Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study of the Impact of Bad Designs on Defect Proneness., , and . SATE, page 1-9. IEEE, (2017)不平衡数据分类研究综述 (Overview of Imbalanced Data Classification)., , and . 计算机科学, 45 (6A): 22-27 (2018)TAP: An Adjustable Planar Structure for Adaptive Topology Control in Wireless Ad Hoc Networks., , , and . ICC, page 1-6. IEEE, (2009)Crowdsourced test report prioritization considering bug severity., and . Inf. Softw. Technol., (2021)GraphPLBART: Code Summarization Based on Graph Embedding and Pre-Trained Model., , , and . SEKE, page 304-309. KSI Research Inc., (2023)Multi-Label Code Smell Detection with Hybrid Model based on Deep Learning., and . SEKE, page 42-47. KSI Research Inc., (2022)Region-Aware Graph Convolutional Network for Traffic Flow Forecasting., , , , , and . DASFAA (4), volume 13946 of Lecture Notes in Computer Science, page 431-446. Springer, (2023)Test Case Prioritization for Black Box Testing., , , and . COMPSAC (1), page 465-474. IEEE Computer Society, (2007)Con-CNAME: A Contextual Multi-armed Bandit Algorithm for Personalized Recommendations., , , and . ICANN (2), volume 11140 of Lecture Notes in Computer Science, page 326-336. Springer, (2018)Droidlens: Robust and Fine-Grained Detection for Android Code Smells., , , and . TASE, page 161-168. IEEE, (2020)