<?xml version="1.0"?>
<dblpperson name="Zhanwei Hui" pid="13/8456" n="38">
<person key="homepages/13/8456" mdate="2010-09-16">
<author pid="13/8456">Zhanwei Hui</author>
</person>
<r><article key="journals/smr/YangHlZH24" mdate="2025-11-26">
<author orcid="0000-0002-2263-8000" pid="90/4655">Sen Yang</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="66/3387">Hui Li</author>
<author pid="215/6027">Changyou Zheng</author>
<author pid="52/4486">Yifan Huang</author>
<title>APP constraint analysis approach to select mobile devices for compatibility crowdtesting.</title>
<year>2024</year>
<month>March</month>
<volume>36</volume>
<journal>J. Softw. Evol. Process.</journal>
<number>3</number>
<ee>https://doi.org/10.1002/smr.2523</ee>
<url>db/journals/smr/smr36.html#YangHlZH24</url>
</article>
</r>
<r><inproceedings key="conf/dsa/HuSYHH23" mdate="2024-02-05">
<author orcid="0000-0002-1483-8854" pid="131/9659">Jinchang Hu</author>
<author pid="43/3451">Kang Sun</author>
<author pid="90/4655">Sen Yang</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="29/159">Song Huang</author>
<title>A Software Security Testing Model for Autonomous Systems.</title>
<pages>70-74</pages>
<year>2023</year>
<booktitle>DSA</booktitle>
<ee>https://doi.org/10.1109/DSA59317.2023.00019</ee>
<crossref>conf/dsa/2023</crossref>
<url>db/conf/dsa/dsa2023.html#HuSYHH23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsa/SunHWCS23" mdate="2023-11-24">
<author pid="203/1725">Jinlei Sun</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="49/7526">Xiaojuan Wang</author>
<author pid="97/10217">Xu Cao</author>
<author pid="86/4211">Shuang Song</author>
<title>Move Smart Contract Vulnerability Detection based on Resource-flow Analysis.</title>
<pages>389-398</pages>
<year>2023</year>
<booktitle>DSA</booktitle>
<ee>https://doi.org/10.1109/DSA59317.2023.00054</ee>
<crossref>conf/dsa/2023</crossref>
<url>db/conf/dsa/dsa2023.html#SunHWCS23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icse/YangCFXHH23" mdate="2025-01-19">
<author pid="90/4655">Sen Yang</author>
<author pid="180/8218-1">Sen Chen 0001</author>
<author pid="11/2636-3">Lingling Fan 0003</author>
<author pid="168/6400">Sihan Xu</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="29/159">Song Huang</author>
<title>Compatibility Issue Detection for Android Apps Based on Path-Sensitive Semantic Analysis.</title>
<pages>257-269</pages>
<year>2023</year>
<booktitle>ICSE</booktitle>
<ee>https://doi.org/10.1109/ICSE48619.2023.00033</ee>
<ee>https://www.wikidata.org/entity/Q131127365</ee>
<crossref>conf/icse/2023</crossref>
<url>db/conf/icse/icse2023.html#YangCFXHH23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/qrs/GuLHLC22" mdate="2023-03-28">
<author pid="313/2402">Siqi Gu</author>
<author pid="12/8228">Jiawei Liu</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="47/3129">Wenhong Liu</author>
<author pid="86/541-1">Zhenyu Chen 0001</author>
<title>MetaA: Multi-Dimensional Evaluation of Testing Ability via Adversarial Examples in Deep Learning.</title>
<pages>1004-1013</pages>
<year>2022</year>
<booktitle>QRS</booktitle>
<ee>https://doi.org/10.1109/QRS57517.2022.00104</ee>
<crossref>conf/qrs/2022</crossref>
<url>db/conf/qrs/qrs2022.html#GuLHLC22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/qrs/ZhaoYLHZ22" mdate="2023-03-28">
<author pid="65/2105">Yuan Zhao</author>
<author pid="283/7995">Gaolei Yi</author>
<author pid="56/2849">Fan Liu</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="31/5664">Jianhua Zhao</author>
<title>A Framework for Scanning Privacy Information based on Static Analysis.</title>
<pages>1135-1145</pages>
<year>2022</year>
<booktitle>QRS</booktitle>
<ee>https://doi.org/10.1109/QRS57517.2022.00116</ee>
<crossref>conf/qrs/2022</crossref>
<url>db/conf/qrs/qrs2022.html#ZhaoYLHZ22</url>
</inproceedings>
</r>
<r><article key="journals/access/XiaZH21" mdate="2022-08-05">
<author orcid="0000-0003-4515-7573" pid="142/6432">Chunyan Xia</author>
<author orcid="0000-0002-5594-4792" pid="04/3348-99">Yan Zhang 0099</author>
<author orcid="0000-0003-2709-6834" pid="13/8456">Zhanwei Hui</author>
<title>Test Suite Reduction via Evolutionary Clustering.</title>
<pages>28111-28121</pages>
<year>2021</year>
<volume>9</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2021.3058301</ee>
<url>db/journals/access/access9.html#XiaZH21</url>
</article>
</r>
<r><article key="journals/access/LiHZ21" mdate="2021-04-07">
<author orcid="0000-0002-4719-9315" pid="39/4864">Shanling Li</author>
<author orcid="0000-0003-2709-6834" pid="13/8456">Zhanwei Hui</author>
<author orcid="0000-0001-8469-1889" pid="215/6027">Changyou Zheng</author>
<title>Comparison Test Based on Program Model and Design Document.</title>
<pages>34778-34788</pages>
<year>2021</year>
<volume>9</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2021.3061158</ee>
<url>db/journals/access/access9.html#LiHZ21</url>
</article>
</r>
<r><article key="journals/tr/HuiWHY21" mdate="2023-06-26">
<author orcid="0000-0003-2709-6834" pid="13/8456">Zhanwei Hui</author>
<author pid="49/7526">Xiaojuan Wang</author>
<author orcid="0000-0002-6894-3916" pid="29/159">Song Huang</author>
<author orcid="0000-0002-2263-8000" pid="90/4655">Sen Yang</author>
<title>MT-ART: A Test Case Generation Method Based on Adaptive Random Testing and Metamorphic Relation.</title>
<pages>1397-1421</pages>
<year>2021</year>
<volume>70</volume>
<journal>IEEE Trans. Reliab.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TR.2021.3106389</ee>
<url>db/journals/tr/tr70.html#HuiWHY21</url>
</article>
</r>
<r><inproceedings key="conf/dsa/QingGHPFWC21" mdate="2022-01-27">
<author pid="307/7492">Mingshuang Qing</author>
<author pid="251/1990">Xiuting Ge</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="251/1917">Ya Pan</author>
<author pid="00/5170">Yong Fan</author>
<author pid="49/7526">Xiaojuan Wang</author>
<author pid="97/10217">Xu Cao</author>
<title>An Empirical Study on Spectral Clustering-based Software Defect Detection.</title>
<pages>20-29</pages>
<year>2021</year>
<booktitle>DSA</booktitle>
<ee>https://doi.org/10.1109/DSA52907.2021.00012</ee>
<crossref>conf/dsa/2021</crossref>
<url>db/conf/dsa/dsa2021.html#QingGHPFWC21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/qrs/SunHZWHD21" mdate="2022-03-16">
<author pid="224/7166">Jin-lei Sun</author>
<author pid="29/159">Song Huang</author>
<author pid="215/6027">Changyou Zheng</author>
<author pid="46/2340">Meijuan Wang</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="316/0443">Yixian Ding</author>
<title>A Novel Method to Prevent Multiple Withdraw Attack on ERC20 Tokens.</title>
<pages>1-7</pages>
<year>2021</year>
<booktitle>QRS</booktitle>
<ee>https://doi.org/10.1109/QRS54544.2021.00011</ee>
<crossref>conf/qrs/2021</crossref>
<url>db/conf/qrs/qrs2021.html#SunHZWHD21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/qrs/GeHHWC21" mdate="2022-03-16">
<author pid="251/1990">Xiuting Ge</author>
<author pid="52/4486">Yifan Huang</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="49/7526">Xiaojuan Wang</author>
<author pid="97/10217">Xu Cao</author>
<title>Impact of datasets on machine learning based methods in Android malware detection: an empirical study.</title>
<pages>81-92</pages>
<year>2021</year>
<booktitle>QRS</booktitle>
<ee>https://doi.org/10.1109/QRS54544.2021.00019</ee>
<crossref>conf/qrs/2021</crossref>
<url>db/conf/qrs/qrs2021.html#GeHHWC21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/qrs/YangHHHZ21" mdate="2022-03-16">
<author pid="90/4655">Sen Yang</author>
<author pid="52/4486">Yifan Huang</author>
<author pid="29/159">Song Huang</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="215/6027">Changyou Zheng</author>
<title>Target Code-coverage and Efficiency in APP Automatic Compatibility Testing Based on Code Analysis.</title>
<pages>322-327</pages>
<year>2021</year>
<booktitle>QRS</booktitle>
<ee>https://doi.org/10.1109/QRS54544.2021.00043</ee>
<crossref>conf/qrs/2021</crossref>
<url>db/conf/qrs/qrs2021.html#YangHHHZ21</url>
</inproceedings>
</r>
<r><article key="journals/ijpe/JiHH20" mdate="2021-04-01">
<author pid="185/8339">Meng-Yu Ji</author>
<author pid="29/159">Song Huang</author>
<author pid="13/8456">Zhanwei Hui</author>
<title>Spectrum-based Security Bug Localization by Analyzing Error Propagation.</title>
<pages>1289-1298</pages>
<year>2020</year>
<volume>16</volume>
<journal>Int. J. Perform. Eng.</journal>
<number>8</number>
<ee>https://doi.org/10.23940/ijpe.20.08.p16.12891298</ee>
<url>db/journals/ijpe/ijpe16.html#JiHH20</url>
</article>
</r>
<r><article key="journals/tr/HuiHCC20" mdate="2024-05-07">
<author orcid="0000-0003-2709-6834" pid="13/8456">Zhanwei Hui</author>
<author orcid="0000-0002-6894-3916" pid="29/159">Song Huang</author>
<author orcid="0000-0003-3126-3156" pid="129/2522">Caslon Chua</author>
<author orcid="0000-0003-3578-0994" pid="88/612">Tsong Yueh Chen</author>
<title>Semiautomated Metamorphic Testing Approach for Geographic Information Systems: An Empirical Study.</title>
<pages>657-673</pages>
<year>2020</year>
<volume>69</volume>
<journal>IEEE Trans. Reliab.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TR.2019.2931561</ee>
<url>db/journals/tr/tr69.html#HuiHCC20</url>
</article>
</r>
<r><inproceedings key="conf/dsa/LiH20" mdate="2022-04-04">
<author pid="39/4864">Shanling Li</author>
<author pid="13/8456">Zhanwei Hui</author>
<title>A model based program comparison test method.</title>
<pages>47-48</pages>
<year>2020</year>
<booktitle>DSA</booktitle>
<ee>https://doi.org/10.1109/DSA51864.2020.00014</ee>
<crossref>conf/dsa/2020</crossref>
<url>db/conf/dsa/dsa2020.html#LiH20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/qrs/HuangCHL20" mdate="2021-02-08">
<author pid="29/159">Song Huang</author>
<author pid="175/3324">Hao Chen</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="265/0027">Yuchan Liu</author>
<title>A Survey of the Use of Test Report in Crowdsourced Testing.</title>
<pages>430-441</pages>
<year>2020</year>
<booktitle>QRS</booktitle>
<ee>https://doi.org/10.1109/QRS51102.2020.00062</ee>
<crossref>conf/qrs/2020</crossref>
<url>db/conf/qrs/qrs2020.html#HuangCHL20</url>
</inproceedings>
</r>
<r><article key="journals/access/YangHH19" mdate="2019-11-28">
<author orcid="0000-0002-2263-8000" pid="90/4655">Sen Yang</author>
<author orcid="0000-0002-0599-7474" pid="29/159">Song Huang</author>
<author orcid="0000-0001-8892-1979" pid="13/8456">Zhanwei Hui</author>
<title>Theoretical Analysis and Empirical Evaluation of Coverage Indictors for Closed Source APP Testing.</title>
<pages>162323-162332</pages>
<year>2019</year>
<volume>7</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2019.2951941</ee>
<url>db/journals/access/access7.html#YangHH19</url>
</article>
</r>
<r><article key="journals/sqj/JiHWHZ19" mdate="2023-08-28">
<author pid="215/6024">Haijin Ji</author>
<author orcid="0000-0002-6894-3916" pid="29/159">Song Huang</author>
<author pid="192/8914">Yaning Wu</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="215/6027">Changyou Zheng</author>
<title>A new weighted naive Bayes method based on information diffusion for software defect prediction.</title>
<pages>923-968</pages>
<year>2019</year>
<volume>27</volume>
<journal>Softw. Qual. J.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s11219-018-9436-4</ee>
<ee>https://www.wikidata.org/entity/Q121787703</ee>
<url>db/journals/sqj/sqj27.html#JiHWHZ19</url>
</article>
</r>
<r><inproceedings key="conf/qrs/HuangCHLYC19" mdate="2019-10-21">
<author pid="29/159">Song Huang</author>
<author pid="88/8595">Lele Chen</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="251/1933">Jialuo Liu</author>
<author pid="90/4655">Sen Yang</author>
<author pid="62/2719">Qiang Chen</author>
<title>A Method of Bug Report Quality Detection Based on Vector Space Model.</title>
<pages>510-511</pages>
<year>2019</year>
<booktitle>QRS Companion</booktitle>
<ee>https://doi.org/10.1109/QRS-C.2019.00099</ee>
<crossref>conf/qrs/2019c</crossref>
<url>db/conf/qrs/qrs2019c.html#HuangCHLYC19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/qrs/HuangYHYCLC19" mdate="2019-10-21">
<author pid="29/159">Song Huang</author>
<author pid="90/4655">Sen Yang</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="204/4129">Yongming Yao</author>
<author pid="88/8595">Lele Chen</author>
<author pid="251/1933">Jialuo Liu</author>
<author pid="62/2719">Qiang Chen</author>
<title>Runtime-Environment Testing Method for Android Applications.</title>
<pages>534-535</pages>
<year>2019</year>
<booktitle>QRS Companion</booktitle>
<ee>https://doi.org/10.1109/QRS-C.2019.00111</ee>
<crossref>conf/qrs/2019c</crossref>
<url>db/conf/qrs/qrs2019c.html#HuangYHYCLC19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/qrs/YaoLHHWCYC19" mdate="2019-10-21">
<author pid="59/179">Yi Yao</author>
<author pid="251/1966">Jiuluo Liu</author>
<author pid="29/159">Song Huang</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="34/4445">Kaishun Wu</author>
<author pid="88/8595">Lele Chen</author>
<author pid="90/4655">Sen Yang</author>
<author pid="62/2719">Qiang Chen</author>
<title>Testing Adequacy of Convolutional Neural Network Based on Mutation Testing.</title>
<pages>536-537</pages>
<year>2019</year>
<booktitle>QRS Companion</booktitle>
<ee>https://doi.org/10.1109/QRS-C.2019.00112</ee>
<crossref>conf/qrs/2019c</crossref>
<url>db/conf/qrs/qrs2019c.html#YaoLHHWCYC19</url>
</inproceedings>
</r>
<r><article key="journals/iet-sen/LvHHJ18" mdate="2025-01-19">
<author pid="174/3855">Xuewei Lv</author>
<author orcid="0000-0002-6894-3916" pid="29/159">Song Huang</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="215/6024">Haijin Ji</author>
<title>Test cases generation for multiple paths based on PSO algorithm with metamorphic relations.</title>
<pages>306-317</pages>
<year>2018</year>
<volume>12</volume>
<journal>IET Softw.</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.1049/iet-sen.2017.0260</ee>
<ee>https://www.wikidata.org/entity/Q129816957</ee>
<url>db/journals/iet-sen/iet-sen12.html#LvHHJ18</url>
</article>
</r>
<r><inproceedings key="conf/qrs/SunZHH18" mdate="2018-08-16">
<author pid="224/7166">Jin-lei Sun</author>
<author pid="224/7231">Shi-wen Zhang</author>
<author pid="29/159">Song Huang</author>
<author pid="13/8456">Zhanwei Hui</author>
<title>Design and Application of a Sikuli Based Capture-Replay Tool.</title>
<pages>42-44</pages>
<year>2018</year>
<booktitle>QRS Companion</booktitle>
<ee>https://doi.org/10.1109/QRS-C.2018.00021</ee>
<crossref>conf/qrs/2018c</crossref>
<url>db/conf/qrs/qrs2018c.html#SunZHH18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/qrs/JiangHH18" mdate="2018-08-16">
<author pid="38/2068">Chao Jiang</author>
<author pid="29/159">Song Huang</author>
<author pid="13/8456">Zhanwei Hui</author>
<title>Metamorphic Testing of Image Region Growth Programs in Image Processing Applications.</title>
<pages>70-72</pages>
<year>2018</year>
<booktitle>QRS Companion</booktitle>
<ee>https://doi.org/10.1109/QRS-C.2018.00026</ee>
<crossref>conf/qrs/2018c</crossref>
<url>db/conf/qrs/qrs2018c.html#JiangHH18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/qrs/ZhengHHW18" mdate="2018-08-16">
<author pid="87/1585">Yu Zheng</author>
<author pid="29/159">Song Huang</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="192/8914">Yaning Wu</author>
<title>A Method of Optimizing Multi-Locators Based on Machine Learning.</title>
<pages>172-174</pages>
<year>2018</year>
<booktitle>QRS Companion</booktitle>
<ee>https://doi.org/10.1109/QRS-C.2018.00041</ee>
<crossref>conf/qrs/2018c</crossref>
<url>db/conf/qrs/qrs2018c.html#ZhengHHW18</url>
</inproceedings>
</r>
<r><article key="journals/jsjkx/LiHHL18" mdate="2020-03-20">
<author pid="41/5232">Yuanyuan Li</author>
<author pid="29/159">Song Huang</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="260/8292">Liuyi Li</author>
<title>&#38754;&#21521;&#19981;&#21516;&#25968;&#25454;&#27169;&#24335;&#30340;&#27979;&#35797;&#29992;&#20363;&#26816;&#32034;&#26041;&#27861; (Test Case Retrieval Method for Different Data Model).</title>
<pages>221-225</pages>
<year>2017</year>
<volume>44</volume>
<journal>&#35745;&#31639;&#26426;&#31185;&#23398;</journal>
<number>11</number>
<ee type="oa">https://doi.org/10.11896/j.issn.1002-137X.2017.11.033</ee>
<ee type="oa">http://www.jsjkx.com/EN/10.11896/j.issn.1002-137X.2017.11.033</ee>
<url>db/journals/jsjkx/jsjkx44.html#LiHHL18</url>
</article>
</r>
<r><inproceedings key="conf/dsa/JiHWHL17" mdate="2020-05-06">
<author pid="215/6024">Haijin Ji</author>
<author pid="29/159">Song Huang</author>
<author pid="192/8914">Yaning Wu</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="174/3855">Xuewei Lv</author>
<title>A New Attribute Selection Method Based on Maximal Information Coefficient and Automatic Clustering.</title>
<pages>22-28</pages>
<year>2017</year>
<booktitle>DSA</booktitle>
<ee>https://doi.org/10.1109/DSA.2017.13</ee>
<crossref>conf/dsa/2017</crossref>
<url>db/conf/dsa/dsa2017.html#JiHWHL17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsa/LvHHJL17" mdate="2020-05-06">
<author pid="174/3855">Xuewei Lv</author>
<author pid="29/159">Song Huang</author>
<author pid="13/8456">Zhanwei Hui</author>
<author pid="215/6024">Haijin Ji</author>
<author pid="15/1152">Shan Li</author>
<title>Test Cases Generation for Multiple paths Based on Metamorphic Relation.</title>
<pages>143</pages>
<year>2017</year>
<booktitle>DSA</booktitle>
<ee>https://doi.org/10.1109/DSA.2017.31</ee>
<crossref>conf/dsa/2017</crossref>
<url>db/conf/dsa/dsa2017.html#LvHHJL17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/issre/HuiHCLN17" mdate="2023-03-24">
<author pid="13/8456">Zhanwei Hui</author>
<author pid="29/159">Song Huang</author>
<author orcid="0000-0003-3578-0994" pid="88/612">Tsong Yueh Chen</author>
<author pid="21/6332">Man Fai Lau</author>
<author pid="44/730">Sebastian Ng</author>
<title>Identifying Failed Test Cases Through Metamorphic Testing.</title>
<pages>90-91</pages>
<year>2017</year>
<booktitle>ISSRE Workshops</booktitle>
<ee>https://doi.org/10.1109/ISSREW.2017.23</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ISSREW.2017.23</ee>
<crossref>conf/issre/2017w</crossref>
<url>db/conf/issre/issre2017w.html#HuiHCLN17</url>
</inproceedings>
</r>
<r><article key="journals/jifs/HuiHJ16" mdate="2021-10-14">
<author pid="13/8456">Zhanwei Hui</author>
<author orcid="0000-0002-6894-3916" pid="29/159">Song Huang</author>
<author pid="185/8339">Meng-Yu Ji</author>
<title>A runtime-testing method for integer overflow detection based on metamorphic relations.</title>
<pages>2349-2361</pages>
<year>2016</year>
<volume>31</volume>
<journal>J. Intell. Fuzzy Syst.</journal>
<number>4</number>
<ee>https://doi.org/10.3233/JIFS-169076</ee>
<url>db/journals/jifs/jifs31.html#HuiHJ16</url>
</article>
</r>
<r><article key="journals/jsjkx/HuiHZL16" mdate="2020-03-27">
<author pid="13/8456">Zhanwei Hui</author>
<author pid="29/159">Song Huang</author>
<author pid="82/5445">Tingting Zhang</author>
<author pid="227/5385">Jianhao Liu</author>
<title>&#19968;&#31181;&#22522;&#20110;&#34581;&#21464;&#20851;&#31995;&#30340;&#27979;&#35797;&#19982;&#22833;&#25928;&#27979;&#35797;&#29992;&#20363;&#23450;&#20301;&#27169;&#22411; (Testing and Invalid Testing Case Localization Model Based on Metamorphic Relation).</title>
<pages>57-62</pages>
<year>2016</year>
<volume>43</volume>
<journal>&#35745;&#31639;&#26426;&#31185;&#23398;</journal>
<number>10</number>
<ee type="oa">https://doi.org/10.11896/j.issn.1002-137X.2016.10.010</ee>
<ee type="oa">http://www.jsjkx.com/EN/10.11896/j.issn.1002-137X.2016.10.010</ee>
<url>db/journals/jsjkx/jsjkx43.html#HuiHZL16</url>
</article>
</r>
<r><inproceedings key="conf/compsac/HuiH16" mdate="2023-03-24">
<author pid="13/8456">Zhanwei Hui</author>
<author pid="29/159">Song Huang</author>
<title>Experience Report: How Do Metamorphic Relations Perform in Geographic Information Systems Testing.</title>
<pages>598-599</pages>
<year>2016</year>
<booktitle>COMPSAC Workshops</booktitle>
<ee>https://doi.org/10.1109/COMPSAC.2016.112</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/COMPSAC.2016.112</ee>
<crossref>conf/compsac/2016w</crossref>
<url>db/conf/compsac/compsac2016w.html#HuiH16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kbse/HuiH16" mdate="2018-11-06">
<author pid="13/8456">Zhanwei Hui</author>
<author pid="29/159">Song Huang</author>
<title>MD-ART: a test case generation method without test oracle problem.</title>
<pages>27-34</pages>
<year>2016</year>
<booktitle>SCTDCP@ASE</booktitle>
<ee>https://doi.org/10.1145/2975954.2975959</ee>
<crossref>conf/kbse/2016sctdcp</crossref>
<url>db/conf/kbse/sctdcp2016.html#HuiH16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/qrs/HuiH16" mdate="2017-05-26">
<author pid="13/8456">Zhanwei Hui</author>
<author pid="29/159">Song Huang</author>
<title>Metamorphic Testing of a Superficial Area Calculation Program.</title>
<pages>406-407</pages>
<year>2016</year>
<booktitle>QRS Companion</booktitle>
<ee>https://doi.org/10.1109/QRS-C.2016.64</ee>
<crossref>conf/qrs/2016c</crossref>
<url>db/conf/qrs/qrs2016c.html#HuiH16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsac/HuiHLLR15" mdate="2023-03-24">
<author pid="13/8456">Zhanwei Hui</author>
<author pid="29/159">Song Huang</author>
<author pid="66/3387">Hui Li</author>
<author pid="227/5385">Jianhao Liu</author>
<author pid="168/6234">Li-Ping Rao</author>
<title>Measurable Metrics for Qualitative Guidelines of Metamorphic Relation.</title>
<pages>417-422</pages>
<year>2015</year>
<booktitle>COMPSAC Workshops</booktitle>
<ee>https://doi.org/10.1109/COMPSAC.2015.179</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/COMPSAC.2015.179</ee>
<crossref>conf/compsac/2015w</crossref>
<url>db/conf/compsac/compsac2015w.html#HuiHLLR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icic/HuiH10" mdate="2017-05-23">
<author pid="13/8456">Zhanwei Hui</author>
<author pid="29/159">Song Huang</author>
<title>Software Security Testing of Web Applications Based on SSD.</title>
<pages>527-534</pages>
<year>2010</year>
<booktitle>ICIC (3)</booktitle>
<ee>https://doi.org/10.1007/978-3-642-14831-6_69</ee>
<crossref>conf/icic/2010-3</crossref>
<url>db/conf/icic/icic2010-3.html#HuiH10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/rskt/HuiHRY10" mdate="2017-05-24">
<author pid="13/8456">Zhanwei Hui</author>
<author pid="29/159">Song Huang</author>
<author pid="05/8611">Zhengping Ren</author>
<author pid="59/179">Yi Yao</author>
<title>Review of Software Security Defects Taxonomy.</title>
<pages>310-321</pages>
<year>2010</year>
<booktitle>RSKT</booktitle>
<ee>https://doi.org/10.1007/978-3-642-16248-0_46</ee>
<crossref>conf/rskt/2010</crossref>
<url>db/conf/rskt/rskt2010.html#HuiHRY10</url>
</inproceedings>
</r>
<coauthors n="59" nc="1">
<co c="0"><na f="c/Cao:Xu" pid="97/10217">Xu Cao</na></co>
<co c="0"><na f="c/Chen:Hao" pid="175/3324">Hao Chen</na></co>
<co c="0"><na f="c/Chen:Lele" pid="88/8595">Lele Chen</na></co>
<co c="0"><na f="c/Chen:Qiang" pid="62/2719">Qiang Chen</na></co>
<co c="0"><na f="c/Chen_0001:Sen" pid="180/8218-1">Sen Chen 0001</na></co>
<co c="0"><na f="c/Chen:Tsong_Yueh" pid="88/612">Tsong Yueh Chen</na></co>
<co c="0"><na f="c/Chen_0001:Zhenyu" pid="86/541-1">Zhenyu Chen 0001</na></co>
<co c="0"><na f="c/Chua:Caslon" pid="129/2522">Caslon Chua</na></co>
<co c="0"><na f="d/Ding:Yixian" pid="316/0443">Yixian Ding</na></co>
<co c="0"><na f="f/Fan_0003:Lingling" pid="11/2636-3">Lingling Fan 0003</na></co>
<co c="0"><na f="f/Fan:Yong" pid="00/5170">Yong Fan</na></co>
<co c="0"><na f="g/Ge:Xiuting" pid="251/1990">Xiuting Ge</na></co>
<co c="0"><na f="g/Gu:Siqi" pid="313/2402">Siqi Gu</na></co>
<co c="0"><na f="h/Hu:Jinchang" pid="131/9659">Jinchang Hu</na></co>
<co c="0"><na f="h/Huang:Song" pid="29/159">Song Huang</na></co>
<co c="0"><na f="h/Huang:Yifan" pid="52/4486">Yifan Huang</na></co>
<co c="0"><na f="j/Ji:Haijin" pid="215/6024">Haijin Ji</na></co>
<co c="0"><na f="j/Ji:Meng=Yu" pid="185/8339">Meng-Yu Ji</na></co>
<co c="0"><na f="j/Jiang:Chao" pid="38/2068">Chao Jiang</na></co>
<co c="0"><na f="l/Lau:Man_Fai" pid="21/6332">Man Fai Lau</na></co>
<co c="0"><na f="l/Li:Hui" pid="66/3387">Hui Li</na></co>
<co c="0"><na f="l/Li:Liuyi" pid="260/8292">Liuyi Li</na></co>
<co c="0"><na f="l/Li:Shan" pid="15/1152">Shan Li</na></co>
<co c="0"><na f="l/Li:Shanling" pid="39/4864">Shanling Li</na></co>
<co c="0"><na f="l/Li:Yuanyuan" pid="41/5232">Yuanyuan Li</na></co>
<co c="0"><na f="l/Liu:Fan" pid="56/2849">Fan Liu</na></co>
<co c="0"><na f="l/Liu:Jialuo" pid="251/1933">Jialuo Liu</na></co>
<co c="0"><na f="l/Liu:Jianhao" pid="227/5385">Jianhao Liu</na></co>
<co c="0"><na f="l/Liu:Jiawei" pid="12/8228">Jiawei Liu</na></co>
<co c="0"><na f="l/Liu:Jiuluo" pid="251/1966">Jiuluo Liu</na></co>
<co c="0"><na f="l/Liu:Wenhong" pid="47/3129">Wenhong Liu</na></co>
<co c="0"><na f="l/Liu:Yuchan" pid="265/0027">Yuchan Liu</na></co>
<co c="0"><na f="l/Lv:Xuewei" pid="174/3855">Xuewei Lv</na></co>
<co c="0"><na f="n/Ng:Sebastian" pid="44/730">Sebastian Ng</na></co>
<co c="0"><na f="p/Pan:Ya" pid="251/1917">Ya Pan</na></co>
<co c="0"><na f="q/Qing:Mingshuang" pid="307/7492">Mingshuang Qing</na></co>
<co c="0"><na f="r/Rao:Li=Ping" pid="168/6234">Li-Ping Rao</na></co>
<co c="0"><na f="r/Ren:Zhengping" pid="05/8611">Zhengping Ren</na></co>
<co c="0"><na f="s/Song:Shuang" pid="86/4211">Shuang Song</na></co>
<co c="0"><na f="s/Sun:Jin=lei" pid="224/7166">Jin-lei Sun</na></co>
<co c="0"><na f="s/Sun:Jinlei" pid="203/1725">Jinlei Sun</na></co>
<co c="0"><na f="s/Sun:Kang" pid="43/3451">Kang Sun</na></co>
<co c="0"><na f="w/Wang:Meijuan" pid="46/2340">Meijuan Wang</na></co>
<co c="0"><na f="w/Wang:Xiaojuan" pid="49/7526">Xiaojuan Wang</na></co>
<co c="0"><na f="w/Wu:Kaishun" pid="34/4445">Kaishun Wu</na></co>
<co c="0"><na f="w/Wu:Yaning" pid="192/8914">Yaning Wu</na></co>
<co c="0"><na f="x/Xia:Chunyan" pid="142/6432">Chunyan Xia</na></co>
<co c="0"><na f="x/Xu:Sihan" pid="168/6400">Sihan Xu</na></co>
<co c="0"><na f="y/Yang:Sen" pid="90/4655">Sen Yang</na></co>
<co c="0"><na f="y/Yao:Yi" pid="59/179">Yi Yao</na></co>
<co c="0"><na f="y/Yao:Yongming" pid="204/4129">Yongming Yao</na></co>
<co c="0"><na f="y/Yi:Gaolei" pid="283/7995">Gaolei Yi</na></co>
<co c="0"><na f="z/Zhang:Shi=wen" pid="224/7231">Shi-wen Zhang</na></co>
<co c="0"><na f="z/Zhang:Tingting" pid="82/5445">Tingting Zhang</na></co>
<co c="0"><na f="z/Zhang_0099:Yan" pid="04/3348-99">Yan Zhang 0099</na></co>
<co c="0"><na f="z/Zhao:Jianhua" pid="31/5664">Jianhua Zhao</na></co>
<co c="0"><na f="z/Zhao:Yuan" pid="65/2105">Yuan Zhao</na></co>
<co c="0"><na f="z/Zheng:Changyou" pid="215/6027">Changyou Zheng</na></co>
<co c="0"><na f="z/Zheng:Yu" pid="87/1585">Yu Zheng</na></co>
</coauthors>
</dblpperson>

