Dong Wang

ORCID: 0000-0002-2004-0902
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Open Source Software Innovations
  • Software Engineering Techniques and Practices
  • Scientific Computing and Data Management
  • Software Testing and Debugging Techniques
  • Data Quality and Management
  • Software System Performance and Reliability
  • Cloud Computing and Resource Management
  • Topic Modeling
  • Teaching and Learning Programming
  • Advanced Malware Detection Techniques
  • Data Mining Algorithms and Applications
  • Innovative concrete reinforcement materials
  • Rough Sets and Fuzzy Logic
  • Privacy, Security, and Data Protection
  • Quantum Computing Algorithms and Architecture
  • Software Reliability and Analysis Research
  • Service-Oriented Architecture and Web Services
  • Concrete and Cement Materials Research
  • Online Learning and Analytics
  • Complex Systems and Time Series Analysis
  • Advanced Software Engineering Methodologies
  • Complex Network Analysis Techniques
  • Vehicle Routing Optimization Methods
  • Information and Cyber Security

Tianjin University
2024-2025

Kyushu University
2021-2024

Nara Institute of Science and Technology
2021

University of Waterloo
2021

Shinshu University
2021

Harbin Engineering University
2018

Zhongnan University of Economics and Law
2010

Foshan University
2007

Central South University
2007

Arizona State University
2003

Web services might be the most popular and powerful software development technology in today's world. Yet it brings developers testers a lot of challenges also. This is mainly caused by insufficient information provided WSDL file service. From file, we can not get useful for testing, such as dependence information. To solve this problem, proposed practiced to extend support kind description. In paper, four kinds extension are considered: input-output dependency, invocation sequence,...

10.1109/hase.2002.1173119 article EN 2003-06-25

The present study used the techniques of gene expression programming (GEP) and multi-expression (MEP) to assess compressive strength (CS) flexural (FS) develop predictive models sustainable mortar modified with waste eggshell powder (WEP) glass (WGP) as a replacement cement. In order get more insights into impact relation raw components on CS FS developed mortar, comprehensive using SHapley Additive exPlanations (SHAP) methodology was performed. When comparing efficiency both employed...

10.1016/j.dibe.2024.100361 article EN cc-by Developments in the Built Environment 2024-02-09

Mutation faults are the core of mutation testing and have been widely used in many software tasks. Hence, efficiently constructing high-quality is critical. To address effectiveness limitations traditional deep learning-based techniques, we first proposed LEAM , utilizing a syntax-guided encoder-decoder architecture with extended grammar rules. While significantly enhances effectiveness, it does not consider associated cost. further improve efficiency propose LEAM++ adopting novel selective...

10.1145/3725528 article EN ACM Transactions on Software Engineering and Methodology 2025-03-21

Technical Debt is a metaphor used to describe the situation in which long-term software artifact quality traded for short-term goals projects. In recent years, concept of self-admitted technical debt (SATD) was proposed, focuses on that intentionally introduced and described by developers. Although prior work has made important observations about admitted source code, little known SATD build systems. this paper, we set out better understand characteristics To do so, through qualitative...

10.1109/tse.2021.3115772 article EN cc-by IEEE Transactions on Software Engineering 2021-09-28

Cluster analysis is widely used in fields such as economics, management and engineering. The distance correlation are two of the most important often mathematics- statistics-based similarity measures cluster analysis. Many studies have been conducted to improve high-dimensional overlapped data. However, these do not consider degree influence (weight) different properties on types In practice, weight each property different, so methods cannot accurately analyze real First, this study proposes...

10.1016/j.heliyon.2018.e00984 article EN cc-by-nc-nd Heliyon 2018-11-01

As researchers today, we are witnessing a fundamental change in our technologically-enabled world due to the advent and diffusion of highly disruptive technologies such as generative Artificial Intelligence (AI), Augmented Reality (AR) Virtual (VR). In particular, software engineering has been profoundly affected by transformative power innovations for decades, with significant impact technical advancements on social dynamics its socio-technical nature. this article, reflect importance...

10.1145/3678172 article EN ACM Transactions on Software Engineering and Methodology 2024-07-15

The widespread adoption of third-party libraries for contemporary software development has led to the creation large inter-dependency networks, where sustainability issues a single library can have network effects. Maintainers these are often overworked, relying on contributions volunteers sustain libraries. To understand contributions, in this work, we leverage socio-technical techniques introduce and formalise dependency-contribution congruence (DC congruence) at both ecosystem level,...

10.1109/tse.2022.3225197 article EN cc-by IEEE Transactions on Software Engineering 2022-11-28

Code review is a popular practice where developers critique each others' changes. Since automated builds can identify low-level issues (e.g., syntactic errors, regression bugs), it not uncommon for software organizations to incorporate in the code process. In such deployment scenarios, submitted change sets must be approved integration by both peer reviewers and build bots. may produce an unreliable signal of status set due "flaky" or non-deterministic execution behaviour), tools, as Gerrit,...

10.1109/ase56229.2023.00030 article EN 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2023-09-11

Large-scale network attacks will bring great damage to the network. Although existing detection systems are able detect a large number of known attacks, when facing large-scale log data generated by these usually increases rapidly, which forms vast amount alert information in short period time. This paper researches on picking up efficiently and timely, is an important need. According characte ristics intrusion log, we put forward method using incremental mining algorithm closed sequential...

10.12785/amis/081l06 article EN Applied Mathematics & Information Sciences 2013-11-28

Maintainers are now self-sabotaging their work in order to take political or economic stances, a practice referred as "protestware". In this poster, we present our approach understand how the discourse about such an attack went viral, it is received by community, and whether developers respond timely manner. We study two notable protestware cases, i.e., Colors.js es5-ext, comparing with discussions of typical security vulnerability baseline, Ua-parser, perform thematic analysis more than...

10.1145/3639478.3643086 article EN 2024-04-14

Mutation testing is vital for ensuring software quality. However, the presence of equivalent mutants known to introduce redundant cost and bias issues, hindering effectiveness mutation in practical use. Although numerous mutant detection (EMD) techniques have been proposed, they exhibit limitations due scarcity training data challenges generalizing unseen mutants. Recently, large language models (LLMs) extensively adopted various code-related tasks shown superior performance by more...

10.48550/arxiv.2408.01760 preprint EN arXiv (Cornell University) 2024-08-03

There is growing concern about maintainers self-sabotaging their work in order to take political or economic stances, a practice referred as "protestware". Our objective understand the discourse around discussions on such an attack, how it received by community, and whether developers respond attack timely manner. We study two notable protestware cases i.e., colors.js es5-ext. Results indicate that spread rapidly, though not quickly security vulnerabilities, with lower speed when compared...

10.48550/arxiv.2409.15674 preprint EN arXiv (Cornell University) 2024-09-23

Nonconforming grids, which can simplify the generation of meshes for complex shapes and reduce number meshes, are commonly employed in addressing multiscale aeroacoustics numerical simulation challenges. This approach allows sound propagation processes at a reasonable cost. By utilizing sixth-order weighted compact nonlinear hybrid scheme (WCNHS) with piecewise exponential mapping function (WCNHS_Pe) incorporating ghost grid blocks, method has been developed to reconstruct interface flux...

10.2514/1.j064592 article EN AIAA Journal 2024-12-24

Traveling salesman problem is one of typical NP-hard problems combinatorial optimization. It because the complexity TSP that accurate computing algorithms couldn't find a global optimal solution in more short time or at all. By analyzing relationship between solutions and local computed using heuristic for TSP, it found union set edge sets multi high-qualify can include all edges solution. The method, reducing initial put forward based on probability statistic principle. search space...

10.1109/icmlc.2007.4370535 article EN International Conference on Machine Learning and Cybernetics 2007-01-01
Coming Soon ...