default search action
Zhiqiu Huang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j136]Yaoshen Yu, Zhiqiu Huang, Guohua Shen, Weiwei Li, Yichao Shao:
ASTSDL: predicting the functionality of incomplete programming code via an AST-sequence-based deep learning model. Sci. China Inf. Sci. 67(1) (2024) - [j135]Yunfei Meng, Changbo Ke, Zhiqiu Huang:
A model transformation based security policy automatic management framework for software-defined networking. Comput. Secur. 142: 103850 (2024) - [j134]Guohua Shen, Mengnan Cai, Zhiqiu Huang, Yang Yang, Feifei Guo, Linlin Wei:
LoHDP: Adaptive local differential privacy for high-dimensional data publishing. Concurr. Comput. Pract. Exp. 36(11) (2024) - [j133]Hongjing Guo, Chuanqi Tao, Zhiqiu Huang:
Neuron importance-aware coverage analysis for deep neural network testing. Empir. Softw. Eng. 29(5): 118 (2024) - [j132]Yasir Hussain, Zhiqiu Huang, Yu Zhou, Izhar Ahmed Khan:
Exploring the Impact of Vocabulary Techniques on Code Completion: A Comparative Approach. Int. J. Softw. Eng. Knowl. Eng. 34(5): 705-727 (2024) - [j131]Xinbo Zhang, Guohua Shen, Zhiqiu Huang, Yaoshen Yu, Kang Wang:
FuEPRe: a fusing embedding method with attention for post recommendation. Serv. Oriented Comput. Appl. 18(1): 67-79 (2024) - [j130]Changbo Ke, Fu Xiao, Yan Cao, Zhiqiu Huang:
A Group-Vehicles Oriented Reputation Assessment Scheme for Edge VANETs. IEEE Trans. Cloud Comput. 12(3): 859-875 (2024) - [c82]Junwei Zeng, Yixuan Tang, Jingxuan Zhang, Weiwei Li, Zhiqiu Huang:
Detecting Optimizing Compiler Bugs via History-Driven Test Program Mutation. Internetware 2024 - [c81]Yinjie Xue, Zhiyi Zhang, Chen Liu, Shuxian Chen, Zhiqiu Huang:
DeepWeak: Weak Mutation Testing for Deep Learning Systems. QRS 2024: 49-60 - [c80]Fan Shi, Zhiqiu Huang, Haiyu Pan, Yuting Chang, Heng Xu:
Fuzzy Safety and Liveness Properties in Linear-time. QRS 2024: 536-545 - [i15]Yu Zhao, Lina Gong, Zhiqiu Huang, Yongwei Wang, Mingqiang Wei, Fei Wu:
Coding-PTMs: How to Find Optimal Code Pre-trained Models for Code Embedding in Vulnerability Detection? CoRR abs/2408.04863 (2024) - 2023
- [j129]Feifei Guo, Guohua Shen, Zhiqiu Huang, Yang Yang, Mengnan Cai, Linlin Wei:
DABAC: Smart Contract-Based Spatio-Temporal Domain Access Control for the Internet of Things. IEEE Access 11: 36452-36463 (2023) - [j128]Tiexin Wang, Chao Tan, Lei Huang, Yize Shi, Tao Yue, Zhiqiu Huang:
Simplexity testbed: A model-based digital twin testbed. Comput. Ind. 145: 103804 (2023) - [j127]Jinyong Wang, Zhiqiu Huang, Xiaowei Huang, Tiexin Wang, Guohua Shen, Jian Xie:
An accident prediction architecture based on spatio-clock stochastic and hybrid model for autonomous driving safety. Concurr. Comput. Pract. Exp. 35(17) (2023) - [j126]Guohua Shen, Sien Yang, Zhiqiu Huang, Yaoshen Yu, Xin Li:
The prediction of programming performance using student profiles. Educ. Inf. Technol. 28(1): 725-740 (2023) - [j125]Junan Huang, Zhiqiu Huang, Guohua Shen, Jinyong Wang, Xiaohua Yin:
Maneuver Conditioned Vehicle Trajectory Prediction Using Self-Attention. Int. J. Comput. Intell. Appl. 22(2): 2350005:1-2350005:19 (2023) - [j124]Chuanqi Tao, Yali Tao, Hongjing Guo, Zhiqiu Huang, Xiaobing Sun:
DLRegion: Coverage-guided fuzz testing of deep neural networks with region-based neuron selection strategies. Inf. Softw. Technol. 162: 107266 (2023) - [j123]Muhammad Azeem Akbar, Arif Ali Khan, Zhiqiu Huang:
Multicriteria decision making taxonomy of code recommendation system challenges: a fuzzy-AHP analysis. Inf. Technol. Manag. 24(2): 115-131 (2023) - [j122]Yasir Hussain, Zhiqiu Huang, Yu Zhou, Senzhang Wang:
Boosting source code suggestion with self-supervised Transformer Gated Highway. J. Syst. Softw. 196: 111553 (2023) - [j121]Chuanqi Tao, Hongjing Guo, Jingxuan Zhang, Zhiqiu Huang:
Supporting maintenance and testing for AI functions of mobile apps based on user reviews: An empirical study on plant identification apps. J. Softw. Evol. Process. 35(11) (2023) - [j120]Chao Wang, Zhiqiu Huang, Shuren Qi, Yaoshen Yu, Guohua Shen, Yushu Zhang:
Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection. IEEE Trans. Inf. Forensics Secur. 18: 1064-1079 (2023) - [j119]Zhibin Yang, Linquan Xing, Zonghua Gu, Yingmin Xiao, Yong Zhou, Zhiqiu Huang, Lei Xue:
Model-Based Reinforcement Learning and Neural-Network-Based Policy Compression for Spacecraft Rendezvous on Resource-Constrained Embedded Systems. IEEE Trans. Ind. Informatics 19(1): 1107-1116 (2023) - [j118]Lina Gong, Jingxuan Zhang, Mingqiang Wei, Haoxiang Zhang, Zhiqiu Huang:
What Is the Intended Usage Context of This Model? An Exploratory Study of Pre-Trained Models on Various Model Repositories. ACM Trans. Softw. Eng. Methodol. 32(3): 69:1-69:57 (2023) - [j117]Jingxuan Zhang, Junpeng Luo, Jiahui Liang, Lina Gong, Zhiqiu Huang:
An Accurate Identifier Renaming Prediction and Suggestion Approach. ACM Trans. Softw. Eng. Methodol. 32(6): 148:1-148:51 (2023) - [j116]Wenhua Yang, Chang Xu, Minxue Pan, Yu Zhou, Zhiqiu Huang:
Ensure: Towards Reliable Control of Cyber-Physical Systems Under Uncertainty. IEEE Trans. Reliab. 72(1): 289-301 (2023) - [j115]Chuanqi Tao, Kai Lin, Zhiqiu Huang, Xiaobing Sun:
CRAM: Code Recommendation With Programming Context Based on Self-Attention Mechanism. IEEE Trans. Reliab. 72(1): 302-316 (2023) - [j114]Lina Gong, Haoxiang Zhang, Jingxuan Zhang, Mingqiang Wei, Zhiqiu Huang:
A Comprehensive Investigation of the Impact of Class Overlap on Software Defect Prediction. IEEE Trans. Software Eng. 49(4): 2440-2458 (2023) - [j113]Jingxuan Zhang, Siyuan Liu, Lina Gong, Haoxiang Zhang, Zhiqiu Huang, He Jiang:
BEQAIN: An Effective and Efficient Identifier Normalization Approach With BERT and the Question Answering System. IEEE Trans. Software Eng. 49(4): 2597-2620 (2023) - [c79]Yasir Hussain, Zhiqiu Huang, Yu Zhou, Izhar Ahmed Khan, Nasrullah Khan, Muhammad Zahid Abbas:
Optimized Tokenization Process for Open-Vocabulary Code Completion: An Empirical Study. EASE 2023: 398-405 - [c78]Xin Lian, Zhiqiu Huang, Chao Wang:
AKD: Using Adversarial Knowledge Distillation to Achieve Black-box Attacks. IJCNN 2023: 1-7 - [c77]Yichun Wang, Zhiyi Zhang, Yongming Yao, Zhiqiu Huang:
A Fine-Grained Evaluation of Mutation Operators for Deep Learning Systems: A Selective Mutation Approach. Internetware 2023: 123-133 - [c76]Hongjing Guo, Chuanqi Tao, Zhiqiu Huang:
Multi-Objective White-Box Test Input Selection for Deep Neural Network Model Enhancement. ISSRE 2023: 521-532 - [c75]Huangli Cai, Zhiyi Zhang, Yifan Jian, Dan Li, Zhiqiu Huang:
BDGSE: A Symbolic Execution Technique for High MC/DC. QRS 2023: 313-324 - [c74]Zhuangyu Zhang, Zhiyi Zhang, Ziyuan Wang, Fang Chen, Zhiqiu Huang:
BTM: Black-Box Testing for DNN Based on Meta-Learning. QRS 2023: 581-592 - [c73]Wei Li, Zhiyi Zhang, Yifan Jian, Chen Liu, Zhiqiu Huang:
DeepRank: Test Case Prioritization for Deep Neural Networks. SEKE 2023: 262-267 - [c72]Yingmin Xiao, Zhibin Yang, Yong Zhou, Zhiqiu Huang:
Run-Time Assured Reinforcement Learning for Safe Spacecraft Rendezvous with Obstacle Avoidance. SETTA 2023: 298-313 - [c71]Yao Hao, Zhiqiu Huang, Hongjing Guo, Guohua Shen:
Test Input Selection for Deep Neural Network Enhancement Based on Multiple-Objective Optimization. SANER 2023: 534-545 - [i14]Yunfei Meng, Changbo Ke, Zhiqiu Huang, Guohua Shen, Chunming Liu, Xiaojie Feng:
A Practical Runtime Security Policy Transformation Framework for Software Defined Networks. CoRR abs/2301.03790 (2023) - [i13]Chao Wang, Shuren Qi, Zhiqiu Huang, Yushu Zhang, Xiaochun Cao:
Towards an Accurate and Secure Detector against Adversarial Perturbations. CoRR abs/2305.10856 (2023) - [i12]Yu Zhao, Lina Gong, Haoxiang Zhang, Yaoshen Yu, Zhiqiu Huang:
How to get better embeddings with code pre-trained models? An empirical study. CoRR abs/2311.08066 (2023) - 2022
- [j112]Jian Xie, Wenan Tan, Zhibin Yang, Shuming Li, Linquan Xing, Zhiqiu Huang:
SysML-based compositional verification and safety analysis for safety-critical cyber-physical systems. Connect. Sci. 34(1): 911-941 (2022) - [j111]Changbo Ke, Fu Xiao, Zhiqiu Huang, Fangxiong Xiao:
A user requirements-oriented privacy policy self-adaption scheme in cloud computing. Frontiers Comput. Sci. 17(2): 172203 (2022) - [j110]Linyuan Liu, Haibin Zhu, Shenglei Chen, Zhiqiu Huang:
Privacy regulation aware service selection for multi-provision cloud service composition. Future Gener. Comput. Syst. 126: 263-278 (2022) - [j109]Jinyong Wang, Zhiqiu Huang, Yi Zhu, Guohua Shen:
Statistical Model Checking for Stochastic and Hybrid Autonomous Driving Based on Spatio-Clock Constraints. Int. J. Softw. Eng. Knowl. Eng. 32(4): 553-582 (2022) - [j108]Yongchao Wang, Yu Zhou, Taolue Chen, Jingxuan Zhang, Wenhua Yang, Zhiqiu Huang:
Sequence-Aware API Recommendation Based on Collaborative Filtering. Int. J. Softw. Eng. Knowl. Eng. 32(8): 1203-1228 (2022) - [j107]Yasir Hussain, Zhiqiu Huang, Yu Zhou, Izhar Ahmed Khan:
Exploring the Impact of Balanced and Imbalanced Learning in Source Code Suggestion. Int. J. Softw. Eng. Knowl. Eng. 32(10): 1499-1526 (2022) - [j106]Changbo Ke, Zejiang Zhu, Fu Xiao, Zhiqiu Huang, Yunfei Meng:
SDN-Based Privacy and Functional Authentication Scheme for Fog Nodes of Smart Healthcare. IEEE Internet Things J. 9(18): 17989-18001 (2022) - [j105]Wenhua Yang, Minxue Pan, Yu Zhou, Zhiqiu Huang:
Meaningful Update and Repair of Markov Decision Processes for Self-Adaptive Systems. J. Comput. Sci. Technol. 37(1): 106-127 (2022) - [j104]Zhiyi Zhang, Ziyuan Wang, Fan Yang, Jiahao Wei, Yuqian Zhou, Zhiqiu Huang:
Random or heuristic? An empirical study on path search strategies for test generation in KLEE. J. Syst. Softw. 188: 111269 (2022) - [j103]Junpeng Luo, Jingxuan Zhang, Zhiqiu Huang, Yong Xu, Chenxing Sun:
Toward an accurate method renaming approach via structural and lexical analyses. Frontiers Inf. Technol. Electron. Eng. 23(5): 732-748 (2022) - [j102]Yichao Shao, Zhiqiu Huang, Weiwei Li, Yaoshen Yu:
Fast code recommendation via approximate sub-tree matching. Frontiers Inf. Technol. Electron. Eng. 23(8): 1205-1216 (2022) - [j101]Weiwei Li, Jin Chen, Peixue Gao, Zhiqiu Huang:
Label enhancement with label-specific feature learning. Int. J. Mach. Learn. Cybern. 13(10): 2857-2867 (2022) - [j100]Yaoshen Yu, Zhiqiu Huang, Guohua Shen, Weiwei Li, Yichao Shao:
ASTENS-BWA: Searching partial syntactic similar regions between source code fragments via AST-based encoded sequence alignment. Sci. Comput. Program. 222: 102839 (2022) - [j99]Xiaohua Yin, Zhiqiu Huang, Shuanglong Kan, Guohua Shen, Zhe Chen, Yang Liu, Fei Wang:
