default search action
Hongyu Kuang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Gaigai Tang, Lin Yang, Long Zhang, Hongyu Kuang, Huiqiang Wang:
MRC-VulLoc: Software source code vulnerability localization based on multi-choice reading comprehension. Comput. Secur. 141: 103816 (2024) - [j8]Guoping Rong, Yongda Yu, Yifan Zhang, He Zhang, Haifeng Shen, Dong Shao, Hongyu Kuang, Min Wang, Zhao Wei, Yong Xu, Juhong Wang:
Distilling Quality Enhancing Comments From Code Reviews to Underpin Reviewer Recommendation. IEEE Trans. Software Eng. 50(7): 1658-1674 (2024) - [c20]Bohan Liu, He Zhang, Weigang Ma, Hongyu Kuang, Yi Yang, Jinwei Xu, Shan Gao, Jian Gao:
Mining Pull Requests to Detect Process Anomalies in Open Source Software Development. ICSE 2024: 194:1-194:13 - [c19]Hui Gao, Hongyu Kuang, Wesley K. G. Assunção, Christoph Mayr-Dorn, Guoping Rong, He Zhang, Xiaoxing Ma, Alexander Egyed:
TRIAD: Automated Traceability Recovery based on Biterm-enhanced Deduction of Transitive Links among Artifacts. ICSE 2024: 216:1-216:13 - [c18]Hongyu Kuang, Jingjing Zhang, Feng Yang, Long Zhang, Zhijian Huang, Lin Yang:
VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal Perspective. KSEM (3) 2024: 41-56 - [c17]Zhijian Huang, Shuguang Song, Han Liu, Hongyu Kuang, Jingjing Zhang, Pengfei Hu:
A Review on Binary Code Analysis Datasets. WASA (3) 2024: 199-214 - [i7]Chengyu Song, Linru Ma, Jianming Zheng, Jinzhi Liao, Hongyu Kuang, Lin Yang:
Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection. CoRR abs/2408.08902 (2024) - [i6]Kexin Sun, Yiding Ren, Hongyu Kuang, Hui Gao, Xiaoxing Ma, Guoping Rong, Dong Shao, He Zhang:
AVIATE: Exploiting Translation Variants of Artifacts to Improve IR-based Traceability Recovery in Bilingual Software Projects. CoRR abs/2409.19304 (2024) - 2023
- [j7]Hongyu Kuang, Jianli Li:
Stability of stochastic functional differential equations with impulses. Appl. Math. Lett. 145: 108735 (2023) - [j6]Ming Hao, Yue Qi, Rongji Xu, Kangqi Zhao, Mingqing Li, Yongyan Shan, Tian Xia, Kun Yang, Wuyang Hasi, Cong Zhang, Daowei Li, Yi Wang, Peng Wang, Hongyu Kuang:
ENCD: a manually curated database of experimentally supported endocrine system disease and lncRNA associations. Database J. Biol. Databases Curation 2023 (2023) - [j5]Gaigai Tang, Lin Yang, Long Zhang, Weipeng Cao, Lianxiao Meng, Hongbin He, Hongyu Kuang, Feng Yang, Huiqiang Wang:
An attention-based automatic vulnerability detection approach with GGNN. Int. J. Mach. Learn. Cybern. 14(9): 3113-3127 (2023) - [c16]Yuyou Wang, Hao Hu, Hongyu Kuang, Chenyou Fan, Liang Wang, Xianping Tao:
RL-Based CEP Operator Placement Method on Edge Networks Using Response Time Feedback. WISA 2023: 559-571 - [c15]Guoping Rong, Shenghui Gu, Haifeng Shen, He Zhang, Hongyu Kuang:
How Do Developers' Profiles and Experiences Influence their Logging Practices? An Empirical Study of Industrial Practitioners. ICSE 2023: 855-867 - [c14]Hongyu Kuang, Feng Yang, Long Zhang, Gaigai Tang, Lin Yang:
Leveraging User-Defined Identifiers for Counterfactual Data Generation in Source Code Vulnerability Detection. SCAM 2023: 143-150 - [i5]Hui Gao, Hongyu Kuang, Wesley K. G. Assunção, Christoph Mayr-Dorn, Guoping Rong, He Zhang, Xiaoxing Ma, Alexander Egyed:
TRIAD: Automated Traceability Recovery based on Biterm-enhanced Deduction of Transitive Links among Artifacts. CoRR abs/2312.16854 (2023) - 2022
- [j4]Hui Gao, Hongyu Kuang, Xiaoxing Ma, Hao Hu, Jian Lü, Patrick Mäder, Alexander Egyed:
Propagating frugal user feedback through closeness of code dependencies to improve IR-based traceability recovery. Empir. Softw. Eng. 27(2): 41 (2022) - [j3]Hongyu Kuang, Jian Wang, Ruilin Li, Chao Feng, Yunfei Su, Xing Zhang:
Automated detection on the security of the linked-list operations. Frontiers Comput. Sci. 16(2): 162201 (2022) - [c13]Yaxin Wang, Liang Wang, Hao Hu, Jing Jiang, Hongyu Kuang, Xianping Tao:
