Junyan Qian

Orcid: 0000-0002-1325-6975

According to our database1, Junyan Qian authored at least 84 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient 3-D Processor Array Reconfiguration Algorithms Based on Bucket Effect.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2024

An Efficient Bottleneck Planes Exclusion Method for Reconfiguring 3D VLSI Arrays.
IEEE Trans. Parallel Distributed Syst., February, 2024

Corrections to "Uncovering Bugs in Code Coverage Profilers via Control Flow Constraint Solving".
IEEE Trans. Software Eng., January, 2024

2023
Uncovering Bugs in Code Coverage Profilers via Control Flow Constraint Solving.
IEEE Trans. Software Eng., November, 2023

Human-in-the-loop online just-in-time software defect prediction.
CoRR, 2023

Design of a Dual-Band Wireless Power and Data Transfer Coil for Multisite Biomedical Implants.
Proceedings of the IEEE Nordic Circuits and Systems Conference, 2023

2022
Lightweight Secure Detection Service for Malicious Attacks in WSN With Timestamp-Based MAC.
IEEE Trans. Netw. Serv. Manag., December, 2022

Approximate Safety Properties in Metric Transition Systems.
IEEE Trans. Reliab., 2022

Generating Optimal Class Integration Test Orders Using Genetic Algorithms.
Int. J. Softw. Eng. Knowl. Eng., 2022

Evolutionary Measures for Object-oriented Projects and Impact on the Performance of Cross-version Defect Prediction.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

2021
Fuzzy Alternating Refinement Relations Under the Gödel Semantics.
IEEE Trans. Fuzzy Syst., 2021

An efficiency-enhanced deep learning model for citywide crowd flows prediction.
Int. J. Mach. Learn. Cybern., 2021

A high-performance VLSI array reconfiguration scheme based on network flow under row and column rerouting.
J. Parallel Distributed Comput., 2021

Flexible scheme for reconfiguring 2D mesh-connected VLSI subarrays under row and column rerouting.
J. Parallel Distributed Comput., 2021

An improved algorithm for accelerating reconfiguration of VLSI array.
Integr., 2021

A mathematical programming method for constructing the shortest interconnection VLSI arrays.
Integr., 2021

SmartCamera: Realtime Video Stream-Oriented Action Recognition Platform in Edge Environment.
Proceedings of the UbiComp/ISWC '21: 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing and 2021 ACM International Symposium on Wearable Computers, 2021

2020
A Novel Class-Imbalance Learning Approach for Both Within-Project and Cross-Project Defect Prediction.
IEEE Trans. Reliab., 2020

Efficient Reconfiguration Algorithm With Flexible Rerouting Schemes for Constructing 3-D VLSI Subarrays.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

IoT-RECSM - Resource-Constrained Smart Service Migration Framework for IoT Edge Computing Environment.
Sensors, 2020

An efficient multiple shortest augmenting paths algorithm for constructing high performance VLSI subarray.
Integr., 2020

Process metrics for software defect prediction in object-oriented programs.
IET Softw., 2020

Mulr4FL: Effective Fault Localization of Evolution Software Based on Multivariate Logistic Regression Model.
IEEE Access, 2020

Reflector: a fine-grained I/O tracker for HPC systems.
Proceedings of the PPoPP '20: 25th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2020

MobiMVL: A Model-Driven Mobile Application Development Approach for End-Users.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
Fuzzy Pushdown Termination Games.
IEEE Trans. Fuzzy Syst., 2019

An Empirical Study on the Effectiveness of Feature Selection for Cross-Project Defect Prediction.
IEEE Access, 2019

An Approach for Detecting Infeasible Paths Based on a SMT Solver.
IEEE Access, 2019

Performance Evaluation of Data Race Detection Based on Thread Sharing Analysis With Different Granularities: An Empirical Study.
IEEE Access, 2019

Efficient Test Case Generation for Thread-Safe Classes.
IEEE Access, 2019

Multi-UAV Formation Transformation Based on Improved Heuristically-Accelerated Reinforcement Learning.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

Program Slicing Method of LLVM IR Based on Information-Flow Analysis.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

The Lightweight System for UAV Cooperative Mission Planning Simulation.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

2018
A game-theoretic approach to advertisement dissemination in ephemeral networks.
World Wide Web, 2018

How Far We Have Progressed in the Journey? An Examination of Cross-Project Defect Prediction.
ACM Trans. Softw. Eng. Methodol., 2018

Lightweight Service Mashup Middleware With REST Style Architecture for IoT Applications.
IEEE Trans. Netw. Serv. Manag., 2018

基于动态调整简化粒子群优化的组合测试用例生成方法 (Combinatorial Test Case Generation Method Based on Simplified Particle Swarm Optimizationwith Dynamic Adjustment).
计算机科学, 2018

Evolutionary approach to generating test data for data flow test.
IET Softw., 2018

Improvement in JavaMOP by Simplifying Büchi Automaton.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2018

Poster: A Lightweight Timestamp-based MAC Detection Scheme for XOR Network Coding in Wireless Sensor Networks.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Monadic Dynamic Slicing of Object-Oriented Programs.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2018

2017
Optimal Representation of Large-Scale Graph Data Based on K2-Tree.
Wirel. Pers. Commun., 2017

基于FP-Growth的图上随机游走推荐方法 (Recommendation Method Based on Random Walk on Graph Integrated with FP-Growth).
计算机科学, 2017

A Behavioral Similarity Metric for Semantic Workflows Based on Semantic Task Adjacency Relations With Importance.
IEEE Access, 2017

A Mathematical Model for Reconfiguring VLSI Subarrays Under Row and Column Rerouting.
IEEE Access, 2017

A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram.
IEEE Access, 2017

Knowledge Graph Embedding by Dynamic Translation.
IEEE Access, 2017

An Interactive Debugging Framework with Heuristic Graph.
Proceedings of the 2017 International Conference on Software Analysis, 2017

An In-Depth Study of the Efficiency of Risk Evaluation Formulas for Multi-Fault Localization.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

2016
Optimal Reconfiguration of High-Performance VLSI Subarrays with Network Flow.
IEEE Trans. Parallel Distributed Syst., 2016

Detection and classification of anomaly intrusion using hierarchy clustering and SVM.
Secur. Commun. Networks, 2016

计算节点不可靠网络可靠度的一种MDD算法 (Novel Reliability Analysis Algorithm Based on MDDs in Networks with Imperfect Nodes).
计算机科学, 2016

A Robust Electronic Voting Scheme Against Side Channel Attack.
J. Inf. Sci. Eng., 2016

An integer programming method for constructing tightly coupled VLSI subarrays.
IEICE Electron. Express, 2016

Satisfiability-based method for reconfiguring power efficient VLSI array.
IEICE Electron. Express, 2016

Which Is More Important for Cross-Project Defect Prediction: Instance or Feature?
Proceedings of the International Conference on Software Analysis, Testing and Evolution, 2016

An Improved Reconfiguration Algorithm for VLSI Arrays with A-Star.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

Linearizability Proof of Stack Data.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

2015
Dr.VIS v2.0: an updated database of human disease-related viral integration sites in the era of high-throughput deep sequencing.
Nucleic Acids Res., 2015

基于Petri网的CSP并发系统验证技术研究 (Verification of Concurrent CSP Systems Based on Petri Net).
计算机科学, 2015

Ad Dissemination Game in Ephemeral Networks.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

2012
WSSecTool: A Web Service Security Analysis Tool Based on Program Slicing.
Proceedings of the Eighth IEEE World Congress on Services, 2012

Event Calculus-Based Adaptive Services Composition Policy for AmI Systems.
Proceedings of the Active Media Technology - 8th International Conference, 2012

2010
Using ASP for knowledge management with user authorization.
Data Knowl. Eng., 2010

Using ASP to Improve the Information Reuse in Mechanical Assembly Sequence Planning.
Proceedings of the PRICAI 2010: Trends in Artificial Intelligence, 2010

2009
An ASP Based Solution to Mechanical Assembly Sequence Planning.
Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing, 2009

Supervising Mechanism for Contract Based Virtual Organization.
Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing, 2009

An ASP based method for subassembly identification.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009

Automatic Construction of Complete Abstraction by Abstract Interpretation.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Test frame updating in CPM testing of Prolog programs.
Softw. Qual. J., 2008

Formula-Dependent Abstraction for CTL Model Checking.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

A Formal Framework for Policy-Governed Institutional Agency.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Formal Verification for C Program.
Informatica, 2007

Goal-independent Semantics for Path Dependent Analysis of Prolog Programs.
Proceedings of the First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering, 2007

Verifying Programs Using Abstraction and Theorem Proving.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

A Novel Test Case Generation Method for Prolog Programs Based on Call Patterns Semantics.
Proceedings of the Programming Languages and Systems, 5th Asian Symposium, 2007

2006
A Base for Achieving Semantics for Prolog with Cut for Correct Observables.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

Compositional Abstraction for Concurrent Programs.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

A Constraint-based Correct Call Pattern Semantics for Prolog as an Abstraction of Decorated Tree Semantics.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

Designing Prolog Semantics for a Class of Observables.
Proceedings of the PRICAI 2006: Trends in Artificial Intelligence, 2006

Optimization Construction of Region Automaton.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications & Conference on Real-Time Computing Systems and Applications, 2006

On the New Application of Call Patterns to CPM Testing of Prolog Programs.
Proceedings of the AI 2006: Advances in Artificial Intelligence, 2006

2005
Model Checking for Timed Statecharts.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2005

2004
The compositional semantics of timed statecharts.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004


  Loading...