


default search action
Shihai Wang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Wentao Wu, Shihai Wang, Bin Liu, Yuanxun Shao, Wandong Xie:
A novel software defect prediction approach via weighted classification based on association rule mining. Eng. Appl. Artif. Intell. 129: 107622 (2024) - [j22]Zhe Liu
, Shihai Wang
, Bin Liu
, Rui Kang
:
Optimal Release Policy for Software with Epistemic Uncertainty. J. Uncertain Syst. 17(3): 2450007:1-2450007:29 (2024) - [j21]Yujie Ren
, Bin Liu
, Shihai Wang
:
Joint Instance and Feature Adaptation for Heterogeneous Defect Prediction. IEEE Trans. Reliab. 73(1): 741-756 (2024) - [c14]Meng Tian, Shihai Wang, Wentao Wu, Wandong Xie:
A Novel Approach for Software Defect Prediction Through Relational Association Rules Based on Cost-Sensitive Learning. QRS Companion 2024: 880-886 - [c13]Tengfei Shi, Shihai Wang, Haoran Li, Shudi Guo, Yu Liu:
Generating Adversarial Samples Based on the Attack Robust Training Model. QRS Companion 2024: 896-901 - [c12]Yingxian Guo, Shihai Wang, Dong An, Yu Luo:
StasogFL: A Fault Localization Method Based on Statement Association Graph. QRS Companion 2024: 902-909 - [c11]Wentao Wu, Shihai Wang, Yuanxun Shao, Wandong Xie:
Software fault localization based on eigenvector centrality in complex network theory. QRS Companion 2024: 934-939 - 2023
- [j20]Haonan Tong
, Wei Lu, Weiwei Xing, Shihai Wang:
ARRAY: Adaptive triple feature-weighted transfer Naive Bayes for cross-project defect prediction. J. Syst. Softw. 202: 111721 (2023) - 2022
- [j19]Haonan Tong
, Wei Lu, Weiwei Xing, Bin Liu, Shihai Wang:
SHSE: A subspace hybrid sampling ensemble method for software defect number prediction. Inf. Softw. Technol. 142: 106747 (2022) - [j18]Can Cui, Bin Liu, Shihai Wang
:
WIFLF: An approach independent of the target project for cross-project defect prediction. J. Softw. Evol. Process. 34(12) (2022) - [c10]Mingxing Zhang, Shihai Wang, Weiguo Qiu:
A Software Multi-fault Locating Technique based on Space Shrinkage. DSA 2022: 853-858 - [c9]Haoran Li, Shihai Wang, Tengfei Shi, Xinyue Fang, Jian Chen:
TSDTest: A Efficient Coverage Guided Two-Stage Testing for Deep Learning Systems. QRS Companion 2022: 173-178 - [c8]Dong An, Shihai Wang, Liandie Zhu, Xunli Yang, Xiaobo Yan:
Prefilter: A Fault Localization Method using Unlabelled Test Cases based on K-Means Clustering and Similarity. QRS Companion 2022: 263-269 - [c7]Wentao Wu, Shihai Wang, Yuanxun Shao, Mingxing Zhang, Wandong Xie:
A Software Defect Prediction Classifier based on Three Minimum Support Threshold Association Rule Mining. QRS Companion 2022: 278-282 - [c6]Mingxing Zhang, Shihai Wang, Wentao Wu, Weiguo Qiu, Wandong Xie:
A Software Multi-Fault Clustering Ensemble Technology. QRS Companion 2022: 352-358 - 2021
- [j17]Xiaobo Yan, Bin Liu, Shihai Wang, Dong An, Feng Zhu, Yelin Yang:
Efilter: An effective fault localization based on information entropy with unlabelled test cases. Inf. Softw. Technol. 134: 106543 (2021) - [j16]Xiaobo Yan, Bin Liu, Shihai Wang:
A Test Restoration Method based on Genetic Algorithm for effective fault localization in multiple-fault programs. J. Syst. Softw. 172: 110861 (2021) - [j15]Haonan Tong
, Bin Liu, Shihai Wang
:
Kernel Spectral Embedding Transfer Ensemble for Heterogeneous Defect Prediction. IEEE Trans. Software Eng. 47(9): 1886-1906 (2021) - 2020
- [j14]Yuanxun Shao, Bin Liu, Shihai Wang, Guoqi Li:
Software defect prediction based on correlation weighted class association rule mining. Knowl. Based Syst. 196: 105742 (2020) - [c5]Shudi Guo, Shihai Wang, Bin Liu, Tengfei Shi:
KBAA: An adversarial example generation method for KBQA task. DSA 2020: 313-318
2010 – 2019
- 2019
- [j13]Xiaobo Yan, Bin Liu, Shihai Wang
:
An Analysis on the Negative Effect of Multiple-Faults for Spectrum-Based Fault Localization. IEEE Access 7: 2327-2347 (2019) - [d1]Shihai Wang:
Datasets for Kernel Spectral Embedding Transfer Ensemble for Heterogeneous Defect Prediction. IEEE DataPort, 2019 - [i1]Haonan Tong, Bin Liu, Shihai Wang, Qiuying Li:
Transfer-Learning Oriented Class Imbalance Learning for Cross-Project Defect Prediction. CoRR abs/1901.08429 (2019) - 2018
- [j12]Rongbin Han, Shihai Wang
, Bin Liu, Tingdi Zhao, Zhiao Ye:
A Novel Model-Based Dynamic Analysis Method for State Correlation With IMA Fault Recovery. IEEE Access 6: 22094-22107 (2018) - [j11]Yuanxun Shao
, Bin Liu, Shihai Wang, Guoqi Li:
A novel software defect prediction based on atomic class-association rule mining. Expert Syst. Appl. 114: 237-254 (2018) - [j10]Haonan Tong, Bin Liu, Shihai Wang:
Software defect prediction using stacked denoising autoencoders and two-stage ensemble learning. Inf. Softw. Technol. 96: 94-111 (2018) - [j9]Peng Xiao
, Bin Liu, Shihai Wang:
Feedback-based integrated prediction: Defect prediction based on feedback from software testing process. J. Syst. Softw. 143: 159-171 (2018) - 2016
- [j8]Quan Zhang, Shihai Wang, Bin Liu:
Approach for integrated modular avionics reconfiguration modelling and reliability analysis based on AADL. IET Softw. 10(1): 18-25 (2016) - [j7]Xiaoxu Diao, Bin Liu, Shihai Wang:
A survey of avionics analysis and simulation based on AADL model. Int. J. Inf. Commun. Technol. 9(3): 282-299 (2016) - 2015
- [j6]Fuqun Huang
, Bin Liu, Shihai Wang, Qiuying Li:
The impact of software process consistency on residual defects. J. Softw. Evol. Process. 27(9): 625-646 (2015) - 2014
- [j5]Dongyi Ling, Shihai Wang, Bin Liu, Xiaoqi Xing:
Reliability Evaluation based on the AADL Architecture Model. J. Networks 9(10): 2721-2727 (2014) - [j4]Renqing Li, Shihai Wang:
An Empirical Study for Software Fault-Proneness Prediction with Ensemble Learning Models on Imbalanced Data Sets. J. Softw. 9(3): 697-704 (2014) - [c4]Shihai Wang, Zelin Li:
A new transfer learning Boosting approach based on distribution measure with an application on facial expression recognition. IJCNN 2014: 432-439 - 2012
- [j3]Shihai Wang, Shin-Jye Lee
:
A Robust Boosting by using an Adaptive Weight Scheme. Cybern. Syst. 43(7): 549-566 (2012) - 2011
- [j2]Ke Chen
, Shihai Wang:
Semi-Supervised Learning via Regularized Boosting Working on Multiple Semi-Supervised Assumptions. IEEE Trans. Pattern Anal. Mach. Intell. 33(1): 129-143 (2011) - [c3]Shihai Wang, Geng Li:
An improvment of weight scheme on adaBoost in the presence of noisy data. ACPR 2011: 407-411 - 2010
- [j1]Shihai Wang, Tianxiang Yue:
HASM-AD algorithm based on the sequential least squares. Geo spatial Inf. Sci. 13(4): 285-293 (2010)
2000 – 2009
- 2007
- [c2]Shihai Wang, Ke Chen
:
Ensemble Learning with Active Data Selection for Semi-Supervised Pattern Classification. IJCNN 2007: 355-360 - [c1]Ke Chen, Shihai Wang:
Regularized Boost for Semi-Supervised Learning. NIPS 2007: 281-288
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint