Search Results - "Fang, Chunrong"

Refine Results
  1. 1

    A Systematic Literature Review of Android Malware Detection Using Static Analysis by Pan, Ya, Ge, Xiuting, Fang, Chunrong, Fan, Yong

    Published in IEEE access (2020)
    “…Android malware has been in an increasing trend in recent years due to the pervasiveness of Android operating system. Android malware is installed and run on…”
    Get full text
    Journal Article
  2. 2

    Improving actionable warning identification via the refined warning-inducing context representation by Ge, Xiuting, Fang, Chunrong, Li, Xuanye, Zhang, Quanjun, Liu, Jia, Zhao, Zhihong, Chen, Zhenyu

    Published in Science China. Information sciences (01-05-2024)
    “…Conclusion We improve AWI via the refined warning-inducing context representation, which captures both lexical and structural information for AWI from the…”
    Get full text
    Journal Article
  3. 3

    Similarity-based test case prioritization using ordered sequences of program entities by Fang, Chunrong, Chen, Zhenyu, Wu, Kun, Zhao, Zhihong

    Published in Software quality journal (01-06-2014)
    “…Test suites often grow very large over many releases, such that it is impractical to re-execute all test cases within limited resources. Test case…”
    Get full text
    Journal Article
  4. 4

    Measuring the Diversity of a Test Set With Distance Entropy by Shi, Qingkai, Chen, Zhenyu, Fang, Chunrong, Feng, Yang, Xu, Baowen

    Published in IEEE transactions on reliability (01-03-2016)
    “…Most existing metrics that we call white-box metrics, such as coverage metrics, require white-box information, like program structure information, and…”
    Get full text
    Journal Article
  5. 5

    Comparing logic coverage criteria on test case prioritization by Fang, ChunRong, Chen, ZhenYu, Xu, BaoWen

    Published in Science China. Information sciences (01-12-2012)
    “…Logic coverage criteria have been widely used in the testing of safety-critical software. In the past few years, fault-based logic coverage criteria have been…”
    Get full text
    Journal Article
  6. 6

    Multi-objective test report prioritization using image understanding by Yang Feng, Jones, James A., Zhenyu Chen, Chunrong Fang

    “…In crowdsourced software testing, inspecting the large number of test reports is an overwhelming but inevitable software maintenance task. In recent years, to…”
    Get full text
    Conference Proceeding
  7. 7

    TransformCode: A Contrastive Learning Framework for Code Embedding via Subtree Transformation by Xian, Zixiang, Huang, Rubing, Towey, Dave, Fang, Chunrong, Chen, Zhenyu

    Published in IEEE transactions on software engineering (01-06-2024)
    “…Artificial intelligence (AI) has revolutionized software engineering (SE) by enhancing software development efficiency. The advent of pre-trained models (PTMs)…”
    Get full text
    Journal Article
  8. 8

    An Empirical Study of Class Rebalancing Methods for Actionable Warning Identification by Ge, Xiuting, Fang, Chunrong, Bai, Tongtong, Liu, Jia, Zhao, Zhihong

    Published in IEEE transactions on reliability (01-12-2023)
    “…Actionable warning identification (AWI) is crucial for improving the usability of static analysis tools. Currently, machine learning (ML)-based AWI approaches…”
    Get full text
    Journal Article
  9. 9

    Leveraging Android Automated Testing to Assist Crowdsourced Testing by Ge, Xiuting, Yu, Shengcheng, Fang, Chunrong, Zhu, Qi, Zhao, Zhihong

    Published in IEEE transactions on software engineering (01-04-2023)
    “…Crowdsourced testing is an emerging trend in mobile application testing. The openness of crowdsourced testing provides a promising way to conduct large-scale…”
    Get full text
    Journal Article
  10. 10

    DeepPath: Path-Driven Testing Criteria for Deep Neural Networks by Wang, Dong, Wang, Ziyuan, Fang, Chunrong, Chen, Yanshan, Chen, Zhenyu

    “…Inspired by path-oriented testing, we propose a series of path-driven testing criteria, called DeepPath, to comprehensively calculate coverage in deep neural…”
    Get full text
    Conference Proceeding
  11. 11

    Deep learning framework testing via hierarchical and heuristic model generation by Zou, Yinglong, Sun, Haofeng, Fang, Chunrong, Liu, Jiawei, Zhang, Zhenping

    Published in The Journal of systems and software (01-07-2023)
    “…Deep learning frameworks are the foundation of deep learning model construction and inference. Many testing methods using deep learning models as test inputs…”
    Get full text
    Journal Article
  12. 12

    An Online Multistep-Forward Voltage-Prediction Approach Based on an LSTM-TD Model and KF Algorithm by Ni, Ye, Xia, Zhilong, Zhao, Fangtong, Fang, Chunrong, Chen, Zhenyu

    Published in Computer (Long Beach, Calif.) (01-08-2021)
    “…We propose a multistep-forward voltage-prediction approach combining a long short-term memory time-distributed model and the Kalman filter algorithm to improve…”
    Get full text
    Journal Article
  13. 13

    Benchmarking Object Detection Robustness against Real-World Corruptions by Liu, Jiawei, Wang, Zhijie, Ma, Lei, Fang, Chunrong, Bai, Tongtong, Zhang, Xufan, Liu, Jia, Chen, Zhenyu

    Published in International journal of computer vision (01-10-2024)
    “…With the rapid recent development, deep learning based object detection techniques have been applied to various real-world software systems, especially in…”
    Get full text
    Journal Article
  14. 14

    APPT: Boosting Automated Patch Correctness Prediction via Fine-Tuning Pre-Trained Models by Zhang, Quanjun, Fang, Chunrong, Sun, Weisong, Liu, Yan, He, Tieke, Hao, Xiaodong, Chen, Zhenyu

    Published in IEEE transactions on software engineering (01-03-2024)
    “…Automated program repair (APR) aims to fix software bugs automatically without human debugging efforts and plays a crucial role in software development and…”
    Get full text
    Journal Article
  15. 15

    Mobile App Crowdsourced Test Report Consistency Detection via Deep Image-and-Text Fusion Understanding by Yu, Shengcheng, Fang, Chunrong, Zhang, Quanjun, Cao, Zhihao, Yun, Yexiao, Cao, Zhenfei, Mei, Kai, Chen, Zhenyu

    Published in IEEE transactions on software engineering (01-08-2023)
    “…Crowdsourced testing, as a distinct testing paradigm, has attracted much attention in software testing, especially in mobile application (app) testing field…”
    Get full text
    Journal Article
  16. 16

    An unsupervised feature selection approach for actionable warning identification by Ge, Xiuting, Fang, Chunrong, Liu, Jia, Qing, Mingshuang, Li, Xuanye, Zhao, Zhihong

    Published in Expert systems with applications (01-10-2023)
    “…Static Analysis Tools (SATs) are widely applied to detect defects in software projects. However, SATs are overshadowed by a large number of unactionable…”
    Get full text
    Journal Article
  17. 17

    Security‐based code smell definition, detection, and impact quantification in Android by Zhong, Yi, Shi, Mengyu, He, Jiawei, Fang, Chunrong, Chen, Zhenyu

    Published in Software, practice & experience (01-11-2023)
    “…Android's high market share and extensive functionality make its security a significant concern. Research reveals that many security issues are caused by…”
    Get full text
    Journal Article
  18. 18

    Practical, Automated Scenario-Based Mobile App Testing by Yu, Shengcheng, Fang, Chunrong, Du, Mingzhe, Ding, Zimin, Chen, Zhenyu, Su, Zhendong

    Published in IEEE transactions on software engineering (01-07-2024)
    “…The importance of mobile application (app) quality assurance is increasing with the rapid development of the mobile Internet. Automated test generation…”
    Get full text
    Journal Article
  19. 19

    Duo: Differential Fuzzing for Deep Learning Operators by Zhang, Xufan, Liu, Jiawei, Sun, Ning, Fang, Chunrong, Liu, Jia, Wang, Jiang, Chai, Dong, Chen, Zhenyu

    Published in IEEE transactions on reliability (01-12-2021)
    “…Deep learning (DL) libraries reduce the barriers to the DL model construction. In DL libraries, various building blocks are DL operators with different…”
    Get full text
    Journal Article
  20. 20

    Locality-based security bug report identification via active learning by Ge, Xiuting, Fang, Chunrong, Qian, Meiyuan, Ge, Yu, Qing, Mingshuang

    Published in Information and software technology (01-07-2022)
    “…Security bug report (SBR) identification is a crucial way to eliminate security-critical vulnerabilities during software development. In recent years, many…”
    Get full text
    Journal Article