Author of the publication

Compiler bug isolation via effective witness test program generation.

, , , , , and . ESEC/SIGSOFT FSE, page 223-234. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malware Variants Detection Using Behavior Destructive Features., , , and . PAC, page 121-122. IEEE, (2018)Diagnosis Method of Combing Feature Extraction Based on Time-Frequency Analysis and Intelligent Classifier., , , and . WISM (1), volume 6987 of Lecture Notes in Computer Science, page 419-425. Springer, (2011)Using SVM to Predict High-Level Cognition from fMRI Data: A Case Study of 4*4 Sudoku Solving., , , , , and . Brain Informatics, volume 5819 of Lecture Notes in Computer Science, page 171-181. Springer, (2009)A Fuzzy Mapping from Image Texture to Affective Thesaurus., , , and . LSMS (1), volume 4688 of Lecture Notes in Computer Science, page 357-367. Springer, (2007)A Bibliometric Analysis of the Research Status of the Technology Enhanced Language Learning., , , , and . SETE@ICWL, volume 11284 of Lecture Notes in Computer Science, page 169-179. Springer, (2018)Hybrid Localization Algorithm of Mobile Nodes in Wireless Sensor Networks., , , and . J. Commun., 11 (4): 358-364 (2016)Resting-State Functional Network Scale Effects and Statistical Significance-Based Feature Selection in Machine Learning Classification., , , , , , and . Comput. Math. Methods Medicine, (2019)Hadoop平台下的动态调度算法 (Dynamic Scheduling Algorithm in Hadoop Platform)., , and . 计算机科学, 42 (9): 45-49 (2015)SMT-Based and Disjunctive Relational Abstract Domains for StaticAnalysis.. New York University, USA, (2015)Detection of Information Hiding at Anti-Copying 2D Barcodes., , , , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (1): 437-450 (2022)