Linzhang Wang
Linzhang Wang
Professor of Computer Science, Nanjing University
Verified email at - Homepage
Cited by
Cited by
Generating test cases from UML activity diagram based on gray-box method
W Linzhang, Y Jiesong, Y Xiaofeng, H Jun, L Xuandong, Z Guoliang
Software Engineering Conference, 2004. 11th Asia-Pacific, 284-291, 2004
Steering symbolic execution to less traveled paths
Y Li, Z Su, L Wang, X Li
ACM SIGPLAN Notices 48 (10), 19-32, 2013
UML activity diagram-based automatic test case generation for Java programs
M Chen, X Qiu, W Xu, L Wang, J Zhao, X Li
The Computer Journal 52 (5), 545-556, 2009
A threat model driven approach for security testing
L Wang, E Wong, D Xu
Proceedings of the Third International Workshop on Software Engineering for …, 2007
Toward online hybrid systems model checking of cyber-physical systems' time-bounded short-run behavior
L Bu, Q Wang, X Chen, L Wang, T Zhang, J Zhao, X Li
ACM SIGBED Review 8 (2), 7-10, 2011
BACH: Bounded reachability checker for linear hybrid automata
L Bu, Y Li, L Wang, X Li
Formal Methods in Computer-Aided Design, 2008. FMCAD'08, 1-4, 2008
An Automated Test Generation Technique for Software Quality Assurance
D Xu, W Xu, M Kent, L Thomas, L Wang
IEEE Transactions on Reliability 64 (1), 247-268, 2015
For Research Only
B Lei, L Wang, X Li
BovInspector: automatic inspection and repair of buffer overflow vulnerabilities
F Gao, L Wang, X Li
Proceedings of the 31st IEEE/ACM International Conference on Automated …, 2016
ATOM: Automatic Maintenance of GUI Test Scripts for Evolving Mobile Applications
X Li, N Chang, Y Wang, H Huang, Y Pei, L Wang, X Li
Software Testing, Verification and Validation (ICST), 2017 IEEE …, 2017
Selective restore: an energy efficient read disturbance mitigation scheme for future STT-MRAM
R Wang, L Jiang, Y Zhang, L Wang, J Yang
Proceedings of the 52nd Annual Design Automation Conference, 21, 2015
Design and Implementation of a Toolkit for Usability Testing of Mobile Apps
X Ma, B Yan, G Chen, C Zhang, K Huang, J Drury, L Wang
Mobile Networks and Applications 18 (1), 81-97, 2013
An empirical study on detecting and fixing buffer overflow bugs
T Ye, L Zhang, L Wang, X Li
2016 IEEE International Conference on Software Testing, Verification and …, 2016
Leveraging design rules to improve software architecture recovery
Y Cai, H Wang, S Wong, L Wang
Proceedings of the 9th international ACM Sigsoft conference on Quality of …, 2013
A model-driven development framework for enterprise Web services
X Yu, Y Zhang, T Zhang, L Wang, J Hu, J Zhao, X Li
Information Systems Frontiers 9 (4), 391-409, 2007
Dynamically Validating Static Memory Leak Warnings
M Li, Y Chen, L Wang, G Xu
ISSTA ’13, 2013
Automatic detection and validation of race conditions in interrupt-driven embedded software
Y Wang, L Wang, T Yu, J Zhao, X Li
Proceedings of the 26th ACM SIGSOFT International Symposium on Software …, 2017
BACH 2: B ounded reach A bility CH ecker for compositional linear hybrid systems
L Bu, Y Li, L Wang, X Chen, X Li
Proceedings of the Conference on Design, Automation and Test in Europe, 1512 …, 2010
Modeling and integrating aspects with UML activity diagrams
Z Cui, L Wang, X Li, D Xu
Proceedings of the 2009 ACM symposium on Applied Computing, 430-437, 2009
Change-based test script maintenance for android apps
N Chang, L Wang, Y Pei, SK Mondal, X Li
2018 IEEE International Conference on Software Quality, Reliability and …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20