default search action
Jinfu Chen 0001
Person information
- affiliation: Jiangsu University, School of Computer Science and Telecommunication Engineering, Zhenjiang, China
- affiliation (PhD 2009): Huazhong University of Science and Technology, College of Computer Science and Technology, Wuhan, China
Other persons with the same name
- Jinfu Chen 0002 — Huawei Technologies, Canada (and 1 more)
- Jinfu Chen 0003 — Huazhong University of Science and Technology, School of Electrical and Electronic Engineering, Hubei Electric Power Security and High Efficiency Key Laboratory, Wuhan, China
- Jin-Fu Chen 0004 (aka: Jinfu Chen 0004) — China Academy of Engineering Physics, Graduate School, Beijing, China (and 1 more)
- Jinfu Chen 0005 — Huazhong University of Science and Technology, School of Architecture and Urban Planning, Wuhan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j64]Saihua Cai, Han Tang, Jinfu Chen, Yikai Hu, Wuhao Guo:
CDDA-MD: An efficient malicious traffic detection method based on concept drift detection and adaptation technique. Comput. Secur. 148: 104121 (2025) - 2024
- [j63]Jinfu Chen, Haodi Xie, Saihua Cai, Luo Song, Bo Geng, Wuhao Guo:
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism. Comput. Secur. 147: 104083 (2024) - [j62]Jinfu Chen, Weijia Wang, Bo Liu, Saihua Cai, Dave Towey, Shengran Wang:
Hybrid semantics-based vulnerability detection incorporating a Temporal Convolutional Network and Self-attention Mechanism. Inf. Softw. Technol. 171: 107453 (2024) - [j61]Jinfu Chen, Zian Zhao, Saihua Cai, Xiao Chen, Bilal Ahmad, Luo Song, Kun Wang:
DCM-GIFT: An Android malware dynamic classification method based on gray-scale image and feature-selection tree. Inf. Softw. Technol. 176: 107560 (2024) - [j60]Jinfu Chen, Jingyi Chen, Lili Zhu, Chengying Mao, Qihao Bao, Rubing Huang:
L′OP-ART: A linear-time adaptive random testing algorithm for object-oriented programs. J. Syst. Softw. 211: 111970 (2024) - [j59]Chi Zhang, Jinfu Chen, Saihua Cai, Wen Zhang, Rexford Nii Ayitey Sosu, Haibo Chen:
TR-Fuzz: A syntax valid tool for fuzzing C compilers. Sci. Comput. Program. 238: 103155 (2024) - [j58]Jinfu Chen, Yemin Yin, Saihua Cai, Weijia Wang, Shengran Wang, Jiming Chen:
iGnnVD: A novel software vulnerability detection model based on integrated graph neural networks. Sci. Comput. Program. 238: 103156 (2024) - [j57]Jinfu Chen, Yuechao Gu, Saihua Cai, Haibo Chen, Jingyi Chen:
A novel test case prioritization approach for black-box testing based on K-medoids clustering. J. Softw. Evol. Process. 36(4) (2024) - [j56]Chi Zhang, Xiaoli Wang, Jinfu Chen, Saihua Cai, Rexford Nii Ayitey Sosu:
A novel defect prediction method based on semantic feature enhancement. J. Softw. Evol. Process. 36(9) (2024) - [j55]Shengran Wang, Jinfu Chen, Jianming Zhang, Saihua Cai, Wen Zhang, Jian Sun:
A novel memory usage guided fuzzing based on particle swarm optimization. Swarm Evol. Comput. 91: 101747 (2024) - [j54]Mukhtar Ahmed, Jinfu Chen, Ernest Akpaku, Rexford Nii Ayitey Sosu, Ajmal Latif:
DELM: Deep Ensemble Learning Model for Anomaly Detection in Malicious Network Traffic-based Adaptive Feature Aggregation and Network Optimization. ACM Trans. Priv. Secur. 27(4): 32:1-32:36 (2024) - [j53]Jinfu Chen, Jiaping Xu, Saihua Cai, Xiaoli Wang, Haibo Chen, Zhehao Li:
