Name
Papers
Collaborators
XIAN ZHANG
44
103
Citations 
PageRank 
Referers 
112
18.22
261
Referees 
References 
504
266
Search Limit
100504
Title
Citations
PageRank
Year
On identifiability of discrete-time nonlinearly parameterized systems00.342022
AMCheX: Accurate Analysis of Missing-Check Bugs for Linux Kernel00.342021
Simplify Array Processing Loops for Efficient Program Verification00.342021
Online 3-D Trajectory Design for UAV-Enabled Communications with User Mobility and UAV Kinematic Constraints.00.342021
DRA U-Net - An Attention based U-Net Framework for 2D Medical Image Segmentation.00.342021
Biological Tissue Damage Monitoring Method Based on IMWPE and PNN during HIFU Treatment.00.342021
MulCode: A Multi-task Learning Approach for Source Code Understanding10.352021
An Improved Firefly Algorithm for Software Defect Prediction.00.342020
Runtime Verification on Hierarchical Properties of ROS-Based Robot Swarms00.342020
Iterative Controller Synthesis for Multirobot System00.342020
Decentralized Runtime Enforcement For Robotic Swarms00.342020
Collective intelligence for smarter neural program synthesis00.342020
Boosting component-based synthesis with API usage knowledge00.342020
Symbolic verification of message passing interface programs40.412020
基于非局部相似联合低秩表示的高光谱图像去噪 (Hyperspectral Images Denoising Based on Non-local Similarity Joint Low-rank Representation).00.342020
Prosy: Api-Based Synthesis With Probabilistic Model00.342020
Modified condition/decision coverage (MC/DC) oriented compiler optimization for symbolic execution00.342020
How Much Support Can Api Recommendation Methods Provide For Component-Based Synthesis?00.342020
Accuracy Improvement For Neural Program Synthesis Via Attention Mechanism And Program Slicing00.342020
改进的神经语言模型及其在代码提示中的应用 (Modified Neural Language Model and Its Application in Code Suggestion).00.342019
Characteristics of Spatial Magnetic Field of Coupling Mechanism with Magnetic Shield in Wireless Charging System.00.342019
NotOnlyLog: Mining Patch-Log Associations from Software Evolution History to Enhance Failure Diagnosis Capability00.342018
Guide Fuzzing with Multi-Factor Potential Analysis00.342018
Automatic Exploit Generation for Buffer Overflow Vulnerabilities00.342018
User Identification with Spatio-Temporal Awareness across Social Networks.00.342018
Monitor Synthesis for Parametric MTL Properties in Discrete Control Software00.342017
Unified Access Layer with PostgreSQL FDW for Heterogeneous Databases.00.342017
RSVP-TE Signaling Procedure for End-to-End GMPLS Restoration and Resource Sharing.00.342017
Optimizing Monitor Code Based on Patterns in Runtime Verification00.342017
Towards verification of computation orchestration20.372014
Challenges, Experiences and Lessons Learned from Deploying Patient Monitoring and Assistance System at Dementia Care Hostel.00.342013
ACARP: auto correct activity recognition rules using process analysis toolkit (PAT)30.472012
Formal Analysis of Pervasive Computing Systems70.512012
Runtime verification with predictive semantics80.492012
An event pattern language for runtime monitoring based on AOP.00.342011
Modeling and Analyzing Timed Security Protocols Using Extended Timed CSP00.342010
Verifying Stateful Timed CSP Using Implicit Clocks and Zone Abstraction211.102009
Automating Software FMEA via Formal Analysis of Dependence Relations50.462008
Specifying and Verifying Sensor Networks: An Experiment of Formal Methods120.582008
Verification of computation orchestration via timed automata301.322006
A reasoning method for timed CSP based on constraint solving150.962006
HighSpec: a tool for building and checking OZTA models30.362006
The semantics and tool support of OZTA10.382005
Real Solutions of the Equation Φt(A)=1/nJn.00.342000