- Software Engineering Research
- Open Source Software Innovations
- Software Engineering Techniques and Practices
- Scientific Computing and Data Management
- Software Testing and Debugging Techniques
- Data Quality and Management
- Software System Performance and Reliability
- Cloud Computing and Resource Management
- Topic Modeling
- Teaching and Learning Programming
- Advanced Malware Detection Techniques
- Data Mining Algorithms and Applications
- Innovative concrete reinforcement materials
- Rough Sets and Fuzzy Logic
- Privacy, Security, and Data Protection
- Quantum Computing Algorithms and Architecture
- Software Reliability and Analysis Research
- Service-Oriented Architecture and Web Services
- Concrete and Cement Materials Research
- Online Learning and Analytics
- Complex Systems and Time Series Analysis
- Advanced Software Engineering Methodologies
- Complex Network Analysis Techniques
- Vehicle Routing Optimization Methods
- Information and Cyber Security
Tianjin University
2024-2025
Kyushu University
2021-2024
Nara Institute of Science and Technology
2021
University of Waterloo
2021
Shinshu University
2021
Harbin Engineering University
2018
Zhongnan University of Economics and Law
2010
Foshan University
2007
Central South University
2007
Arizona State University
2003
Web services might be the most popular and powerful software development technology in today's world. Yet it brings developers testers a lot of challenges also. This is mainly caused by insufficient information provided WSDL file service. From file, we can not get useful for testing, such as dependence information. To solve this problem, proposed practiced to extend support kind description. In paper, four kinds extension are considered: input-output dependency, invocation sequence,...
The present study used the techniques of gene expression programming (GEP) and multi-expression (MEP) to assess compressive strength (CS) flexural (FS) develop predictive models sustainable mortar modified with waste eggshell powder (WEP) glass (WGP) as a replacement cement. In order get more insights into impact relation raw components on CS FS developed mortar, comprehensive using SHapley Additive exPlanations (SHAP) methodology was performed. When comparing efficiency both employed...
Mutation faults are the core of mutation testing and have been widely used in many software tasks. Hence, efficiently constructing high-quality is critical. To address effectiveness limitations traditional deep learning-based techniques, we first proposed LEAM , utilizing a syntax-guided encoder-decoder architecture with extended grammar rules. While significantly enhances effectiveness, it does not consider associated cost. further improve efficiency propose LEAM++ adopting novel selective...
Technical Debt is a metaphor used to describe the situation in which long-term software artifact quality traded for short-term goals projects. In recent years, concept of self-admitted technical debt (SATD) was proposed, focuses on that intentionally introduced and described by developers. Although prior work has made important observations about admitted source code, little known SATD build systems. this paper, we set out better understand characteristics To do so, through qualitative...
Cluster analysis is widely used in fields such as economics, management and engineering. The distance correlation are two of the most important often mathematics- statistics-based similarity measures cluster analysis. Many studies have been conducted to improve high-dimensional overlapped data. However, these do not consider degree influence (weight) different properties on types In practice, weight each property different, so methods cannot accurately analyze real First, this study proposes...
As researchers today, we are witnessing a fundamental change in our technologically-enabled world due to the advent and diffusion of highly disruptive technologies such as generative Artificial Intelligence (AI), Augmented Reality (AR) Virtual (VR). In particular, software engineering has been profoundly affected by transformative power innovations for decades, with significant impact technical advancements on social dynamics its socio-technical nature. this article, reflect importance...
The widespread adoption of third-party libraries for contemporary software development has led to the creation large inter-dependency networks, where sustainability issues a single library can have network effects. Maintainers these are often overworked, relying on contributions volunteers sustain libraries. To understand contributions, in this work, we leverage socio-technical techniques introduce and formalise dependency-contribution congruence (DC congruence) at both ecosystem level,...
Code review is a popular practice where developers critique each others' changes. Since automated builds can identify low-level issues (e.g., syntactic errors, regression bugs), it not uncommon for software organizations to incorporate in the code process. In such deployment scenarios, submitted change sets must be approved integration by both peer reviewers and build bots. may produce an unreliable signal of status set due "flaky" or non-deterministic execution behaviour), tools, as Gerrit,...
Large-scale network attacks will bring great damage to the network. Although existing detection systems are able detect a large number of known attacks, when facing large-scale log data generated by these usually increases rapidly, which forms vast amount alert information in short period time. This paper researches on picking up efficiently and timely, is an important need. According characte ristics intrusion log, we put forward method using incremental mining algorithm closed sequential...
Maintainers are now self-sabotaging their work in order to take political or economic stances, a practice referred as "protestware". In this poster, we present our approach understand how the discourse about such an attack went viral, it is received by community, and whether developers respond timely manner. We study two notable protestware cases, i.e., Colors.js es5-ext, comparing with discussions of typical security vulnerability baseline, Ua-parser, perform thematic analysis more than...
Mutation testing is vital for ensuring software quality. However, the presence of equivalent mutants known to introduce redundant cost and bias issues, hindering effectiveness mutation in practical use. Although numerous mutant detection (EMD) techniques have been proposed, they exhibit limitations due scarcity training data challenges generalizing unseen mutants. Recently, large language models (LLMs) extensively adopted various code-related tasks shown superior performance by more...
There is growing concern about maintainers self-sabotaging their work in order to take political or economic stances, a practice referred as "protestware". Our objective understand the discourse around discussions on such an attack, how it received by community, and whether developers respond attack timely manner. We study two notable protestware cases i.e., colors.js es5-ext. Results indicate that spread rapidly, though not quickly security vulnerabilities, with lower speed when compared...
Nonconforming grids, which can simplify the generation of meshes for complex shapes and reduce number meshes, are commonly employed in addressing multiscale aeroacoustics numerical simulation challenges. This approach allows sound propagation processes at a reasonable cost. By utilizing sixth-order weighted compact nonlinear hybrid scheme (WCNHS) with piecewise exponential mapping function (WCNHS_Pe) incorporating ghost grid blocks, method has been developed to reconstruct interface flux...
Traveling salesman problem is one of typical NP-hard problems combinatorial optimization. It because the complexity TSP that accurate computing algorithms couldn't find a global optimal solution in more short time or at all. By analyzing relationship between solutions and local computed using heuristic for TSP, it found union set edge sets multi high-qualify can include all edges solution. The method, reducing initial put forward based on probability statistic principle. search space...