Software Defect Prediction Approach Based on a Diversity Ensemble Combined With Neural Network. IEEE Trans. Reliab. 73(3): 1487-1501 (2024) - [c62]Jinfu Chen, Fei Yan, Saihua Cai, Shengran Wang, Jingyi Chen:
FMUZZ: A Novel Greybox Fuzzing Approach based on Mutation Strategy Optimization with Byte Scheduling. QRS 2024: 550-561 - [c61]Dongjie Wang, Jinfu Chen, Saihua Cai, Qiaowei Feng, Yuhao Chen, Xinyi Hu:
SCVD-SA: A Smart Contract Vulnerability Detection Method Based on Hybrid Deep Learning Model and Self-attention Mechanism. SANER (Companion) 2024: 207-214 - 2023
- [j52]Saihua Cai, Jinfu Chen, Haibo Chen, Chi Zhang, Qian Li, Dengzhou Shi, Wei Lin:
Minimal Rare Pattern-Based Outlier Detection Approach For Uncertain Data Streams Under Monotonic Constraints. Comput. J. 66(1): 16-34 (2023) - [j51]Jinfu Chen, Yuhao Chen, Saihua Cai, Shang Yin, Lingling Zhao, Zikang Zhang:
An optimized feature extraction algorithm for abnormal network traffic detection. Future Gener. Comput. Syst. 149: 330-342 (2023) - [j50]Jinfu Chen, Tianxiang Lv, Saihua Cai, Luo Song, Shang Yin:
A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network. Inf. Softw. Technol. 157: 107166 (2023) - [j49]Jinfu Chen, Chi Zhang, Saihua Cai, Lin Zhang, Liang Ma:
A memory-related vulnerability detection approach based on vulnerability model with Petri Net. J. Log. Algebraic Methods Program. 132: 100859 (2023) - [j48]Jinfu Chen, Wei Lin, Saihua Cai, Yemin Yin, Haibo Chen, Dave Towey:
BiTCN_DRSN: An effective software vulnerability detection model based on an improved temporal convolutional network. J. Syst. Softw. 204: 111772 (2023) - [j47]Jinfu Chen, Jingyi Chen, Saihua Cai, Haibo Chen, Chi Zhang:
A novel combinatorial testing approach with fuzzing strategy. J. Softw. Evol. Process. 35(12) (2023) - [j46]Richard Amankwah, Jinfu Chen, Heping Song, Patrick Kwaku Kudjo:
Bug detection in Java code: An extensive evaluation of static analysis tools using Juliet Test Suites. Softw. Pract. Exp. 53(5): 1125-1143 (2023) - [j45]Jinfu Chen, Luo Song, Saihua Cai, Haodi Xie, Shang Yin, Bilal Ahmad:
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism. ACM Trans. Priv. Secur. 26(4): 44:1-44:21 (2023) - [c60]Saihua Cai, Wenjun Zhao, Han Tang, Jinfu Chen, Wuhao Guo:
CGSA-RNN: Abnormal Network Traffic Detection Model Based on CycleGAN and Self-Attention Mechanism. QRS 2023: 541-549 - [c59]Xiangchen Shen, Haibo Chen, Jinfu Chen, Jiawei Zhang, Shuhui Wang:
EcoDialTest: Adaptive Mutation Schedule for Automated Dialogue Systems Testing. SANER 2023: 933-939 - 2022
- [j44]Jinfu Chen, Chi Zhang, Saihua Cai, Zufa Zhang, Lu Liu, Longxia Huang:
Malware recognition approach based on self-similarity and an improved clustering algorithm. IET Softw. 16(5): 527-541 (2022) - [j43]Saihua Cai, Li Li, Jinfu Chen, Kaiyi Zhao, Gang Yuan, Ruizhi Sun, Rexford Nii Ayitey Sosu, Longxia Huang:
MWFP-outlier: Maximal weighted frequent-pattern-based approach for detecting outliers from uncertain weighted data streams. Inf. Sci. 591: 195-225 (2022) - [j42]Wendong Chen, Haiqin Wu, Xiao Chen, Jinfu Chen:
A Review of Research on Privacy Protection of Internet of Vehicles Based on Blockchain. J. Sens. Actuator Networks 11(4): 86 (2022) - [j41]Jinfu Chen, Xiaoli Wang, Saihua Cai, Jiaping Xu, Jingyi Chen, Haibo Chen:
A software defect prediction method with metric compensation based on feature selection and transfer learning. Frontiers Inf. Technol. Electron. Eng. 23(5): 715-731 (2022) - [j40]Jinfu Chen, Haibo Chen, Yuchi Guo, Minmin Zhou, Rubing Huang, Chengying Mao:
A Novel Test Case Generation Approach for Adaptive Random Testing of Object-Oriented Software Using K-Means Clustering Technique. IEEE Trans. Emerg. Top. Comput. Intell. 6(4): 969-981 (2022) - [c58]Jinfu Chen, Haibo Chen, Yiming Wu, Chengying Mao, Saihua Cai:
Adaptive Random Testing based on the Modified Metric-memory Tree and Information Entropy. DSA 2022: 615-623 - [c57]Hao Lei, Longxia Huang, Liangmin Wang, Jinfu Chen:
MPC: Multi-node Payment Channel for Off-chain Transactions. ICC 2022: 4733-4738 - [c56]Jinfu Chen, Zian Zhao, Xiao Chen, Saihua Cai, Shang Yin, Luo Song:
A novel classification approach for Android malware based on feature fusion and natural language processing. Internetware 2022: 28-36 - [c55]Bo Liu, Jinfu Chen, Weijia Wang, Saihua Cai, Jingyi Chen, Qiaowei Feng:
An adaptive search optimization algorithm for improving the detection capability of software vulnerability. Internetware 2022: 212-220 - [c54]Haibo Chen, Jinfu Chen:
Coverage-based Greybox Fuzzing with Pointer Monitoring for C Programs. ASE 2022: 121:1-121:4 - [c53]Jinfu Chen, Shengran Wang, Saihua Cai, Chi Zhang, Haibo Chen, Jingyi Chen, Jianming Zhang:
A Novel Coverage-guided Greybox Fuzzing based on Power Schedule Optimization with Time Complexity. ASE 2022: 172:1-172:5 - [c52]Jinfu Chen, Yemin Yin, Saihua Cai, Ye Geng, Longxia Huang:
An Improved Test Case Generation Method based on Test Requirements for Testing Software Component. QRS Companion 2022: 209-218 - [c51]Shengran Wang, Jinfu Chen, Saihua Cai, Chi Zhang, Haibo Chen:
A Novel Coverage-Guided Greybox Fuzzing Method based on Grammar-Aware with Particle Swarm Optimization. QRS Companion 2022: 780-781 - [c50]Jinfu Chen, Haodi Xie, Saihua Cai, Ye Geng, Yemin Yin, Zikang Zhang:
A formalization-based vulnerability detection method for cross-subject network components. TrustCom 2022: 1054-1059 - 2021
- [j39]Rubing Huang, Haibo Chen, Yunan Zhou, Tsong Yueh Chen, Dave Towey, Man Fai Lau, Sebastian Ng, Robert G. Merkel, Jinfu Chen:
Covering Array Constructors: An Experimental Analysis of Their Interaction Coverage and Fault Detection. Comput. J. 64(5): 762-788 (2021) - [j38]Chi Zhang, Jinfu Chen, Lei Zhang, Shujie Chen, Zufa Zhang:
A new semantic annotation approach for software vulnerability source code. Int. J. Simul. Process. Model. 16(1): 1-13 (2021) - [j37]Saihua Cai, Rubing Huang, Jinfu Chen, Chi Zhang, Bo Liu, Shang Yin, Ye Geng:
An efficient outlier detection method for data streams based on closed frequent patterns by considering anti-monotonic constraints. Inf. Sci. 555: 125-146 (2021) - [j36]Saihua Cai, Jinfu Chen, Haibo Chen, Chi Zhang, Qian Li, Rexford Nii Ayitey Sosu, Shang Yin:
An efficient anomaly detection method for uncertain data based on minimal rare patterns with the consideration of anti-monotonic constraints. Inf. Sci. 580: 620-642 (2021) - [j35]Bo Liu, Jinfu Chen, Songling Qin, Zufa Zhang, Yisong Liu, Lingling Zhao, Jingyi Chen:
An Approach Based on the Improved SVM Algorithm for Identifying Malware in Network Traffic. Secur. Commun. Networks 2021: 5518909:1-5518909:14 (2021) - [j34]Jinchang Hu, Jinfu Chen, Sher Ali, Bo Liu, Jingyi Chen, Chi Zhang, Jian Yang:
A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter. Secur. Commun. Networks 2021: 5581274:1-5581274:14 (2021) - [j33]Rubing Huang, Weifeng Sun, Tsong Yueh Chen, Sebastian Ng, Jin-Fu Chen:
Identification of Failure Regions for Programs With Numeric Inputs. IEEE Trans. Emerg. Top. Comput. Intell. 5(4): 651-667 (2021) - [c49]Jinfu Chen, Jingyi Chen, Saihua Cai, Haibo Chen, Chi Zhang, Chuangfei Huang:
A Test Case Generation Method of Combinatorial Testing based on τ-way Testing with Adaptive Random Testing. ISSRE Workshops 2021: 83-90 - [c48]Jinfu Chen, Jiaping Xu, Saihua Cai, Xiaoli Wang, Yuechao Gu, Shuhui Wang:
An efficient dual ensemble software defect prediction method with neural network. ISSRE Workshops 2021: 91-98 - [c47]Jinfu Chen, Yuechao Gu, Saihua Cai, Haibo Chen, Jingyi Chen:
KS-TCP: An Efficient Test Case Prioritization Approach based on K-medoids and Similarity. ISSRE Workshops 2021: 105-110 - [c46]Chi Zhang, Jinfu Chen:
Fuzzing Methods Recommendation Based on Feature Vectors. ASE 2021: 1079-1081 - [c45]Jinfu Chen, Shang Yin, Saihua Cai, Lingling Zhao, Shengran Wang:
L-KPCA: an efficient feature extraction method for network intrusion detection. MSN 2021: 683-684 - [c44]Chi Zhang, Xinxue Lin, Jinfu Chen, Ye Geng:
Dirmap: Web Application Vulnerability Detection Platform Based on Script Code. QRS Companion 2021: 148-151 - [c43]Jinfu Chen, Yiming Wu, Chengying Mao, Tsong Yueh Chen, Haibo Chen:
MMFC-ART: a Fixed-size-Candidate-set Adaptive Random Testing approach based on the modified Metric-Memory tree. QRS 2021: 248-259 - [c42]Jinfu Chen, Shang Yin, Saihua Cai, Chi Zhang, Yemin Yin, Ling Zhou:
An Efficient Network Intrusion Detection Model Based on Temporal Convolutional Networks. QRS 2021: 768-775 - [c41]Shengran Wang, Jinfu Chen, Jiaxiang Xi, Haibo Chen, Jingyi Chen:
An Adaptive Random Test Method based on Variable Probability Density Function with Particle Swarm Optimization. QRS Companion 2021: 1157-1158 - [c40]Jin-Fu Chen, Bo Liu, Saihua Cai, Weijia Wang, Shengran Wang:
AIdetectorX: A Vulnerability Detector Based on TCN and Self-attention Mechanism. SETTA 2021: 161-177 - 2020
- [j32]Jinfu Chen, Qihao Bao, T. H. Tse, Tsong Yueh Chen, Jiaxiang Xi, Chengying Mao, Minjie Yu, Rubing Huang:
Exploiting the Largest Available Zone: A Proactive Approach to Adaptive Random Testing by Exclusion. IEEE Access 8: 52475-52488 (2020) - [j31]Chengying Mao, Xuzheng Zhan, Jinfu Chen, Jifu Chen, Rubing Huang:
Adaptive random testing based on flexible partitioning. IET Softw. 14(5): 493-505 (2020) - [j30]Michael Omari, Jinfu Chen, Robert French-Baidoo, Yunting Sun:
A Proactive Approach to Test Case Selection - An Efficient Implementation of Adaptive Random Testing. Int. J. Softw. Eng. Knowl. Eng. 30(8): 1169-1198 (2020) - [j29]Jinfu Chen, Patrick Kwaku Kudjo, Solomon Mensah, Selasie Brown Aformaley, George Akorfu:
An automatic software vulnerability classification framework using term frequency-inverse gravity moment and feature selection. J. Syst. Softw. 167: 110616 (2020) - [j28]Rubing Huang, Quanjun Zhang, Dave Towey, Weifeng Sun, Jinfu Chen:
Regression test case prioritization by code combinations coverage. J. Syst. Softw. 169: 110712 (2020) - [j27]Lin Lin, You Shi, Jinfu Chen, Sher Ali:
A Novel Fuzzy PID Congestion Control Model Based on Cuckoo Search in WSNs. Sensors 20(7): 1862 (2020) - [j26]Richard Amankwah, Jinfu Chen, Patrick Kwaku Kudjo, Beatrice Korkor Agyemang, Alfred Adutwum Amponsah:
An automated framework for evaluating open-source web scanner vulnerability severity. Serv. Oriented Comput. Appl. 14(4): 297-307 (2020) - [j25]Richard Amankwah, Jinfu Chen, Patrick Kwaku Kudjo, Dave Towey:
An empirical comparison of commercial and open-source web vulnerability scanners. Softw. Pract. Exp. 50(9): 1842-1857 (2020) - [j24]Patrick Kwaku Kudjo, Jinfu Chen, Solomon Mensah, Richard Amankwah, Christopher Kudjo:
The effect of Bellwether analysis on software vulnerability severity prediction models. Softw. Qual. J. 28(4): 1413-1446 (2020) - [j23]Rubing Huang, Weifeng Sun, Tsong Yueh Chen, Dave Towey, Jinfu Chen, Weiwen Zong, Yunan Zhou:
Abstract Test Case Prioritization Using Repeated Small-Strength Level-Combination Coverage. IEEE Trans. Reliab. 69(1): 349-372 (2020) - [c39]Songling Qin, Jinfu Chen, Zufa Zhang, Yisong Liu, Lingling Zhao, Bo Liu, Jingyi Chen:
A Malware Identification Approach Based on Improved SVM in Network Traffic. DSA 2020: 37-40 - [c38]James Msughter Adeke, Jinfu Chen, Lei Zhang, Richard N. K. Mensah, Kun Tong:
An Efficient Approach Based on Parameter Optimization for Network Traffic Classification Using Machine Learning. DSA 2020: 99-107 - [c37]Richard Amankwah, Jinfu Chen, Alfred Adutwum Amponsah, Patrick Kwaku Kudjo, Vivienne Ocran, Comfort Ofoley Anang:
Fast Bug Detection Algorithm for Identifying Potential Vulnerabilities in Juliet Test Cases. iSCI 2020: 89-94 - [c36]Jinfu Chen, Jingyi Chen, Dong Guo, Dave Towey:
An improved fuzzing approach based on adaptive random testing. ISSRE Workshops 2020: 103-108 - [c35]Saihua Cai, Jinfu Chen, Xinru Li, Bo Liu:
Minimal Rare-Pattern-Based Outlier Detection Method for Data Streams by Considering Anti-monotonic Constraints. ISC 2020: 274-289 - [c34]Jinfu Chen, Lingling Zhao, Minmin Zhou, Yisong Liu, Songling Qin:
An Approach to Determine the Optimal k-Value of K-means Clustering in Adaptive Random Testing. QRS 2020: 160-167 - [c33]Chi Zhang, Jinfu Chen, Saihua Cai, Bo Liu, Yiming Wu, Ye Geng:
iTES: Integrated Testing and Evaluation System for Software Vulnerability Detection Methods. TrustCom 2020: 1455-1460 - [c32]Haibo Chen, Junzuo Chen, Jinfu Chen, Shang Yin, Yiming Wu, Jiaping Xu:
An Automatic Vulnerability Scanner for Web Applications. TrustCom 2020: 1519-1524 - [c31]Haibo Chen, Dalin Zhang, Jinfu Chen, Wei Lin, Dengzhou Shi, Zian Zhao:
An Automatic Vulnerability Classification System for IoT Softwares. TrustCom 2020: 1525-1529 - [i3]Rubing Huang, Quanjun Zhang, Dave Towey, Weifeng Sun, Jinfu Chen:
Regression Test Case Prioritization by Code Combinations Coverage. CoRR abs/2007.00370 (2020) - [i2]Rubing Huang, Weifeng Sun, Tsong Yueh Chen, Sebastian Ng, Jinfu Chen:
Identification of Failure Regions for Programs with Numeric Inputs. CoRR abs/2007.15231 (2020)
2010 – 2019
- 2019
- [j22]Michael Omari, Jinfu Chen, Hilary Ackah-Arthur, Patrick Kwaku Kudjo:
Elimination by Linear Association: An Effective and Efficient Static Mirror Adaptive Random Testing. IEEE Access 7: 71038-71060 (2019) - [j21]Jinfu Chen, Minmin Zhou, T. H. Tse, Tsong Yueh Chen, Yuchi Guo, Rubing Huang, Chengying Mao:
Toward a K-means clustering approach to adaptive random testing for object-oriented software. Sci. China Inf. Sci. 62(11): 219105:1-219105:2 (2019) - [j20]Rubing Huang, Weiwen Zong, Tsong Yueh Chen, Dave Towey, Yunan Zhou, Jinfu Chen:
Prioritising abstract test cases: an empirical study. IET Softw. 13(4): 313-326 (2019) - [j19]Lin Lin, Jinfu Chen, Patrick Kwaku Kudjo, Michael Omari:
A novel routing protocol for content-based publish/subscribe model in mobile sensor networks. Int. J. Distributed Sens. Networks 15(9) (2019) - [j18]Jinfu Chen, Patrick Kwaku Kudjo, Zufa Zhang, Chenfei Su, Yuchi Guo, Rubing Huang, Heping Song:
A Modified Similarity Metric for Unit Testing of Object-Oriented Software Based on Adaptive Random Testing. Int. J. Softw. Eng. Knowl. Eng. 29(4): 577-606 (2019) - [j17]Hilary Ackah-Arthur, Jinfu Chen, Dave Towey, Michael Omari, Jiaxiang Xi, Rubing Huang:
One-Domain-One-Input: Adaptive Random Testing by Orthogonal Recursive Bisection With Restriction. IEEE Trans. Reliab. 68(4): 1404-1428 (2019) - [c30]John Mark Andah, Jinfu Chen:
Malicious Intentions: Android Internet Permission Security Risks. CSS (2) 2019: 111-120 - [c29]Jin Li, Minhuan Huang, Shuaibing Lu, Hu Li, Jin-Fu Chen:
Research on Evaluation Index System for Software Vulnerability Analysis Methods. DSC 2019: 522-527 - [c28]Bo Liu, Honghe Ge, Jinfu Chen, Qihao Bao:
An Automatic Testing Platform for Object-oriented Software based on Code Coverage. ICCNS 2019: 20-24 - [c27]Patrick Kwaku Kudjo, Jinfu Chen:
A cost-effective strategy for software vulnerability prediction based on bellwether analysis. ISSTA 2019: 424-427 - [c26]Patrick Kwaku Kudjo, Jinfu Chen, Selasie Brown Aformaley, Solomon Mensah:
The Effect of Weighted Moving Windows on Security Vulnerability Prediction. ASE Workshops 2019: 65-68 - [c25]Michael Omari, Jinfu Chen, Patrick Kwaku Kudjo, Hilary Ackah-Arthur, Rubing Huang:
Random Border Mirror Transform: A Diversity Based Approach to an Effective and Efficient Mirror Adaptive Random Testing. QRS 2019: 54-61 - [c24]Patrick Kwaku Kudjo, Jinfu Chen, Minmin Zhou, Solomon Mensah, Rubing Huang:
Improving the Accuracy of Vulnerability Report Classification Using Term Frequency-Inverse Gravity Moment. QRS 2019: 248-259 - [c23]Patrick Kwaku Kudjo, Selasie Brown Aformaley, Solomon Mensah, Jinfu Chen:
The Significant Effect of Parameter Tuning on Software Vulnerability Prediction Models. QRS Companion 2019: 526-527 - [i1]Jinfu Chen, Hilary Ackah-Arthur, Chengying Mao, Patrick Kwaku Kudjo:
A Taxonomic Review of Adaptive Random Testing: Current Status, Classifications, and Issues. CoRR abs/1909.10879 (2019) - 2018
- [j16]Rubing Huang, Quanjun Zhang, Tsong Yueh Chen, James Hamlyn-Harris, Dave Towey, Jinfu Chen:
An Empirical Comparison of Fixed-Strength and Mixed-Strength for Interaction Coverage Based Prioritization. IEEE Access 6: 68350-68372 (2018) - [j15]Hilary Ackah-Arthur, Jinfu Chen, Jiaxiang Xi, Michael Omari, Heping Song, Rubing Huang:
A cost-effective adaptive random testing approach by dynamic restriction. IET Softw. 12(6): 489-497 (2018) - [j14]Jinfu Chen, Lili Zhu, Tsong Yueh Chen, Dave Towey, Fei-Ching Kuo, Rubing Huang, Yuchi Guo:
Test case prioritization for object-oriented software: An adaptive random sequence approach based on clustering. J. Syst. Softw. 135: 107-125 (2018) - [c22]Rubing Huang, Weiwen Zong, Tsong Yueh Chen, Dave Towey, Jinfu Chen, Yunan Zhou, Weifeng Sun:
On the Selection of Strength for Fixed-Strength Interaction Coverage Based Prioritization. COMPSAC (1) 2018: 310-315 - [c21]Rubing Huang, Yunan Zhou, Dave Towey, Tsong Yueh Chen, Jinfu Chen:
An experimental analysis of fault detection capabilities of covering array constructors. ICSE (Companion Volume) 2018: 246-247 - 2017
- [j13]Jinfu Chen, Saihua Cai, Dave Towey, Lili Zhu, Rubing Huang, Hilary Ackah-Arthur, Michael Omari:
Detecting Implicit Security Exceptions Using an Improved Variable-Length Sequential Pattern Mining Method. Int. J. Softw. Eng. Knowl. Eng. 27(8): 1235-1268 (2017) - [j12]Jinfu Chen, Fei-Ching Kuo, Tsong Yueh Chen, Dave Towey, Chenfei Su, Rubing Huang:
A Similarity Metric for the Inputs of OO Programs and Its Application in Adaptive Random Testing. IEEE Trans. Reliab. 66(2): 373-402 (2017) - [c20]Xiang Li, Jinfu Chen, Zhechao Lin, Lin Zhang, Zibin Wang, Minmin Zhou, Wanggen Xie:
A Mining Approach to Obtain the Software Vulnerability Characteristics. CBD 2017: 296-301 - [c19]Rubing Huang, Yunan Zhou, Weiwen Zong, Dave Towey, Jinfu Chen:
An Empirical Comparison of Similarity Measures for Abstract Test Case Prioritization. COMPSAC (1) 2017: 3-12 - [c18]Rubing Huang, Weiwen Zong, Dave Towey, Yunan Zhou, Jinfu Chen:
An empirical examination of abstract test case prioritization techniques. ICSE (Companion Volume) 2017: 141-143 - [c17]Rubing Huang, Yunan Zhou, Tsong Yueh Chen, Dave Towey, Jinfu Chen, Weiwen Zong:
Prioritizing random combinatorial test suites. SAC 2017: 1183-1189 - [c16]Jinfu Chen, Lin Zhang, Hilary Ackah-Arthur, Michael Omari, Jiaxiang Xi:
An Architecture of Urban Regional Health Information System and Its Data Conversion Algorithm. SpaCCS Workshops 2017: 339-349 - [c15]Jin Li, Jinfu Chen, Minhuan Huang, Minmin Zhou, Lin Zhang, Wanggen Xie:
An Integration Testing Platform for Software Vulnerability Detection Method. TrustCom/BigDataSE/ICESS 2017: 984-989 - 2016
- [j11]Jinfu Chen, Lili Zhu, Yuchi Guo, Saihua Cai, Xiaolei Zhao:
A mining approach for component abnormal information based on monitor log. Int. J. Simul. Process. Model. 11(5): 353-362 (2016) - [j10]Jinfu Chen, Jiamei Chen, Rubing Huang, Yuchi Guo, Yongzhao Zhan:
An approach of security testing for third-party component based on state mutation. Secur. Commun. Networks 9(15): 2827-2842 (2016) - [c14]Rubing Huang, Weiwen Zong, Jinfu Chen, Dave Towey, Yunan Zhou, Deng Chen:
Prioritizing Interaction Test Suites Using Repeated Base Choice Coverage. COMPSAC 2016: 174-184 - [c13]Jinfu Chen, Lili Zhu, Tsong Yueh Chen, Rubing Huang, Dave Towey, Fei-Ching Kuo, Yuchi Guo:
An Adaptive Sequence Approach for OOS Test Case Prioritization. ISSRE Workshops 2016: 205-212 - 2015
- [j9]Chengying Mao, Jifu Chen, Dave Towey, Jinfu Chen, Xiaoyuan Xie:
Search-based QoS ranking prediction for web services in cloud environments. Future Gener. Comput. Syst. 50: 111-126 (2015) - [j8]Rubing Huang, Huai Liu, Xiaodong Xie, Jinfu Chen:
Enhancing mirror adaptive random testing through dynamic partitioning. Inf. Softw. Technol. 67: 13-29 (2015) - [j7]Jinfu Chen, Yuchi Guo, Chenfei Su, Jiamei Chen, Shen Chang:
A Smart City System Architecture based on City-level Data Exchange Platform. J. Inf. Technol. Res. 8(4): 1-25 (2015) - [j6]Rubing Huang, Jinfu Chen, Dave Towey, Alvin T. S. Chan, Yansheng Lu:
Aggregate-strength interaction test suite prioritization. J. Syst. Softw. 99: 36-51 (2015) - [j5]Chengying Mao, Lichuan Xiao, Xinxin Yu, Jinfu Chen:
Adapting ant colony optimization to generate test data for software structural testing. Swarm Evol. Comput. 20: 23-36 (2015) - 2014
- [j4]Rubing Huang, Dave Towey, Jinfu Chen, Yansheng Lu:
New Metrics for Prioritized Interaction Test Suites. IEICE Trans. Inf. Syst. 97-D(4): 830-841 (2014) - [j3]Jinfu Chen, Qing Li, Chengying Mao, Dave Towey, Yongzhao Zhan, Huanhuan Wang:
A Web services vulnerability testing approach based on combinatorial mutation and SOAP message mutation. Serv. Oriented Comput. Appl. 8(1): 1-13 (2014) - [c12]Rubing Huang, Jinfu Chen, Zhicheng Li, Rongcun Wang, Yansheng Lu:
Adaptive random prioritization for interaction test suites. SAC 2014: 1058-1063 - [c11]Rubing Huang, Jinfu Chen, Rongcun Wang, Deng Chen:
How to Do Tie-breaking in Prioritization of Interaction Test Suites?. SEKE 2014: 121-125 - 2013
- [j2]Rubing Huang, Xiaodong Xie, Dave Towey, Tsong Yueh Chen, Yansheng Lu, Jinfu Chen:
Prioritization of Combinatorial Test Cases by Incremental Interaction Coverage. Int. J. Softw. Eng. Knowl. Eng. 23(10): 1427-1458 (2013) - [c10]Rubing Huang, Jinfu Chen, Tao Zhang, Rongcun Wang, Yansheng Lu:
Prioritizing Variable-Strength Covering Array. COMPSAC 2013: 502-511 - [c9]Jinfu Chen, Qing Li, Huanhuan Wang, Rubing Huang:
Describing Component Behavior Using Improved Chemical Abstract Machine. COMPSAC 2013: 605-606 - [c8]Rubing Huang, Xiaodong Xie, Jinfu Chen, Yansheng Lu:
Failure-detection capability analysis of implementing parallelism in adaptive random testing algorithms. SAC 2013: 1049-1054 - 2012
- [j1]Jinfu Chen, Yansheng Lu, Huanhuan Wang:
Component Security Testing Approach Based on Extended Chemical Abstract Machine. Int. J. Softw. Eng. Knowl. Eng. 22(1): 59-83 (2012) - [c7]Qing Li, Jinfu Chen, Yongzhao Zhan, Chengying Mao, Huanhuan Wang:
Combinatorial Mutation Approach to Web Service Vulnerability Testing Based on SOAP Message Mutations. ICEBE 2012: 156-162 - [c6]Chengying Mao, Xinxin Yu, Jifu Chen, Jinfu Chen:
Generating Test Data for Structural Testing Based on Ant Colony Optimization. QSIC 2012: 98-101 - 2011
- [c5]Chengying Mao, Ilkka Tervonen, Jinfu Chen:
Diagnosing Web Services System Based on Execution Traces Pattern Analysis. ICEBE 2011: 207-214
2000 – 2009
- 2009
- [c4]Jinfu Chen, Yansheng Lu, Xiaodong Xie:
CSTS: A Prototype Tool for Testing COM Component Security. HIS (3) 2009: 83-88 - 2007
- [c3]Jinfu Chen, Yansheng Lu, Xiaodong Xie:
Testing Approach of Component Security Based on Fault Injection. CIS 2007: 763-767 - [c2]Jinfu Chen, Yansheng Lu, Xiaodong Xie:
An Auto-Generating Approach of Transactions Profile Graph in Detection of Malicious Transactions. IIH-MSP 2007: 562-565 - [c1]Jinfu Chen, Yansheng Lu, Xiaodong Xie, Wei Zhang:
Testing Approach of Component Security Based on Dynamic Monitoring. IMSCCS 2007: 381-386
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint