Jinfu Chen
Orcid: 0000-0002-3124-5452Affiliations:
- Jiangsu University, School of Computer Science and Telecommunication Engineering, Zhenjiang, China
- Huazhong University of Science and Technology, College of Computer Science and Technology, Wuhan, China (PhD 2009)
According to our database1,
Jinfu Chen
authored at least 134 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
CDDA-MD: An efficient malicious traffic detection method based on concept drift detection and adaptation technique.
Comput. Secur., 2025
2024
Softw. Qual. J., December, 2024
Predicting software vulnerability based on software metrics: a deep learning approach.
Iran J. Comput. Sci., December, 2024
DELM: Deep Ensemble Learning Model for Anomaly Detection in Malicious Network Traffic-based Adaptive Feature Aggregation and Network Optimization.
ACM Trans. Priv. Secur., November, 2024
Software Defect Prediction Approach Based on a Diversity Ensemble Combined With Neural Network.
IEEE Trans. Reliab., September, 2024
J. Softw. Evol. Process., September, 2024
A novel test case prioritization approach for black-box testing based on K-medoids clustering.
J. Softw. Evol. Process., April, 2024
Swarm Evol. Comput., 2024
iGnnVD: A novel software vulnerability detection model based on integrated graph neural networks.
Sci. Comput. Program., 2024
L′OP-ART: A linear-time adaptive random testing algorithm for object-oriented programs.
J. Syst. Softw., 2024
DCM-GIFT: An Android malware dynamic classification method based on gray-scale image and feature-selection tree.
Inf. Softw. Technol., 2024
Hybrid semantics-based vulnerability detection incorporating a Temporal Convolutional Network and Self-attention Mechanism.
Inf. Softw. Technol., 2024
Exploiting DBSCAN and Combination Strategy to Prioritize the Test Suite in Regression Testing.
IET Softw., 2024
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism.
Comput. Secur., 2024
SCVD-SA: A Smart Contract Vulnerability Detection Method Based on Hybrid Deep Learning Model and Self-attention Mechanism.
Proceedings of the IEEE International Conference on Software Analysis, 2024
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
FMUZZ: A Novel Greybox Fuzzing Approach based on Mutation Strategy Optimization with Byte Scheduling.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
QAQA-SS: An Improved Fuzzing Approach with Seed Scheduling Based on the UCB Algorithm for QA Systems.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024
2023
J. Softw. Evol. Process., December, 2023
Future Gener. Comput. Syst., December, 2023
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism.
ACM Trans. Priv. Secur., November, 2023
BiTCN_DRSN: An effective software vulnerability detection model based on an improved temporal convolutional network.
J. Syst. Softw., October, 2023
Bug detection in Java code: An extensive evaluation of static analysis tools using Juliet Test Suites.
Softw. Pract. Exp., May, 2023
A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network.
Inf. Softw. Technol., May, 2023
A memory-related vulnerability detection approach based on vulnerability model with Petri Net.
J. Log. Algebraic Methods Program., April, 2023
Minimal Rare Pattern-Based Outlier Detection Approach For Uncertain Data Streams Under Monotonic Constraints.
Comput. J., January, 2023
Proceedings of the IEEE International Conference on Software Analysis, 2023
CGSA-RNN: Abnormal Network Traffic Detection Model Based on CycleGAN and Self-Attention Mechanism.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
2022
A Novel Test Case Generation Approach for Adaptive Random Testing of Object-Oriented Software Using K-Means Clustering Technique.
IEEE Trans. Emerg. Top. Comput. Intell., 2022
A software defect prediction method with metric compensation based on feature selection and transfer learning.
Frontiers Inf. Technol. Electron. Eng., 2022
A Review of Research on Privacy Protection of Internet of Vehicles Based on Blockchain.
J. Sens. Actuator Networks, 2022
MWFP-outlier: Maximal weighted frequent-pattern-based approach for detecting outliers from uncertain weighted data streams.
Inf. Sci., 2022
Malware recognition approach based on self-similarity and an improved clustering algorithm.
IET Softw., 2022
A formalization-based vulnerability detection method for cross-subject network components.
Proceedings of the IEEE International Conference on Trust, 2022
A Novel Coverage-Guided Greybox Fuzzing Method based on Grammar-Aware with Particle Swarm Optimization.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
An Improved Test Case Generation Method based on Test Requirements for Testing Software Component.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
A Novel Coverage-guided Greybox Fuzzing based on Power Schedule Optimization with Time Complexity.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
An adaptive search optimization algorithm for improving the detection capability of software vulnerability.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022
A novel classification approach for Android malware based on feature fusion and natural language processing.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Adaptive Random Testing based on the Modified Metric-memory Tree and Information Entropy.
Proceedings of the 9th International Conference on Dependable Systems and Their Applications, 2022
2021
IEEE Trans. Emerg. Top. Comput. Intell., 2021
An Approach Based on the Improved SVM Algorithm for Identifying Malware in Network Traffic.
Secur. Commun. Networks, 2021
A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter.
Secur. Commun. Networks, 2021
An efficient outlier detection method for data streams based on closed frequent patterns by considering anti-monotonic constraints.
Inf. Sci., 2021
An efficient anomaly detection method for uncertain data based on minimal rare patterns with the consideration of anti-monotonic constraints.
Inf. Sci., 2021
Int. J. Simul. Process. Model., 2021
Covering Array Constructors: An Experimental Analysis of Their Interaction Coverage and Fault Detection.
Comput. J., 2021
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
An Adaptive Random Test Method based on Variable Probability Density Function with Particle Swarm Optimization.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
An Efficient Network Intrusion Detection Model Based on Temporal Convolutional Networks.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
MMFC-ART: a Fixed-size-Candidate-set Adaptive Random Testing approach based on the modified Metric-Memory tree.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
KS-TCP: An Efficient Test Case Prioritization Approach based on K-medoids and Similarity.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
A Test Case Generation Method of Combinatorial Testing based on τ-way Testing with Adaptive Random Testing.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
2020
Abstract Test Case Prioritization Using Repeated Small-Strength Level-Combination Coverage.
IEEE Trans. Reliab., 2020
The effect of Bellwether analysis on software vulnerability severity prediction models.
Softw. Qual. J., 2020
Softw. Pract. Exp., 2020
An automated framework for evaluating open-source web scanner vulnerability severity.
Serv. Oriented Comput. Appl., 2020
Sensors, 2020
J. Syst. Softw., 2020
An automatic software vulnerability classification framework using term frequency-inverse gravity moment and feature selection.
J. Syst. Softw., 2020
A Proactive Approach to Test Case Selection - An Efficient Implementation of Adaptive Random Testing.
Int. J. Softw. Eng. Knowl. Eng., 2020
Exploiting the Largest Available Zone: A Proactive Approach to Adaptive Random Testing by Exclusion.
IEEE Access, 2020
iTES: Integrated Testing and Evaluation System for Software Vulnerability Detection Methods.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
An Approach to Determine the Optimal k-Value of K-means Clustering in Adaptive Random Testing.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Minimal Rare-Pattern-Based Outlier Detection Method for Data Streams by Considering Anti-monotonic Constraints.
Proceedings of the Information Security - 23rd International Conference, 2020
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020
Fast Bug Detection Algorithm for Identifying Potential Vulnerabilities in Juliet Test Cases.
Proceedings of the 8th IEEE International Conference on Smart City and Informatization, 2020
Proceedings of the 7th International Conference on Dependable Systems and Their Applications, 2020
An Efficient Approach Based on Parameter Optimization for Network Traffic Classification Using Machine Learning.
Proceedings of the 7th International Conference on Dependable Systems and Their Applications, 2020
2019
One-Domain-One-Input: Adaptive Random Testing by Orthogonal Recursive Bisection With Restriction.
IEEE Trans. Reliab., 2019
A Modified Similarity Metric for Unit Testing of Object-Oriented Software Based on Adaptive Random Testing.
Int. J. Softw. Eng. Knowl. Eng., 2019
A novel routing protocol for content-based publish/subscribe model in mobile sensor networks.
Int. J. Distributed Sens. Networks, 2019
A Taxonomic Review of Adaptive Random Testing: Current Status, Classifications, and Issues.
CoRR, 2019
Toward a K-means clustering approach to adaptive random testing for object-oriented software.
Sci. China Inf. Sci., 2019
Elimination by Linear Association: An Effective and Efficient Static Mirror Adaptive Random Testing.
IEEE Access, 2019
Random Border Mirror Transform: A Diversity Based Approach to an Effective and Efficient Mirror Adaptive Random Testing.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019
Improving the Accuracy of Vulnerability Report Classification Using Term Frequency-Inverse Gravity Moment.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019
The Significant Effect of Parameter Tuning on Software Vulnerability Prediction Models.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019
A cost-effective strategy for software vulnerability prediction based on bellwether analysis.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2018
Test case prioritization for object-oriented software: An adaptive random sequence approach based on clustering.
J. Syst. Softw., 2018
IET Softw., 2018
An Empirical Comparison of Fixed-Strength and Mixed-Strength for Interaction Coverage Based Prioritization.
IEEE Access, 2018
An experimental analysis of fault detection capabilities of covering array constructors.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
On the Selection of Strength for Fixed-Strength Interaction Coverage Based Prioritization.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
A Similarity Metric for the Inputs of OO Programs and Its Application in Adaptive Random Testing.
IEEE Trans. Reliab., 2017
Detecting Implicit Security Exceptions Using an Improved Variable-Length Sequential Pattern Mining Method.
Int. J. Softw. Eng. Knowl. Eng., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
An Architecture of Urban Regional Health Information System and Its Data Conversion Algorithm.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
An Empirical Comparison of Similarity Measures for Abstract Test Case Prioritization.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017
2016
Secur. Commun. Networks, 2016
Int. J. Simul. Process. Model., 2016
Proceedings of the 2016 IEEE International Symposium on Software Reliability Engineering Workshops, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
Adapting ant colony optimization to generate test data for software structural testing.
Swarm Evol. Comput., 2015
J. Inf. Technol. Res., 2015
Inf. Softw. Technol., 2015
Future Gener. Comput. Syst., 2015
2014
A Web services vulnerability testing approach based on combinatorial mutation and SOAP message mutation.
Serv. Oriented Comput. Appl., 2014
How to Do Tie-breaking in Prioritization of Interaction Test Suites?.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014
Proceedings of the Symposium on Applied Computing, 2014
2013
Int. J. Softw. Eng. Knowl. Eng., 2013
Failure-detection capability analysis of implementing parallelism in adaptive random testing algorithms.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
2012
Int. J. Softw. Eng. Knowl. Eng., 2012
Proceedings of the 2012 12th International Conference on Quality Software, 2012
Combinatorial Mutation Approach to Web Service Vulnerability Testing Based on SOAP Message Mutations.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012
2011
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011
2009
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
2007
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007
An Auto-Generating Approach of Transactions Profile Graph in Detection of Malicious Transactions.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007