SafeOSL: Ensuring memory safety of C via ownership-based intermediate language. Softw. Pract. Exp. 52(5): 1114-1142 (2022) - [j98]Wenhua Yang, Chong Zhang, Minxue Pan, Chang Xu, Yu Zhou, Zhiqiu Huang:
Do Developers Really Know How to Use Git Commands? A Large-scale Study Using Stack Overflow. ACM Trans. Softw. Eng. Methodol. 31(3): 44:1-44:29 (2022) - [j97]Changbo Ke, Jiayu Wu, Fu Xiao, Zhiqiu Huang, Yunfei Meng:
A Privacy Risk Assessment Scheme for Fog Nodes in Access Control System. IEEE Trans. Reliab. 71(4): 1513-1526 (2022) - [j96]Changbo Ke, Fu Xiao, Zhiqiu Huang, Yunfei Meng, Yan Cao:
Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data. IEEE Trans. Serv. Comput. 15(1): 59-68 (2022) - [j95]Yu Zhou, Xinying Yang, Taolue Chen, Zhiqiu Huang, Xiaoxing Ma, Harald C. Gall:
Boosting API Recommendation With Implicit Feedback. IEEE Trans. Software Eng. 48(6): 2157-2172 (2022) - [c70]Junan Huang, Zhiqiu Huang, Guohua Shen, Heng Xu, Gaoyang Hua:
SIA-Net: Scalable Interaction-Aware Network for Vehicle Trajectory Prediction Based on Self-Attention. ICTAI 2022: 780-787 - [c69]Weiwei Li, Jin Chen, Yuqing Lu, Zhiqiu Huang:
Filling Missing Labels in Label Distribution Learning by Exploiting Label-Specific Feature Selection. IJCNN 2022: 1-8 - [c68]Chao Xiong, Zhiyi Zhang, Yuqian Zhou, Chen Liu, Zhiqiu Huang:
IEMT: Inequality-Based Metamorphic Testing for Autonomous Driving Models. QRS Companion 2022: 283-287 - [c67]Cheng Wei, Zhiqiu Huang, Yaoshen Yu:
Improved Methods of Pointer Mixture Network for Code Completion. QRS 2022: 907-915 - [c66]Lile Lin, Zhiqiu Huang, Yaoshen Yu, Yapeng Liu:
Multi-Modal Code Summarization with Retrieved Summary. SCAM 2022: 132-142 - [c65]Yapeng Liu, Zhiqiu Huang, Yaoshen Yu, Yasir Hussain, Lile Lin:
Improving Code Completion by Sequence Features and Structural Features. WSSE 2022: 51-58 - [i11]Chao Wang, Zhiqiu Huang, Shu-Ren Qi, Yaoshen Yu, Guohua Shen:
Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection. CoRR abs/2207.09135 (2022) - 2021
- [j94]Shuyu Bian, Guohua Shen, Zhiqiu Huang, Yang Yang, Jinghan Li, Xiaoyu Zhang:
PABC: A Patent Application System Based on Blockchain. IEEE Access 9: 4199-4210 (2021) - [j93]Yunfei Meng, Zhiqiu Huang, Guohua Shen, Changbo Ke:
A security policy model transformation and verification approach for software defined networking. Comput. Secur. 100: 102089 (2021) - [j92]Yao Xia, Zhiqiu Huang, Yonglong Zhang, Min Yuan, Shangguang Wang, Yu Zhou:
SPASC: Strategy-proof auction mechanism with cost and QoS incentive for service composition. Concurr. Comput. Pract. Exp. 33(9) (2021) - [j91]Zhibin Yang, Yang Bao, Yongqiang Yang, Zhiqiu Huang, Jean-Paul Bodeveix, Mamoun Filali, Zonghua Gu:
Exploiting augmented intelligence in the modeling of safety-critical autonomous systems. Formal Aspects Comput. 33(3): 343-384 (2021) - [j90]Yasir Hussain, Zhiqiu Huang, Yu Zhou:
Improving source code suggestion with code embedding and enhanced convolutional long short-term memory. IET Softw. 15(3): 199-213 (2021) - [j89]Kai Chen, Guohua Shen, Zhiqiu Huang, Haijuan Wang:
Improved Entity Linking for Simple Question Answering Over Knowledge Graph. Int. J. Softw. Eng. Knowl. Eng. 31(1): 55-80 (2021) - [j88]Guohua Shen, Haijuan Wang, Zhiqiu Huang, Yaoshen Yu, Kai Chen:
Supporting Requirements to Code Traceability Creation by Code Comments. Int. J. Softw. Eng. Knowl. Eng. 31(8): 1099-1118 (2021) - [j87]Wenhua Yang, Yu Zhou, Zhiqiu Huang:
Personalized API Recommendations. Int. J. Softw. Eng. Knowl. Eng. 31(9): 1299-1327 (2021) - [j86]Zhiyi Zhang, Pu Wang, Hongjing Guo, Ziyuan Wang, Yuqian Zhou, Zhiqiu Huang:
DeepBackground: Metamorphic testing for Deep-Learning-driven image recognition systems accompanied by Background-Relevance. Inf. Softw. Technol. 140: 106701 (2021) - [j85]Jing-Xuan Zhang, Chuanqi Tao, Zhiqiu Huang, Xin Chen:
Discovering API Directives from API Specifications with Text Classification. J. Comput. Sci. Technol. 36(4): 922-943 (2021) - [j84]Zhibin Yang, Zhikai Qiu, Yong Zhou, Zhiqiu Huang, Jean-Paul Bodeveix, Mamoun Filali:
C2AADL_Reverse: A model-driven reverse engineering approach to development and verification of safety-critical software. J. Syst. Archit. 118: 102202 (2021) - [j83]Yao Xia, Zhiqiu Huang:
A strategy-proof auction mechanism for service composition based on user preferences. Frontiers Inf. Technol. Electron. Eng. 22(2): 185-201 (2021) - [j82]Haijuan Wang, Guohua Shen, Zhiqiu Huang, Yaoshen Yu, Kai Chen:
Analyzing close relations between target artifacts for improving IR-based requirement traceability recovery. Frontiers Inf. Technol. Electron. Eng. 22(7): 957-968 (2021) - [j81]Jian Xie, Wenan Tan, BingWu Fang, Zhiqiu Huang:
Towards a Statistical Model Checking Method for Safety-Critical Cyber-Physical System Verification. Secur. Commun. Networks 2021: 5536722:1-5536722:12 (2021) - [j80]Yuxuan Zhang, Senzhang Wang, Bing Chen, Jiannong Cao, Zhiqiu Huang:
TrafficGAN: Network-Scale Deep Traffic Prediction With Generative Adversarial Nets. IEEE Trans. Intell. Transp. Syst. 22(1): 219-230 (2021) - [j79]Jingxuan Zhang, He Jiang, Zhilei Ren, Tao Zhang, Zhiqiu Huang:
Enriching API Documentation with Code Samples and Usage Scenarios from Crowd Knowledge. IEEE Trans. Software Eng. 47(6): 1299-1314 (2021) - [j78]Yu Zhou, Yanqi Su, Taolue Chen, Zhiqiu Huang, Harald C. Gall, Sebastiano Panichella:
User Review-Based Change File Localization for Mobile Applications. IEEE Trans. Software Eng. 47(12): 2755-2770 (2021) - [c64]Jingxuan Zhang, Weiqin Zou, Zhiqiu Huang:
An Empirical Study on the Usage and Evolution of Identifier Styles in Practice. APSEC 2021: 171-180 - [c63]Muhammad Ali Arshad, Zhiqiu Huang, Adnan Riaz, Yasir Hussain:
Deep Learning-Based Resolution Prediction of Software Enhancement Reports. CCWC 2021: 492-499 - [c62]Zhiqiu Huang, Yuqing Zhang, Wengjie Wang, Haitao He:
Ant Hole: Data Poisoning Attack Breaking out the Boundary of Face Cluster. DSN Workshops 2021: 71-77 - [c61]Lei Liao, Zhiqiu Huang, Wengjie Wang:
A Statistical Learning Model with Deep Learning Characteristics. DSN Workshops 2021: 137-140 - [c60]Jingxue Sun, Zhiqiu Huang, Ting Yang, Wengjie Wang, Yuqing Zhang:
A system for detecting third-party tracking through the combination of dynamic analysis and static analysis. INFOCOM Workshops 2021: 1-6 - [c59]Jingxue Sun, Ting Yang, Zhiqiu Huang, Wengjie Wang, Yuqing Zhang:
Using Dynamic Analysis to Automatically Detect Anti-Adblocker on the Web. INFOCOM Workshops 2021: 1-6 - [c58]Kai Lin, Chuanqi Tao, Zhiqiu Huang:
Exception Handling Recommendation Based on Self-Attention Network. ISSRE Workshops 2021: 282-283 - [c57]Jiahui Liang, Weiqin Zou, Jingxuan Zhang, Zhiqiu Huang, Chenxing Sun:
A Deep Method Renaming Prediction and Refinement Approach for Java Projects. QRS 2021: 404-413 - [c56]Yunjian Xu, Zhiyi Zhang, Yuqian Zhou, Ziyuan Wang, Zhiqiu Huang:
DeepMnist: A method of white box testing based on hierarchy. QRS Companion 2021: 712-717 - [c55]Meng Zhang, Chuanqi Tao, Hongjing Guo, Zhiqiu Huang:
Recovering Semantic Traceability between Requirements and Source Code Using Feature Representation Techniques. QRS 2021: 873-882 - [c54]Yongchao Wang, Yu Zhou, Taolue Chen, Jingxuan Zhang, Wenhua Yang, Zhiqiu Huang:
Hybrid Collaborative Filtering-Based API Recommendation. QRS 2021: 906-914 - [i10]Yunfei Meng, Zhiqiu Huang, Guohua Shen, Changbo Ke:
SDN-based Runtime Security Enforcement Approach for Privacy Preservation of Dynamic Web Service Composition. CoRR abs/2105.12935 (2021) - 2020
- [j77]Yasir Hussain, Huang Zhiqiu, Muhammad Azeem Akbar, Ahmed Alsanad, Abeer Abdul-Aziz Alsanad, Asif Nawaz, Izhar Ahmed Khan, Zaheer Ullah Khan:
Context-Aware Trust and Reputation Model for Fog-Based IoT. IEEE Access 8: 31622-31632 (2020) - [j76]Jingxuan Zhang, Siyuan Liu, Junpeng Luo, Jiahui Liang, Zhiqiu Huang:
Exploring the Characteristics of Identifiers: A Large-Scale Empirical Study on 5, 000 Open Source Projects. IEEE Access 8: 140607-140620 (2020) - [j75]Chuanqi Tao, Panpan Bao, Zhiqiu Huang:
Code line generation based on deep context-awareness of onsite programming. Sci. China Inf. Sci. 63(9): 1-3 (2020) - [j74]Yan Cao, Zhiqiu Huang, Yaoshen Yu, Changbo Ke, Zihao Wang:
A topology and risk-aware access control framework for cyber-physical space. Frontiers Comput. Sci. 14(4): 144805 (2020) - [j73]Yasir Hussain, Zhiqiu Huang, Yu Zhou, Senzhang Wang:
Deep Transfer Learning for Source Code Modeling. Int. J. Softw. Eng. Knowl. Eng. 30(5): 649-668 (2020) - [j72]Chuanqi Tao, Hongjing Guo, Zhiqiu Huang:
Identifying security issues for mobile applications based on user review summarization. Inf. Softw. Technol. 122: 106290 (2020) - [j71]Yasir Hussain, Zhiqiu Huang, Yu Zhou, Senzhang Wang:
CodeGRU: Context-aware deep learning with gated recurrent unit for source code modeling. Inf. Softw. Technol. 125: 106309 (2020) - [j70]Wenhua Yang, Minxue Pan, Yu Zhou, Zhiqiu Huang:
Developer portraying: A quick approach to understanding developers on OSS platforms. Inf. Softw. Technol. 125: 106336 (2020) - [j69]Weiwei Li, Wenzhou Zhang, Xiuyi Jia, Zhiqiu Huang:
Effort-Aware semi-Supervised just-in-Time defect prediction. Inf. Softw. Technol. 126: 106364 (2020) - [j68]Wenhua Yang, Chang Xu, Haibo Ye, Yu Zhou, Zhiqiu Huang:
智能化信息物理系统中非确定性的分类研究 (Taxonomy of Uncertainty Factors in Intelligence-oriented Cyber-physical Systems). 计算机科学 47(3): 11-18 (2020) - [j67]Yunfan Zhang, Yu Zhou, Zhiqiu Huang:
基于语义相似度的API使用模式推荐 (Semantic Similarity Based API Usage Pattern Recommendation). 计算机科学 47(3): 34-40 (2020) - [j66]Tianbao Du, Guohua Shen, Zhi-qiu Huang, Yaoshen Yu, Dexiang Wu:
Automatic traceability link recovery via active learning. Frontiers Inf. Technol. Electron. Eng. 21(8): 1217-1225 (2020) - [j65]Asif Nawaz, Zhiqiu Huang, Senzhang Wang, Muhammad Azeem Akbar, Hussain Alsalman, Abdu Gumaei:
GPS Trajectory Completion Using End-to-End Bidirectional Convolutional Recurrent Encoder-Decoder Architecture with Attention Mechanism. Sensors 20(18): 5143 (2020) - [j64]Muhammad Azeem Akbar, Sajjad Mahmood, Zhiqiu Huang, Arif Ali Khan, Mohammad Shameem:
Readiness model for requirements change management in global software development. J. Softw. Evol. Process. 32(10) (2020) - [j63]Yunfei Meng, Zhiqiu Huang, Guohua Shen, Changbo Ke:
SDN-Based Security Enforcement Framework for Data Sharing Systems of Smart Healthcare. IEEE Trans. Netw. Serv. Manag. 17(1): 308-318 (2020) - [j62]Fei Wang, Zhibin Yang, Zhi-qiu Huang, Chengwei Liu, Yong Zhou, Jean-Paul Bodeveix, Mamoun Filali:
An Approach to Generate the Traceability Between Restricted Natural Language Requirements and AADL Models. IEEE Trans. Reliab. 69(1): 154-173 (2020) - [j61]Senzhang Wang, Jiannong Cao, Hao Chen, Hao Peng, Zhiqiu Huang:
SeqST-GAN: Seq2Seq Generative Adversarial Nets for Multi-step Urban Crowd Flow Prediction. ACM Trans. Spatial Algorithms Syst. 6(4): 22:1-22:24 (2020) - [c53]Asif Nawaz, Zhiqiu Huang, Senzhang Wang, Amara Naseer:
Deep neural architecture for geospatial trajectory completion over occupancy gridmap. CLOUD 2020: 37-39 - [c52]Asif Nawaz, Zhiqiu Huang, Senzhang Wang:
SSMDL: Semi-supervised Multi-task Deep Learning for Transportation Mode Classification and Path Prediction with GPS Trajectories. APWeb/WAIM (2) 2020: 391-405 - [c51]Senzhang Wang, Hao Miao, Hao Chen, Zhiqiu Huang:
Multi-task Adversarial Spatial-Temporal Networks for Crowd Flow Prediction. CIKM 2020: 1555-1564 - [c50]Muhammad Azeem Akbar, Zhiqiu Huang, Yu Zhou, Faisal Mehmood, Yasir Hussain, Muhammad Hamza:
Towards continues code recommendation and implementation system: An Initial Framework. EASE 2020: 439-444 - [c49]Liyu Fang, Zhiqiu Huang, Yu Zhou, Taolue Chen:
Adaptive Code Completion with Meta-learning. Internetware 2020: 116-125 - [c48]Yaoshen Yu, Zhiqiu Huang, Yu Zhou, Weiwei Li, Yichao Shao:
ASPDup: AST-Sequence-based Progressive Duplicate Code Detection Tool for Onsite Programming Code. Internetware 2020: 260-264 - [c47]Hongjing Guo, Chuanqi Tao, Zhiqiu Huang:
Metamorphic Testing for Plant Identification Mobile Applications Based on Test Contexts. MobiCASE 2020: 209-223 - [c46]Pu Wang, Zhiyi Zhang, Yuqian Zhou, Zhiqiu Huang:
Test Data Augmentation for Image Recognition Software. QRS Companion 2020: 280-284 - [i9]Yu Zhou, Xinying Yang, Taolue Chen, Zhiqiu Huang, Xiaoxing Ma, Harald C. Gall:
Boosting API Recommendation with Implicit Feedback. CoRR abs/2002.01264 (2020) - [i8]Yunfei Meng, Zhiqiu Huang, Senzhang Wang, Guohua Shen, Changbo Ke:
SOM-based DDoS Defense Mechanism using SDN for the Internet of Things. CoRR abs/2003.06834 (2020) - [i7]Yunfei Meng, Zhiqiu Huang, Guohua Shen, Changbo Ke:
A Security Policy Model Transformation and Verification Approach for Software Defined Networking. CoRR abs/2005.13206 (2020)
2010 – 2019
- 2019
- [j60]Haibo Ye, Li Sheng, Tao Gu, Zhiqiu Huang:
SELoc: Collect Your Location Data Using Only a Barometer Sensor. IEEE Access 7: 88705-88717 (2019) - [j59]Dexiang Wu, Guohua Shen, Zhi-qiu Huang, Yan Cao, Tianbao Du:
A Trust-Aware Task Offloading Framework in Mobile Edge Computing. IEEE Access 7: 150105-150119 (2019) - [j58]Yan Cao, Zhiqiu Huang, Changbo Ke, Jian Xie, Jin Wang:
A topology-aware access control model for collaborative cyber-physical spaces: Specification and verification. Comput. Secur. 87 (2019) - [j57]Yong Wang, Zhiqiu Huang, Yong Li, Rongcun Wang, Qiao Yu:
Spectrum-Based Fault Localization Framework to Support Fault Understanding. IEICE Trans. Inf. Syst. 102-D(4): 863-866 (2019) - [j56]Changbo Ke, Zhiqiu Huang, Jiayu Wu:
面向大数据的隐私发布暴露检测方法 (Big Data Oriented Privacy Disclosure Detection Method for Information Release). 计算机科学 46(10): 148-153 (2019) - [j55]Yu Zhou, Xin Yan, Wenhua Yang, Taolue Chen, Zhiqiu Huang:
Augmenting Java method comments generation with context information based on neural networks. J. Syst. Softw. 156: 328-340 (2019) - [j54]Haibo Ye, Kai Dong, Tao Gu, Zhiqiu Huang:
SMinder: Detect a Left-behind Phone using Sensor-based Context Awareness. Mob. Networks Appl. 24(1): 171-183 (2019) - [j53]Senzhang Wang, Xiaoming Zhang, Fengxiang Li, Philip S. Yu, Zhiqiu Huang:
Efficient Traffic Estimation With Multi-Sourced Data by Parallel Coupled Hidden Markov Model. IEEE Trans. Intell. Transp. Syst. 20(8): 3010-3023 (2019) - [c45]Lei Ai, Zhiqiu Huang, Weiwei Li, Yu Zhou, Yaoshen Yu:
SENSORY: Leveraging Code Statement Sequence Information for Code Snippets Recommendation. COMPSAC (1) 2019: 27-36 - [i6]Yasir Hussain, Zhiqiu Huang, Senzhang Wang, Yu Zhou:
CodeGRU: Context-aware Deep Learning with Gated Recurrent Unit for Source Code Modeling. CoRR abs/1903.00884 (2019) - [i5]Yu Zhou, Yanqi Su, Taolue Chen, Zhiqiu Huang, Harald C. Gall, Sebastiano Panichella:
User Review-Based Change File Localization for Mobile Applications. CoRR abs/1903.00894 (2019) - [i4]Yunfei Meng, Zhiqiu Huang, Senzhang Wang, Yu Zhou, Guohua Shen, Changbo Ke:
Behavior-aware Service Access Control Mechanism using Security Policy Monitoring for SOA Systems. CoRR abs/1908.10201 (2019) - [i3]Yasir Hussain, Zhiqiu Huang, Yu Zhou, Senzhang Wang:
Deep Transfer Learning for Source Code Modeling. CoRR abs/1910.05493 (2019) - [i2]Yasir Hussain, Zhiqiu Huang, Yu Zhou, Senzhang Wang:
DeepVS: An Efficient and Generic Approach for Source Code Modeling Usage. CoRR abs/1910.06500 (2019) - 2018
- [j52]Yong Wang, Zhiqiu Huang, BingWu Fang, Yong Li:
Spectrum-Based Fault Localization via Enlarging Non-Fault Region to Improve Fault Absolute Ranking. IEEE Access 6: 8925-8933 (2018) - [j51]Haibo Ye, Wenhua Yang, Yunyu Yao, Tao Gu, Zhiqiu Huang:
BTrack: Using Barometer for Energy Efficient Location Tracking on Mountain Roads. IEEE Access 6: 66998-67009 (2018) - [j50]Liming Fang, Chunpeng Ge, Zhiqiu Huang, Jiandong Wang:
Privacy preserving cloud data sharing system with flexible control. Comput. Electr. Eng. 70: 978-986 (2018) - [j49]Shuanglong Kan, Zhiqiu Huang:
Partial Order Reduction for the full Class of State/Event Linear Temporal Logic. Comput. J. 61(5): 629-644 (2018) - [j48]Yunfei Meng, Zhiqiu Huang, Yu Zhou, Changbo Ke:
Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities. Future Gener. Comput. Syst. 86: 1-11 (2018) - [j47]Yong Wang, Zhiqiu Huang, Rongcun Wang, Qiao Yu:
Spectrum-Based Fault Localization Using Fault Triggering Model to Refine Fault Ranking List. IEICE Trans. Inf. Syst. 101-D(10): 2436-2446 (2018) - [j46]Jia-xin Jiang, Zhi-qiu Huang, Wei-wei Ma, Yan Cao:
Using information flow analysis to detect implicit information leaks for web service composition. Frontiers Inf. Technol. Electron. Eng. 19(4): 494-502 (2018) - [j45]Huanfeng Peng, Zhi-qiu Huang, LinYuan Liu, Yong Li, Dajuan Fan, Yu-qing Wang:
Preserving privacy information flow security in composite service evolution. Frontiers Inf. Technol. Electron. Eng. 19(5): 626-638 (2018) - [j44]Shuanglong Kan, Zhiqiu Huang:
Detecting safety-related components in statecharts through traceability and model slicing. Softw. Pract. Exp. 48(3): 428-448 (2018) - [c44]Min Yuan, Zhiqiu Huang:
Efficient Verification of Service-Based Applications for Flexible Modeling. SCC 2018: 97-104 - [c43]Yasir Hussain, Zhiqiu Huang:
TRFIoT: Trust and Reputation Model for Fog-based IoT. ICCCS (6) 2018: 187-198 - [c42]Zhe Chen, Junqi Yan, Wenming Li, Ju Qian, Zhiqiu Huang:
Runtime verification of memory safety via source transformation. ICSE (Companion Volume) 2018: 264-265 - [c41]Jinmiao Xu, Zhibin Yang, Zhiqiu Huang, Yong Zhou, Chengwei Liu, Lei Xue, Jean-Paul Bodeveix, Mamoun Filali:
Hierarchical Behavior Annex: Towards an AADL Functional Specification Extension. MEMOCODE 2018: 88-98 - 2017
- [j43]Changbo Ke, Zhiqiu Huang, Xiaohui Cheng:
Privacy Disclosure Checking Method Applied on Collaboration Interactions Among SaaS Services. IEEE Access 5: 15080-15092 (2017) - [j42]Yong Li, Zhiqiu Huang, Yong Wang, BingWu Fang:
Evaluating Data Filter on Cross-Project Defect Prediction: Comparison and Improvements. IEEE Access 5: 25646-25656 (2017) - [j41]Weiwei Li, Shuanglong Kan, Zhiqiu Huang:
A Better Translation From LTL to Transition-Based Generalized Büchi Automata. IEEE Access 5: 27081-27090 (2017) - [j40]Yong Wang, Zhiqiu Huang, Yong Li, BingWu Fang:
Lightweight fault localization combined with fault context to improve fault absolute rank. Sci. China Inf. Sci. 60(9): 092113:1-092113:16 (2017) - [j39]Chi Zhang, Zhiqiu Huang, Zewen Ding:
支持抽象解释的静态分析方法的形式化体系研究 (Research on Static Analysis Formalism Supporting Abstract Interpretation). 计算机科学 44(12): 126-130 (2017) - [j38]Changbo Ke, Zhiqiu Huang, Fu Xiao:
基于本体概念相似度的软件构件检索方法 (Software Component Retrieval Method Based on Ontology Concept Similarity). 计算机科学 44(12): 144-149 (2017) - [j37]Shuanglong Kan, Zhiqiu Huang, Zhe Chen, Weiwei Li, Yutao Huang:
Partial order reduction for checking LTL formulae with the next-time operator. J. Log. Comput. 27(4): 1095-1131 (2017) - [j36]BingWu Fang, Zhiqiu Huang, Yong Li, Yong Wang:
υ-Support vector machine based on discriminant sparse neighborhood preserving embedding. Pattern Anal. Appl. 20(4): 1077-1089 (2017) - [j35]Yi Zhu, Zhiqiu Huang, Hang Zhou:
Modeling and verification of Web services composition based on model transformation. Softw. Pract. Exp. 47(5): 709-730 (2017) - [j34]Yinling Liu, Guohua Shen, Zhiqiu Huang, Zhibin Yang:
Quantitative risk analysis of safety-critical embedded systems. Softw. Qual. J. 25(2): 503-527 (2017) - [j33]Senzhang Wang, Xiaoming Zhang, Jianping Cao, Lifang He, Leon Stenneth, Philip S. Yu, Zhoujun Li, Zhiqiu Huang:
Computing Urban Traffic Congestions by Incorporating Sparse GPS Probe Data and Social Media Data. ACM Trans. Inf. Syst. 35(4): 40:1-40:30 (2017) - [c40]Yu Zhou, Ruihang Gu, Taolue Chen, Zhiqiu Huang, Sebastiano Panichella, Harald C. Gall:
Analyzing APIs documentation and code to detect directive defects. ICSE 2017: 27-37 - [c39]Mirza Khudadad, Zhiqiu Huang:
Intrusion Detection with Tree-Based Data Mining Classification Techniques by Using KDD. MLICOM (2) 2017: 294-303 - [c38]Qi Zhang, Zhiqiu Huang, Jian Xie:
Distributed System Model Using SysML and Event-B. MLICOM (1) 2017: 326-336 - [c37]Shenghui Su, Jianhua Zheng, Shuwang Lü, Zhiqiu Huang, Zhoujun Li, Zhenmin Tang:
Idology and Its Applications in Public Security and Network Security. PAISI 2017: 129-149 - 2016
- [j32]Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren:
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles. Comput. J. 59(7): 970-982 (2016) - [j31]Weiwei Li, Zhiqiu Huang, Xiuyi Jia, Xinye Cai:
Neighborhood based decision-theoretic rough set models. Int. J. Approx. Reason. 69: 1-17 (2016) - [j30]Yi Zhu, Zhiqiu Huang, Guangquan Zhang, Hang Zhou, Fangxiong Xiao:
Multi-Resource Modeling of Real-Time Software Based on Resource Timed Process Algebra. Int. J. Softw. Eng. Knowl. Eng. 26(7): 1099-1116 (2016) - [j29]Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi:
Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distributed Comput. 89: 1-12 (2016) - [j28]Xueming Zhang, Zhiqiu Huang, Yi Sun:
基于RBAC的隐私访问控制研究 (Research on Privacy Access Control Based on RBAC). 计算机科学 43(1): 166-171 (2016) - [j27]Guangying Chen, Zhiqiu Huang, Zhe Chen, Shuanglong Kan:
面向DO-333的襟缝翼控制单元安全性分析 (Safety Analysis of Slat and Flap Control Unit for DO-333). 计算机科学 43(5): 150-156 (2016) - [j26]Weiwei Li, Zhiqiu Huang, Qing Li:
Three-way decisions based software defect prediction. Knowl. Based Syst. 91: 263-274 (2016) - [c36]Shuanglong Kan, Zhiqiu Huang, Zhe Chen:
Partial Order Reduction for State/Event Systems. ICFEM 2016: 329-345 - [c35]Senzhang Wang, Lifang He, Leon Stenneth, Philip S. Yu, Zhoujun Li, Zhiqiu Huang:
Estimating Urban Traffic Congestions with Multi-sourced Data. MDM 2016: 82-91 - [c34]Yong Wang, Zhiqiu Huang:
Weighted Control Flow Subgraph to Support Debugging Activities. QRS Companion 2016: 131-134 - [c33]Yong Wang, Zhiqiu Huang, Yong Li, BingWu Fang:
Lightweight Fault Localization Combining with Fault-Context. SATE 2016: 96-101 - [i1]Shenghui Su, Jianhua Zheng, Zhiqiu Huang, Zhoujun Li, Zhenmin Tang, Jian Wang, Shuwang Lü:
Idology and Its Applications in Public Security and Network Security. CoRR abs/1609.05601 (2016) - 2015
- [j25]Yonglong Zhang, Bin Li, Zhiqiu Huang, Jin Wang, Junwu Zhu:
SGAM: strategy-proof group buying-based auction mechanism for virtual machine allocation in clouds. Concurr. Comput. Pract. Exp. 27(18): 5577-5589 (2015) - [j24]Yu Zhou, Yankai Huang, Ou Wei, Zhiqiu Huang:
Verifying specifications with associated attributes in graph transformation systems. Frontiers Comput. Sci. 9(3): 364-374 (2015) - [j23]Changbo Ke, Ruchuan Wang, Fu Xiao, Zhiqiu Huang:
Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing. J. Commun. 10(1): 55-63 (2015) - [j22]Chuan Ni, Zhiqiu Huang, Shanshan Wang, Chuanlin Huang:
基于属性的支持策略本体推理的访问控制方法研究 (Attribute-based Access Control Method Supporting Policies Ontology Reasoning). 计算机科学 42(3): 96-101 (2015) - [j21]Zhipeng Wu, Zhiqiu Huang, Shanshan Wang, Dejian Cao:
一种基于故障扩展SysML活动图的安全性验证框架研究 (Research on Framework of Safety Verification Based on Fault-extended SysML Activity Diagram). 计算机科学 42(7): 222-228 (2015) - [j20]Liang Zhou, Zhiqiu Huang, Chuanlin Huang:
故障树领域本体及SWRL规则的构建方法研究 (Construction Method for Fault Tree Domain Ontology Supporting SWRL Rules). 计算机科学 42(8): 198-202 (2015) - [j19]Liming Fang, Zhiqiu Huang, Jiandong Wang:
标准模型下增强的无需安全信道的带关键词搜索的公钥加密 (Secure Channel Free Searchable Encryption in Standard Model). 计算机科学 42(11): 197-202 (2015) - [j18]Fei Wang, Guohua Shen, Zhiqiu Huang, Lin Ma, Chang Liu, Haifeng Li, Lili Liao:
一种结合线性时序逻辑和故障树的软件安全验证方法 (Method Combining Linear Temporal Logic and Fault Tree for Software Safety Verification). 计算机科学 42(12): 71-75 (2015) - [j17]Chuanlin Huang, Zhiqiu Huang, Jun Hu, Zhipeng Wu, Siqi Wang:
A MDE-Based Approach to the Safety Verification of Extended SysML Activity Diagram. J. Softw. 10(1): 56-70 (2015) - [j16]Zhe Chen, Yi Gu, Zhiqiu Huang, Jun Zheng, Chang Liu, Ziyi Liu:
Model checking aircraft controller software: a case study. Softw. Pract. Exp. 45(7): 989-1017 (2015) - [j15]Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi:
On the Security of A Privacy-Preserving Product Calculation Scheme. IEEE Trans. Dependable Secur. Comput. 12(3): 373-374 (2015) - [c32]Zhe Chen, Ou Wei, Zhiqiu Huang, Hongwei Xi:
Formal Semantics of Runtime Monitoring, Verification, Enforcement and Control. TASE 2015: 63-70 - [e1]Zhiqiu Huang, Xingming Sun, Junzhou Luo, Jian Wang:
Cloud Computing and Security - First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers. Lecture Notes in Computer Science 9483, Springer 2015, ISBN 978-3-319-27050-0 [contents] - 2014
- [j14]Dajuan Fan, Zhiqiu Huang, Lei Tang:
A Correctness Assurance Approach to Automatic Synthesis of Composite Web Services. IEICE Trans. Inf. Syst. 97-D(6): 1535-1545 (2014) - [j13]Changbo Ke, Zhiqiu Huang, Weiwei Li, Yi Sun, Fangxiong Xiao:
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing. J. Appl. Math. 2014: 240425:1-240425:11 (2014) - [j12]Jiajun Lu, Zhiqiu Huang, Changbo Ke:
Verification of Behavior-aware Privacy Requirements in Web Services Composition. J. Softw. 9(4): 944-951 (2014) - [j11]Qiang Ge, Guohua Shen, Zhiqiu Huang, Changbo Ke:
The Application of SWRL Based Ontology Inference for Privacy Protection. J. Softw. 9(5): 1217-1222 (2014) - [j10]Yi Sun, Zhiqiu Huang, Changbo Ke:
Using Game Theory to Analyze Strategic Choices of Service Providers and Service Requesters. J. Softw. 9(11): 2918-2924 (2014) - [c31]Yonglong Zhang, Bin Li, Zhiqiu Huang, Jin Wang, Junwu Zhu, Huanfeng Peng:
Strategy-Proof Auction Mechanism with Group Price for Virtual Machine Allocation in Clouds. CBD 2014: 60-68 - [c30]Guohua Shen, Yinling Liu, Fei Wang, Jia Si, Zi Wang, Zhiqiu Huang, Dazhou Kang:
OMReasoner: combination of multi-matchers for ontology matching: results for OAEI 2014. OM 2014: 142-148 - 2013
- [j9]Ruiqiang Yu, Zhiqiu Huang, Lin Wang, Hongjie Zhang:
Analyzing Temporal Constraints for Web Services Composition. J. Softw. 8(5): 1051-1057 (2013) - [j8]Changbo Ke, Zhiqiu Huang, Mei Tang:
Supporting negotiation mechanism privacy authority method in cloud computing. Knowl. Based Syst. 51: 48-59 (2013) - [c29]Bingfeng Xu, Zhiqiu Huang, Jun Hu, Ou Wei, Yu Zhou:
Minimal cut sequence generation for state/event fault trees. Middleware Doctoral Symposium 2013: 3:1-3:6 - [c28]Weiwei Li, Zhiqiu Huang, Xiuyi Jia:
Two-Phase Classification Based on Three-Way Decisions. RSKT 2013: 338-345 - 2012
- [j7]Xinye Cai, Ou Wei, Zhiqiu Huang:
Evolutionary Approaches for Multi-Objective Next Release Problem. Comput. Informatics 31(4): 847- (2012) - [j6]Changbo Ke, Zhiqiu Huang:
Self-adaptive semantic web service matching method. Knowl. Based Syst. 35: 41-48 (2012) - [c27]Yu Zhou, Xuefeng Yan, Zhiqiu Huang:
A Graph Transformation Based Approach for Modeling Component-Level Migration in Mobile Environments. COMPSAC Workshops 2012: 152-157 - [c26]Guohua Shen, Zhiqiu Huang, Changbao Tian, Qiang Ge, Wei Zhang:
Feature modeling and Verification based on Description Logics. SEKE 2012: 422-425 - [c25]Guohua Shen, Changbao Tian, Qiang Ge, Yiquan Zhu, Lili Liao, Zhiqiu Huang, Dazhou Kang:
OMReasoner: using multi-matchers and reasoner for ontology matching: results for OAEI 2012. OM 2012 - 2011
- [j5]LinYuan Liu, Haibin Zhu, Zhiqiu Huang, Dongqing Xie:
Minimal privacy authorization in web services collaboration. Comput. Stand. Interfaces 33(3): 332-343 (2011) - [j4]LinYuan Liu, Haibin Zhu, Zhiqiu Huang:
Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms. Expert Syst. Appl. 38(4): 4540-4549 (2011) - [j3]Fangxiong Xiao, Zhiqiu Huang, Zining Cao, Jun Hu, LinYuan Liu, Min Yuan:
Unified Modelling Functional and Non-Functional Aspects of Web Services Composition Using PTCCS 1. Int. J. Web Serv. Res. 8(4): 47-80 (2011) - [c24]Guohua Shen, Lantao Jin, Ziyue Zhao, Zhe Jia, Wenmin He, Zhiqiu Huang:
OMReasoner: using reasoner for ontology matching: results for OAEI 2011. OM 2011 - 2010
- [c23]Xiaofei Zhao, Zhiqiu Huang:
Checking Structural Integrity for Metadata Repository Systems by Means of Description Logics. DASFAA Workshops 2010: 118-129 - [c22]Min Yuan, Zhiqiu Huang, Xiang Li, Yan Yan:
Towards a Formal Verification Approach for Business Process Coordination. ICWS 2010: 361-368 - [c21]Yuankang Fang, Ziyang Zhen, Zhiqiu Huang, Chao Zhang:
Multi-objective Fuzzy Clustering Method for Image Segmentation Based on Variable-Length Intelligent Optimization Algorithm. ISICA (1) 2010: 329-337 - [c20]Yi Zhu, Zhiqiu Huang, Zining Cao, Hang Zhou, Min Yuan:
An MDE Based Approach for Generating Software Architecture Models from Formal Specifications. QSIC 2010: 373-376 - [c19]Lizhong Tu, Fangxiong Xiao, Zhiqiu Huang:
Modeling Service Composition Using Priced Probabilistic Process Algebra. SOSE 2010: 35-38 - [c18]Bingfeng Xu, Zhiqiu Huang, Ou Wei:
Making Architectural Decisions Based on Requirements: Analysis and Combination of Risk-Based and Quality Attribute-Based Methods. UIC/ATC Workshops 2010: 392-397 - [c17]Yuankang Fang, Zhiqiu Huang:
An Improved Algorithm for Session Identification on Web Log. WISM 2010: 53-60
2000 – 2009
- 2009
- [j2]Guohua Shen, Zhiqiu Huang, Yuping Zhang, Xiaodong Zhu, Jun Yang:
A Semantic Model for Matchmaking of Web Services Based on Description Logics. Fundam. Informaticae 96(1-2): 211-226 (2009) - [c16]Min Yuan, Zhiqiu Huang, Jun Hu, Xiang Li, Yi Zhu:
Ensuring Coordination of Multi-business Interactions. IEEE SCC 2009: 356-363 - [c15]Guohua Shen, Zhiqiu Huang, Xiaodong Zhu, Jun Yang:
Reasoning about Web Services with Dynamic Description Logics. CSIE (6) 2009: 106-110 - [c14]LinYuan Liu, Zhiqiu Huang, Haibin Zhu:
Role-based consistency verification for privacy-aware Web services. CTS 2009: 423-430 - [c13]Fangxiong Xiao, Zhiqiu Huang, Zining Cao, Jun Hu, LinYuan Liu:
Modeling Cost-Aware Web Services Composition Using PTCCS. ICWS 2009: 461-468 - [c12]Min Yuan, Zhiqiu Huang, Fangxiong Xiao:
Modeling and Analysis of Flexible Transaction for Web Services. ICWS 2009: 1008-1009 - [c11]Feng Huang, Zhiqiu Huang, LinYuan Liu:
A DL-based method for access control policy conflict detecting. Internetware 2009: 16 - [c10]Min Yuan, Zhiqiu Huang, Jian Zhao, Xiang Li:
Modeling and Verification of Automatic Multi-business Transactions. SEKE 2009: 274-279 - 2008
- [j1]Xiaodong Zhu, Zhiqiu Huang:
Conceptual modeling rules extracting for data streams. Knowl. Based Syst. 21(8): 934-940 (2008) - [c9]Junhua Zhang, Zhiqiu Huang, Zining Cao, Fangxiong Xiao:
Counterexample Generation for Probabilistic Timed Automata Model Checking. CSSE (2) 2008: 210-214 - [c8]Fangxiong Xiao, Zhiqiu Huang, Jun Hu, Min Yuan, Junhua Zhang:
Support Web Services Composition with Optimal Cost Using PPA. ICWS 2008: 760-761 - [c7]Hang Zhou, Zhiqiu Huang, Yi Zhu:
Polymorphism Sequence Diagrams Test Data Automatic Generation Based on OCL. ICYCS 2008: 1235-1240 - [c6]Yi Zhu, Zhiqiu Huang, Hang Zhou:
A Formal Method Support for Resource Modeling of Web Services Composition. ISCSCT (1) 2008: 370-375 - [c5]Xiaodong Zhu, Zhiqiu Huang, Guohua Shen:
Description Logic Based Consistency Checking upon Data Mining Metadata. RSKT 2008: 475-482 - 2007
- [c4]Xiaodong Zhu, Zhiqiu Huang, Shuqun Yang, Guohua Shen:
Fuzzy Implication Methods in Fuzzy Logic. FSKD (1) 2007: 154-158 - [c3]Guohua Shen, Zhiqiu Huang, Xiaodong Zhu, Lei Wang, Gaoyou Xiang:
Using Description Logics Reasoner for Ontology Matching. IITA 2007: 30-33 - 2006
- [c2]Xiaofei Zhao, Zhiqiu Huang:
A Formal Framework for Reasoning on Metadata Based on CWM. ER 2006: 371-384 - [c1]Guohua Shen, Zhiqiu Huang, Xiaodong Zhu, Xiaofei Zhao:
Research on the Rules of Mapping from Relational Model to OWL. OWLED 2006
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint