default search action
Yunzhan Gong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j23]Qianjin Zhang, Dahai Jin, Yawen Wang, Yunzhan Gong:
Semantic Clone Detection Based on Code Feature Fusion Learning. Int. J. Softw. Eng. Knowl. Eng. 33(7): 1039-1062 (2023) - [c25]Wenjing Liu, Zhiwei Xu, Limin Liu, Yunzhan Gong:
Incremental Reliability Assessment of Large-Scale Software via Theoretical Structure Reduction. ICSOFT 2023: 241-248 - 2022
- [j22]Peng Dai, Yawen Wang, Dahai Jin, Yunzhan Gong, Wenjin Yang:
An improving approach to analyzing change impact of C programs. Comput. Commun. 182: 60-71 (2022) - [j21]Yanyang Zhao, Yawen Wang, Dalin Zhang, Yunzhan Gong:
Eliminating the high false-positive rate in defect prediction through BayesNet with adjustable weight. Expert Syst. J. Knowl. Eng. 39(6) (2022) - [j20]Peng Dai, Qianjin Zhang, Yawen Wang, Dahai Jin, Yunzhan Gong:
Improving Large-Gap Clone Detection Recall Using Multiple Features. Int. J. Softw. Eng. Knowl. Eng. 32(7): 1071-1099 (2022) - [j19]Yanyang Zhao, Yawen Wang, Yuwei Zhang, Dalin Zhang, Yunzhan Gong, Dahai Jin:
ST-TLF: Cross-version defect prediction framework based transfer learning. Inf. Softw. Technol. 149: 106939 (2022) - 2021
- [j18]Mingzhe Zhang, Yunzhan Gong, Yawen Wang, Dahai Jin:
Mining constant information for readable test data generation. Int. J. Embed. Syst. 14(1): 9-18 (2021) - 2020
- [j17]Yang Song, Yunzhan Gong:
Web service composition on IoT reliability test based on cross entropy. Comput. Intell. 36(4): 1650-1662 (2020) - [j16]Yuwei Zhang, Dahai Jin, Ying Xing, Yunzhan Gong:
Automated defect identification via path analysis-based features with transfer learning. J. Syst. Softw. 166: 110585 (2020) - [j15]Yuwei Zhang, Ying Xing, Yunzhan Gong, Dahai Jin, Honghui Li, Feng Liu:
A variable-level automated defect identification model based on machine learning. Soft Comput. 24(2): 1045-1061 (2020)
2010 – 2019
- 2019
- [j14]Huan Lin, Yawen Wang, Yunzhan Gong, Dahai Jin:
Domain-RIP Analysis: A Technique for Analyzing Mutation Stubbornness. IEEE Access 7: 4006-4023 (2019) - [j13]Honglei Zhu, Dahai Jin, Yunzhan Gong, Ying Xing, Mingnan Zhou:
Detecting Interprocedural Infeasible Paths Based on Unsatisfiable Path Constraint Patterns. IEEE Access 7: 15040-15055 (2019) - [j12]Mingzhe Zhang, Yunzhan Gong, Yawen Wang, Dahai Jin:
Unit Test Data Generation for C Using Rule-Directed Symbolic Execution. J. Comput. Sci. Technol. 34(3): 670-689 (2019) - [j11]Xiaoli Song, Yunzhan Gong, Dahai Jin, Qiangyi Li:
Nodes deployment optimization algorithm based on improved evidence theory of underwater wireless sensor networks. Photonic Netw. Commun. 37(2): 224-232 (2019) - 2018
- [c24]Xiaoli Song, Yunzhan Gong, Dahai Jin, Qiangyi Li, Hengchang Jing:
Nodes Deployment Optimization Algorithm Based on Improved Evidence Theory. ICA3PP (Workshops) 2018: 84-89 - [c23]Huan Lin, Yawen Wang, Yunzhan Gong:
Subsuming mutation operators. ICSE (Companion Volume) 2018: 236-237 - 2017
- [j10]Jianqiang Hao, Yunzhan Gong, Yawen Wang, Li Tan, Jianzhi Sun:
Using k-Mix-Neighborhood Subdigraphs to Compute Canonical Labelings of Digraphs. Entropy 19(2): 79 (2017) - [j9]Xiaoli Song, Yunzhan Gong, Dahai Jin, Qiangyi Li, Hengchang Jing:
Coverage Hole Recovery Algorithm Based on Molecule Model in Heterogeneous WSNs. Int. J. Comput. Commun. Control 12(4): 562-576 (2017) - [j8]Xuzhou Zhang, Yunzhan Gong, Yawen Wang:
Heuristic Guided Selective Path Exploration for Loop Structure in Coverage Testing. Int. J. Open Source Softw. Process. 8(2): 59-75 (2017) - [j7]Xuzhou Zhang, Yunzhan Gong, Yawen Wang, Ying Xing, Mingzhe Zhang:
Automated String Constraints Solving for Programs Containing String Manipulation Functions. J. Comput. Sci. Technol. 32(6): 1125-1135 (2017) - 2015
- [j6]Ying Xing, Yunzhan Gong, Yawen Wang, Xuzhou Zhang:
The application of iterative interval arithmetic in path-wise test data generation. Eng. Appl. Artif. Intell. 45: 441-452 (2015) - [c22]Dalin Zhang, Gang Yin, Dahai Jin, Yunzhan Gong, Tianshuang Wu, Hailong Zhang:
A hybrid static analysis refinement approach within internetware environment. Internetware 2015: 141-147 - 2014
- [j5]Yawen Wang, Ying Xing, Yunzhan Gong, Xuzhou Zhang:
Optimized Branch and Bound for Path-wise Test Data Generation. Int. J. Comput. Commun. Control 9(4): 497-509 (2014) - [j4]Yukun Dong, Dahai Jin, Yunzhan Gong:
Symbolic Procedure Summary Using Region-based Symbolic Three-valued Logic. J. Comput. 9(3): 774-780 (2014) - [j3]Ying Xing, Junfei Huang, Yunzhan Gong, Yawen Wang, Xuzhou Zhang:
An Intelligent Method Based on State Space Search for Automatic Test Case Generation. J. Softw. 9(2): 358-364 (2014) - [c21]Chi Yao, Yawen Wang, Feng Li, Yunzhan Gong:
A method of function modeling in accurate stub generation. ICSAI 2014: 1022-1026 - [c20]Qian Wang, Dahai Jin, Yunzhan Gong:
A Memory Model Based on Three-Valued Matrix for Static Defect Detection. ISSRE Workshops 2014: 251-256 - 2013
- [j2]Qian Wang, Dahai Jin, Yunzhan Gong, Hongbo Zhou:
Detecting Null-dereference Bugs via a Backward Analysis. J. Softw. 8(12): 3120-3131 (2013) - [c19]Siqin Chen, Junfei Huang, Yunzhan Gong:
Static Testing as a Service on Cloud. AINA Workshops 2013: 638-642 - [c18]Dalin Zhang, Dahai Jin, Yunzhan Gong, Hailong Zhang:
Diagnosis-Oriented Alarm Correlations. APSEC (1) 2013: 172-179 - [c17]Qian Wang, Dahai Jin, Yunzhan Gong:
Null Dereference Detection via a Backward Analysis. APSEC (1) 2013: 553-558 - [c16]Dalin Zhang, Dahai Jin, Ying Xing, Hailong Zhang, Yunzhan Gong:
Automatically mining similar warnings and warning combinations. FSKD 2013: 783-788 - [c15]Dalin Zhang, Hailong Zhang, Dahai Jin, Yunzhan Gong:
Improving the accuracy of static analysis based on state partition. ISSRE (Supplemental Proceedings) 2013: 157-161 - [c14]Yukun Dong, Ying Xing, Dahai Jin, Yunzhan Gong, Kai Liu:
An Approach to Fully Recognizing Addressable Expression. QSIC 2013: 149-152 - [c13]Hailong Zhang, Dalin Zhang, Dahai Jin, Yunzhan Gong, Chengcheng Wang:
Automatically Mining High Level Patterns of Software Faults within Methods. QSIC 2013: 196-199 - 2012
- [c12]Feiyu Li, Yunzhan Gong:
Memory Modeling-Based Automatic Test Data Generation for String-Manipulating Programs. APSEC Workshops 2012: 95-104 - [c11]Hongbo Zhou, Dahai Jin, Yunzhan Gong:
An Interval-Based Model for Detecting Software Defect Using Alias Analysis. APSEC Workshops 2012: 136-144 - [c10]Hongbo Zhou, Qian Wang, Dahai Jin, Yunzhan Gong:
A Static Detecting Model for Invalid Arithmetic Operation Based on Alias Analysis. ISSRE Workshops 2012: 183-188 - 2011
- [c9]Yunshan Zhao, Yawen Wang, Yunzhan Gong, Honghe Chen, Qing Xiao, Zhaohong Yang:
STVL: Improve the Precision of Static Defect Detection with Symbolic Three-Valued Logic. APSEC 2011: 179-186 - [c8]Xiaoying Bai, Bin Chen, Bo Ma, Yunzhan Gong:
Design of intelligent agents for collaborative testing of service-based systems. AST 2011: 22-28 - [c7]Yunshan Zhao, Yunzhan Gong, Li Liu, Qing Xiao, Zhaohong Yang:
Context-Sensitive Interprocedural Defect Detection Based on a Unified Symbolic Procedure Summary Model. QSIC 2011: 51-60 - 2010
- [c6]Xuehong Yang, Junfei Huang, Yunzhan Gong:
Defect Analysis Respecting Dead Path Elimination in BPEL Process. APSCC 2010: 315-321
2000 – 2009
- 2008
- [c5]Yawen Wang, Yunzhan Gong, Junliang Chen, Qing Xiao, Zhaohong Yang:
An Application of Interval Analysis in Software Static Analysis. EUC (2) 2008: 367-372 - [c4]Zhaohong Yang, Yunzhan Gong, Qing Xiao, Yawen Wang:
DTS - A Software Defects Testing System. SCAM 2008: 269-270 - 2005
- [c3]Guangyan Huang, Guangmei Zhang, Xiaowei Li, Yunzhan Gong:
A State Machine for Detecting C/C++ Memory Faults. Asian Test Symposium 2005: 82-87 - 2003
- [c2]Yunzhan Gong, Wanli Xu, Xiaowei Li:
An Expression's Single Fault Model and the Testing Methods. Asian Test Symposium 2003: 110-115 - [c1]Dahai Jin, Yunzhan Gong:
An Object-Oriented Program Automatic Execute Model and the Research of Algorithm. Asian Test Symposium 2003: 492-495
1990 – 1999
- 1993
- [j1]Yunzhan Gong, Daozheng Wei:
Deductive fault simulation algorithm based on fault collapsing. J. Comput. Sci. Technol. 8(2): 182-187 (1993)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint