Jinfu Chen

Orcid: 0000-0002-3124-5452

Affiliations:
  • Jiangsu University, School of Computer Science and Telecommunication Engineering, Zhenjiang, China
  • Huazhong University of Science and Technology, College of Computer Science and Technology, Wuhan, China (PhD 2009)


According to our database1, Jinfu Chen authored at least 134 papers between 2007 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
CDDA-MD: An efficient malicious traffic detection method based on concept drift detection and adaptation technique.
Comput. Secur., 2025

2024
MUT Model: a metric for characterizing metamorphic relations diversity.
Softw. Qual. J., December, 2024

Predicting software vulnerability based on software metrics: a deep learning approach.
Iran J. Comput. Sci., December, 2024

DELM: Deep Ensemble Learning Model for Anomaly Detection in Malicious Network Traffic-based Adaptive Feature Aggregation and Network Optimization.
ACM Trans. Priv. Secur., November, 2024

Software Defect Prediction Approach Based on a Diversity Ensemble Combined With Neural Network.
IEEE Trans. Reliab., September, 2024

A novel defect prediction method based on semantic feature enhancement.
J. Softw. Evol. Process., September, 2024

A novel test case prioritization approach for black-box testing based on K-medoids clustering.
J. Softw. Evol. Process., April, 2024

A novel memory usage guided fuzzing based on particle swarm optimization.
Swarm Evol. Comput., 2024

TR-Fuzz: A syntax valid tool for fuzzing C compilers.
Sci. Comput. Program., 2024

iGnnVD: A novel software vulnerability detection model based on integrated graph neural networks.
Sci. Comput. Program., 2024

L′OP-ART: A linear-time adaptive random testing algorithm for object-oriented programs.
J. Syst. Softw., 2024

DCM-GIFT: An Android malware dynamic classification method based on gray-scale image and feature-selection tree.
Inf. Softw. Technol., 2024

Hybrid semantics-based vulnerability detection incorporating a Temporal Convolutional Network and Self-attention Mechanism.
Inf. Softw. Technol., 2024

Exploiting DBSCAN and Combination Strategy to Prioritize the Test Suite in Regression Testing.
IET Softw., 2024

GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism.
Comput. Secur., 2024

SCVD-SA: A Smart Contract Vulnerability Detection Method Based on Hybrid Deep Learning Model and Self-attention Mechanism.
Proceedings of the IEEE International Conference on Software Analysis, 2024

JFuzzer: Detecting Optimization Errors in JavaScript Just-In-Time Compilers.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024

Detecting Bias in LLMs' Natural Language Inference Using Metamorphic Testing.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024

FMUZZ: A Novel Greybox Fuzzing Approach based on Mutation Strategy Optimization with Byte Scheduling.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024

QAQA-SS: An Improved Fuzzing Approach with Seed Scheduling Based on the UCB Algorithm for QA Systems.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024

HyWE: A Hybrid Word Embedding Method for Smart Contract Vulnerability Detection.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024

2023
A novel combinatorial testing approach with fuzzing strategy.
J. Softw. Evol. Process., December, 2023

An optimized feature extraction algorithm for abnormal network traffic detection.
Future Gener. Comput. Syst., December, 2023

TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism.
ACM Trans. Priv. Secur., November, 2023

BiTCN_DRSN: An effective software vulnerability detection model based on an improved temporal convolutional network.
J. Syst. Softw., October, 2023

Bug detection in Java code: An extensive evaluation of static analysis tools using Juliet Test Suites.
Softw. Pract. Exp., May, 2023

A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network.
Inf. Softw. Technol., May, 2023

A memory-related vulnerability detection approach based on vulnerability model with Petri Net.
J. Log. Algebraic Methods Program., April, 2023

Minimal Rare Pattern-Based Outlier Detection Approach For Uncertain Data Streams Under Monotonic Constraints.
Comput. J., January, 2023

EcoDialTest: Adaptive Mutation Schedule for Automated Dialogue Systems Testing.
Proceedings of the IEEE International Conference on Software Analysis, 2023

CGSA-RNN: Abnormal Network Traffic Detection Model Based on CycleGAN and Self-Attention Mechanism.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

2022
A Novel Test Case Generation Approach for Adaptive Random Testing of Object-Oriented Software Using K-Means Clustering Technique.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

A software defect prediction method with metric compensation based on feature selection and transfer learning.
Frontiers Inf. Technol. Electron. Eng., 2022

A Review of Research on Privacy Protection of Internet of Vehicles Based on Blockchain.
J. Sens. Actuator Networks, 2022

MWFP-outlier: Maximal weighted frequent-pattern-based approach for detecting outliers from uncertain weighted data streams.
Inf. Sci., 2022

Malware recognition approach based on self-similarity and an improved clustering algorithm.
IET Softw., 2022

A formalization-based vulnerability detection method for cross-subject network components.
Proceedings of the IEEE International Conference on Trust, 2022

A Novel Coverage-Guided Greybox Fuzzing Method based on Grammar-Aware with Particle Swarm Optimization.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

An Improved Test Case Generation Method based on Test Requirements for Testing Software Component.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Coverage-based Greybox Fuzzing with Pointer Monitoring for C Programs.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

A Novel Coverage-guided Greybox Fuzzing based on Power Schedule Optimization with Time Complexity.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

An adaptive search optimization algorithm for improving the detection capability of software vulnerability.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

A novel classification approach for Android malware based on feature fusion and natural language processing.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

MPC: Multi-node Payment Channel for Off-chain Transactions.
Proceedings of the IEEE International Conference on Communications, 2022

Adaptive Random Testing based on the Modified Metric-memory Tree and Information Entropy.
Proceedings of the 9th International Conference on Dependable Systems and Their Applications, 2022

2021
Identification of Failure Regions for Programs With Numeric Inputs.
IEEE Trans. Emerg. Top. Comput. Intell., 2021

An Approach Based on the Improved SVM Algorithm for Identifying Malware in Network Traffic.
Secur. Commun. Networks, 2021

A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter.
Secur. Commun. Networks, 2021

An efficient outlier detection method for data streams based on closed frequent patterns by considering anti-monotonic constraints.
Inf. Sci., 2021

An efficient anomaly detection method for uncertain data based on minimal rare patterns with the consideration of anti-monotonic constraints.
Inf. Sci., 2021

A new semantic annotation approach for software vulnerability source code.
Int. J. Simul. Process. Model., 2021

Covering Array Constructors: An Experimental Analysis of Their Interaction Coverage and Fault Detection.
Comput. J., 2021

AIdetectorX: A Vulnerability Detector Based on TCN and Self-attention Mechanism.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2021

Dirmap: Web Application Vulnerability Detection Platform Based on Script Code.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

An Adaptive Random Test Method based on Variable Probability Density Function with Particle Swarm Optimization.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

An Efficient Network Intrusion Detection Model Based on Temporal Convolutional Networks.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

MMFC-ART: a Fixed-size-Candidate-set Adaptive Random Testing approach based on the modified Metric-Memory tree.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

L-KPCA: an efficient feature extraction method for network intrusion detection.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Fuzzing Methods Recommendation Based on Feature Vectors.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

An efficient dual ensemble software defect prediction method with neural network.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

KS-TCP: An Efficient Test Case Prioritization Approach based on K-medoids and Similarity.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

A Test Case Generation Method of Combinatorial Testing based on τ-way Testing with Adaptive Random Testing.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

2020
Abstract Test Case Prioritization Using Repeated Small-Strength Level-Combination Coverage.
IEEE Trans. Reliab., 2020

The effect of Bellwether analysis on software vulnerability severity prediction models.
Softw. Qual. J., 2020

An empirical comparison of commercial and open-source web vulnerability scanners.
Softw. Pract. Exp., 2020

An automated framework for evaluating open-source web scanner vulnerability severity.
Serv. Oriented Comput. Appl., 2020

A Novel Fuzzy PID Congestion Control Model Based on Cuckoo Search in WSNs.
Sensors, 2020

Regression test case prioritization by code combinations coverage.
J. Syst. Softw., 2020

An automatic software vulnerability classification framework using term frequency-inverse gravity moment and feature selection.
J. Syst. Softw., 2020

A Proactive Approach to Test Case Selection - An Efficient Implementation of Adaptive Random Testing.
Int. J. Softw. Eng. Knowl. Eng., 2020

Adaptive random testing based on flexible partitioning.
IET Softw., 2020

Exploiting the Largest Available Zone: A Proactive Approach to Adaptive Random Testing by Exclusion.
IEEE Access, 2020

iTES: Integrated Testing and Evaluation System for Software Vulnerability Detection Methods.
Proceedings of the 19th IEEE International Conference on Trust, 2020

An Automatic Vulnerability Classification System for IoT Softwares.
Proceedings of the 19th IEEE International Conference on Trust, 2020

An Automatic Vulnerability Scanner for Web Applications.
Proceedings of the 19th IEEE International Conference on Trust, 2020

An Approach to Determine the Optimal k-Value of K-means Clustering in Adaptive Random Testing.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Minimal Rare-Pattern-Based Outlier Detection Method for Data Streams by Considering Anti-monotonic Constraints.
Proceedings of the Information Security - 23rd International Conference, 2020

An improved fuzzing approach based on adaptive random testing.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

Fast Bug Detection Algorithm for Identifying Potential Vulnerabilities in Juliet Test Cases.
Proceedings of the 8th IEEE International Conference on Smart City and Informatization, 2020

A Malware Identification Approach Based on Improved SVM in Network Traffic.
Proceedings of the 7th International Conference on Dependable Systems and Their Applications, 2020

An Efficient Approach Based on Parameter Optimization for Network Traffic Classification Using Machine Learning.
Proceedings of the 7th International Conference on Dependable Systems and Their Applications, 2020

2019
One-Domain-One-Input: Adaptive Random Testing by Orthogonal Recursive Bisection With Restriction.
IEEE Trans. Reliab., 2019

A Modified Similarity Metric for Unit Testing of Object-Oriented Software Based on Adaptive Random Testing.
Int. J. Softw. Eng. Knowl. Eng., 2019

A novel routing protocol for content-based publish/subscribe model in mobile sensor networks.
Int. J. Distributed Sens. Networks, 2019

Prioritising abstract test cases: an empirical study.
IET Softw., 2019

A Taxonomic Review of Adaptive Random Testing: Current Status, Classifications, and Issues.
CoRR, 2019

Toward a K-means clustering approach to adaptive random testing for object-oriented software.
Sci. China Inf. Sci., 2019

Elimination by Linear Association: An Effective and Efficient Static Mirror Adaptive Random Testing.
IEEE Access, 2019

Random Border Mirror Transform: A Diversity Based Approach to an Effective and Efficient Mirror Adaptive Random Testing.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Improving the Accuracy of Vulnerability Report Classification Using Term Frequency-Inverse Gravity Moment.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

The Significant Effect of Parameter Tuning on Software Vulnerability Prediction Models.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

The Effect of Weighted Moving Windows on Security Vulnerability Prediction.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019

A cost-effective strategy for software vulnerability prediction based on bellwether analysis.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

An Automatic Testing Platform for Object-oriented Software based on Code Coverage.
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019

Research on Evaluation Index System for Software Vulnerability Analysis Methods.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Malicious Intentions: Android Internet Permission Security Risks.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Test case prioritization for object-oriented software: An adaptive random sequence approach based on clustering.
J. Syst. Softw., 2018

A cost-effective adaptive random testing approach by dynamic restriction.
IET Softw., 2018

An Empirical Comparison of Fixed-Strength and Mixed-Strength for Interaction Coverage Based Prioritization.
IEEE Access, 2018

An experimental analysis of fault detection capabilities of covering array constructors.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

On the Selection of Strength for Fixed-Strength Interaction Coverage Based Prioritization.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
A Similarity Metric for the Inputs of OO Programs and Its Application in Adaptive Random Testing.
IEEE Trans. Reliab., 2017

Detecting Implicit Security Exceptions Using an Improved Variable-Length Sequential Pattern Mining Method.
Int. J. Softw. Eng. Knowl. Eng., 2017

An Integration Testing Platform for Software Vulnerability Detection Method.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An Architecture of Urban Regional Health Information System and Its Data Conversion Algorithm.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Prioritizing random combinatorial test suites.
Proceedings of the Symposium on Applied Computing, 2017

An empirical examination of abstract test case prioritization techniques.
Proceedings of the 39th International Conference on Software Engineering, 2017

An Empirical Comparison of Similarity Measures for Abstract Test Case Prioritization.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

A Mining Approach to Obtain the Software Vulnerability Characteristics.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

2016
An approach of security testing for third-party component based on state mutation.
Secur. Commun. Networks, 2016

A mining approach for component abnormal information based on monitor log.
Int. J. Simul. Process. Model., 2016

An Adaptive Sequence Approach for OOS Test Case Prioritization.
Proceedings of the 2016 IEEE International Symposium on Software Reliability Engineering Workshops, 2016

Prioritizing Interaction Test Suites Using Repeated Base Choice Coverage.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Adapting ant colony optimization to generate test data for software structural testing.
Swarm Evol. Comput., 2015

Aggregate-strength interaction test suite prioritization.
J. Syst. Softw., 2015

A Smart City System Architecture based on City-level Data Exchange Platform.
J. Inf. Technol. Res., 2015

Enhancing mirror adaptive random testing through dynamic partitioning.
Inf. Softw. Technol., 2015

Search-based QoS ranking prediction for web services in cloud environments.
Future Gener. Comput. Syst., 2015

2014
A Web services vulnerability testing approach based on combinatorial mutation and SOAP message mutation.
Serv. Oriented Comput. Appl., 2014

New Metrics for Prioritized Interaction Test Suites.
IEICE Trans. Inf. Syst., 2014

How to Do Tie-breaking in Prioritization of Interaction Test Suites?.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Adaptive random prioritization for interaction test suites.
Proceedings of the Symposium on Applied Computing, 2014

2013
Prioritization of Combinatorial Test Cases by Incremental Interaction Coverage.
Int. J. Softw. Eng. Knowl. Eng., 2013

Failure-detection capability analysis of implementing parallelism in adaptive random testing algorithms.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Prioritizing Variable-Strength Covering Array.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Describing Component Behavior Using Improved Chemical Abstract Machine.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

2012
Component Security Testing Approach Based on Extended Chemical Abstract Machine.
Int. J. Softw. Eng. Knowl. Eng., 2012

Generating Test Data for Structural Testing Based on Ant Colony Optimization.
Proceedings of the 2012 12th International Conference on Quality Software, 2012

Combinatorial Mutation Approach to Web Service Vulnerability Testing Based on SOAP Message Mutations.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

2011
Diagnosing Web Services System Based on Execution Traces Pattern Analysis.
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

2009
CSTS: A Prototype Tool for Testing COM Component Security.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2007
Testing Approach of Component Security Based on Dynamic Monitoring.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

An Auto-Generating Approach of Transactions Profile Graph in Detection of Malicious Transactions.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Testing Approach of Component Security Based on Fault Injection.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...