Author of the publication

Detecting Buggy Files based on Bug Reports: A Random Walk Based Approach.

, , , and . Internetware, page 62-69. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Virtual Local-hub Solution with Function Module Sharing for Wearable Devices., , , and . MSWiM, page 278-286. ACM, (2016)Generative Adversarial Nets for Robust Scatter Estimation: A Proper Scoring Rule Perspective., , and . CoRR, (2019)Robust estimation via Generative Adversarial Networks., , , and . ICLR (Poster), OpenReview.net, (2019)Consistency Analysis of Data-Usage Purposes in Mobile Apps., , , , and . CCS, page 2824-2843. ACM, (2021)Design of a system for recognizing user's relationship based on GIS and mobile phone., , and . EMEIT, page 4251-4253. IEEE, (2011)Fair Representation Learning: An Alternative to Mutual Information., , , , , , and . KDD, page 1088-1097. ACM, (2022)Multiobjective optimization of hydrocarbon biorefinery supply chain designs under uncertainty., , and . CDC, page 5560-5565. IEEE, (2012)Causal Network Analysis and Fault Root Point Detection Based on Symbolic Transfer Entropy., , and . BICT, volume 329 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 107-115. Springer, (2020)Perceptions of visual and multimodal symbolic mediated social touch: Role of technology modality, relationship, and task emotional salience., , and . Int. J. Hum. Comput. Stud., (2022)A Self-Constructing Fuzzy Neural Network with New Learning Algorithm and Its Control Application., , , and . IC-AI, page 203-209. CSREA Press, (2009)