- Software Engineering Research
- Software System Performance and Reliability
- Software Reliability and Analysis Research
- Advanced Malware Detection Techniques
- Software Testing and Debugging Techniques
- Network Security and Intrusion Detection
- Cancer-related molecular mechanisms research
- RNA modifications and cancer
- Multi-Criteria Decision Making
- MicroRNA in disease regulation
- Internet Traffic Analysis and Secure E-voting
- Advanced Software Engineering Methodologies
- Data Management and Algorithms
- Data Mining Algorithms and Applications
- Software Engineering Techniques and Practices
- Complex Network Analysis Techniques
- Advanced Database Systems and Queries
- Remote Sensing and LiDAR Applications
- Atmospheric aerosols and clouds
- Remote Sensing in Agriculture
- CCD and CMOS Imaging Sensors
- Smart Agriculture and AI
- Muscle activation and electromyography studies
- E-Learning and Knowledge Management
- Security and Verification in Computing
Gansu Academy of Agricultural Sciences
2025
Qilu Hospital of Shandong University
2024
University of California, Riverside
2019-2023
Shandong University of Science and Technology
2022-2023
Pudong New Area People's Hospital
2021
Xi'an Jiaotong University
2009-2019
Shandong Normal University
2017-2018
University of Nottingham Ningbo China
2017
State Key Laboratory of Industrial Control Technology
2009-2011
Zhejiang University of Technology
2011
Software vulnerabilities are now reported unprecedentedly due to the recent development of automated vulnerability hunting tools. However, fixing still mainly depends on programmers' manual efforts. Developers need deeply understand and affect system's functions as little possible. In this paper, with advancement Neural Machine Translation (NMT) techniques, we provide a novel approach called SeqTrans exploit historical fixes suggestions automatically fix source code. To capture contextual...
In recent years, Complex Network theory and graph algorithms have been proved to be effective in predicting software bugs. On the other hand, as a widely-used algorithm theory, k-core decomposition has used engineering domain identify key classes. Intuitively, classes are more likely buggy since they participate functions or interactions dependencies. However, there is no existing research uses analyze To fill this gap, we first use on Class Dependency Networks bug distribution from new...
Potato is one of the most important food crops in world and occupies a crucial position China’s agricultural development. Due to large number potato varieties phenomenon variety mixing, development industry seriously affected. Therefore, accurate identification key link promote industry. Deep learning technology used identify with good accuracy, but there are relatively few related studies. Thus, this paper introduces an enhanced Swin Transformer classification model named MSR-SwinT...
MiRNAs are a kind of non-coding RNA molecules found in plants, animals, and various viruses. They have been proved to play an important role multiple biological as well physiological processes. Specifically, growing number studies shown that miRNAs close relationships with many diseases, thus the exploration between diseases is great significance disease research. Although traditional experimental methods can obtain associations amount data obtained far from enough for us fully understand...
MiRNAs are small non-coding regulatory RNAs which associated with multiple diseases. Increasing evidence has shown that miRNAs play important roles in various biological and physiological processes. Therefore, the identification of potential miRNA-disease associations could provide new clues to understanding mechanism pathogenesis. Although many traditional methods have been successfully applied discover part associations, they general time-consuming expensive. Consequently,...
Over the past decades, numerous approaches were proposed to help practitioner predict or locate defective files. These techniques often use syntactic dependency, history co-change relation, semantic similarity. The problem is that, it remains unclear whether these different dependency relations will present similar accuracy in terms of defect prediction and localization. In this paper, we our systematic investigation question from perspective software architecture. Considering files involved...
Moderate Resolution Imaging Spectrometer (MODIS) images are widely used in land, ocean, and atmospheric monitoring, due to their wide spectral coverage, high temporal resolution, convenient data acquisition. Accurate cloud detection is critical the fine processing application of MODIS images. Owing spatial resolution limitations influence mixed pixels, most algorithms struggle effectively recognize clouds ground objects. Here, we propose a novel method based on land surface reflectance (LSR)...
Deep learning has demonstrated its strengths in numerous binary analysis tasks, including function boundary detection, code search, prototype inference, value set analysis, etc. When applying deep to we need decide what input should be fed into the neural network model. More specifically, answer how represent an instruction a fixed-length vector. The idea of automatically representations is intriguing, but existing schemes fail capture unique characteristics disassembly. These ignore complex...
Modern software systems' structures and behaviors are becoming very complicated. Existing models either lack systematic considerations on the whole system's behavior patterns or inefficient in runtime monitoring. In this paper, Calling Network (CN) model is proposed to provide new perspectives analyze dynamic execution process of a system. CN consisted one series Graph (CG), which version Call encodes method call frequencies. Some such as Growing (Graph) Sequence also embodied model. Based...
This paper summarises some of the best practices learned from an extended software engineering project completed through a collaboration multidisciplinary faculty and several teams computer science students. The delivered advanced multimedia note-taking application, as open educational resource (OER), capable supporting both students research into note-making practices. lasted beyond single academic year, thus enabling multiple student cohort participation, took place in English medium...
Open educational resources (OERs) are essentially made freely available to the public for purpose of enabling education. This paper examines experiences a collaborative team interdisciplinary teachers and computer science students in their research development an OER designed facilitate student note-making, research. As expected, encountered, overcame, number challenges, with both learning from experiences. The has been completed, deployed full study. reflections may help guide similar...
Linguistic pairwise comparison matrices are widely used in decision-making procedures. However, the often give conflicting results when there multiple criteria under consideration. Despite intensive research, achieving consistency of such remains a daunting task. In this paper, novel approach based on linguistic discrete region is proposed to address challenge. Unlike existing methods that require single value for each comparison, our allows be expressed by with terms. Such front-end gives...
Abstract mi RNA s are a class of small noncoding that associated with variety complex biological processes. Increasing studies have shown close relationships many human diseases. The prediction the associations between and diseases has thus become hot topic. Although traditional experimental methods reliable, they could only identify limited number as time‐consuming expensive. Consequently, great efforts been made to effectively predict reliable disease‐related based on computational...
Purpose. This study is aimed at analyzing the application experience and feedback of patients with poststroke ankle dorsiflexion disorders for 3D printed AFO three different materials. Methods. 15 were randomly divided into groups; 3 materials (PA2200, Somos NeXt, PA12) was used to each group, according crossover design, in order ask groups use AFO. Assessment taken by end test round. Through statistical processing, patient data obtained. Results. In material comfort assessment AFO, NeXt...
Memory forensic tools rely on the knowledge of kernel symbols and object layouts to retrieve digital evidence artifacts from memory dumps.This is called profile.Existing solutions for profile generation are either inconvenient or inaccurate.In this paper, we propose a logic inference approach automatically generating directly dump.It leverages invariants existing in data structures across all versions configurations precisely locate forensics-required fields objects.We have implemented...
It is commonly believed that the IPv6 protocol can provide good protection against network worms try to find victims through random address scanning due its huge space. However, we discover there serious vulnerability in terms of worm propagation and IPv4-IPv6 dual-stack networks. shown this article a new collect addresses all running hosts local subnet very quickly, leading accelerated propagation. Similar modeling self-replicating behaviors biological viruses, Species-Patch model...
In the identity authentication, many advanced encryption techniques are applied to confirm and protect user identity. Although information is transmitted as cipher text in Internet, attackers can theft fraud by eavesdropping, cryptanalysis forging. this paper, a new authentication mechanism proposed, which exploits Timing Covert Channel (TCC) transmit information. TCC was originally hacker technique leak under supervising, uses sending time of packets indicate our method, intervals between...
Measuring software execution is important for many engineering tasks. In this paper, Densification Power Law (DPL) of measured and studied as a feature growing complexity. means that during networked system's evolution, it usually becomes denser the number edges nodes grows with consistent super linear relation. This was discovered reported in 2005. based on measurement 15 open-source Java programs, we show when systems are modeled series dynamic Call Graphs their executions, they always...