The Influence of Sponsorship on Open-Source Software Developers' Activities on GitHub. COMPSAC 2022: 924-933 - [c12]Guoping Rong, Yifan Zhang, Lanxin Yang, Fuli Zhang, Hongyu Kuang, He Zhang:
Modeling Review History for Reviewer Recommendation: A Hypergraph Approach. ICSE 2022: 1381-1392 - [c11]Kexin Sun, Xiaobo Shi, Hui Gao, Hongyu Kuang, Xiaoxing Ma, Guoping Rong, Dong Shao, Zheng Zhao, He Zhang:
Incorporating Pre-trained Transformer Models into TextCNN for Sentiment Analysis on Software Engineering Texts. Internetware 2022: 127-136 - [c10]Hui Gao, Hongyu Kuang, Kexin Sun, Xiaoxing Ma, Alexander Egyed, Patrick Mäder, Guoping Rong, Dong Shao, He Zhang:
Using Consensual Biterms from Text Structures of Requirements and Code to Improve IR-Based Traceability Recovery. ASE 2022: 114:1 - [c9]Hongbin He, Hongyu Kuang, Lin Yang, Feng Yang, Qiang Wang, Weipeng Cao:
Automated Reliability Analysis of Redundancy Architectures Using Statistical Model Checking. KSEM (3) 2022: 463-476 - [c8]Liming Dong, He Zhang, Wei Liu, Zhiluo Weng, Hongyu Kuang:
Semi-supervised pre-processing for learning-based traceability framework on real-world software projects. ESEC/SIGSOFT FSE 2022: 570-582 - [i4]Guoping Rong, Yifan Zhang, Lanxin Yang, Fuli Zhang, Hongyu Kuang, He Zhang:
Modeling Review History for Reviewer Recommendation: A Hypergraph Approach. CoRR abs/2204.09526 (2022) - [i3]Hui Gao, Hongyu Kuang, Kexin Sun, Xiaoxing Ma, Alexander Egyed, Patrick Mäder, Guoping Rong, Dong Shao, He Zhang:
Using Consensual Biterms from Text Structures of Requirements and Code to Improve IR-Based Traceability Recovery. CoRR abs/2209.01734 (2022) - 2021
- [c7]Kexin Sun, Hui Gao, Hongyu Kuang, Xiaoxing Ma, Guoping Rong, Dong Shao, He Zhang:
Exploiting the Unique Expression for Improved Sentiment Analysis in Software Engineering Text. ICPC 2021: 149-159 - [i2]Kexin Sun, Hui Gao, Hongyu Kuang, Xiaoxing Ma, Guoping Rong, Dong Shao, He Zhang:
Exploiting the Unique Expression for Improved Sentiment Analysis in Software Engineering Text. CoRR abs/2103.13154 (2021) - 2020
- [j2]Hongyu Kuang, Jian Wang, Ruilin Li, Chao Feng, Xing Zhang:
Automated Data-Processing Function Identification Using Deep Neural Network. IEEE Access 8: 55411-55423 (2020)
2010 – 2019
- 2019
- [c6]Sijia Xu, Hongyu Kuang, Zhuang Zhi, Renjie Hu, Yang Liu, Huyang Sun:
Macro Action Selection with Deep Reinforcement Learning in StarCraft. AIIDE 2019: 94-99 - [c5]Hongyu Kuang, Hui Gao, Hao Hu, Xiaoxing Ma, Jian Lu, Patrick Mäder, Alexander Egyed:
Using frugal user feedback with closeness analysis on code to improve IR-based traceability recovery. ICPC 2019: 369-379 - 2018
- [c4]Xinchen Cai, Hongyu Kuang, Hao Hu, Wei Song, Jian Lü:
Response Time Aware Operator Placement for Complex Event Processing in Edge Computing. ICSOC 2018: 264-278 - [i1]Sijia Xu, Hongyu Kuang, Zhi Zhuang, Renjie Hu, Yang Liu, Huyang Sun:
Macro action selection with deep reinforcement learning in StarCraft. CoRR abs/1812.00336 (2018) - 2017
- [c3]Yuhao Gong, Hongyu Kuang, Xinchen Cai, Hao Hu, Wei Song, Jian Lu:
Parallelized Mobility-Aware Complex Event Processing. ICWS 2017: 898-901 - [c2]Hongyu Kuang, Jia Nie, Hao Hu, Patrick Rempel, Jian Lu, Alexander Egyed, Patrick Mäder:
Analyzing closeness of code dependencies for improving IR-based Traceability Recovery. SANER 2017: 68-78 - 2015
- [j1]Hongyu Kuang, Patrick Mäder, Hao Hu, Achraf Ghabi, LiGuo Huang, Jian Lü, Alexander Egyed:
Can method data dependencies support the assessment of traceability between requirements and source code? J. Softw. Evol. Process. 27(11): 838-866 (2015) - 2012
- [c1]Hongyu Kuang, Patrick Mäder, Hao Hu, Achraf Ghabi, LiGuo Huang, Jian Lv, Alexander Egyed:
Do data dependencies in source code complement call dependencies for understanding requirements traceability? ICSM 2012: 181-190
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 21:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint