default search action
Wentao Wang 0003
Person information
- affiliation: Oracle, USA
- affiliation: University of Cincinnati, Department of Electrical Engineering and Computer Science, OH, USA
- affiliation (former): Beijing Institute of Technology, School of Computer Science and Technology, China
Other persons with the same name
- Wentao Wang (aka: Wen-Tao Wang) — disambiguation page
- Wentao Wang 0001 — Huazhong University of Science and Technology, Institute for Pattern Recognition and Artificial Intelligence, Wuhan, China (and 1 more)
- Wentao Wang 0002 — Jiaxing University, College of Mathematics, Physics and Information Engineering, China (and 1 more)
- Wentao Wang 0004 — Zhejiang University, College of Computer Science and Technology, Hangzhou, China
- Wentao Wang 0005 — National University of Defense Technology, College of Computer, Changsha, China
- Wentao Wang 0006 — Michigan State University, Data Science and Engineering Lab, East Lansing, MI, USA (and 1 more)
- Wentao Wang 0007 — Baidu Inc., Beijing, China
- Wentao Wang 0008 — Massachusetts Institute of Technology (MIT), Cambridge, MA, USA
- Wentao Wang 0009 — Shanghai Jiao Tong University, School of Electronic Information and Electrical Engineering, MoE Key Lab of Artificial Intelligence, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j11]Wentao Wang, Faryn Dumont, Nan Niu, Glen Horton:
Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis. IEEE Trans. Software Eng. 48(5): 1665-1675 (2022) - 2021
- [c14]Xuanyi Lin, Zedong Peng, Nan Niu, Wentao Wang, Hui Liu:
Finding Metamorphic Relations for Scientific Software. ICSE (Companion Volume) 2021: 254-255 - [c13]Mona Assarandarban, Tanmay Bhowmik, Anh Quoc Do, Surendra Raju Chekuri, Wentao Wang, Nan Niu:
Foraging-Theoretic Tool Composition: An Empirical Study on Vulnerability Discovery. IRI 2021: 139-146 - 2020
- [j10]Wentao Wang, Nan Niu, Mounifah Alenazi, Juha Savolainen, Zhendong Niu, Jing-Ru C. Cheng, Li Da Xu:
Complementarity in Requirements Tracing. IEEE Trans. Cybern. 50(4): 1395-1404 (2020)
2010 – 2019
- 2019
- [j9]Wentao Wang, Kavya Reddy Mahakala, Arushi Gupta, Nesrin Hussein, Yinglin Wang:
A linear classifier based approach for identifying security requirements in open source software development. J. Ind. Inf. Integr. 14: 34-40 (2019) - [j8]Nan Niu, Wentao Wang, Arushi Gupta, Mona Assarandarban, Li Da Xu, Juha Savolainen, Jing-Ru C. Cheng:
Corrections to "Requirements Socio-Technical Graphs for Managing Practitioners' Traceability Questions". IEEE Trans. Comput. Soc. Syst. 6(1): 190 (2019) - [j7]Wentao Wang, Nan Niu, Mounifah Alenazi, Li Da Xu:
In-Place Traceability for Automated Production Systems: A Survey of PLC and SysML Tools. IEEE Trans. Ind. Informatics 15(6): 3155-3162 (2019) - [c12]Tanmay Bhowmik, Surendra Raju Chekuri, Anh Quoc Do, Wentao Wang, Nan Niu:
The Role of Environment Assertions in Requirements-Based Testing. RE 2019: 75-85 - 2018
- [j6]Ally S. Nyamawe, Hui Liu, Zhendong Niu, Wentao Wang, Nan Niu:
Recommending Refactoring Solutions Based on Traceability and Code Metrics. IEEE Access 6: 49460-49475 (2018) - [j5]Nan Niu, Wentao Wang, Arushi Gupta, Mona Assarandarban, Li Da Xu, Juha Savolainen, Jing-Ru C. Cheng:
Requirements Socio-Technical Graphs for Managing Practitioners' Traceability Questions. IEEE Trans. Comput. Soc. Syst. 5(4): 1152-1162 (2018) - [j4]Wentao Wang, Arushi Gupta, Nan Niu, Li Da Xu, Jing-Ru C. Cheng, Zhendong Niu:
Automatically Tracing Dependability Requirements via Term-Based Relevance Feedback. IEEE Trans. Ind. Informatics 14(1): 342-349 (2018) - [c11]Arushi Gupta, Wentao Wang, Nan Niu, Juha Savolainen:
Answering the requirements traceability questions. ICSE (Companion Volume) 2018: 444-445 - [c10]Wentao Wang, Arushi Gupta, Nan Niu:
Mining Security Requirements from Common Vulnerabilities and Exposures for Agile Projects. QuaRAP@RE 2018: 6-9 - [c9]Wentao Wang, Nan Niu, Hui Liu, Zhendong Niu:
Enhancing Automated Requirements Traceability by Resolving Polysemy. RE 2018: 40-51 - [c8]Mounifah Alenazi, Nan Niu, Wentao Wang, Juha Savolainen:
Using Obstacle Analysis to Support SysML-Based Model Testing for Cyber Physical Systems. MoDRE@RE 2018: 46-55 - 2017
- [j3]Sandeep Reddivari, Asai Asaithambi, Nan Niu, Wentao Wang, Li Da Xu, Jing-Ru C. Cheng:
Ethnographic field work in requirements engineering. Enterp. Inf. Syst. 11(1) (2017) - [c7]Mounifah Alenazi, Nan Niu, Wentao Wang, Arushi Gupta:
Traceability for Automated Production Systems: A Position Paper. RE Workshops 2017: 51-55 - [c6]Wentao Wang, Nesrin Hussein, Arushi Gupta, Yinglin Wang:
A Regression Model Based Approach for Identifying Security Requirements in Open Source Software Development. RE Workshops 2017: 443-446 - 2016
- [j2]Tanmay Bhowmik, Nan Niu, Wentao Wang, Jing-Ru C. Cheng, Ling Li, Xiongfei Cao:
Optimal Group Size for Software Change Tasks: A Social Information Foraging Perspective. IEEE Trans. Cybern. 46(8): 1784-1795 (2016) - [c5]Nesrin Hussein, Wentao Wang, Joseph L. Nedelec, Xuetao Wei, Nan Niu:
Unified Profiling of Attackers via Domain Modeling. RE Workshops 2016: 98-101 - [c4]Nan Niu, Wentao Wang, Arushi Gupta:
Gray links in the use of requirements traceability. SIGSOFT FSE 2016: 384-395 - 2015
- [j1]Tanmay Bhowmik, Nan Niu, Prachi Singhania, Wentao Wang:
On the Role of Structural Holes in Requirements Identification: An Exploratory Study on Open-Source Software Development. ACM Trans. Manag. Inf. Syst. 6(3): 10:1-10:30 (2015) - [c3]Wentao Wang, Nan Niu, Hui Liu, Yuting Wu:
Tagging in Assisted Tracing. SST@ICSE 2015: 8-14 - [c2]Wentao Wang, Arushi Gupta, Yingbo Wu:
Continuously delivered? Periodically updated? Never changed? Studying an open source project's releases of code, requirements, and trace matrix. JITRE 2015: 13-16 - 2014
- [c1]Xiangyu Zhao, Zhendong Niu, Wentao Wang, Ke Niu, Wu Yuan:
Considering Rating as Probability Distribution of Attitude in Recommender System. WAIM Workshops 2014: 393-402
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint