Zhiqiu Huang

According to our database1, Zhiqiu Huang authored at least 89 papers between 2006 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


SMinder: Detect a Left-behind Phone using Sensor-based Context Awareness.
MONET, 2019

User Review-Based Change File Localization for Mobile Applications.
CoRR, 2019

CodeGRU: Context-aware Deep Learning with Gated Recurrent Unit for Source Code Modeling.
CoRR, 2019

Detecting safety-related components in statecharts through traceability and model slicing.
Softw., Pract. Exper., 2018

Spectrum-Based Fault Localization Using Fault Triggering Model to Refine Fault Ranking List.
IEICE Transactions, 2018

Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities.
Future Generation Comp. Syst., 2018

Partial Order Reduction for the full Class of State/Event Linear Temporal Logic.
Comput. J., 2018

Privacy preserving cloud data sharing system with flexible control.
Computers & Electrical Engineering, 2018

BTrack: Using Barometer for Energy Efficient Location Tracking on Mountain Roads.
IEEE Access, 2018

Spectrum-Based Fault Localization via Enlarging Non-Fault Region to Improve Fault Absolute Ranking.
IEEE Access, 2018

Hierarchical Behavior Annex: Towards an AADL Functional Specification Extension.
Proceedings of the 16th ACM/IEEE International Conference on Formal Methods and Models for System Design, 2018

Runtime verification of memory safety via source transformation.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

TRFIoT: Trust and Reputation Model for Fog-based IoT.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Efficient Verification of Service-Based Applications for Flexible Modeling.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018

Computing Urban Traffic Congestions by Incorporating Sparse GPS Probe Data and Social Media Data.
ACM Trans. Inf. Syst., 2017

Quantitative risk analysis of safety-critical embedded systems.
Software Quality Journal, 2017

Modeling and verification of Web services composition based on model transformation.
Softw., Pract. Exper., 2017

υ-Support vector machine based on discriminant sparse neighborhood preserving embedding.
Pattern Anal. Appl., 2017

Partial order reduction for checking LTL formulae with the next-time operator.
J. Log. Comput., 2017

Lightweight fault localization combined with fault context to improve fault absolute rank.
SCIENCE CHINA Information Sciences, 2017

A Better Translation From LTL to Transition-Based Generalized Büchi Automata.
IEEE Access, 2017

Evaluating Data Filter on Cross-Project Defect Prediction: Comparison and Improvements.
IEEE Access, 2017

Privacy Disclosure Checking Method Applied on Collaboration Interactions Among SaaS Services.
IEEE Access, 2017

Idology and Its Applications in Public Security and Network Security.
Proceedings of the Intelligence and Security Informatics - 12th Pacific Asia Workshop, 2017

Distributed System Model Using SysML and Event-B.
Proceedings of the Machine Learning and Intelligent Communications, 2017

Intrusion Detection with Tree-Based Data Mining Classification Techniques by Using KDD.
Proceedings of the Machine Learning and Intelligent Communications, 2017

Analyzing APIs documentation and code to detect directive defects.
Proceedings of the 39th International Conference on Software Engineering, 2017

Three-way decisions based software defect prediction.
Knowl.-Based Syst., 2016

Secure and controllable k-NN query over encrypted cloud data with key confidentiality.
J. Parallel Distrib. Comput., 2016

Multi-Resource Modeling of Real-Time Software Based on Resource Timed Process Algebra.
International Journal of Software Engineering and Knowledge Engineering, 2016

Neighborhood based decision-theoretic rough set models.
Int. J. Approx. Reasoning, 2016

Idology and Its Applications in Public Security and Network Security.
CoRR, 2016

A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.
Comput. J., 2016

Lightweight Fault Localization Combining with Fault-Context.
Proceedings of the International Conference on Software Analysis, Testing and Evolution, 2016

Weighted Control Flow Subgraph to Support Debugging Activities.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Estimating Urban Traffic Congestions with Multi-sourced Data.
Proceedings of the IEEE 17th International Conference on Mobile Data Management, 2016

Partial Order Reduction for State/Event Systems.
Proceedings of the Formal Methods and Software Engineering, 2016

On the Security of A Privacy-Preserving Product Calculation Scheme.
IEEE Trans. Dependable Sec. Comput., 2015

Model checking aircraft controller software: a case study.
Softw., Pract. Exper., 2015

A MDE-Based Approach to the Safety Verification of Extended SysML Activity Diagram.
JSW, 2015

Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing.
JCM, 2015

Verifying specifications with associated attributes in graph transformation systems.
Frontiers Comput. Sci., 2015

SGAM: strategy-proof group buying-based auction mechanism for virtual machine allocation in clouds.
Concurrency and Computation: Practice and Experience, 2015

Formal Semantics of Runtime Monitoring, Verification, Enforcement and Control.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

Using Game Theory to Analyze Strategic Choices of Service Providers and Service Requesters.
JSW, 2014

Verification of Behavior-aware Privacy Requirements in Web Services Composition.
JSW, 2014

The Application of SWRL Based Ontology Inference for Privacy Protection.
JSW, 2014

Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing.
J. Applied Mathematics, 2014

A Correctness Assurance Approach to Automatic Synthesis of Composite Web Services.
IEICE Transactions, 2014

OMReasoner: combination of multi-matchers for ontology matching: results for OAEI 2014.
Proceedings of the 9th International Workshop on Ontology Matching collocated with the 13th International Semantic Web Conference (ISWC 2014), 2014

Strategy-Proof Auction Mechanism with Group Price for Virtual Machine Allocation in Clouds.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014

Supporting negotiation mechanism privacy authority method in cloud computing.
Knowl.-Based Syst., 2013

Analyzing Temporal Constraints for Web Services Composition.
JSW, 2013

Two-Phase Classification Based on Three-Way Decisions.
Proceedings of the Rough Sets and Knowledge Technology - 8th International Conference, 2013

Minimal cut sequence generation for state/event fault trees.
Proceedings of the 2013 Middleware Doctoral Symposium, 2013

Self-adaptive semantic web service matching method.
Knowl.-Based Syst., 2012

Evolutionary Approaches for Multi-Objective Next Release Problem.
Computing and Informatics, 2012

OMReasoner: using multi-matchers and reasoner for ontology matching: results for OAEI 2012.
Proceedings of the 7th International Workshop on Ontology Matching, 2012

Feature modeling and Verification based on Description Logics.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012

A Graph Transformation Based Approach for Modeling Component-Level Migration in Mobile Environments.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Unified Modelling Functional and Non-Functional Aspects of Web Services Composition Using PTCCS 1.
Int. J. Web Service Res., 2011

Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms.
Expert Syst. Appl., 2011

Minimal privacy authorization in web services collaboration.
Computer Standards & Interfaces, 2011

OMReasoner: using reasoner for ontology matching: results for OAEI 2011.
Proceedings of the 6th International Workshop on Ontology Matching, 2011

An Improved Algorithm for Session Identification on Web Log.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

Making Architectural Decisions Based on Requirements: Analysis and Combination of Risk-Based and Quality Attribute-Based Methods.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

Modeling Service Composition Using Priced Probabilistic Process Algebra.
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010

An MDE Based Approach for Generating Software Architecture Models from Formal Specifications.
Proceedings of the 10th International Conference on Quality Software, 2010

Multi-objective Fuzzy Clustering Method for Image Segmentation Based on Variable-Length Intelligent Optimization Algorithm.
Proceedings of the Advances in Computation and Intelligence - 5th International Symposium, 2010

Towards a Formal Verification Approach for Business Process Coordination.
Proceedings of the IEEE International Conference on Web Services, 2010

Checking Structural Integrity for Metadata Repository Systems by Means of Description Logics.
Proceedings of the Database Systems for Advanced Applications, 2010

A Semantic Model for Matchmaking of Web Services Based on Description Logics.
Fundam. Inform., 2009

Modeling and Verification of Automatic Multi-business Transactions.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

A DL-based method for access control policy conflict detecting.
Proceedings of the First Asia-Pacific Symposium on Internetware, 2009

Modeling and Analysis of Flexible Transaction for Web Services.
Proceedings of the IEEE International Conference on Web Services, 2009

Modeling Cost-Aware Web Services Composition Using PTCCS.
Proceedings of the IEEE International Conference on Web Services, 2009

Role-based consistency verification for privacy-aware Web services.
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009

Reasoning about Web Services with Dynamic Description Logics.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Ensuring Coordination of Multi-business Interactions.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009

Conceptual modeling rules extracting for data streams.
Knowl.-Based Syst., 2008

Description Logic Based Consistency Checking upon Data Mining Metadata.
Proceedings of the Rough Sets and Knowledge Technology, Third International Conference, 2008

A Formal Method Support for Resource Modeling of Web Services Composition.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Polymorphism Sequence Diagrams Test Data Automatic Generation Based on OCL.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Support Web Services Composition with Optimal Cost Using PPA.
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008

Counterexample Generation for Probabilistic Timed Automata Model Checking.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Using Description Logics Reasoner for Ontology Matching.
Proceedings of the Workshop on Intelligent Information Technology Application, 2007

Fuzzy Implication Methods in Fuzzy Logic.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Research on the Rules of Mapping from Relational Model to OWL.
Proceedings of the OWLED*06 Workshop on OWL: Experiences and Directions, 2006

A Formal Framework for Reasoning on Metadata Based on CWM.
Proceedings of the Conceptual Modeling, 2006