![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Chunying Zhao
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j8]Juechen Yang
, Jun Kong, Chunying Zhao:
A Smartphone-Based Cursor Position System in Cross-Device Interaction Using Machine Learning Techniques. Sensors 21(5): 1665 (2021) - 2020
- [j7]Chunying Zhao, Cong Chen, Kang Zhang, Jun Kong:
ViBERT: Visual Behavior Regression Testing. J. Vis. Lang. Sentient Syst. 2020(2): 31-41 (2020)
2010 – 2019
- 2017
- [j6]Di Wang, Chunying Zhao, Jun Kong:
The Fusion of an Ultrasonic and Spatially Aware System in a Mobile-Interaction Device. Symmetry 9(8): 137 (2017) - 2014
- [j5]Krishna C. Chinthakayala, Chunying Zhao, Jun Kong, Kang Zhang:
A comparative study of three social networking websites. World Wide Web 17(6): 1233-1259 (2014) - 2013
- [j4]Ankita Kohli, Chunying Zhao, Jun Kong:
Automatic Usability Evaluation of Mobile Web Pages with XML. Int. J. Handheld Comput. Res. 4(3): 19-40 (2013) - 2012
- [j3]Jun Kong, Omer Barkol, Ruth Bergman, Ayelet Pnueli, Sagi Schein, Kang Zhang, Chunying Zhao:
Web Interface Interpretation Using Graph Grammars. IEEE Trans. Syst. Man Cybern. Part C 42(4): 590-602 (2012) - 2011
- [c10]Yan Zhang, Yiyu Jia, Chunying Zhao:
Top Subspace Synthesizing for Promotional Subspace Mining. ICTAI 2011: 894-895 - 2010
- [j2]Chunying Zhao, Jun Kong, Kang Zhang:
Program Behavior Discovery and Verification: A Graph Grammar Approach. IEEE Trans. Software Eng. 36(3): 431-448 (2010)
2000 – 2009
- 2009
- [c9]Chunying Zhao, Kang Zhang, Yu Lei:
Abstraction of multiple executions of object-oriented programs. SAC 2009: 549-550 - [c8]Chunying Zhao, Kang Zhang, Jie Hao, W. Eric Wong:
Visualizing Multiple Program Executions to Assist Behavior Verification. SSIRI 2009: 113-122 - 2008
- [c7]Chunying Zhao, Gongde Guo, Xuming Huang, Tianqiang Huang, Daniel Neagu:
Data Reduction and Classification based on Multiple Classifier Behavior. DMIN 2008: 78-83 - [c6]Chunying Zhao, Kang Zhang:
A Grammar-Based Reverse Engineering Framework for Behavior Verification. HASE 2008: 449-452 - [c5]Chunying Zhao, Keven Ates, Jun Kong, Kang Zhang:
Discovering Program's Behavioral Patterns by Inferring Graph-Grammars from Execution Traces. ICTAI (2) 2008: 395-402 - 2007
- [j1]Chunying Zhao, Jun Kong, Jing Dong, Kang Zhang:
Pattern-based design evolution using graph transformation. J. Vis. Lang. Comput. 18(4): 378-398 (2007) - [c4]Chunying Zhao, Jun Kong, Kang Zhang:
Design Pattern Evolution and Verification Using Graph Transformation. HICSS 2007: 290 - [c3]Chunying Zhao, Kang Zhang:
Transformational Approaches to Model Driven Architecture - A Review. SEW 2007: 67-74 - 2005
- [c2]Chunying Zhao, Jingtai Liu, Yujuan Li, Tao Chen, Lei Sun:
Virtual Repulsive Force in Competitive Multi-Robot Teleoperation. ICITA (2) 2005: 15-20 - [c1]Jingtai Liu, Lei Sun, Tao Chen, Xingbo Huang, Chunying Zhao:
Competitive Multi-robot Teleoperation. ICRA 2005: 75-80
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint