Zhiqiu Huang
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
Empir. Softw. Eng., September, 2024
Exploring the Impact of Vocabulary Techniques on Code Completion: A Comparative Approach.
Int. J. Softw. Eng. Knowl. Eng., May, 2024
Concurr. Comput. Pract. Exp., May, 2024
Serv. Oriented Comput. Appl., March, 2024
IEEE Trans. Cloud Comput., 2024
Coding-PTMs: How to Find Optimal Code Pre-trained Models for Code Embedding in Vulnerability Detection?
CoRR, 2024
A model transformation based security policy automatic management framework for software-defined networking.
Comput. Secur., 2024
ASTSDL: predicting the functionality of incomplete programming code via an AST-sequence-based deep learning model.
Sci. China Inf. Sci., 2024
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024
2023
ACM Trans. Softw. Eng. Methodol., November, 2023
Supporting maintenance and testing for AI functions of mobile apps based on user reviews: An empirical study on plant identification apps.
J. Softw. Evol. Process., November, 2023
Multicriteria decision making taxonomy of code recommendation system challenges: a fuzzy-AHP analysis.
Inf. Technol. Manag., June, 2023
Int. J. Comput. Intell. Appl., June, 2023
What Is the Intended Usage Context of This Model? An Exploratory Study of Pre-Trained Models on Various Model Repositories.
ACM Trans. Softw. Eng. Methodol., May, 2023
BEQAIN: An Effective and Efficient Identifier Normalization Approach With BERT and the Question Answering System.
IEEE Trans. Software Eng., April, 2023
A Comprehensive Investigation of the Impact of Class Overlap on Software Defect Prediction.
IEEE Trans. Software Eng., April, 2023
IEEE Trans. Reliab., March, 2023
CRAM: Code Recommendation With Programming Context Based on Self-Attention Mechanism.
IEEE Trans. Reliab., March, 2023
Educ. Inf. Technol., January, 2023
Model-Based Reinforcement Learning and Neural-Network-Based Policy Compression for Spacecraft Rendezvous on Resource-Constrained Embedded Systems.
IEEE Trans. Ind. Informatics, 2023
Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2023
J. Syst. Softw., 2023
DLRegion: Coverage-guided fuzz testing of deep neural networks with region-based neuron selection strategies.
Inf. Softw. Technol., 2023
CoRR, 2023
CoRR, 2023
A Practical Runtime Security Policy Transformation Framework for Software Defined Networks.
CoRR, 2023
An accident prediction architecture based on spatio-clock stochastic and hybrid model for autonomous driving safety.
Concurr. Comput. Pract. Exp., 2023
DABAC: Smart Contract-Based Spatio-Temporal Domain Access Control for the Internet of Things.
IEEE Access, 2023
Test Input Selection for Deep Neural Network Enhancement Based on Multiple-Objective Optimization.
Proceedings of the IEEE International Conference on Software Analysis, 2023
Run-Time Assured Reinforcement Learning for Safe Spacecraft Rendezvous with Obstacle Avoidance.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2023
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
Multi-Objective White-Box Test Input Selection for Deep Neural Network Model Enhancement.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023
A Fine-Grained Evaluation of Mutation Operators for Deep Learning Systems: A Selective Mutation Approach.
Proceedings of the 14th Asia-Pacific Symposium on Internetware, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
Optimized Tokenization Process for Open-Vocabulary Code Completion: An Empirical Study.
Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Reliab., 2022
Do Developers Really Know How to Use Git Commands? A Large-scale Study Using Stack Overflow.
ACM Trans. Softw. Eng. Methodol., 2022
Softw. Pract. Exp., 2022
ASTENS-BWA: Searching partial syntactic similar regions between source code fragments via AST-based encoded sequence alignment.
Sci. Comput. Program., 2022
Int. J. Mach. Learn. Cybern., 2022
Frontiers Inf. Technol. Electron. Eng., 2022
Frontiers Inf. Technol. Electron. Eng., 2022
Random or heuristic? An empirical study on path search strategies for test generation in KLEE.
J. Syst. Softw., 2022
J. Comput. Sci. Technol., 2022
SDN-Based Privacy and Functional Authentication Scheme for Fog Nodes of Smart Healthcare.
IEEE Internet Things J., 2022
Int. J. Softw. Eng. Knowl. Eng., 2022
Statistical Model Checking for Stochastic and Hybrid Autonomous Driving Based on Spatio-Clock Constraints.
Int. J. Softw. Eng. Knowl. Eng., 2022
Int. J. Softw. Eng. Knowl. Eng., 2022
Privacy regulation aware service selection for multi-provision cloud service composition.
Future Gener. Comput. Syst., 2022
Frontiers Comput. Sci., 2022
Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection.
CoRR, 2022
SysML-based compositional verification and safety analysis for safety-critical cyber-physical systems.
Connect. Sci., 2022
Proceedings of the 4th World Symposium on Software Engineering, 2022
Proceedings of the 22nd IEEE International Working Conference on Source Code Analysis and Manipulation, 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Filling Missing Labels in Label Distribution Learning by Exploiting Label-Specific Feature Selection.
Proceedings of the International Joint Conference on Neural Networks, 2022
SIA-Net: Scalable Interaction-Aware Network for Vehicle Trajectory Prediction Based on Self-Attention.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022
2021
IEEE Trans. Software Eng., 2021
Enriching API Documentation with Code Samples and Usage Scenarios from Crowd Knowledge.
IEEE Trans. Software Eng., 2021
IEEE Trans. Intell. Transp. Syst., 2021
Towards a Statistical Model Checking Method for Safety-Critical Cyber-Physical System Verification.
Secur. Commun. Networks, 2021
A strategy-proof auction mechanism for service composition based on user preferences.
Frontiers Inf. Technol. Electron. Eng., 2021
Analyzing close relations between target artifacts for improving IR-based requirement traceability recovery.
Frontiers Inf. Technol. Electron. Eng., 2021
C2AADL_Reverse: A model-driven reverse engineering approach to development and verification of safety-critical software.
J. Syst. Archit., 2021
J. Comput. Sci. Technol., 2021
DeepBackground: Metamorphic testing for Deep-Learning-driven image recognition systems accompanied by Background-Relevance.
Inf. Softw. Technol., 2021
Int. J. Softw. Eng. Knowl. Eng., 2021
Int. J. Softw. Eng. Knowl. Eng., 2021
Improving source code suggestion with code embedding and enhanced convolutional long short-term memory.
IET Softw., 2021
Exploiting augmented intelligence in the modeling of safety-critical autonomous systems.
Formal Aspects Comput., 2021
SDN-based Runtime Security Enforcement Approach for Privacy Preservation of Dynamic Web Service Composition.
CoRR, 2021
SPASC: Strategy-proof auction mechanism with cost and QoS incentive for service composition.
Concurr. Comput. Pract. Exp., 2021
A security policy model transformation and verification approach for software defined networking.
Comput. Secur., 2021
Recovering Semantic Traceability between Requirements and Source Code Using Feature Representation Techniques.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
A system for detecting third-party tracking through the combination of dynamic analysis and static analysis.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021
2020
SeqST-GAN: Seq2Seq Generative Adversarial Nets for Multi-step Urban Crowd Flow Prediction.
ACM Trans. Spatial Algorithms Syst., 2020
An Approach to Generate the Traceability Between Restricted Natural Language Requirements and AADL Models.
IEEE Trans. Reliab., 2020
SDN-Based Security Enforcement Framework for Data Sharing Systems of Smart Healthcare.
IEEE Trans. Netw. Serv. Manag., 2020
J. Softw. Evol. Process., 2020
GPS Trajectory Completion Using End-to-End Bidirectional Convolutional Recurrent Encoder-Decoder Architecture with Attention Mechanism.
Sensors, 2020
Frontiers Inf. Technol. Electron. Eng., 2020
计算机科学, 2020
智能化信息物理系统中非确定性的分类研究 (Taxonomy of Uncertainty Factors in Intelligence-oriented Cyber-physical Systems).
计算机科学, 2020
Inf. Softw. Technol., 2020
Identifying security issues for mobile applications based on user review summarization.
Inf. Softw. Technol., 2020
Inf. Softw. Technol., 2020
CodeGRU: Context-aware deep learning with gated recurrent unit for source code modeling.
Inf. Softw. Technol., 2020
Int. J. Softw. Eng. Knowl. Eng., 2020
Frontiers Comput. Sci., 2020
Sci. China Inf. Sci., 2020
Exploring the Characteristics of Identifiers: A Large-Scale Empirical Study on 5, 000 Open Source Projects.
IEEE Access, 2020
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Metamorphic Testing for Plant Identification Mobile Applications Based on Test Contexts.
Proceedings of the Mobile Computing, Applications, and Services, 2020
ASPDup: AST-Sequence-based Progressive Duplicate Code Detection Tool for Onsite Programming Code.
Proceedings of the Internetware'20: 12th Asia-Pacific Symposium on Internetware, 2020
Proceedings of the Internetware'20: 12th Asia-Pacific Symposium on Internetware, 2020
Towards continues code recommendation and implementation system: An Initial Framework.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
SSMDL: Semi-supervised Multi-task Deep Learning for Transportation Mode Classification and Path Prediction with GPS Trajectories.
Proceedings of the Web and Big Data - 4th International Joint Conference, 2020
Deep neural architecture for geospatial trajectory completion over occupancy gridmap.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020
2019
Efficient Traffic Estimation With Multi-Sourced Data by Parallel Coupled Hidden Markov Model.
IEEE Trans. Intell. Transp. Syst., 2019
Mob. Networks Appl., 2019
Augmenting Java method comments generation with context information based on neural networks.
J. Syst. Softw., 2019
面向大数据的隐私发布暴露检测方法 (Big Data Oriented Privacy Disclosure Detection Method for Information Release).
计算机科学, 2019
IEICE Trans. Inf. Syst., 2019
Behavior-aware Service Access Control Mechanism using Security Policy Monitoring for SOA Systems.
CoRR, 2019
A topology-aware access control model for collaborative cyber-physical spaces: Specification and verification.
Comput. Secur., 2019
SENSORY: Leveraging Code Statement Sequence Information for Code Snippets Recommendation.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
2018
Detecting safety-related components in statecharts through traceability and model slicing.
Softw. Pract. Exp., 2018
Frontiers Inf. Technol. Electron. Eng., 2018
Using information flow analysis to detect implicit information leaks for web service composition.
Frontiers Inf. Technol. Electron. Eng., 2018
Spectrum-Based Fault Localization Using Fault Triggering Model to Refine Fault Ranking List.
IEICE Trans. Inf. Syst., 2018
Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities.
Future Gener. Comput. Syst., 2018
Comput. J., 2018
Comput. Electr. Eng., 2018
IEEE Access, 2018
Spectrum-Based Fault Localization via Enlarging Non-Fault Region to Improve Fault Absolute Ranking.
IEEE Access, 2018
Proceedings of the 16th ACM/IEEE International Conference on Formal Methods and Models for System Design, 2018
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018
2017
Computing Urban Traffic Congestions by Incorporating Sparse GPS Probe Data and Social Media Data.
ACM Trans. Inf. Syst., 2017
Softw. Qual. J., 2017
Softw. Pract. Exp., 2017
υ-Support vector machine based on discriminant sparse neighborhood preserving embedding.
Pattern Anal. Appl., 2017
J. Log. Comput., 2017
支持抽象解释的静态分析方法的形式化体系研究 (Research on Static Analysis Formalism Supporting Abstract Interpretation).
计算机科学, 2017
基于本体概念相似度的软件构件检索方法 (Software Component Retrieval Method Based on Ontology Concept Similarity).
计算机科学, 2017
Lightweight fault localization combined with fault context to improve fault absolute rank.
Sci. China Inf. Sci., 2017
IEEE Access, 2017
Evaluating Data Filter on Cross-Project Defect Prediction: Comparison and Improvements.
IEEE Access, 2017
Privacy Disclosure Checking Method Applied on Collaboration Interactions Among SaaS Services.
IEEE Access, 2017
Proceedings of the Intelligence and Security Informatics - 12th Pacific Asia Workshop, 2017
Proceedings of the Machine Learning and Intelligent Communications, 2017
Intrusion Detection with Tree-Based Data Mining Classification Techniques by Using KDD.
Proceedings of the Machine Learning and Intelligent Communications, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
2016
计算机科学, 2016
Secure and controllable k-NN query over encrypted cloud data with key confidentiality.
J. Parallel Distributed Comput., 2016
Multi-Resource Modeling of Real-Time Software Based on Resource Timed Process Algebra.
Int. J. Softw. Eng. Knowl. Eng., 2016
Int. J. Approx. Reason., 2016
Comput. J., 2016
Proceedings of the International Conference on Software Analysis, Testing and Evolution, 2016
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016
Proceedings of the IEEE 17th International Conference on Mobile Data Management, 2016
Proceedings of the Formal Methods and Software Engineering, 2016
2015
IEEE Trans. Dependable Secur. Comput., 2015
J. Softw., 2015
故障树领域本体及SWRL规则的构建方法研究 (Construction Method for Fault Tree Domain Ontology Supporting SWRL Rules).
计算机科学, 2015
一种基于故障扩展SysML活动图的安全性验证框架研究 (Research on Framework of Safety Verification Based on Fault-extended SysML Activity Diagram).
计算机科学, 2015
一种结合线性时序逻辑和故障树的软件安全验证方法 (Method Combining Linear Temporal Logic and Fault Tree for Software Safety Verification).
计算机科学, 2015
基于属性的支持策略本体推理的访问控制方法研究 (Attribute-based Access Control Method Supporting Policies Ontology Reasoning).
计算机科学, 2015
标准模型下增强的无需安全信道的带关键词搜索的公钥加密 (Secure Channel Free Searchable Encryption in Standard Model).
计算机科学, 2015
J. Commun., 2015
Frontiers Comput. Sci., 2015
SGAM: strategy-proof group buying-based auction mechanism for virtual machine allocation in clouds.
Concurr. Comput. Pract. Exp., 2015
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015
2014
Using Game Theory to Analyze Strategic Choices of Service Providers and Service Requesters.
J. Softw., 2014
J. Softw., 2014
J. Softw., 2014
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing.
J. Appl. Math., 2014
IEICE Trans. Inf. Syst., 2014
OMReasoner: combination of multi-matchers for ontology matching: results for OAEI 2014.
Proceedings of the 9th International Workshop on Ontology Matching collocated with the 13th International Semantic Web Conference (ISWC 2014), 2014
Strategy-Proof Auction Mechanism with Group Price for Virtual Machine Allocation in Clouds.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014
2013
Knowl. Based Syst., 2013
Proceedings of the Rough Sets and Knowledge Technology - 8th International Conference, 2013
Proceedings of the 2013 Middleware Doctoral Symposium, 2013
2012
Comput. Informatics, 2012
OMReasoner: using multi-matchers and reasoner for ontology matching: results for OAEI 2012.
Proceedings of the 7th International Workshop on Ontology Matching, 2012
Feature modeling and Verification based on Description Logics.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012
A Graph Transformation Based Approach for Modeling Component-Level Migration in Mobile Environments.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
2011
Unified Modelling Functional and Non-Functional Aspects of Web Services Composition Using PTCCS 1.
Int. J. Web Serv. Res., 2011
Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms.
Expert Syst. Appl., 2011
Comput. Stand. Interfaces, 2011
Proceedings of the 6th International Workshop on Ontology Matching, 2011
2010
Proceedings of the Web Information Systems and Mining - International Conference, 2010
Making Architectural Decisions Based on Requirements: Analysis and Combination of Risk-Based and Quality Attribute-Based Methods.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010
An MDE Based Approach for Generating Software Architecture Models from Formal Specifications.
Proceedings of the 10th International Conference on Quality Software, 2010
Multi-objective Fuzzy Clustering Method for Image Segmentation Based on Variable-Length Intelligent Optimization Algorithm.
Proceedings of the Advances in Computation and Intelligence - 5th International Symposium, 2010
Proceedings of the IEEE International Conference on Web Services, 2010
Checking Structural Integrity for Metadata Repository Systems by Means of Description Logics.
Proceedings of the Database Systems for Advanced Applications, 2010
2009
Fundam. Informaticae, 2009
Modeling and Verification of Automatic Multi-business Transactions.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009
Proceedings of the First Asia-Pacific Symposium on Internetware, 2009
Proceedings of the IEEE International Conference on Web Services, 2009
Proceedings of the IEEE International Conference on Web Services, 2009
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009
2008
Proceedings of the Rough Sets and Knowledge Technology, Third International Conference, 2008
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2007
Proceedings of the Workshop on Intelligent Information Technology Application, 2007
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007
2006
Proceedings of the OWLED*06 Workshop on OWL: Experiences and Directions, 2006
Proceedings of the Conceptual Modeling, 2006