Search Results - "Hui, ZhanWei"
-
1
Test Suite Reduction via Evolutionary Clustering
Published in IEEE access (2021)“…Test suite reduction is an effective way to reduce the cost of regression testing by identifying and removing redundant test cases from the original test…”
Get full text
Journal Article -
2
Theoretical Analysis and Empirical Evaluation of Coverage Indictors for Closed Source APP Testing
Published in IEEE access (2019)“…The number of mobile applications has increased geometrically nowadays, but how to ensure their quality and conduct adequate and effective testing is still a…”
Get full text
Journal Article -
3
Comparison of SETAM with Security Use Case and Security Misuse Case:A Software Security Testing Study
Published in Wuhan University journal of natural sciences (01-12-2012)“…A software security testing behavior model,SETAM,was proposed in our previous work as the integrated model for describing software security testing…”
Get full text
Journal Article -
4
A new weighted naive Bayes method based on information diffusion for software defect prediction
Published in Software quality journal (01-09-2019)“…Software defect prediction (SDP) plays a significant part in identifying the most defect-prone modules before software testing and allocating limited testing…”
Get full text
Journal Article -
5
A New Attribute Selection Method Based on Maximal Information Coefficient and Automatic Clustering
Published in 2017 International Conference on Dependable Systems and Their Applications (DSA) (01-10-2017)“…Software defect prediction (SDP) plays a significant part in identifying the most defect-prone modules before software testing. Software attributes are the key…”
Get full text
Conference Proceeding -
6
Test Cases Generation for Multiple paths Based on Metamorphic Relation
Published in 2017 International Conference on Dependable Systems and Their Applications (DSA) (01-10-2017)“…In order to enhance efficiency, a novel test cases generation method for multiple paths is proposed in this paper. It utilizes metamorphic relation to generate…”
Get full text
Conference Proceeding -
7
Compatibility Issue Detection for Android Apps Based on Path-Sensitive Semantic Analysis
Published in 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE) (01-05-2023)“…Android API-related compatibility issues have be-come a severe problem and significant challenge for app devel-opers due to the well-known Android…”
Get full text
Conference Proceeding -
8
APP constraint analysis approach to select mobile devices for compatibility crowdtesting
Published in Journal of software : evolution and process (01-03-2024)“…The compatibility issues caused by Android fragmentation have become a vital task in the development of Android applications. To locate those issues, thousand…”
Get full text
Journal Article -
9
A taxonomy of software security defects for SST
Published in 2010 International Conference on Intelligent Computing and Integrated Systems (01-10-2010)“…Software security test (SST) is a useful way to validate software system security attribute. Defects based testing technologies are more effective than…”
Get full text
Conference Proceeding -
10
Software security testing based on typical SSD:A case study
Published in 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) (01-08-2010)“…Due to the increasing complexity of Web applications, traditional function security testing ways, which only test and validate software security mechanisms,…”
Get full text
Conference Proceeding -
11
GUI testing based on Function-Diagram
Published in 2010 International Conference on Computer Application and System Modeling (ICCASM 2010) (01-10-2010)“…Using functional diagram to represent GUI (Graphical User Interface) can promote the efficiency of GUI testing effectively. In this paper, a method of…”
Get full text
Conference Proceeding -
12
Move Smart Contract Vulnerability Detection based on Resource-flow Analysis
Published in 2023 10th International Conference on Dependable Systems and Their Applications (DSA) (10-08-2023)“…The Move smart contract (MSC) is designed to enhance the type security of digital assets by utilizing a resource-based structure. However, vulnerabilities may…”
Get full text
Conference Proceeding -
13
MetaA: Multi-Dimensional Evaluation of Testing Ability via Adversarial Examples in Deep Learning
Published in 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS) (01-12-2022)“…Deep learning (DL) has shown superior performance in many areas, making the quality assurance of DL-based software particularly important. Adversarial examples…”
Get full text
Conference Proceeding -
14
Impact of datasets on machine learning based methods in Android malware detection: an empirical study
Published in 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS) (01-12-2021)“…For Android malware detection, machine learning-based (ML-based) methods show promising performance. However, limited studies are performed to investigate the…”
Get full text
Conference Proceeding -
15
A Software Security Testing Model for Autonomous Systems
Published in 2023 10th International Conference on Dependable Systems and Their Applications (DSA) (10-08-2023)“…The autonomous system is an extremely complex and multidisciplinary system, and the overall goal of this paper is to study safety testing methods for…”
Get full text
Conference Proceeding -
16
Target Code-coverage and Efficiency in APP Automatic Compatibility Testing Based on Code Analysis
Published in 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS) (01-12-2021)“…With the prosperity of Mobile APPs, developers need to dynamically find the compatibility issues by testing APP on all Android versions and devices, which is…”
Get full text
Conference Proceeding -
17
A Survey of the Use of Test Report in Crowdsourced Testing
Published in 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS) (01-12-2020)“…With the rise of crowdsourced software testing in recent years, the issuers of crowd test tasks can usually collect a large number of test reports after the…”
Get full text
Conference Proceeding -
18
A Framework for Scanning Privacy Information based on Static Analysis
Published in 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS) (01-12-2022)“…Modern software brings many conveniences to users through big data, but it also risks privacy leakage. In recent years, privacy leaks have been frequent, and…”
Get full text
Conference Proceeding -
19
An Empirical Study on Spectral Clustering-based Software Defect Detection
Published in 2021 8th International Conference on Dependable Systems and Their Applications (DSA) (01-08-2021)“…Software defect detection is essential in software development. Most existing approaches often apply Supervised Machine Learning (SML) techniques for software…”
Get full text
Conference Proceeding -
20
A Method of Bug Report Quality Detection Based on Vector Space Model
Published in 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C) (01-07-2019)“…As a vehicle for recording and tracking defects, bug report provides basis for solving software quality problems. However, moving fake or duplication bug…”
Get full text
Conference Proceeding