![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Tiantian Wang 0001
Person information
- affiliation (PhD 2009): Harbin Institute of Technology, School of Computer Science and Technology, China
Other persons with the same name
- Tiantian Wang — disambiguation page
- Tiantian Wang 0002 — Dalian University of Technology, School of Information and Communication Engineering, China
- Tiantian Wang 0003
— University of Electronic Science and Technology of China, School of Information and Communication Engineering, Chengdu, China
- Tiantian Wang 0004
— Central South University, School of Traffic and Transportation Engineering, Changsha, China (and 1 more)
- Tiantian Wang 0005
— Southwest University, China
- Tiantian Wang 0006 — Zhejiang University, China
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Yuan Jiang, Yujian Zhang, Xiaohong Su, Christoph Treude, Tiantian Wang:
StagedVulBERT: Multigranular Vulnerability Detection With a Novel Pretrained Code Model. IEEE Trans. Software Eng. 50(12): 3454-3471 (2024) - [i1]Yuan Jiang, Yujian Zhang, Xiaohong Su, Christoph Treude, Tiantian Wang:
StagedVulBERT: Multi-Granular Vulnerability Detection with a Novel Pre-trained Code Model. CoRR abs/2410.05766 (2024) - 2023
- [j18]Yuan Jiang
, Xiaohong Su, Christoph Treude
, Chao Shang, Tiantian Wang
:
Does Deep Learning improve the performance of duplicate bug report detection? An empirical study. J. Syst. Softw. 198: 111607 (2023) - [c8]Ziyue Wei
, Weining Zheng
, Xiaohong Su
, Wenxin Tao
, Tiantian Wang
:
A Graph Neural Network-Based Smart Contract Vulnerability Detection Method with Artificial Rule. ICANN (4) 2023: 241-252 - 2022
- [j17]Tiantian Wang
, HaiLong Yu
, Kechao Wang, Xiaohong Su:
Fault localization based on wide & deep learning model by mining software behavior. Future Gener. Comput. Syst. 127: 309-319 (2022) - [j16]Dan Gong
, Tiantian Wang, Xiaohong Su:
Golden Mutator Recommendation Based on Mutation Pattern Mining. Int. J. Pattern Recognit. Artif. Intell. 36(8): 2250025:1-2250025:19 (2022) - [j15]Dan Gong
, Tiantian Wang, Xiaohong Su, Yanhang Zhang:
Equivalent Mutants Detection Based on Weighted Software Behavior Graph. Int. J. Softw. Eng. Knowl. Eng. 32(6): 819-843 (2022) - [j14]Yuan Jiang
, Xiaohong Su, Christoph Treude
, Tiantian Wang
:
Hierarchical semantic-aware neural code representation. J. Syst. Softw. 191: 111355 (2022) - 2020
- [j13]Yuan Jiang
, Pengcheng Lu, Xiaohong Su, Tiantian Wang:
LTRWES: A new framework for security bug report detection. Inf. Softw. Technol. 124: 106314 (2020) - [j12]Tiantian Wang, Kechao Wang, Xiaohong Su:
Fault localization by analyzing failure propagation with samples in cloud computing environment. J. Cloud Comput. 9: 17 (2020) - [j11]Tiantian Wang, Kechao Wang, Xiaohong Su, Lin Liu:
Data Mining in Programs: Clustering Programs Based on Structure Metrics and Execution Values. Int. J. Data Warehous. Min. 16(2): 48-63 (2020)
2010 – 2019
- 2019
- [j10]Tiantian Wang, Kechao Wang, Xiaohong Su, Lei Zhang
:
Invariant based fault localization by analyzing error propagation. Future Gener. Comput. Syst. 94: 549-563 (2019) - [j9]Tiantian Wang
, JiaHuan Xu, Xiaohong Su, ChenShi Li, Yang Chi:
Automatic debugging of operator errors based on efficient mutation analysis. Multim. Tools Appl. 78(21): 29881-29898 (2019) - 2018
- [j8]Kechao Wang, Tiantian Wang
, Xiaohong Su:
Test case selection using multi-criteria optimization for effective fault localization. Computing 100(8): 787-808 (2018) - [j7]CholMyong Pak, Tiantian Wang, Xiaohong Su:
An Empirical Study on Software Defect Prediction Using Over-Sampling by SMOTE. Int. J. Softw. Eng. Knowl. Eng. 28(6): 811-830 (2018) - 2017
- [j6]Zhixiang Tong
, Xiaohong Su
, Longzhu Cen, Tiantian Wang:
Greening Software Requirements Change Management Strategy Based on Nash Equilibrium. Wirel. Commun. Mob. Comput. 2017 (2017) - [c7]Syed Rizwan, Tiantian Wang, Xiaohong Su, Salahuddin
:
Empirical Study on Software Bug Prediction. ICSEB 2017: 55-59 - 2016
- [c6]Xiaohong Su, Jing Qiu, Tiantian Wang, Lingling Zhao:
Optimization and improvements of a Moodle-Based online learning system for C programming. FIE 2016: 1-8 - 2015
- [j5]Dandan Gong, Xiaohong Su, Tiantian Wang, Peijun Ma, Wang Yu:
State dependency probabilistic model for fault localization. Inf. Softw. Technol. 57: 430-445 (2015) - [c5]Xiaohong Su, Tiantian Wang, Jing Qiu, Lingling Zhao:
Motivating students with new mechanisms of online assignments and examination to meet the MOOC challenges for programming. FIE 2015: 1-6 - [c4]Lingling Zhao, Xiaohong Su, Tiantian Wang, Yongfeng Yuan:
Interest-driven and innovation-oriented practice for programming course. FIE 2015: 1-6 - 2014
- [j4]Tiantian Wang, Kechao Wang, Xiaohong Su, Peijun Ma:
Detection of semantically similar code. Frontiers Comput. Sci. 8(6): 996-1011 (2014) - 2013
- [j3]Dandan Gong, Tiantian Wang, Xiaohong Su, Peijun Ma:
A test-suite reduction approach to improving fault-localization effectiveness. Comput. Lang. Syst. Struct. 39(3): 95-108 (2013) - [c3]Tiantian Wang, Mark Harman
, Yue Jia, Jens Krinke
:
Searching for better configurations: a rigorous approach to clone evaluation. ESEC/SIGSOFT FSE 2013: 455-465 - 2011
- [j2]Tiantian Wang, Xiaohong Su, Peijun Ma, Yuying Wang, Kuanquan Wang:
Ability-training-oriented automated assessment in introductory programming course. Comput. Educ. 56(1): 220-226 (2011)
2000 – 2009
- 2008
- [c2]Tiantian Wang, Xiaohong Su, Peijun Ma:
Program Normalization for Removing Code Variations. CSSE (2) 2008: 306-309 - [c1]Tiantian Wang, Xiaohong Su, Peijun Ma:
Normalization for Removing Code Variations in Modular Programs. ISCSCT (2) 2008: 21-24 - 2007
- [j1]Tiantian Wang, Xiaohong Su, Yuying Wang, Peijun Ma:
Semantic similarity-based grading of student programs. Inf. Softw. Technol. 49(2): 99-107 (2007)
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-31 23:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint