default search action
Jeong Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Young Rae Kim, Jeong Yang, Young Lee, Brandon Earwood:
Assessing Cybersecurity Problem-Solving Skills and Creativity of Engineering Students Through Model-Eliciting Activities Using an Analytic Rubric. IEEE Access 12: 5743-5759 (2024) - [c24]Hongyu Wang, Brian Kishiyama, David Lopez, Jeong Yang:
An Overview of Infrastructure as Code (IaC) with Performance and Availability Assessment on Google Cloud Platform. ACR 2024: 497-514 - [c23]Hongyu Wang, Jeong Yang, Gongbo Liang, Young Lee, Zechun Cao:
Analyzing the Usability, Performance, and Cost-Efficiency of Deploying ML Models on BigQuery ML and Vertex AI in Google Cloud. ICCBDC 2024: 15-25 - [i1]Ramya Jonnala, Gongbo Liang, Jeong Yang, Izzat Alsmadi:
Using Large Language Models in Public Transit Systems, San Antonio as a case study. CoRR abs/2407.11003 (2024) - 2023
- [c22]Anoop Abraham, Jeong Yang:
A Comparative Analysis of Performance and Usability on Serverless and Server-Based Google Cloud Services. ACR 2023: 408-422 - [c21]Young Lee, Jeong Yang, Young Rae Kim:
Adopting Model-Eliciting Activities in an Undergraduate Software Engineering Course Through Real-World Projects. FIE 2023: 1-5 - [c20]Young Lee, Arlen P. McDonald, Jeong Yang:
Identifying Code Tampering Using A Bytecode Comparison Analysis Tool. SERA 2023: 69-76 - 2022
- [j2]Mridula Shan, Jeong Yang:
Investigating the accessibility and impacts of cybersecurity programs on high-school girls' long-term industry engagement. Inf. Comput. Secur. 30(3): 309-323 (2022) - [c19]Anoop Abraham, Daniel Livingston, Izabella Guerra, Jeong Yang:
Exploring the Application of Machine Learning Algorithms to Water Quality Analysis. BCD 2022: 142-148 - [c18]Jeong Yang, Young Rae Kim, Brandon Earwood:
A Study of Effectiveness and Problem Solving on Security Concepts with Model-Eliciting Activities. FIE 2022: 1-9 - [c17]Jeong Yang, Young Lee, William Noon, Anoop Abraham:
Demo Abstract: SmartSAT - A Customizable Secure App for San Antonio Transit Pilot Project. MobiWac 2022: 123-127 - 2021
- [c16]Brandon Earwood, Jeong Yang, Young Rae Kim:
Effective Learning of Cybersecurity Concepts with Model-Eliciting Activities. TALE 2021: 1-7 - 2020
- [c15]Michael Alicea, Arlen P. McDonald, Chunyang Tang, Jeong Yang:
Exploring the Application of Machine Learning Algorithms to the City Public Bus Transport. BigDataSE 2020: 22-27
2010 – 2019
- 2018
- [j1]Jeong Yang, Young Lee, Kai H. Chang:
Evaluations of JaguarCode: A web-based object-oriented programming environment with static and dynamic visualization. J. Syst. Softw. 145: 147-163 (2018) - [c14]Akhtar Lodgher, Jeong Yang, Ummugul Bulut:
An Innovative Modular Approach of Teaching Cyber Security across Computing Curricula. FIE 2018: 1-5 - [c13]Jeong Yang, Akhtar Lodgher, Young Lee:
Secure Modules for Undergraduate Software Engineering Courses. FIE 2018: 1-5 - [c12]Sourabh Shivaji Kumbhar, Young Lee, Jeong Yang:
Hybrid Encryption for Securing SharedPreferences of Android Applications. ICDIS 2018: 246-249 - 2017
- [c11]Jeong Yang, Young Lee, Kai H. Chang:
Initial Evaluation of JaguarCode: A Web-Based Object-Oriented Programming Environment with Static and Dynamic Visualization. CSEE&T 2017: 152-161 - 2016
- [c10]Madhusudan Srinivasan, Young Lee, Jeong Yang:
Enhancing Object-Oriented Programming Comprehension Using Optimized Sequence Diagram. CSEE&T 2016: 81-85 - [c9]Brandon Earwood, Jeong Yang, Young Lee:
Impact of static and dynamic visualization in improving object-oriented programming concepts. FIE 2016: 1-5 - [c8]Madhusudan Srinivasan, Jeong Yang, Young Lee:
Case studies of optimized sequence diagram for program comprehension. ICPC 2016: 1-4 - [c7]Jeong Yang, Young Lee, David Hicks:
Synchronized static and dynamic visualization in a web-based programming environment. ICPC 2016: 1-4 - 2015
- [c6]Jeong Yang, Young Lee, David Hicks, Kai-Hsiung Chang:
Enhancing object-oriented programming education using static and dynamic visualization. FIE 2015: 1-5 - 2010
- [c5]Young Lee, Jeong Yang:
Identifying Architectural Changes Using Software Metrics. Software Engineering Research and Practice 2010: 370-375
2000 – 2009
- 2008
- [c4]Young Lee, Jeong Yang, Kai H. Chang:
Identifying Connected Classes for Software Reuse and Maintenance. SCSS (1) 2008: 389-393 - [c3]Young Lee, Jeong Yang:
Visualization of Software Evolution. Software Engineering Research and Practice 2008: 343-348 - 2007
- [c2]Young Lee, Jeong Yang, Kai H. Chang:
Metrics and Evolution in Open Source Software. QSIC 2007: 191-197 - 2005
- [c1]Jeong Yang, T. Dean Hendrix, Kai H. Chang, David A. Umphress:
An empirical validation of complexity profile graph. ACM Southeast Regional Conference (1) 2005: 143-149
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint