Yijun Yu

According to our database1, Yijun Yu authored at least 171 papers between 1997 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Text Filtering and Ranking for Security Bug Report Prediction.
IEEE Trans. Software Eng., 2019

Bilateral Dependency Neural Networks for Cross-Language Algorithm Classification.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

SAR: learning cross-language API mappings with little knowledge.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

fAST: flattening abstract syntax trees for efficiency.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Dragonfly: a tool for simulating self-adaptive drone behaviours.
Proceedings of the 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2019

Assessing Security and Privacy Behavioural Risks for Self-Protection Systems.
Proceedings of the Engineering Adaptive Software Systems, 2019

Design and Engineering of Adaptive Software Systems.
Proceedings of the Engineering Adaptive Software Systems, 2019

Requirements Engineering.
Proceedings of the Handbook of Software Engineering., 2019

2018
CrowdService: Optimizing Mobile Crowdsourcing and Service Composition.
ACM Trans. Internet Techn., 2018

Simplifying the Formal Verification of Safety Requirements in Zone Controllers Through Problem Frames and Constraint-Based Projection.
IEEE Trans. Intelligent Transportation Systems, 2018

An Empirical Study of Cohesion and Coupling: Balancing Optimization and Disruption.
IEEE Trans. Evolutionary Computation, 2018

Feature-Driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things.
TCPS, 2018

Requirements and specifications for adaptive security: concepts and analysis.
Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, 2018

Are Smell-Based Metrics Actually Useful in Effort-Aware Structural Change-Proneness Prediction? An Empirical Study.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

Cross-Language Learning for Program Classification Using Bilateral Tree-Based Convolutional Neural Networks.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Visual Simple Transformations: Empowering End-Users to Wire Internet of Things Objects.
ACM Trans. Comput.-Hum. Interact., 2017

Goal Modelling for Security Problem Matching and Pattern Enforcement.
IJSSE, 2017

Snap forensics: a tradeoff between ephemeral intelligence and persistent evidence collection.
Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics, 2017

O2O service composition with social collaboration.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

A multi-dimensional hierarchical performance evaluation model for edge cloud platform.
Proceedings of the 2017 International Conference on Identification, 2017

Towards Mobile Twin Peaks for App Development.
Proceedings of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2017

Transforming Timing Requirements into CCSL Constraints to Verify Cyber-Physical Systems.
Proceedings of the Formal Methods and Software Engineering, 2017

Enabling End-Users to Protect their Privacy.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Engineering Adaptive Model-Driven User Interfaces.
IEEE Trans. Software Eng., 2016

Protecting Privacy in the Cloud: Current Practices, Future Directions.
IEEE Computer, 2016

Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Forensically-Sound Analysis of Security Risks of Using Local Password Managers.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Locating bugs without looking back.
Proceedings of the 13th International Conference on Mining Software Repositories, 2016

CrowdService: serving the individuals through mobile crowdsourcing and service composition.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Requirements-driven design of autonomic application software.
Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, 2016

2015
Requirements-Driven Self-Optimization of Composite Services Using Feedback Control.
IEEE Trans. Services Computing, 2015

Guest editorial: Special section: Software quality and maintainability.
Software Quality Journal, 2015

"Why can't I do that?": Tracing Adaptive Security Decisions.
EAI Endorsed Trans. Self-Adaptive Systems, 2015

The Aftermath of the Missing Flight MH370: What Can Engineers Do? [Point of View].
Proceedings of the IEEE, 2015

Automated analysis of security requirements through risk-based argumentation.
Journal of Systems and Software, 2015

An Open Framework for Semantic Code Queries on Heterogeneous Repositories.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

An Architectural Evolution Dataset.
Proceedings of the 12th IEEE/ACM Working Conference on Mining Software Repositories, 2015

A survey of the forms of Java reference names.
Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension, 2015

Investigating naming convention adherence in Java references.
Proceedings of the 2015 IEEE International Conference on Software Maintenance and Evolution, 2015

The Role of Environmental Assumptions in Failures of DNA Nanosystems.
Proceedings of the 1st IEEE/ACM International Workshop on Complex Faults and Failures in Large Software Systems, 2015

Managing Security Control Assumptions Using Causal Traceability.
Proceedings of the 8th IEEE/ACM International Symposium on Software and Systems Traceability, 2015

2014
Uncertainty handling in goal-driven self-optimization - Limiting the negative effect on adaptation.
Journal of Systems and Software, 2014

Adaptive Model-Driven User Interface Development Systems.
ACM Comput. Surv., 2014

Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Self-adaptation through incremental generative model transformations at runtime.
Proceedings of the 36th International Conference on Software Engineering, 2014

Requirements-driven mediation for collaborative security.
Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2014

Run-time generation, transformation, and verification of access control models for self-protection.
Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2014

Integrating adaptive user interface capabilities in enterprise applications.
Proceedings of the 36th International Conference on Software Engineering, 2014

Evolving Commitments for Self-Adaptive Socio-technical Systems.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

Traceability for Adaptive Information Security in the Cloud.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Engineering Adaptive Software Systems (EASSy) (NII Shonan Meeting 2013-7).
NII Shonan Meet. Rep., 2013

Improving feature location using structural similarity and iterative graph mapping.
Journal of Systems and Software, 2013

Resolving vulnerability identification errors using security requirements on business process models.
Inf. Manag. Comput. Security, 2013

Preface.
ECEASST, 2013

Specifying software features for composition: A tool-supported approach.
Computer Networks, 2013

Requirements-Driven Self-Repairing against Environmental Failures.
Proceedings of the Seventh International Symposium on Theoretical Aspects of Software Engineering, 2013

Requirements-driven adaptive digital forensics.
Proceedings of the 21st IEEE International Requirements Engineering Conference, 2013

INVocD: identifier name vocabulary dataset.
Proceedings of the 10th Working Conference on Mining Software Repositories, 2013

Issues in representing domain-specific concerns in model-driven engineering.
Proceedings of the 5th International Workshop on Modeling in Software Engineering, 2013

Developing a domain-specific plug-in for a modelling platform: The good, the bad, the ugly.
Proceedings of the 3rd International Workshop on Developing Tools as Plug-ins, 2013

Cedar studio: an IDE supporting adaptive model-driven user interfaces for enterprise applications.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2013

Crowdsourcing user interface adaptations for minimizing the bloat in enterprise applications.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2013

RBUIS: simplifying enterprise application user interfaces through engineering role-based adaptive behavior.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2013

Preserving Designer Input on Concrete User Interfaces Using Constraints While Maintaining Adaptive Behavior.
Proceedings of the Workshop on Context-Aware Adaptation of Service Front-Ends, 2013

Reasoning About Dynamic Aspectual Requirements.
Proceedings of the Aspect-Oriented Requirements Engineering, 2013

Aspect Interactions: A Requirements Engineering Perspective.
Proceedings of the Aspect-Oriented Requirements Engineering, 2013

Maintaining Security Requirements of Software Systems Using Evolving Crosscutting Dependencies.
Proceedings of the Aspect-Oriented Requirements Engineering, 2013

2012
Engineering Autonomic Systems (EASy) (NII Shonan Meeting 2012-3).
NII Shonan Meet. Rep., 2012

Analysing monitoring and switching problems for adaptive systems.
Journal of Systems and Software, 2012

Self-tuning of software systems through dynamic quality tradeoff and value-based feedback control loop.
Journal of Systems and Software, 2012

EA-tracer: identifying traceability links between code aspects and early aspects.
Proceedings of the ACM Symposium on Applied Computing, 2012

Privacy arguments: Analysing selective disclosure requirements for mobile applications.
Proceedings of the 2012 20th IEEE International Requirements Engineering Conference (RE), 2012

Stateful requirements monitoring for self-repairing socio-technical systems.
Proceedings of the 2012 20th IEEE International Requirements Engineering Conference (RE), 2012

Maintaining invariant traceability through bidirectional transformations.
Proceedings of the 34th International Conference on Software Engineering, 2012

Using Interpreted Runtime Models for Devising Adaptive User Interfaces of Enterprise Applications.
Proceedings of the ICEIS 2012 - Proceedings of the 14th International Conference on Enterprise Information Systems, Volume 3, Wroclaw, Poland, 28 June, 2012

Workshop Proposal for CSMR 2012 - SQM 2012.
Proceedings of the 16th European Conference on Software Maintenance and Reengineering, 2012

An Aspect-Oriented Approach to Relating Security Requirements and Access Control.
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012

2011
Analyzing evolution of variability in a software product line: From contexts and requirements to features.
Information & Software Technology, 2011

Assessing architectural evolution: a case study.
Empirical Software Engineering, 2011

Run-Time Security Traceability for Evolving Systems.
Comput. J., 2011

Survivability-oriented self-tuning of web systems.
Proceedings of the 20th International Conference on World Wide Web, 2011

Tool support for UML-based specification and verification of role-based access control properties.
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011

SeCMER: A Tool to Gain Control of Security Requirements Evolution.
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

OpenArgue: Supporting argumentation to evolve secure software systems.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Risk and argument: A risk-based argumentation method for practical security.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Are your sites down? Requirements-driven self-tuning for the survivability of Web systems.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications.
Proceedings of the POLICY 2011, 2011

Specifying and detecting meaningful changes in programs.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

Challenges in model-based evolution and merging of access control policies.
Proceedings of the 12th International Workshop on Principles of Software Evolution and the 7th annual ERCIM Workshop on Software Evolution, 2011

OpenOME: An Open-source Goal and Agent-Oriented Model Drawing and Analysis Tool.
Proceedings of the 5<sup>th</sup> International <i>i</i>* Workshop 2011, 2011

Maleku: An evolutionary visual software analysis tool for providing insights into software evolution.
Proceedings of the IEEE 27th International Conference on Software Maintenance, 2011

Mining java class naming conventions.
Proceedings of the IEEE 27th International Conference on Software Maintenance, 2011

Iterative context-aware feature location.
Proceedings of the 33rd International Conference on Software Engineering, 2011

The Security Twin Peaks.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Improving the Tokenisation of Identifier Names.
Proceedings of the ECOOP 2011 - Object-Oriented Programming, 2011

From Model-Driven Software Development Processes to Problem Diagnoses at Runtime.
Proceedings of the Models@run.time - Foundations, Applications, and Roadmaps [Dagstuhl Seminar 11481, November 27, 2011

An Extended Ontology for Security Requirements.
Proceedings of the Advanced Information Systems Engineering Workshops, 2011

A Tool for Managing Evolving Security Requirements.
Proceedings of the IS Olympics: Information Systems in a Diverse World, 2011

A Tool for Managing Evolving Security Requirements.
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011

2010
Security Requirements Engineering for Evolving Software Systems: A Survey.
IJSSE, 2010

Model-Based Argument Analysis for Evolving Security Requirements.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Self-Tuning of Software Systems Through Goal-based Feedback Loop Control.
Proceedings of the RE 2010, 18th IEEE International Requirements Engineering Conference, Sydney, New South Wales, Australia, September 27, 2010

Tool support for code generation from a UMLsec property.
Proceedings of the ASE 2010, 2010

Assure High Quality Code Using Refactoring and Obfuscation Techniques.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

Exploring the Influence of Identifier Names on Code Quality: An Empirical Study.
Proceedings of the 14th European Conference on Software Maintenance and Reengineering, 2010

Variability Modeling for Product Line Viewpoints Integration.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Aspects across Software Life Cycle: A Goal-Driven Approach.
LNCS Trans. Aspect Oriented Softw. Dev., 2009

Monitoring and diagnosing software requirements.
Autom. Softw. Eng., 2009

Relating Identifier Naming Flaws and Code Quality: An Empirical Study.
Proceedings of the 16th Working Conference on Reverse Engineering, 2009

Early Identification of Problem Interactions: A Tool-Supported Approach.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2009

Are Your Lights Off? Using Problem Frames to Diagnose System Failures.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009

AVT Vector: A Quantitative Security Requirements Evaluation Approach Based on Assets, Vulnerabilities and Trustworthiness of Environment.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009

Towards a Unified Framework for Contextual Variability in Requirements.
Proceedings of the Third International Workshop on Software Product Management, 2009

Using formal concept analysis to construct and visualise hierarchies of socio-technical relations.
Proceedings of the 31st International Conference on Software Engineering, 2009

Some Issues in the 'Archaeology' of Software Evolution.
Proceedings of the Generative and Transformational Techniques in Software Engineering III, 2009

Towards a Problem Oriented Engineering Theory of Pattern-Oriented Analysis and Design.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Goal-Directed Modeling of Self-adaptive Software Architecture.
Proceedings of the Enterprise, 2009

2008
Graph-Centric Tools for Understanding the Evolution and Relationships of Software Structures.
Proceedings of the WCRE 2008, 2008

Configuring features with stakeholder goals.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Supporting Requirements Model Evolution throughout the System Life-Cycle.
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008

Analyzing the evolution of eclipse plugins.
Proceedings of the 2008 International Working Conference on Mining Software Repositories, 2008

Tools for Traceability in Secure Software Development.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008

From Goals to High-Variability Software Design.
Proceedings of the Foundations of Intelligent Systems, 17th International Symposium, 2008

Traceability for the maintenance of secure software.
Proceedings of the 24th IEEE International Conference on Software Maintenance (ICSM 2008), September 28, 2008

Design principles in architectural evolution: A case study.
Proceedings of the 24th IEEE International Conference on Software Maintenance (ICSM 2008), September 28, 2008

Automated Analysis of Permission-Based Security Using UMLsec.
Proceedings of the Fundamental Approaches to Software Engineering, 2008

Enforcing a security pattern in stakeholder goal models.
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

Tools for Traceable Security Verification.
Proceedings of the Visions of Computer Science, 2008

2007
Three-Dimensional Bayesian Inversion With Application to Subsurface Sensing.
IEEE Trans. Geoscience and Remote Sensing, 2007

A Bivariate Gaussian Model for Unexploded Ordnance Classification with EMI Data.
IEEE Geosci. Remote Sensing Lett., 2007

Web Service Composition: A Reality Check.
Proceedings of the Web Information Systems Engineering, 2007

Web Service Search: Who, When, What, and How.
Proceedings of the Web Information Systems Engineering - WISE 2007 Workshops, 2007

Exploring the Dimensions of Variability: a Requirements Engineering Perspective.
Proceedings of the First International Workshop on Variability Modelling of Software-Intensive Systems, 2007

Tracing and Validating Goal Aspects.
Proceedings of the 15th IEEE International Requirements Engineering Conference, 2007

Specifying Monitoring and Switching Problems in Context.
Proceedings of the 15th IEEE International Requirements Engineering Conference, 2007

An automated approach to monitoring and diagnosing requirements.
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007

Tools for model-based security engineering: models vs. code.
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007

Comparing Web Services with other Software Components.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Requirements-Driven Design and Configuration Management of Business Processes.
Proceedings of the Business Process Management, 5th International Conference, 2007

A Taxonomy of Asymmetric Requirements Aspects.
Proceedings of the Early Aspects: Current Challenges and Future Directions, 2007

2006
On Goal-based Variability Acquisition and Analysis.
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006

A Surface Errors Locator System for Ancient Culture Preservation.
Proceedings of the Digital Libraries: Achievements, 2006

Mining Interest Navigation Patterns Based on Hybrid Markov Model.
Proceedings of the Flexible Query Answering Systems, 7th International Conference, 2006

Personalized Web Recommendation Based on Path Clustering.
Proceedings of the Flexible Query Answering Systems, 7th International Conference, 2006

Requirements-driven design of autonomic application software.
Proceedings of the 2006 conference of the Centre for Advanced Studies on Collaborative Research, 2006

2005
Making XML document markup international.
Softw., Pract. Exper., 2005

Towards requirements-driven autonomic systems design.
ACM SIGSOFT Software Engineering Notes, 2005

A Lightweight Approach to Semantic Web Service Synthesis.
Proceedings of the 2005 International Workshop on Challenges in Web Information Retrieval and Integration (WIRI 2005), 2005

RETR: Reverse Engineering to Requirements.
Proceedings of the 12th Working Conference on Reverse Engineering, 2005

Reverse Engineering Goal Models from Legacy Code.
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005

Configuring Common Personal Software: a Requirements-Driven Approach.
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005

Reducing Build Time through Precompilations for Evolving Large Software.
Proceedings of the 21st IEEE International Conference on Software Maintenance (ICSM 2005), 2005

Improving the Build Architecture of Legacy C/C++ Software Systems.
Proceedings of the Fundamental Approaches to Software Engineering, 2005

Quality-Based Software Reuse.
Proceedings of the Advanced Information Systems Engineering, 17th International Conference, 2005

2004
Three-dimensional inverse scattering of a dielectric target embedded in a lossy half-space.
IEEE Trans. Geoscience and Remote Sensing, 2004

Dynamically Self-Organized Service Composition in Wireless Ad Hoc Networks.
Proceedings of the Technologies for E-Services, 5th International Workshop, 2004

From Goals to Aspects: Discovering Aspects from Requirements Goal Models.
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE 2004), 2004

Performance Visualizations using XML Representations.
Proceedings of the 8th International Conference on Information Visualisation, 2004

Non-Uniform Dependences Partitioned by Recurrence Chains.
Proceedings of the 33rd International Conference on Parallel Processing (ICPP 2004), 2004

2003
A Cost-Efficient Scheduling Algorithm of On-Demand Broadcasts.
Wireless Networks, 2003

Removing false code dependencies to speedup software build processes.
Proceedings of the 2003 conference of the Centre for Advanced Studies on Collaborative Research, 2003

Localizing XML Documents through XSLT.
Proceedings of the 21st IASTED International Multi-Conference on Applied Informatics (AI 2003), 2003

2002
Visualization Enables the Programmer to Reduce Cache Misses.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002

2001
Loop Parallelization using the 3D Iteration Space Visualizer.
J. Vis. Lang. Comput., 2001

A self-adaptive scheduling algorithm of on-demand broadcasts.
Proceedings of the 4th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2001

Visualizing the Impact of the Cache on Program Execution.
Proceedings of the International Conference on Information Visualisation, 2001

2000
Partitioning Loops with Variable Dependence Distances.
Proceedings of the 2000 International Conference on Parallel Processing, 2000

1999
JPT: A Java Parallelization Tool.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 1999

A 3D-Java tool to visualize loop-carried dependences.
Proceedings of the Parallel Computing: Fundamentals & Applications, 1999

1997
Visualizing the Iteration Space in PEFPT.
Proceedings of the High-Performance Computing and Networking, 1997


  Loading...