


default search action
Jingyi Wang 0004
Person information
- affiliation: Zhejiang University, China
- affiliation (former): Singapore University of Technology and Design, Singapore
Other persons with the same name
- Jingyi Wang — disambiguation page
- Jingyi Wang 0001
— Shenzhen University, College of Mathematics and Statistics, Shenzhen, China - Jingyi Wang 0002
— University of Houston, Department of Electrical and Computer Engineering, Houston, TX, USA - Jingyi Wang 0003
— Jiangsu University, Zhenjiang, China - Jingyi Wang 0005
— University of British Columbia, Vancouver, Canada (and 1 more) - Jingyi Wang 0006
— Yunnan University of Finance and Economics, China - Jingyi Wang 0007
— Sichuan University, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j20]Xuran Li
, Jingyi Wang
, Xiaohan Yuan
, Wenhai Wang
:
A2R: A hybridactivation-attention framework for enhancing large language model reliability. Expert Syst. Appl. 306: 130922 (2026)
[j19]Xiangshan Gao
, Jingyi Wang
, Zhikun Zhang
, Jialuo Chen, Peng Cheng
, Jiming Chen
:
A2E: Black-Box Anti-Adversarial Example Based Watermarking to Verify Federated Unlearning. IEEE Trans. Dependable Secur. Comput. 23(1): 66-81 (2026)
[j18]Xiaoxia Liu
, Peng Di
, Cong Li
, Jun Sun
, Jingyi Wang
:
Efficient Function Orchestration for Large Language Models. IEEE Trans. Software Eng. 52(2): 411-427 (2026)
[e1]Étienne André
, Jingyi Wang
, Naijun Zhan:
Formal Methods and Software Engineering - 26th International Conference on Formal Engineering Methods, ICFEM 2025, Hangzhou, China, November 10-13, 2025, Proceedings. Lecture Notes in Computer Science 16229, Springer 2026, ISBN 978-981-95-4212-3 [contents]- 2025
[j17]Xiaohan Yuan
, Jinfeng Li
, Dongxia Wang
, Yuefeng Chen
, Xiaofeng Mao
, Longtao Huang
, Jialuo Chen
, Hui Xue
, Xiaoxia Liu
, Wenhai Wang
, Kui Ren
, Jingyi Wang
:
S-Eval: Towards Automated and Comprehensive Safety Evaluation for Large Language Models. Proc. ACM Softw. Eng. 2(ISSTA): 2136-2157 (2025)
[j16]Xiaokun Luan
, Xiyue Zhang
, Jingyi Wang
, Meng Sun
:
Protecting Deep Learning Model Copyrights With Adversarial Example-Free Reuse Detection. IEEE Trans. Neural Networks Learn. Syst. 36(10): 19187-19199 (2025)
[j15]Xiangxiang Chen
, Xingwei Lin
, Jingyi Wang
, Jun Sun
, Jiashui Wang
, Wenhai Wang
:
Scuzer: A Scheduling Optimization Fuzzer for TVM. ACM Trans. Softw. Eng. Methodol. 34(4): 102:1-102:28 (2025)
[j14]Shunkai Zhu
, Jun Sun
, Jingyi Wang
, Xingwei Lin
, Peng Cheng
:
OptSE: Toward Optimal Symbolic Execution. IEEE Trans. Software Eng. 51(7): 1934-1949 (2025)
[c34]Huan Sun
, David Sanán
, Jingyi Wang
, Yongwang Zhao
, Jun Sun
, Wenhai Wang
:
Generalized Security-Preserving Refinement for Concurrent Systems. CCS 2025: 2789-2803
[c33]Jianan Ma
, Jingyi Wang
, Qi Xuan
, Zhen Wang
:
Provable Repair of Deep Neural Network Defects by Preimage Synthesis and Property Refinement. CCS 2025: 4169-4183
[c32]Tianlin Li
, Qiang Hu
