Остановите войну!
for scientists:
default search action
Ji Wang 0001
Person information
- affiliation: National University of Defense Technology, School of Computer, Science and Technology on Parallel and Distributed Processing Laboratory, Changsha, China
- not to be confused with: Ji Wang 0002
Other persons with the same name
- Ji Wang — disambiguation page
- Ji Wang 0002 — National University of Defense Technology, College of Information Systems and Management, Changsha, China
- Ji Wang 0003 — Virginia Polytechnic Institute, Department of Computer Science, Blacksburg, VA, USA
- Ji Wang 0004 — Huazhong University of Science and Technology, School of Electronic Information and Communications, Wuhan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Bai Xue, Naijun Zhan, Martin Fränzle, Ji Wang, Wanwei Liu:
Reach-Avoid Verification Based on Convex Optimization. IEEE Trans. Autom. Control. 69(1): 598-605 (2024) - [j46]Yufeng Zhang, Jialu Pan, Wanwei Liu, Zhenbang Chen, Kenli Li, Ji Wang, Zhiming Liu, Hongmei Wei:
Kullback-Leibler Divergence-Based Out-of-Distribution Detection With Flow-Based Generative Models. IEEE Trans. Knowl. Data Eng. 36(4): 1683-1697 (2024) - [c121]Guofeng Zhang, Ziqi Shuai, Kelin Ma, Kunlin Liu, Zhenbang Chen, Ji Wang:
FDSE: Enhance Symbolic Execution by Fuzzing-based Pre-Analysis (Competition Contribution). FASE 2024: 304-308 - 2023
- [j45]Shaowei Cai, Zhenbang Chen, Ji Wang, Bohua Zhan, Yongwang Zhao:
Preface to the Special Issue on Constraint Solving and Theorem Proving. Int. J. Softw. Informatics 13(3): 243-245 (2023) - [j44]Zhen Liang, Taoran Wu, Wanwei Liu, Bai Xue, Wenjing Yang, Ji Wang, Zhengbin Pang:
Towards robust neural networks via a global and monotonically decreasing robustness training strategy. Frontiers Inf. Technol. Electron. Eng. 24(10): 1375-1389 (2023) - [j43]Liqian Chen, Dengping Wei, Banghu Yin, Ji Wang:
Static analysis of linear absolute value equalities among variables of a program. Sci. Comput. Program. 225: 102906 (2023) - [c120]Ziqi Shuai, Zhenbang Chen, Yufeng Zhang, Hengbiao Yu, Ji Wang:
Unsatisfiable Core Based Constraint Solving Cache in Symbolic Execution. APSEC 2023: 661-662 - [c119]Ye Tao, Wanwei Liu, Fu Song, Zhen Liang, Ji Wang, Hongxu Zhu:
An Automata-Theoretic Approach to Synthesizing Binarized Neural Networks. ATVA (1) 2023: 380-400 - [c118]Yiqing Yu, Taoran Wu, Bican Xia, Ji Wang, Bai Xue:
Safe Probabilistic Invariance Verification for Stochastic Discrete-Time Dynamical Systems. CDC 2023: 5804-5811 - [c117]Shiwen Yu, Ting Wang, Ji Wang:
Loop Invariant Inference through SMT Solving Enhanced Reinforcement Learning. ISSTA 2023: 175-187 - [c116]Siang Zhao, Zhongyang Li, Zhenbang Chen, Ji Wang:
Symbolic Verification of Fuzzy Logic Models. ASE 2023: 1787-1789 - [c115]Yufeng Zhang, Jialu Pan, Li Ken Li, Wanwei Liu, Zhenbang Chen, Xinwang Liu, Ji Wang:
On the Properties of Kullback-Leibler Divergence Between Multivariate Gaussian Distributions. NeurIPS 2023 - [c114]Peishan Huang, Weijiang Hong, Zhenbang Chen, Ji Wang:
CSP based Formal Modeling and Verification of Behavior Trees. QRS Companion 2023: 1-2 - [c113]Weijiang Hong, Zhenbang Chen, Minglong Li, Yuhan Li, Peishan Huang, Ji Wang:
Formal Verification Based Synthesis for Behavior Trees. SETTA 2023: 72-91 - [c112]Han Xu, Liqian Chen, Guangsheng Fan, Banghu Yin, Ji Wang:
An Abstract Domain of Linear Templates with Disjunctive Right-Hand-Side Intervals. SETTA 2023: 314-330 - [c111]Zhen Liang, Dejin Ren, Wanwei Liu, Ji Wang, Wenjing Yang, Bai Xue:
Safety Verification for Neural Networks Based on Set-Boundary Analysis. TASE 2023: 248-267 - [i16]Zhen Liang, Taoran Wu, Changyuan Zhao, Wanwei Liu, Bai Xue, Wenjing Yang, Ji Wang:
Repairing Deep Neural Networks Based on Behavior Imitation. CoRR abs/2305.03365 (2023) - [i15]Zhen Liang, Dejin Ren, Bai Xue, Ji Wang, Wenjing Yang, Wanwei Liu:
Verifying Safety of Neural Networks from Topological Perspectives. CoRR abs/2306.15403 (2023) - [i14]Ye Tao, Wanwei Liu, Fu Song, Zhen Liang, Ji Wang, Hongxu Zhu:
An Automata-Theoretic Approach to Synthesizing Binarized Neural Networks. CoRR abs/2307.15907 (2023) - 2022
- [j42]Shiwen Yu, Ting Wang, Ji Wang:
Data Augmentation by Program Transformation. J. Syst. Softw. 190: 111304 (2022) - [j41]Banghu Yin, Liqian Chen, Jiangchao Liu, Ji Wang:
Efficient Complete Verification of Neural Networks via Layerwised Splitting and Refinement. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 3898-3909 (2022) - [c110]Guofeng Zhang, Zhenbang Chen, Ziqi Shuai, Yufeng Zhang, Ji Wang:
Synergizing Symbolic Execution and Fuzzing By Function-level Selective Symbolization. APSEC 2022: 328-337 - [c109]Chenghu Ma, Liqian Chen, Xin Yi, Guangsheng Fan, Ji Wang:
NuMFUZZ: A Floating-Point Format Aware Fuzzer for Numerical Programs. APSEC 2022: 338-347 - [c108]Liqian Chen, Renjie Huang, Dan Luo, Chenghu Ma, Dengping Wei, Ji Wang:
Estimating Worst-case Resource Usage by Resource-usage-aware Fuzzing. FASE 2022: 92-101 - [c107]Haochen He, Zhouyang Jia, Shanshan Li, Yue Yu, Chenglong Zhou, Qing Liao, Ji Wang, Xiangke Liao:
Multi-Intention-Aware Configuration Selection for Performance Tuning. ICSE 2022: 1431-1442 - [c106]Yide Du, Weijiang Hong, Zhenbang Chen, Ji Wang:
Collaborative Verification of Uninterpreted Programs. TASE 2022: 148-154 - [i13]Bai Xue, Naijun Zhan, Martin Fränzle, Ji Wang, Wanwei Liu:
Reach-avoid Verification Based on Convex Optimization. CoRR abs/2208.08105 (2022) - [i12]Zhen Liang, Dejin Ren, Wanwei Liu, Ji Wang, Wenjing Yang, Bai Xue:
Safety Verification for Neural Networks Based on Set-boundary Analysis. CoRR abs/2210.04175 (2022) - 2021
- [j40]Chenglong Zhou, Haoran Liu, Yuanliang Zhang, Zhipeng Xue, Qing Liao, JinJing Zhao, Ji Wang:
Deep Understanding of Runtime Configuration Intention. Int. J. Softw. Eng. Knowl. Eng. 31(6): 775-802 (2021) - [j39]Kim G. Larsen, Oleg Sokolsky, Ji Wang:
Preface to the Special Issue on Dependable Software Engineering: Theories, Tools and Applications (SETTA 2017). Sci. Comput. Program. 206: 102622 (2021) - [c105]Tengbin Wang, Liqian Chen, Taoqing Chen, Guangsheng Fan, Ji Wang:
Making Rigorous Linear Programming Practical for Program Analysis. CP 2021: 57:1-57:17 - [c104]Weijiang Hong, Zhenbang Chen, Yide Du, Ji Wang:
Trace Abstraction-Based Verification for Uninterpreted Programs. FM 2021: 545-562 - [c103]Zhouyang Jia, Shanshan Li, Tingting Yu, Chen Zeng, Erci Xu, Xiaodong Liu, Ji Wang, Xiangke Liao:
DepOwl: Detecting Dependency Bugs to Prevent Compatibility Failures. ICSE 2021: 86-98 - [c102]Qianyi Zhang, Zhixin Zeng, Yiming Liu, Kang Tang, Ji Wang:
Dynamic Scene Deblurring Using Enhanced Feature Fusion and Multi - Distillation Mechanism. IJCNN 2021: 1-8 - [c101]Guangsheng Fan, Taoqing Chen, Banghu Yin, Liqian Chen, Tengbin Wang, Ji Wang:
Static Bound Analysis of Dynamically Allocated Resources for C Programs. ISSRE 2021: 390-400 - [c100]Zhenbang Chen, Zehua Chen, Ziqi Shuai, Guofeng Zhang, Weiyu Pan, Yufeng Zhang, Ji Wang:
Synthesize solving strategy for symbolic execution. ISSTA 2021: 348-360 - [c99]Ziqi Shuai, Zhenbang Chen, Yufeng Zhang, Jun Sun, Ji Wang:
Type and interval aware array constraint solving for symbolic execution. ISSTA 2021: 361-373 - [c98]Weiyu Pan, Zhenbang Chen, Guofeng Zhang, Yunlai Luo, Yufeng Zhang, Ji Wang:
Grammar-agnostic symbolic execution by token symbolization. ISSTA 2021: 374-387 - [c97]Wang Li, Zhouyang Jia, Shanshan Li, Yuanliang Zhang, Teng Wang, Erci Xu, Ji Wang, Xiangke Liao:
Challenges and opportunities: an in-depth empirical study on configuration error injection testing. ISSTA 2021: 478-490 - [c96]Liqian Chen, Banghu Yin, Dengping Wei, Ji Wang:
An Abstract Domain to Infer Linear Absolute Value Equalities. TASE 2021: 47-54 - [c95]Deze Wang, Yue Yu, Shanshan Li, Wei Dong, Ji Wang, Qing Liao:
MulCode: A Multi-task Learning Approach for Source Code Understanding. SANER 2021: 48-59 - [i11]Yufeng Zhang, Wanwei Liu, Zhenbang Chen, Kenli Li, Ji Wang:
On the Properties of Kullback-Leibler Divergence Between Gaussians. CoRR abs/2102.05485 (2021) - [i10]Zhouyang Jia, Shanshan Li, Tingting Yu, Chen Zeng, Erci Xu, Xiaodong Liu, Ji Wang, Xiangke Liao:
DepOwl: Detecting Dependency Bugs to Prevent Compatibility Failures. CoRR abs/2102.08543 (2021) - 2020
- [j38]Shanshan Li, Xu Niu, Zhouyang Jia, Xiangke Liao, Ji Wang, Tao Li:
Guiding log revisions by learning from software evolution history. Empir. Softw. Eng. 25(3): 2302-2340 (2020) - [j37]Tun Li, Wanwei Liu, Xinrui Guo, Ji Wang:
Software testing without the oracle correctness assumption. Frontiers Comput. Sci. 14(3): 143203 (2020) - [j36]Weijiang Hong, Yijun Liu, Zhenbang Chen, Wei Dong, Ji Wang:
Modified condition/decision coverage (MC/DC) oriented compiler optimization for symbolic execution. Frontiers Inf. Technol. Electron. Eng. 21(9): 1267-1284 (2020) - [j35]Cyrille Artho, Quoc-Sang Phan, Peter Aldous, Alyas Almaawi, Lucas Bang, Lasse Berglund, Tevfik Bultan, Zhenbang Chen, Hayes Converse, Wei Dong, William Eiers, Milos Gligoric, Simon Goldsmith, Lars Grunske, Joshua Hooker, Ismet Burak Kadron, Timo Kehrer, Sarfraz Khurshid, Xuan-Bach Dinh Le, David Lo, Eric Mercer, Sasa Misailovic, Egor Namakonov, Hoang Lam Nguyen, Yannic Noller, Benjamin Ogles, Rohan Padhye, Pavel Parízek, Corina S. Pasareanu, Sheridan Jacob Powell, Seemanta Saha, Koushik Sen, Elena Sherman, Kyle Storey, Minxing Tang, Willem Visser, Ji Wang, Hengbiao Yu:
The Java Pathfinder Workshop 2019. ACM SIGSOFT Softw. Eng. Notes 45(2): 20-22 (2020) - [j34]Yunrui Guo, Zongxu Pan, Meiming Wang, Ji Wang, Wenjing Yang:
Learning Capsules for SAR Target Recognition. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 13: 4663-4673 (2020) - [j33]Banghu Yin, Liqian Chen, Jiangchao Liu, Ji Wang:
Hierarchical Analysis of Loops With Relaxed Abstract Transformers. IEEE Trans. Reliab. 69(1): 203-215 (2020) - [j32]Liangze Yin, Wei Dong, Wanwei Liu, Ji Wang:
On Scheduling Constraint Abstraction for Multi-Threaded Program Verification. IEEE Trans. Software Eng. 46(5): 549-565 (2020) - [c94]Mingliang Yang, Jing Zhao, Da Huang, Ji Wang:
Progressive Unsupervised Domain Adaptation for Image-based Person Re-Identification. ICPR 2020: 7730-7736 - [c93]Zhenbang Chen, Hengbiao Yu, Xianjin Fu, Ji Wang:
MPI-SV: a symbolic verifier for MPI programs. ICSE (Companion Volume) 2020: 93-96 - [c92]Hengbiao Yu, Zhenbang Chen, Xianjin Fu, Ji Wang, Zhendong Su, Jun Sun, Chun Huang, Wei Dong:
Symbolic verification of message passing interface programs. ICSE 2020: 1248-1260 - [c91]Haochen He, Zhouyang Jia, Shanshan Li, Erci Xu, Tingting Yu, Yue Yu, Ji Wang, Xiangke Liao:
CP-Detector: Using Configuration-related Performance Properties to Expose Performance Bugs. ASE 2020: 623-634 - [c90]Yufeng Zhang, Zhenbang Chen, Ziqi Shuai, Tianqi Zhang, Kenli Li, Ji Wang:
Multiplex Symbolic Execution: Exploring Multiple Paths by Solving Once. ASE 2020: 846-857 - [c89]Tianqi Zhang, Yufeng Zhang, Zhenbang Chen, Ziqi Shuai, Ji Wang:
Efficient Multiplex Symbolic Execution with Adaptive Search Strategy. ASE 2020: 1255-1256 - [c88]Meixi Liu, Weijiang Hong, Weiyu Pan, Chendong Feng, Zhenbang Chen, Ji Wang:
Styx: A Data-Oriented Mutation Framework to Improve the Robustness of DNN. ASE 2020: 1260-1261 - [c87]Haotian Wang, Wenjing Yang, Ji Wang, Ruxin Wang, Long Lan, Mingyang Geng:
Pairwise Similarity Regularization for Adversarial Domain Adaptation. ACM Multimedia 2020: 2409-2418 - [c86]Hengbiao Yu, Zhenbang Chen, Chun Huang, Ji Wang:
Symbolic Verification of MPI Programs with Non-deterministic Synchronizations. SETTA 2020: 160-176 - [i9]Yufeng Zhang, Wanwei Liu, Zhenbang Chen, Ji Wang, Zhiming Liu, Kenli Li, Hongmei Wei, Zuoning Chen:
Out-of-Distribution Detection with Distance Guarantee in Deep Generative Models. CoRR abs/2002.03328 (2020) - [i8]Jiangchao Liu, Liqian Chen, Antoine Miné, Ji Wang:
Input Validation for Neural Networks via Runtime Local Robustness Verification. CoRR abs/2002.03339 (2020)
2010 – 2019
- 2019
- [j31]Weijiang Hong, Zhenbang Chen, Hengbiao Yu, Ji Wang:
Evaluation of model checkers by verifying message passing programs. Sci. China Inf. Sci. 62(10): 200101:1-200101:24 (2019) - [j30]Haotian Wang, Wenjing Yang, Zhenyu Zhao, Tingjin Luo, Ji Wang, Yuhua Tang:
Rademacher dropout: An adaptive dropout for deep neural network via optimizing generalization gap. Neurocomputing 357: 177-187 (2019) - [j29]Zhenbang Chen, Hengbiao Yu, Ji Wang, Wei Dong:
Symbolic Verification of Regular Properties for Java Programs. ACM SIGSOFT Softw. Eng. Notes 44(4): 17 (2019) - [c85]Liangze Yin, Wei Dong, Wanwei Liu, Ji Wang:
Parallel refinement for multi-threaded program verification. ICSE 2019: 643-653 - [c84]Zhouyang Jia, Shanshan Li, Tingting Yu, Xiangke Liao, Ji Wang, Xiaodong Liu, Yunhuai Liu:
Detecting Error-Handling Bugs without Error Specification Input. ASE 2019: 213-225 - [c83]Banghu Yin, Liqian Chen, Jiangchao Liu, Ji Wang, Patrick Cousot:
Verifying Numerical Programs via Iterative Abstract Testing. SAS 2019: 247-267 - [c82]Zhouyang Jia, Shanshan Li, Tingting Yu, Xiangke Liao, Ji Wang:
Automatically detecting missing cleanup for ungraceful exits. ESEC/SIGSOFT FSE 2019: 751-762 - 2018
- [j28]Liangze Yin, Wei Dong, Fei He, Ji Wang:
A True-Concurrency Encoding for BMC of Compositional Systems. Comput. J. 61(5): 658-671 (2018) - [j27]Jingwen Zhou, Zhenbang Chen, Ji Wang, Zibin Zheng, Michael R. Lyu:
A Data Set for User Request Trace-Oriented Monitoring and its Applications. IEEE Trans. Serv. Comput. 11(4): 699-712 (2018) - [c81]Hengbiao Yu, Zhenbang Chen, Ji Wang, Zhendong Su, Wei Dong:
Symbolic verification of regular properties. ICSE 2018: 871-881 - [c80]Shanshan Li, Xu Niu, Zhouyang Jia, Ji Wang, Haochen He, Teng Wang:
Logtracker: learning log revision behaviors proactively from software evolution history. ICPC 2018: 178-188 - [c79]Liangze Yin, Wei Dong, Wanwei Liu, Ji Wang:
Scheduling constraint based abstraction refinement for weak memory models. ASE 2018: 645-655 - [c78]Liangze Yin, Wei Dong, Wanwei Liu, Yunchou Li, Ji Wang:
YOGAR-CBMC: CBMC with Scheduling Constraint Based Abstraction Refinement - (Competition Contribution). TACAS (2) 2018: 422-426 - [p1]Xueguang Wu, Liqian Chen, Ji Wang:
Analyzing Interrupt Handlers via Interprocedural Summaries. Symposium on Real-Time and Hybrid Systems 2018: 246-262 - [i7]Hengbiao Yu, Zhenbang Chen, Xianjin Fu, Ji Wang, Zhendong Su, Wei Dong, Chun Huang:
Combining Symbolic Execution and Model Checking to Verify MPI Programs. CoRR abs/1803.06300 (2018) - [i6]Chengdong Feng, Zhenbang Chen, Weijiang Hong, Hengbiao Yu, Wei Dong, Ji Wang:
Boosting the Robustness Verification of DNN by Identifying the Achilles's Heel. CoRR abs/1811.07108 (2018) - 2017
- [c77]Hengbiao Yu, Zhenbang Chen, Yufeng Zhang, Ji Wang, Wei Dong:
RGSE: a regular property guided symbolic executor for Java. ESEC/SIGSOFT FSE 2017: 954-958 - [c76]Jiahong Jiang, Liqian Chen, Xueguang Wu, Ji Wang:
Block-Wise Abstract Interpretation by Combining Abstract Domains with SMT. VMCAI 2017: 310-329 - [e1]Kim Guldstrand Larsen, Oleg Sokolsky, Ji Wang:
Dependable Software Engineering. Theories, Tools, and Applications - Third International Symposium, SETTA 2017, Changsha, China, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10606, Springer 2017, ISBN 978-3-319-69482-5 [contents] - [i5]Liangze Yin, Wei Dong, Wanwei Liu, Ji Wang:
Scheduling Constraint Based Abstraction Refinement for Multi-Threaded Program Verification. CoRR abs/1708.08323 (2017) - 2016
- [j26]Xueguang Wu, Liqian Chen, Antoine Miné, Wei Dong, Ji Wang:
Static Analysis of Runtime Errors in Interrupt-Driven Programs via Sequentialization. ACM Trans. Embed. Comput. Syst. 15(4): 70:1-70:26 (2016) - 2015
- [j25]Banghu Yin, Liqian Chen, Ji Wang:
基于指向与数值抽象的带指针算术程序的分析方法 (Analysis of Programs with Pointer Arithmetic by Combining Points-to and Numerical Abstractions). 计算机科学 42(7): 32-37 (2015) - [c75]Xianjin Fu, Zhenbang Chen, Yufeng Zhang, Chun Huang, Wei Dong, Ji Wang:
MPISE: Symbolic Execution of MPI Programs. HASE 2015: 181-188 - [c74]Yufeng Zhang, Zhenbang Chen, Ji Wang, Wei Dong, Zhiming Liu:
Regular Property Guided Dynamic Symbolic Execution. ICSE (1) 2015: 643-653 - [c73]Jingwen Zhou, Zhenbang Chen, Ji Wang:
Poster: Segmentation Based Online Performance Problem Diagnosis. ICSE (2) 2015: 807-808 - [c72]Xianjin Fu, Zhenbang Chen, Hengbiao Yu, Chun Huang, Wei Dong, Ji Wang:
Poster: Symbolic Execution of MPI Programs. ICSE (2) 2015: 809-810 - [c71]Wanwei Liu, Lei Song, Ji Wang, Lijun Zhang:
A Simple Probabilistic Extension of Modal Mu-calculus. IJCAI 2015: 882-888 - [i4]Wanwei Liu, Lei Song, Ji Wang, Lijun Zhang:
A Simple Probabilistic Extension of Modal Mu-calculus. CoRR abs/1504.07737 (2015) - 2014
- [j24]Pei Fan, Zhenbang Chen, Ji Wang, Zibin Zheng, Michael R. Lyu:
A topology-aware method for scientific application deployment on cloud. Int. J. Web Grid Serv. 10(4): 338-370 (2014) - [j23]Wanwei Liu, Rui Wang, Xianjin Fu, Ji Wang, Wei Dong, Xiaoguang Mao:
Counterexample-Preserving Reduction for Symbolic Model Checking. J. Appl. Math. 2014: 702165:1-702165:13 (2014) - [j22]Liqian Chen, Jiahong Jiang, Banghu Yin, Wei Dong, Ji Wang:
Robustness Analysis of Floating-Point Programs by Self-Composition. J. Appl. Math. 2014: 789213:1-789213:12 (2014) - [j21]Liqian Chen, Renjian Li, Xueguang Wu, Ji Wang:
Static analysis of lists by combining shape and numerical abstractions. Sci. Comput. Program. 95: 320-342 (2014) - [c70]Jingwen Zhou, Zhenbang Chen, Ji Wang, Zibin Zheng, Michael R. Lyu:
Towards an Open Data Set for Trace-Oriented Monitoring. IEEE CLOUD 2014: 922-923 - [c69]Xianjin Fu, Zhenbang Chen, Chun Huang, Wei Dong, Ji Wang:
Synchronization Error Detection of MPI Programs by Symbolic Execution. APSEC (1) 2014: 127-134 - [c68]Jingwen Zhou, Zhenbang Chen, Ji Wang, Zibin Zheng, Michael R. Lyu:
Trace Bench: An Open Data Set for Trace-Oriented Monitoring. CloudCom 2014: 519-526 - [c67]Jingwen Zhou, Zhenbang Chen, Ji Wang, Zibin Zheng, Wei Dong:
A Runtime Verification Based Trace-Oriented Monitoring Framework for Cloud Systems. ISSRE Workshops 2014: 152-155 - [c66]Liqian Chen, Jiangchao Liu, Antoine Miné, Deepak Kapur, Ji Wang:
An Abstract Domain to Infer Octagonal Constraints with Absolute Value. SAS 2014: 101-117 - [c65]Jingwen Zhou, Zhenbang Chen, Haibo Mi, Ji Wang:
MTracer: A Trace-Oriented Monitoring Framework for Medium-Scale Distributed Systems. SOSE 2014: 266-271 - [c64]Xueguang Wu, Liqian Chen, Ji Wang:
An Abstract Domain to Infer Symbolic Ranges over Nonnegative Parameters. NSAD 2014: 33-45 - [i3]Xianjin Fu, Zhenbang Chen, Yufeng Zhang, Chun Huang, Ji Wang:
MPISE: Symbolic Execution of MPI Programs. CoRR abs/1403.4813 (2014) - 2013
- [j20]Rui Wang, Wanwei Liu, Tun Li, Xiaoguang Mao, Ji Wang:
Bounded Model Checking of ETL Cooperating with Finite and Looping Automata Connectives. J. Appl. Math. 2013: 462532:1-462532:12 (2013) - [c63]Wanwei Liu, Rui Wang, Xianjin Fu, Ji Wang, Wei Dong, Xiaoguang Mao:
Counterexample-Preserving Reduction for Symbolic Model Checking. ICTAC 2013: 249-266 - [c62]Liqian Chen, Renjian Li, Xueguang Wu, Ji Wang:
Static analysis of list-manipulating programs via bit-vectors and numerical abstractions. SAC 2013: 1204-1210 - [c61]Xueguang Wu, Yanjun Wen, Liqian Chen, Wei Dong, Ji Wang:
Data Race Detection for Interrupt-Driven Programs via Bounded Model Checking. SERE (Companion) 2013: 204-210 - [c60]Hengbiao Yu, Zhenbang Chen, Ji Wang:
An Operational Semantics for Model Checking Long Running Transactions. WS-FM 2013: 168-187 - [i2]Wanwei Liu, Rui Wang, Xianjin Fu, Ji Wang, Wei Dong, Xiaoguang Mao:
Counterexample-Preserving Reduction for Symbolic Model Checking. CoRR abs/1301.3299 (2013) - 2012
- [j19]Dengping Wei, Ting Wang, Ji Wang:
A logistic regression model for Semantic Web service matchmaking. Sci. China Inf. Sci. 55(7): 1715-1720 (2012) - [j18]Pei Fan, Ji Wang, Zhenbang Chen, Zibin Zheng, Michael R. Lyu:
A spectral clustering-based optimal deployment method for scientific application in cloud computing. Int. J. Web Grid Serv. 8(1): 31-55 (2012) - [j17]Yufeng Zhang, Zhenbang Chen, Ji Wang:
S2PF: speculative symbolic PathFinder. ACM SIGSOFT Softw. Eng. Notes 37(6): 1-5 (2012) - [j16]Zhenbang Chen, Zhiming Liu, Ji Wang:
Failure-divergence semantics and refinement of long running transactions. Theor. Comput. Sci. 455: 31-65 (2012) - [c59]Pei Fan, Zhenbang Chen, Ji Wang, Zibin Zheng, Michael R. Lyu:
Topology-Aware Deployment of Scientific Applications in Cloud Computing. IEEE CLOUD 2012: 319-326 - [c58]Longming Dong, Ji Wang, Liqian Chen:
Modular Heap Abstraction-Based Memory Leak Detection for Heap-Manipulating Programs. APSEC 2012: 20-29 - [c57]Pei Fan, Zhenbang Chen, Ji Wang, Zibin Zheng:
Online Optimization of VM Deployment in IaaS Cloud. ICPADS 2012: 760-765 - [c56]Yufeng Zhang, Zhenbang Chen, Ji Wang:
Speculative Symbolic Execution. ISSRE 2012: 101-110 - [c55]Longming Dong, Ji Wang, Liqian Chen:
Modular Heap Abstraction-Based Code Clone Detection for Heap-Manipulating Programs. QSIC 2012: 197-200 - [i1]Yufeng Zhang, Zhenbang Chen, Ji Wang:
Speculative Symbolic Execution. CoRR abs/1205.4951 (2012) - 2011
- [j15]Renjian Li, Ji Wang, Liqian Chen, Wanwei Liu, Dengping Wei:
Quantitative analysis for symbolic heap bounds of CPS software. Comput. Sci. Inf. Syst. 8(4): 1251-1276 (2011) - [j14]Dengping Wei, Ting Wang, Ji Wang:
SAWSDL Service Discovery Based on Fine-Grained Data Semantics. IEICE Trans. Inf. Syst. 94-D(3): 525-534 (2011) - [j13]Ji Wang, Rui Shen, Huaimin Wang:
A Programming Language Approach to Internet-Based Virtual Computing Environment. J. Comput. Sci. Technol. 26(4): 600-615 (2011) - [j12]Dengping Wei, Ting Wang, Ji Wang, Abraham Bernstein:
SAWSDL-iMatcher: A customizable and effective Semantic Web Service matchmaker. J. Web Semant. 9(4): 402-417 (2011) - [c54]Liqian Chen, Antoine Miné, Ji Wang, Patrick Cousot:
Linear Absolute Value Relation Analysis. ESOP 2011: 156-175 - [c53]Zhenbang Chen, Zhiming Liu, Ji Wang:
Failure-Divergence Refinement of Compensating Communicating Processes. FM 2011: 262-277 - [c52]Jintao Tang, Ting Wang, Qin Lu, Ji Wang, Wenjie Li:
A Wikipedia Based Semantic Graph Model for Topic Tracking in Blogsphere. IJCAI 2011: 2337-2342 - [c51]Jintao Tang, Qin Lu, Ting Wang, Ji Wang, Wenjie Li:
A bipartite graph based social network splicing method for person name disambiguation. SIGIR 2011: 1233-1234 - [c50]Jintao Tang, Ting Wang, Ji Wang, Qin Lu, Wenjie Li:
Using complex network features for fast clustering in the web. WWW (Companion Volume) 2011: 133-134 - 2010
- [j11]Xuejun Yang, Ji Wang, Xiaodong Yi:
Slicing Execution with Partial Weakest Precondition for Model Abstraction of C Programs. Comput. J. 53(1): 37-49 (2010) - [c49]Liqian Chen, Antoine Miné, Ji Wang, Patrick Cousot:
An Abstract Domain to Discover Interval Linear Equalities. VMCAI 2010: 112-128
2000 – 2009
- 2009
- [j10]Mengluo Ji, Ji Wang, Shuhao Li, Zhi-Chang Qi:
Automated Worst-Case Execution Time Analysis Based on Program Modes. Comput. J. 52(5): 530-544 (2009) - [j9]Wanwei Liu, Ji Wang, Huowang Chen, Xiaodong Ma, Zhaofei Wang:
Symbolic model checking APSL. Frontiers Comput. Sci. China 3(1): 130-141 (2009) - [j8]Wanwei Liu, Ji Wang:
A tighter analysis of Piterman's Büchi determinization. Inf. Process. Lett. 109(16): 941-945 (2009) - [j7]Ji Wang, Xiaodong Ma, Wei Dong, Hou-Feng Xu, Wanwei Liu:
Demand-Driven Memory Leak Detection Based on Flow- and Context-Sensitive Pointer Analysis. J. Comput. Sci. Technol. 24(2): 347-356 (2009) - [c48]Jintao Tang, Ting Wang, Ji Wang, Dengping Wei:
Efficient social network approximate analysis on blogosphere based on network structure characteristics. SNAKDD 2009: 7 - [c47]Liqian Chen, Antoine Miné, Ji Wang, Patrick Cousot:
Interval Polyhedra: An Abstract Domain to Infer Interval Linear Relationships. SAS 2009: 309-325 - 2008
- [j6]XinJun Mao, Lijun Shan, Hong Zhu, Ji Wang:
An adaptive casteship mechanism for developing multi-agent systems. Int. J. Comput. Appl. Technol. 31(1/2): 17-34 (2008) - [c46]Wei Dong, Ji Wang, Changzhi Zhao, Xian Zhang, Jie Tian:
Automating Software FMEA via Formal Analysis of Dependence Relations. COMPSAC 2008: 490-491 - [c45]Jintao Tang, Ting Wang, Ji Wang:
Information Flow Detection and Tracking on Web2.0 BLOGS Based on Social Networks. ICYCS 2008: 1664-1670 - [c44]Xiaodong Ma, Ji Wang, Wei Dong:
Computing Must and May Alias to Detect Null Pointer Dereference. ISoLA 2008: 252-261 - [c43]Dengping Wei, Ting Wang, Ji Wang, Yaodong Chen:
Extracting Semantic Constraint from Description Text for Semantic Web Service Discovery. ISWC 2008: 146-161 - [c42]Wanwei Liu, Ji Wang, Huowang Chen, Xiaodong Ma:
Symbolic Model Checking APSL. TASE 2008: 39-46 - 2007
- [j5]Zhenbang Chen, Ji Wang, Wei Dong, Zhichang Qi:
Interface theory-based formalisation and verification of orchestration in BPEL4WS. Int. J. Bus. Process. Integr. Manag. 2(4): 262-281 (2007) - [j4]Wing Lok Yeung, Karl R. P. H. Leung, Ji Wang, Wei Dong:
Modelling and model checking suspendible business processes via statechart diagrams and CSP. Sci. Comput. Program. 65(1): 14-29 (2007) - [c41]Wei Dong, Ji Wang, Zhichang Qi, Ni Rong:
Compositional Verification of UML Dynamic Models. APSEC 2007: 286-293 - [c40]Wanwei Liu, Ji Wang, Wei Dong, Huowang Chen:
Axiomatizing Extended Temporal Logic Fragments Via Instantiation. ICTAC 2007: 322-336 - [c39]Shulin Wang, Ji Wang, Huowang Chen, Shutao Li:
Feature Extraction and Classification of Tumor Based on Wavelet Package and Support Vector Machines. PAKDD 2007: 871-878 - [c38]XinJun Mao, Jianming Zhao, Ji Wang:
Engineering Adaptive Multi-Agent Systems with ODAM Methodology. PRIMA 2007: 380-385 - [c37]Xiaodong Ma, Ji Wang, Wei Dong:
Shape Analysis by Refining on Abstract Evaluation Path. TTSS 2007: 137-151 - 2006
- [j3]Xiaodong Yi, Ji Wang, Xuejun Yang:
Slicing Execution for Model Checking C Programs. Int. J. Softw. Eng. Knowl. Eng. 16(5): 747-768 (2006) - [c36]Shulin Wang, Ji Wang, Huowang Chen, Boyun Zhang:
SVM-Based Tumor Classification with Gene Expression Data. ADMA 2006: 864-870 - [c35]Shulin Wang, Huowang Chen, Ji Wang, Dingxing Zhang, Shutao Li:
Molecular Diagnosis of Tumor Based on Independent Component Analysis and Support Vector Machines. CIS 2006: 46-56 - [c34]Zhenbang Chen, Ji Wang, Wei Dong, Zhichang Qi, Wing Lok Yeung:
An Interface Theory Based Approach to Verification of Web Services. COMPSAC (2) 2006: 139-144 - [c33]Ting Wang, Yaoyong Li, Kalina Bontcheva, Hamish Cunningham, Ji Wang:
Automatic Extraction of Hierarchical Relations from Text. ESWC 2006: 215-229 - [c32]Jianming Zhao, XinJun Mao, Ji Wang:
Developing Multi-Agent Systems with Dynamic Binding Mechanism. IAT 2006: 52-58 - [c31]Yang Yu, Ji Wang, Ting Wang, Huowang Chen:
Representing Wholes by Structure. ICCS 2006: 441-454 - [c30]Xiaodong Yi, Ji Wang, Xuejun Yang:
Stateful Dynamic Partial-Order Reduction. ICFEM 2006: 149-167 - [c29]Mengluo Ji, Ji Wang, Shuhao Li, Zhi-Chang Qi:
Automated WCET Analysis Based on Program Modes. AST 2006: 36-42 - [c28]Shulin Wang, Ji Wang, Huowang Chen, Wensheng Tang:
The Classification of Tumor Using Gene Expression Profile Based on Support Vector Machines and Factor Analysis. ISDA (2) 2006: 471-476 - [c27]Ji Wang, Xiaodong Yi, Xuejun Yang:
Towards a Framework for Scalable Model Checking of Concurrent C Programs. ISoLA 2006: 355-362 - [c26]Wing Lok Yeung, Ji Wang, Wei Dong:
Verifying Choreographic Descriptions of Web Services Based on CSP. SCW 2006: 97-104 - [c25]XinJun Mao, Zhiming Chang, Lijun Shan, Hong Zhu, Ji Wang:
The Dynamic Casteship Mechanism for Modeling and Designing Adaptive Agents. SEKE 2006: 639-644 - [c24]Zhenbang Chen, Ji Wang, Wei Dong, Zhichang Qi:
Towards Formal Interfaces for Web Services with Transactions. SITIS 2006: 292-304 - [c23]Wing Lok Yeung, Karl R. P. H. Leung, Ji Wang, Wei Dong:
Model Checking Suspendible Business Processes via Statechart Diagrams and CSP. MSVVEIS 2006: 97-107 - [c22]Wei Dong, Zhenbang Chen, Ji Wang:
A Contract-based Approach to Specifying and Verifying Safety Critical Systems. FESCA@ETAPS 2006: 89-103 - 2005
- [c21]Wing Lok Yeung, Karl R. P. H. Leung, Ji Wang, Wei Dong:
Improvements Towards Formalizing UML State Diagrams in CSP. APSEC 2005: 176-184 - [c20]Wei Dong, Ji Wang:
Contract-Based Formal Specification of Safety Critical Systems. COMPSAC (2) 2005: 7-8 - [c19]Shuhao Li, Ji Wang, Xin Wang, Zhi-Chang Qi:
Configuration-Oriented Symbolic Test Sequence Construction Method for EFSM. COMPSAC (1) 2005: 13-18 - [c18]XinJun Mao, Ji Wang, Jiajia Chen:
Modeling Organization Structure of Multi-Agent System. IAT 2005: 116-119 - [c17]Yanjun Wen, Ji Wang, Zhi-Chang Qi:
2/3 Alternating Simulation Between Interface Automata. ICFEM 2005: 173-187 - [c16]Xiaodong Yi, Ji Wang, Xuejun Yang:
Verification of C Programs using Slicing Execution. QSIC 2005: 109-116 - 2004
- [c15]Shuhao Li, Ji Wang, Wei Dong, Zhichang Qi:
Property-Oriented Testing of Real-Time Systems. APSEC 2004: 358-365 - [c14]Xin Wang, Ji Wang, Zhi-Chang Qi:
Automatic Generation of Run-Time Test Oracles for Distributed Real-Time Systems. FORTE 2004: 199-212 - [c13]XinJun Mao, Ji Wang, Eric S. K. Yu:
A Framework to Specify and Evaluate Coordination in MAS with Logic. IAT 2004: 325-328 - [c12]Yanjun Wen, Ji Wang, Zhi-Chang Qi:
Bridging Refinement of Interface Automata to Forward Simulation of I/O Automata. ICFEM 2004: 259-273 - [c11]Yanjun Wen, Ji Wang, Zhi-Chang Qi:
Reverse Observation Equivalence Between Labelled State Transition Systems. ICTAC 2004: 204-219 - [c10]Jiong Yan, Ji Wang, Huowang Chen:
UML Based Statistical Testing Acceleration of Distributed Safety-Critical Software. ISPA 2004: 433-445 - [c9]Shuhao Li, Ji Wang, Zhi-Chang Qi:
Property-Oriented Test Generation from UML Statecharts. ASE 2004: 122-131 - [c8]Yan Jiong, Ji Wang, Huowang Chen:
Automatic Generation of Markov Chain Usage Models from Real-Time Software UML Models. QSIC 2004: 22-31 - [c7]Ting Wang, Ji Wang, Yang Yu, Rui Shen, Jinhong Liu, Huowang Chen:
MetaData Pro: Ontology-Based Metadata Processing for Web Resources. WISE Workshops 2004: 34-45 - 2003
- [j2]Jinhui Shan, Ji Wang, Zhi-Chang Qi, Jianping Wu:
Improved Method to Generate Path-Wise Test Data. J. Comput. Sci. Technol. 18(2): 235-240 (2003) - [c6]Yan Jiong, Ji Wang, Huowang Chen:
Deriving Software Statistical Testing Model from UML Model. QSIC 2003: 343-350 - 2002
- [c5]Ji Wang, Wei Dong, Zhichang Qi:
Slicing Hierarchical Automata for Model Checking UML Statecharts. ICFEM 2002: 435-446 - 2001
- [c4]Jinhui Shan, Ji Wang, Zhichang Qi:
On Path-Wise Automatic Generation of Test Data for Both White-Box and Black-Box Testing. APSEC 2001: 237- - [c3]Wei Dong, Ji Wang, Xuan Qi, Zhichang Qi:
Model Checking UML Statecharts. APSEC 2001: 363-370
1990 – 1999
- 1998
- [j1]Tiegeng Luo, Huowang Chen, Bingshan Wang, Ji Wang, Zhenghu Gong, Zhichang Qi:
Verifying automata specification of distributed probabilistic real-time systems. J. Comput. Sci. Technol. 13(6): 588-596 (1998) - 1993
- [c2]Ji Wang, Huowang Chen:
A formal technique to analyze real-time systems. COMPSAC 1993: 180-185 - 1992
- [c1]Ji Wang, Huowang Chen:
Temporal Reasoning About Real Time Reactive Systems. IWAR 1992: 249-256
Coauthor Index
aka: Zhi-Chang Qi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint