- Software Testing and Debugging Techniques
- Software Reliability and Analysis Research
- Software Engineering Research
- Software System Performance and Reliability
- Advanced Malware Detection Techniques
- Virtual Reality Applications and Impacts
- Online Learning and Analytics
- VLSI and Analog Circuit Testing
- Machine Learning and Algorithms
- Open Education and E-Learning
- Scientific Computing and Data Management
- Online and Blended Learning
- Educational Games and Gamification
- Software Engineering Techniques and Practices
- Augmented Reality Applications
- E-Learning and COVID-19
- Machine Learning and Data Classification
- Anomaly Detection Techniques and Applications
- Natural Language Processing Techniques
- E-Learning and Knowledge Management
- Network Security and Intrusion Detection
- Web Application Security Vulnerabilities
- Experimental Learning in Engineering
- Topic Modeling
- Privacy, Security, and Data Protection
University of Nottingham Ningbo China
2016-2025
University of Calabria
2023
Université Paris Cité
2023
National Institute of Information and Communications Technology
2023
Western Washington University
2023
DATA4 (France)
2023
Macau University of Science and Technology
2023
Nanjing University
2023
Los Alamitos Medical Center
2020-2023
Durban University of Technology
2022
In software testing, something which can verify the correctness of test case execution results is called an oracle.The oracle problem occurs when either does not exist, or exists but too expensive to be used.Metamorphic testing a approach uses metamorphic relations, properties under represented in form relations among inputs and outputs multiple executions, help program.This paper presents new empirical evidence support this approach, has been used alleviate various applications enhance...
Modern information technology paradigms, such as online services and off-the-shelf products, often involve a wide variety of users with different or even conflicting objectives. Every software output may satisfy some users, but also fail to others. Furthermore, do not know the internal working mechanisms systems. This situation is quite from bespoke software, where developers typically each other. paper proposes an approach help better understand that they use, thereby more easily achieve...
What if we could know that a program is buggy, even not tell whether or its observed output correct? Metamorphic testing provides this ability. This article explains the basics of technique.
Random testing (RT) is a well-studied method that has been widely applied to the of many applications, including embedded software systems, SQL database and Android applications. Adaptive random (ART) aims enhance RT's failure-detection ability by more evenly spreading test cases over input domain. Since its introduction in 2001, there have contributions development ART, various approaches, implementations, assessment evaluation methods, This paper provides comprehensive survey on...
Testing is a major approach for the detection of software defects, including vulnerabilities in security features. This article introduces metamorphic testing (MT), relatively new method, and discusses how perspective MT can help to conduct negative as well alleviate oracle problem security-related functionality behavior. As demonstrated by effectiveness detecting previously unknown bugs real-world critical applications such compilers code obfuscators, we conclude that features should be...
Restricted Random Testing (RRT) is a new method of testing software that improves upon traditional (RT) techniques. Research has indicated failure patterns (portions an input domain which, when executed, cause the program to fail or reveal error) can influence effectiveness strategies. For certain types patterns, it been found widespread and even distribution test cases in be significantly more effective at detecting compared with ordinary RT. methods based on RT, but which aim achieve...
Summary Web vulnerability scanners (WVSs) are tools that can detect security vulnerabilities in web services. Although both commercial and open‐source WVSs exist, their detection capability performance vary. In this article, we report on a comparative study to determine the capabilities of eight (both open commercial) using two vulnerable applications: WebGoat Damn application. The studied were: Acunetix; HP WebInspect; IBM AppScan; OWASP ZAP; Skipfish; Arachni; Vega; Iron WASP. was...
The recent COVID-19 pandemic has presented challenges to post-secondary education, including that campuses have been closed, removing face-to-face instruction options. Meanwhile, this crisis also unique opportunities create a "tipping point" or conditions foster innovative teaching practices. In light of such "danger-opportunity," the feasibility introducing microlearning (ML), technology-mediated and learning (T&L) strategy, recently revisited by some institutions. ML offers through small...
ABSTRACT Metamorphic testing (MT) is an effective software quality assurance method; it uses metamorphic relations (MRs) to examine the inputs and outputs of multiple test cases. exploration (ME) robustness (MRT) are advanced additions MT literature: ME can enable better understanding, thus testing, systems; MRT without oracle. relation patterns (MRPs) abstractions or templates for concrete MRs. The performance MT/ME/MRT relies on MRs, but identification MRs often a manual task requiring...
Low-contrast medical image segmentation is a challenging task that requires full use of local details and global context. However, existing convolutional neural networks (CNNs) cannot fully exploit information due to limited receptive fields weight sharing. On the other hand, transformer effectively establishes long-range dependencies but lacks desirable properties for modeling details. This paper proposes Transformer-embedded Boundary perception Network (TBNet) combines advantages...
Adaptive random testing (ART) methods are software which based on testing, but use additional mechanisms to ensure more even and widespread distributions of test cases over an input domain. Restricted (RRT) is a version ART uses exclusion regions restriction case generation outside these regions. RRT has been found perform very well, incurs some computational cost in its the This paper presents method reducing overheads called forgetting, where number used algorithm can be limited, thus...
Open Educational Resources (OERs) are teaching learning, and research resources that have been made available such they can be used, shared, modified freely. They already had a significant impact on Higher Education (HE), great potential for providing further positive transformation. However, OER adoption has not universal, with several obstacles barriers still hindering its wider influence. This paper examines the current situation of OERs, as reported in literature, listing some challenges...