Author of the publication

TSTSS: A two-stage training subset selection framework for cross version defect prediction.

, , , , , , , , and . J. Syst. Softw., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Randomized Security Patrolling for Link Flooding Attack Detection., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 17 (4): 795-812 (2020)A Framework and DataSet for Bugs in Ethereum Smart Contracts., , and . ICSME, page 139-150. IEEE, (2020)Aeolus: Distributed Execution of Permissioned Blockchain Transactions via State Sharding., , , , , , , , and . IEEE Trans. Ind. Informatics, 18 (12): 9227-9238 (2022)Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review., , , , , , and . IEEE Trans. Software Eng., 48 (10): 4181-4213 (2022)EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum., , , , , , , and . CoRR, (2020)STor: Social Network based Anonymous Communication in Tor, , , and . CoRR, (2011)Characterizing and Detecting WebAssembly Runtime Bugs., , , , , , , , and . CoRR, (2023)Novel Approaches to End-to-End Packet Reordering Measurement., and . Internet Measurement Conference, page 227-238. USENIX Association, (2005)I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing., , , , , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 3-19. Springer, (2016)On generalized low-rate denial-of-quality attack against Internet services., , , and . IWQoS, page 1-5. IEEE, (2009)