAA} 2010, International Workshops: GDM, BenchmarX, MCIS, SNSMW, DIEW, UDM, Tsukuba, Japan, April 1-4, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6193}, pages = {118--129}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14589-6\_13}, doi = {10.1007/978-3-642-14589-6\_13}, timestamp = {Tue, 25 Feb 2020 17:21:37 +0100}, biburl = {https://dblp.org/rec/conf/dasfaa/ZhaoH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/YuanHLY10, author = {Min Yuan and Zhiqiu Huang and Xiang Li and Yan Yan}, title = {Towards a Formal Verification Approach for Business Process Coordination}, booktitle = {{IEEE} International Conference on Web Services, {ICWS} 2010, Miami, Florida, USA, July 5-10, 2010}, pages = {361--368}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICWS.2010.100}, doi = {10.1109/ICWS.2010.100}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/YuanHLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isica/FangZHZ10, author = {Yuankang Fang and Ziyang Zhen and Zhiqiu Huang and Chao Zhang}, editor = {Zhihua Cai and Chengyu Hu and Zhuo Kang and Yong Liu}, title = {Multi-objective Fuzzy Clustering Method for Image Segmentation Based on Variable-Length Intelligent Optimization Algorithm}, booktitle = {Advances in Computation and Intelligence - 5th International Symposium, {ISICA} 2010, Wuhan, China, October 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6382}, pages = {329--337}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16493-4\_34}, doi = {10.1007/978-3-642-16493-4\_34}, timestamp = {Mon, 09 Mar 2020 14:52:47 +0100}, biburl = {https://dblp.org/rec/conf/isica/FangZHZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qsic/ZhuHCZY10, author = {Yi Zhu and Zhiqiu Huang and Zining Cao and Hang Zhou and Min Yuan}, editor = {Ji Wang and W. K. Chan and Fei{-}Ching Kuo}, title = {An {MDE} Based Approach for Generating Software Architecture Models from Formal Specifications}, booktitle = {Proceedings of the 10th International Conference on Quality Software, {QSIC} 2010, Zhangjiajie, China, 14-15 July 2010}, pages = {373--376}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/QSIC.2010.13}, doi = {10.1109/QSIC.2010.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qsic/ZhuHCZY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sose/TuXH10, author = {Lizhong Tu and Fangxiong Xiao and Zhiqiu Huang}, title = {Modeling Service Composition Using Priced Probabilistic Process Algebra}, booktitle = {The Fifth {IEEE} International Symposium on Service-Oriented System Engineering, {SOSE} 2010, June 4-5, 2010, Nanjing, China}, pages = {35--38}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SOSE.2010.21}, doi = {10.1109/SOSE.2010.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sose/TuXH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/XuHW10, author = {Bingfeng Xu and Zhiqiu Huang and Ou Wei}, title = {Making Architectural Decisions Based on Requirements: Analysis and Combination of Risk-Based and Quality Attribute-Based Methods}, booktitle = {Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing: 7th International Conference on Ubiquitous Intelligence {\&} Computing and 7th International Conference on Autonomic {\&} Trusted Computing, {UIC-ATC} 2010, 26-29 October 2010, Xi'an, China}, pages = {392--397}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/UIC-ATC.2010.74}, doi = {10.1109/UIC-ATC.2010.74}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/XuHW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wism/FangH10, author = {Yuankang Fang and Zhiqiu Huang}, editor = {Fu Lee Wang and Zhiguo Gong and Xiangfeng Luo and Jingsheng Lei}, title = {An Improved Algorithm for Session Identification on Web Log}, booktitle = {Web Information Systems and Mining - International Conference, {WISM} 2010, Sanya, China, October 23-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6318}, pages = {53--60}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16515-3\_8}, doi = {10.1007/978-3-642-16515-3\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wism/FangH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/ShenHZZY09, author = {Guohua Shen and Zhiqiu Huang and Yuping Zhang and Xiaodong Zhu and Jun Yang}, title = {A Semantic Model for Matchmaking of Web Services Based on Description Logics}, journal = {Fundam. Informaticae}, volume = {96}, number = {1-2}, pages = {211--226}, year = {2009}, url = {https://doi.org/10.3233/FI-2009-175}, doi = {10.3233/FI-2009-175}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/ShenHZZY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/YuanHHLZ09, author = {Min Yuan and Zhiqiu Huang and Jun Hu and Xiang Li and Yi Zhu}, title = {Ensuring Coordination of Multi-business Interactions}, booktitle = {2009 {IEEE} International Conference on Services Computing {(SCC} 2009), 21-25 September 2009, Bangalore, India}, pages = {356--363}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SCC.2009.82}, doi = {10.1109/SCC.2009.82}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/YuanHHLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csie/ShenHZY09, author = {Guohua Shen and Zhiqiu Huang and Xiaodong Zhu and Jun Yang}, editor = {Mark Burgin and Masud H. Chowdhury and Chan H. Ham and Simone A. Ludwig and Weilian Su and Sumanth Yenduri}, title = {Reasoning about Web Services with Dynamic Description Logics}, booktitle = {{CSIE} 2009, 2009 {WRI} World Congress on Computer Science and Information Engineering, March 31 - April 2, 2009, Los Angeles, California, USA, 7 Volumes}, pages = {106--110}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSIE.2009.232}, doi = {10.1109/CSIE.2009.232}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csie/ShenHZY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cts/LiuHZ09, author = {LinYuan Liu and Zhiqiu Huang and Haibin Zhu}, editor = {William K. McQuay and Waleed W. Smari}, title = {Role-based consistency verification for privacy-aware Web services}, booktitle = {2009 International Symposium on Collaborative Technologies and Systems, {CTS} 2009, Baltimore, Maryland, USA, May 18-22, 2009}, pages = {423--430}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CTS.2009.5067510}, doi = {10.1109/CTS.2009.5067510}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cts/LiuHZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/XiaoHCHL09, author = {Fangxiong Xiao and Zhiqiu Huang and Zining Cao and Jun Hu and LinYuan Liu}, title = {Modeling Cost-Aware Web Services Composition Using {PTCCS}}, booktitle = {{IEEE} International Conference on Web Services, {ICWS} 2009, Los Angeles, CA, USA, 6-10 July 2009}, pages = {461--468}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICWS.2009.56}, doi = {10.1109/ICWS.2009.56}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/XiaoHCHL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/YuanHX09, author = {Min Yuan and Zhiqiu Huang and Fangxiong Xiao}, title = {Modeling and Analysis of Flexible Transaction for Web Services}, booktitle = {{IEEE} International Conference on Web Services, {ICWS} 2009, Los Angeles, CA, USA, 6-10 July 2009}, pages = {1008--1009}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICWS.2009.137}, doi = {10.1109/ICWS.2009.137}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/YuanHX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/internetware/HuangHL09, author = {Feng Huang and Zhiqiu Huang and LinYuan Liu}, editor = {Fuqing Yang and Hong Mei and Jian Lv}, title = {A DL-based method for access control policy conflict detecting}, booktitle = {Proceedings of the First Asia-Pacific Symposium on Internetware, Internetware 2009, Beijing, China, October 17 - 18, 2009}, pages = {16}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1640206.1640222}, doi = {10.1145/1640206.1640222}, timestamp = {Tue, 09 May 2023 08:00:06 +0200}, biburl = {https://dblp.org/rec/conf/internetware/HuangHL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seke/YuanHZL09, author = {Min Yuan and Zhiqiu Huang and Jian Zhao and Xiang Li}, title = {Modeling and Verification of Automatic Multi-business Transactions}, booktitle = {Proceedings of the 21st International Conference on Software Engineering {\&} Knowledge Engineering (SEKE'2009), Boston, Massachusetts, USA, July 1-3, 2009}, pages = {274--279}, publisher = {Knowledge Systems Institute Graduate School}, year = {2009}, timestamp = {Thu, 12 Mar 2020 11:30:49 +0100}, biburl = {https://dblp.org/rec/conf/seke/YuanHZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/ZhuH08, author = {Xiaodong Zhu and Zhiqiu Huang}, title = {Conceptual modeling rules extracting for data streams}, journal = {Knowl. Based Syst.}, volume = {21}, number = {8}, pages = {934--940}, year = {2008}, url = {https://doi.org/10.1016/j.knosys.2008.04.003}, doi = {10.1016/J.KNOSYS.2008.04.003}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/ZhuH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csse/ZhangHCX08, author = {Junhua Zhang and Zhiqiu Huang and Zining Cao and Fangxiong Xiao}, title = {Counterexample Generation for Probabilistic Timed Automata Model Checking}, booktitle = {International Conference on Computer Science and Software Engineering, {CSSE} 2008, Volume 2: Software Engineering, December 12-14, 2008, Wuhan, China}, pages = {210--214}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSSE.2008.371}, doi = {10.1109/CSSE.2008.371}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csse/ZhangHCX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/XiaoHHYZ08, author = {Fangxiong Xiao and Zhiqiu Huang and Jun Hu and Min Yuan and Junhua Zhang}, title = {Support Web Services Composition with Optimal Cost Using {PPA}}, booktitle = {2008 {IEEE} International Conference on Web Services {(ICWS} 2008), September 23-26, 2008, Beijing, China}, pages = {760--761}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICWS.2008.50}, doi = {10.1109/ICWS.2008.50}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/XiaoHHYZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycs/ZhouHZ08, author = {Hang Zhou and Zhiqiu Huang and Yi Zhu}, title = {Polymorphism Sequence Diagrams Test Data Automatic Generation Based on {OCL}}, booktitle = {Proceedings of the 9th International Conference for Young Computer Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008}, pages = {1235--1240}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICYCS.2008.50}, doi = {10.1109/ICYCS.2008.50}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icycs/ZhouHZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscsct/ZhuHZ08, author = {Yi Zhu and Zhiqiu Huang and Hang Zhou}, title = {A Formal Method Support for Resource Modeling of Web Services Composition}, booktitle = {2008 International Symposium on Computer Science and Computational Technology, {ISCSCT} 2008, 20-22 December 2008, Shanghai, China, 2 Volumes}, pages = {370--375}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISCSCT.2008.239}, doi = {10.1109/ISCSCT.2008.239}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscsct/ZhuHZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rskt/ZhuHS08, author = {Xiaodong Zhu and Zhiqiu Huang and Guohua Shen}, editor = {Guoyin Wang and Tianrui Li and Jerzy W. Grzymala{-}Busse and Duoqian Miao and Andrzej Skowron and Yiyu Yao}, title = {Description Logic Based Consistency Checking upon Data Mining Metadata}, booktitle = {Rough Sets and Knowledge Technology, Third International Conference, {RSKT} 2008, Chengdu, China, May 17-19, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5009}, pages = {475--482}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79721-0\_65}, doi = {10.1007/978-3-540-79721-0\_65}, timestamp = {Thu, 15 Jul 2021 13:46:36 +0200}, biburl = {https://dblp.org/rec/conf/rskt/ZhuHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/ZhuHYS07, author = {Xiaodong Zhu and Zhiqiu Huang and Shuqun Yang and Guohua Shen}, editor = {J. Lei}, title = {Fuzzy Implication Methods in Fuzzy Logic}, booktitle = {Fourth International Conference on Fuzzy Systems and Knowledge Discovery, {FSKD} 2007, 24-27 August 2007, Haikou, Hainan, China, Proceedings, Volume 1}, pages = {154--158}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FSKD.2007.327}, doi = {10.1109/FSKD.2007.327}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fskd/ZhuHYS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iita/ShenHZWX07, author = {Guohua Shen and Zhiqiu Huang and Xiaodong Zhu and Lei Wang and Gaoyou Xiang}, editor = {Fei Yu and Renfa Li and Guiping Liao}, title = {Using Description Logics Reasoner for Ontology Matching}, booktitle = {Proceedings of the Workshop on Intelligent Information Technology Application, {IITA} 2007, Zhang Jiajie, China, December 2-3, 2007}, pages = {30--33}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IITA.2007.95}, doi = {10.1109/IITA.2007.95}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iita/ShenHZWX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/ZhaoH06, author = {Xiaofei Zhao and Zhiqiu Huang}, editor = {David W. Embley and Antoni Oliv{\'{e}} and Sudha Ram}, title = {A Formal Framework for Reasoning on Metadata Based on {CWM}}, booktitle = {Conceptual Modeling - {ER} 2006, 25th International Conference on Conceptual Modeling, Tucson, AZ, USA, November 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4215}, pages = {371--384}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11901181\_28}, doi = {10.1007/11901181\_28}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/er/ZhaoH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/owled/ShenHZZ06, author = {Guohua Shen and Zhiqiu Huang and Xiaodong Zhu and Xiaofei Zhao}, editor = {Bernardo Cuenca Grau and Pascal Hitzler and Conor Shankey and Evan Wallace}, title = {Research on the Rules of Mapping from Relational Model to {OWL}}, booktitle = {Proceedings of the OWLED*06 Workshop on {OWL:} Experiences and Directions, Athens, Georgia, USA, November 10-11, 2006}, series = {{CEUR} Workshop Proceedings}, volume = {216}, publisher = {CEUR-WS.org}, year = {2006}, url = {https://ceur-ws.org/Vol-216/submission\_5.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:02 +0100}, biburl = {https://dblp.org/rec/conf/owled/ShenHZZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.