, Chong Wang
, Jian Zhang
, Wei Ma
, Aishan Liu, Jingyi Wang
, Yang Liu
:
An Analytical Perspective on Software Engineering for Large Language Models. ICECCS 2025: 489-494
[c31]Ziyu Mao, Jingyi Wang, Jun Sun, Shengchao Qin, Jiawen Xiong:
LLM-Aided Automatic Modeling for Security Protocol Verification. ICSE 2025: 642-654
[c30]Zhiming Chi, Jianan Ma, Pengfei Yang, Cheng-Chao Huang, Renjue Li, Jingyi Wang, Xiaowei Huang, Lijun Zhang:
Patch Synthesis for Property Repair of Deep Neural Networks. ICSE 2025: 1191-1203
[c29]Xinyao Xu
, Ziyu Mao
, Jianzhong Su
, Xingwei Lin
, David A. Basin
, Jun Sun
, Jingyi Wang
:
Quantitative Runtime Monitoring of Ethereum Transaction Attacks. WWW 2025: 4146-4159
[i38]Xiaoxia Liu, Peng Di, Cong Li, Jun Sun, Jingyi Wang:
Efficient Function Orchestration for Large Language Models. CoRR abs/2504.14872 (2025)
[i37]Xuran Li, Jingyi Wang, Xiaohan Yuan, Peixin Zhang, Zhan Qin, Zhibo Wang, Kui Ren:
PRUNE: A Patching Based Repair Framework for Certifiable Unlearning of Neural Networks. CoRR abs/2505.06520 (2025)
[i36]Xiangxiang Chen, Peixin Zhang, Jun Sun
, Wenhai Wang, Jingyi Wang:
Rounding-Guided Backdoor Injection in Deep Learning Model Quantization. CoRR abs/2510.09647 (2025)
[i35]Xuran Li, Jingyi Wang:
An Empirical Study of Sample Selection Strategies for Large Language Model Repair. CoRR abs/2510.20428 (2025)
[i34]Huan Sun, David Sanán, Jingyi Wang, Yongwang Zhao, Jun Sun, Wenhai Wang:
Generalized Security-Preserving Refinement for Concurrent Systems. CoRR abs/2511.06862 (2025)- 2024
[j13]Xiangshan Gao
, Xingjun Ma
, Jingyi Wang
, Youcheng Sun
, Bo Li, Shouling Ji
, Peng Cheng
, Jiming Chen
:
VeriFi: Towards Verifiable Federated Unlearning. IEEE Trans. Dependable Secur. Comput. 21(6): 5720-5736 (2024)
[j12]Zhe Zhao
, Guangke Chen
, Tong Liu
, Taishan Li
, Fu Song
, Jingyi Wang
, Jun Sun
:
Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples. ACM Trans. Softw. Eng. Methodol. 33(3): 68:1-68:45 (2024)
[j11]Shunkai Zhu
, Jingyi Wang
, Jun Sun
, Jie Yang
, Xingwei Lin
, Tian Wang, Liyi Zhang
, Peng Cheng:
Better Pay Attention Whilst Fuzzing. IEEE Trans. Software Eng. 50(2): 190-208 (2024)
[c28]Zichen Wang
, Jingyi Wang
, Fu Song
, Kun Wang
, Hongyi Pu
, Peng Cheng
:
K-RAPID: A Formal Executable Semantics of the RAPID Robot Programming Language. CPSS@AsiaCCS 2024: 64-76
[c27]Jianan Ma
, Pengfei Yang
, Jingyi Wang
, Youcheng Sun
, Cheng-Chao Huang
, Zhen Wang
:
VeRe: Verification Guided Synthesis for Repairing Deep Neural Networks. ICSE 2024: 8:1-8:13
[c26]Jialuo Chen
, Jingyi Wang
, Youcheng Sun
, Peng Cheng
, Jiming Chen
:
Isolation-Based Debugging for Neural Networks. ISSTA 2024: 338-349
[c25]Zuohui Chen
, Jun Zhou
, Youcheng Sun
, Jingyi Wang
, Qi Xuan
, Xiaoniu Yang
:
Interpretability Based Neural Network Repair. ISSTA 2024: 908-919
[c24]Xiangshan Gao
, Jialuo Chen
, Jingyi Wang
, Jie Shi
, Peng Cheng
, Jiming Chen
:
TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model Development. ISSTA 2024: 1479-1490
[c23]Jialuo Chen
, Jingyi Wang
, Xiyue Zhang
, Youcheng Sun
, Marta Kwiatkowska
, Jiming Chen, Peng Cheng
:
FAST: Boosting Uncertainty-based Test Prioritization Methods for Neural Networks via Feature Selection. ASE 2024: 895-906
[i33]Xiaohan Yuan
, Jinfeng Li, Dongxia Wang, Yuefeng Chen, Xiaofeng Mao, Longtao Huang, Hui Xue, Wenhai Wang, Kui Ren, Jingyi Wang:
S-Eval: Automatic and Adaptive Test Generation for Benchmarking Safety Evaluation of Large Language Models. CoRR abs/2405.14191 (2024)
[i32]Zhibo Wang
, Peng Kuang, Zhixuan Chu, Jingyi Wang, Kui Ren:
Towards Real World Debiasing: A Fine-grained Analysis On Spurious Correlation. CoRR abs/2405.15240 (2024)
[i31]Xiaokun Luan, Xiyue Zhang, Jingyi Wang, Meng Sun:
Protecting Deep Learning Model Copyrights with Adversarial Example-Free Reuse Detection. CoRR abs/2407.03883 (2024)
[i30]Kun Wang, Christopher M. Poskitt, Yang Sun, Jun Sun, Jingyi Wang, Peng Cheng, Jiming Chen:
μDrive: User-Controlled Autonomous Driving. CoRR abs/2407.13201 (2024)
[i29]Jialuo Chen, Jingyi Wang, Xiyue Zhang
, Youcheng Sun, Marta Kwiatkowska
, Jiming Chen, Peng Cheng:
FAST: Boosting Uncertainty-based Test Prioritization Methods for Neural Networks via Feature Selection. CoRR abs/2409.09130 (2024)
[i28]Yao Lu, Peixin Zhang, Jingyi Wang, Lei Ma, Xiaoniu Yang, Qi Xuan:
RedTest: Towards Measuring Redundancy in Deep Neural Networks Effectively. CoRR abs/2411.10507 (2024)- 2023
[j10]Yangyang Geng
, Yuqi Chen, Rongkuan Ma
, Qiang Wei
, Jie Pan, Jingyi Wang
, Peng Cheng, Qingxian Wang:
Defending Cyber-Physical Systems Through Reverse-Engineering-Based Memory Sanity Check. IEEE Internet Things J. 10(10): 8331-8347 (2023)
[j9]Yifan Jia
, Christopher M. Poskitt
, Peixin Zhang
, Jingyi Wang
, Jun Sun
, Sudipta Chattopadhyay
:
Boosting Adversarial Training in Safety-Critical Systems Through Boundary Data Selection. IEEE Robotics Autom. Lett. 8(12): 8350-8357 (2023)
[j8]Jialuo Chen
, Jingyi Wang
, Xingjun Ma
, Youcheng Sun
, Jun Sun
, Peixin Zhang
, Peng Cheng
:
QuoTe: Quality-oriented Testing for Deep Learning Systems. ACM Trans. Softw. Eng. Methodol. 32(5): 125:1-125:33 (2023)
[j7]Mengdi Zhang
, Jun Sun
, Jingyi Wang
, Bing Sun
:
TestSGD: Interpretable Testing of Neural Networks against Subtle Group Discrimination. ACM Trans. Softw. Eng. Methodol. 32(6): 137:1-137:24 (2023)
[j6]Kun Wang
, Jingyi Wang
, Christopher M. Poskitt
, Xiangxiang Chen
, Jun Sun
, Peng Cheng:
K-ST: A Formal Executable Semantics of the Structured Text Language for PLCs. IEEE Trans. Software Eng. 49(10): 4796-4813 (2023)
[c22]Wenya Wang
, Xingwei Lin
, Jingyi Wang
, Wang Gao
, Dawu Gu
, Wei Lv
, Jiashui Wang
:
HODOR: Shrinking Attack Surface on Node.js via System Call Limitation. CCS 2023: 2800-2814
[c21]Weipeng Jiang, Chao Shen, Chenhao Lin, Jingyi Wang, Jun Sun, Xuanqi Gao:
Black-Box Fairness Testing with Shadow Models. ICICS 2023: 467-484
[c20]Jialuo Chen, Youcheng Sun, Jingyi Wang, Peng Cheng, Xingjun Ma:
DEEPJUDGE: A Testing Framework for Copyright Protection of Deep Learning Models. ICSE Companion 2023: 64-67
[c19]Huizhong Guo
, Jinfeng Li, Jingyi Wang, Xiangyu Liu, Dongxia Wang, Zehong Hu, Rong Zhang, Hui Xue:
FairRec: Fairness Testing for Deep Recommender Systems. ISSTA 2023: 310-321
[i27]Huizhong Guo, Jinfeng Li, Jingyi Wang, Xiangyu Liu, Dongxia Wang, Zehong Hu, Rong Zhang, Hui Xue:
FairRec: Fairness Testing for Deep Recommender Systems. CoRR abs/2304.07030 (2023)
[i26]Wenya Wang, Xingwei Lin, Jingyi Wang, Wang Gao, Dawu Gu, Wei Lv, Jiashui Wang:
HODOR: Shrinking Attack Surface on Node.js via System Call Limitation. CoRR abs/2306.13984 (2023)
[i25]Xiaoxia Liu, Jingyi Wang, Jun Sun, Xiaohan Yuan, Guoliang Dong, Peng Di
, Wenhai Wang, Dongxia Wang:
Prompting Frameworks for Large Language Models: A Survey. CoRR abs/2311.12785 (2023)- 2022
[j5]Mengdi Zhang
, Jun Sun, Jingyi Wang:
Which neural network makes more explainable decisions? An approach towards measuring explainability. Autom. Softw. Eng. 29(2): 39 (2022)
[j4]Peixin Zhang
, Jingyi Wang
, Jun Sun
, Xinyu Wang
, Guoliang Dong, Xingen Wang
, Ting Dai, Jin Song Dong:
Automatic Fairness Testing of Neural Classifiers Through Adversarial Sampling. IEEE Trans. Software Eng. 48(9): 3593-3612 (2022)
[c18]Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, Jinyin Chen:
NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification. ICSE 2022: 1519-1531
[c17]Jialuo Chen
, Jingyi Wang, Tinglan Peng, Youcheng Sun
, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, Dawn Song:
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models. SP 2022: 824-841
[c16]Guoliang Dong, Jingyi Wang, Jun Sun, Sudipta Chattopadhyay, Xinyu Wang, Ting Dai, Jie Shi, Jin Song Dong:
Repairing Adversarial Texts Through Perturbation. TASE 2022: 29-48
[i24]Guoliang Dong, Jingyi Wang, Jun Sun, Sudipta Chattopadhyay, Xinyu Wang, Ting Dai, Jie Shi, Jin Song Dong:
Repairing Adversarial Texts through Perturbation. CoRR abs/2201.02504 (2022)
[i23]Kun Wang, Jingyi Wang, Christopher M. Poskitt, Xiangxiang Chen, Jun Sun, Peng Cheng:
K-ST: A Formal Executable Semantics of PLC Structured Text Language. CoRR abs/2202.04076 (2022)
[i22]Xiangshan Gao, Xingjun Ma, Jingyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng, Jiming Chen:
VeriFi: Towards Verifiable Federated Unlearning. CoRR abs/2205.12709 (2022)
[i21]Mengdi Zhang, Jun Sun, Jingyi Wang, Bing Sun:
TESTSGD: Interpretable Testing of Neural Networks Against Subtle Group Discrimination. CoRR abs/2208.11321 (2022)
[i20]Rongkuan Ma, Qiang Wei, Jingyi Wang, Shunkai Zhu, Shouling Ji, Peng Cheng, Yan Jia, Qingxian Wang:
Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study. CoRR abs/2212.14296 (2022)- 2021
[j3]Yifan Jia, Jingyi Wang, Christopher M. Poskitt
, Sudipta Chattopadhyay, Jun Sun
, Yuqi Chen:
Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems. Int. J. Crit. Infrastructure Prot. 34: 100452 (2021)
[j2]Jingyi Wang
, Jun Sun, Shengchao Qin
, Cyrille Jégourel
:
Automatically 'Verifying' Discrete-Time Complex Systems through Learning, Abstraction and Refinement. IEEE Trans. Software Eng. 47(1): 189-203 (2021)
[c15]Jingyi Wang, Jialuo Chen
, Youcheng Sun
, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng:
RobOT: Robustness-Oriented Testing for Deep Learning Systems. ICSE 2021: 300-311
[c14]Zhe Zhao
, Guangke Chen
, Jingyi Wang, Yiwei Yang
, Fu Song, Jun Sun
:
Attack as defense: characterizing adversarial examples using robustness. ISSTA 2021: 42-55
[c13]Pengfei Yang
, Renjue Li
, Jianlin Li
, Cheng-Chao Huang
, Jingyi Wang
, Jun Sun
, Bai Xue
, Lijun Zhang
:
Improving Neural Network Verification through Spurious Region Guided Refinement. TACAS (1) 2021: 389-408
[i19]Jingyi Wang, Jialuo Chen, Youcheng Sun, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng:
RobOT: Robustness-Oriented Testing for Deep Learning Systems. CoRR abs/2102.05913 (2021)
[i18]Zhe Zhao, Guangke Chen, Jingyi Wang, Yiwei Yang, Fu Song, Jun Sun:
Attack as Defense: Characterizing Adversarial Examples using Robustness. CoRR abs/2103.07633 (2021)
[i17]Yifan Jia, Jingyi Wang, Christopher M. Poskitt
, Sudipta Chattopadhyay, Jun Sun, Yuqi Chen:
Adversarial Attacks and Mitigation for Anomaly Detectors of Cyber-Physical Systems. CoRR abs/2105.10707 (2021)
[i16]Peixin Zhang, Jingyi Wang, Jun Sun, Xinyu Wang, Guoliang Dong, Xingen Wang, Ting Dai, Jin Song Dong:
Automatic Fairness Testing of Neural Classifiers through Adversarial Sampling. CoRR abs/2107.08176 (2021)
[i15]Peixin Zhang, Jingyi Wang, Jun Sun, Xinyu Wang:
Fairness Testing of Deep Image Classification with Adequacy Metrics. CoRR abs/2111.08856 (2021)
[i14]Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun
, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, Dawn Song:
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models. CoRR abs/2112.05588 (2021)
[i13]Shunkai Zhu, Jingyi Wang, Jun Sun, Jie Yang, Xingwei Lin, Liyi Zhang, Peng Cheng:
Better Pay Attention Whilst Fuzzing. CoRR abs/2112.07143 (2021)
[i12]Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, Jinyin Chen:
NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification. CoRR abs/2112.13214 (2021)- 2020
[c12]Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Ting Dai:
An Empirical Study on Correlation between Coverage and Robustness for Deep Neural Networks. ICECCS 2020: 73-82
[c11]Peixin Zhang, Jingyi Wang, Jun Sun, Guoliang Dong, Xinyu Wang, Xingen Wang, Jin Song Dong, Ting Dai:
White-box fairness testing through adversarial sampling. ICSE 2020: 949-960
[c10]Guoliang Dong, Jingyi Wang, Jun Sun, Yang Zhang, Xinyu Wang, Ting Dai, Jin Song Dong, Xingen Wang:
Towards Interpreting Recurrent Neural Networks through Probabilistic Abstraction. ASE 2020: 499-510
[i11]Pengfei Yang, Renjue Li, Jianlin Li
, Cheng-Chao Huang, Jingyi Wang, Jun Sun, Bai Xue, Lijun Zhang:
Improving Neural Network Verification through Spurious Region Guided Refinement. CoRR abs/2010.07722 (2020)
[i10]Guoliang Dong, Jun Sun, Jingyi Wang, Xinyu Wang, Ting Dai:
Towards Repairing Neural Networks Correctly. CoRR abs/2012.01872 (2020)
2010 – 2019
- 2019
[c9]Jingyi Wang, Guoliang Dong, Jun Sun, Xinyu Wang, Peixin Zhang:
Adversarial sample detection for deep neural network through model mutation testing. ICSE 2019: 1245-1256
[i9]Guoliang Dong, Jingyi Wang, Jun Sun, Yang Zhang, Xinyu Wang, Ting Dai, Jin Song Dong:
Analyzing Recurrent Neural Network by Probabilistic Abstraction. CoRR abs/1909.10023 (2019)
[i8]Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting:
There is Limited Correlation between Coverage and Robustness for Deep Neural Networks. CoRR abs/1911.05904 (2019)- 2018
[j1]Jingyi Wang, Jun Sun, Qixia Yuan, Jun Pang:
Learning probabilistic models for model checking: an evolutionary approach and an empirical study. Int. J. Softw. Tools Technol. Transf. 20(6): 689-704 (2018)
[c8]Cyrille Jégourel, Jingyi Wang, Jun Sun:
Importance Sampling of Interval Markov Chains. DSN 2018: 303-313
[c7]Jingyi Wang, Jun Sun, Yifan Jia, Shengchao Qin
, Zhiwu Xu:
Towards 'Verifying' a Water Treatment System. FM 2018: 73-92
[c6]Xinyu Wang, Jun Sun, Zhenbang Chen, Peixin Zhang, Jingyi Wang, Yun Lin:
Towards optimal concolic testing. ICSE 2018: 291-302
[i7]Jingyi Wang, Jun Sun, Peixin Zhang, Xinyu Wang:
Detecting Adversarial Samples for Deep Neural Networks through Mutation Testing. CoRR abs/1805.05010 (2018)
[i6]Jingyi Wang, Guoliang Dong, Jun Sun, Xinyu Wang, Peixin Zhang:
Adversarial Sample Detection for Deep Neural Network through Model Mutation Testing. CoRR abs/1812.05793 (2018)- 2017
[c5]Jingyi Wang, Jun Sun
, Qixia Yuan, Jun Pang:
Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study. FASE 2017: 3-21
[c4]Long H. Pham, Jun Sun, Lyly Tran Thi, Jingyi Wang, Xin Peng:
Learning Likely Invariants to Explain Why a Program Fails. ICECCS 2017: 70-79
[c3]Jingyi Wang, Xiaohong Chen, Jun Sun
, Shengchao Qin:
Improving Probability Estimation Through Active Probabilistic Model Learning. ICFEM 2017: 379-395
[i5]Jingyi Wang, Jun Sun, Yifan Jia:
Toward 'verifying' a Water Treatment System. CoRR abs/1712.04155 (2017)- 2016
[c2]Pingfan Kong, Yi Li, Xiaohong Chen, Jun Sun
, Meng Sun, Jingyi Wang:
Towards Concolic Testing for Hybrid Systems. FM 2016: 460-478
[c1]Manman Chen, Tian Huat Tan, Jun Sun
, Jingyi Wang, Yang Liu
, Jing Sun, Jin Song Dong:
Service Adaptation with Probabilistic Partial Models. ICFEM 2016: 122-140
[i4]Jingyi Wang, Jun Sun, Qixia Yuan, Jun Pang:
Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study. CoRR abs/1605.08278 (2016)
[i3]Pingfan Kong, Yi Li, Xiaohong Chen, Jun Sun, Meng Sun, Jingyi Wang:
Towards Concolic Testing for Hybrid Systems. CoRR abs/1608.08754 (2016)
[i2]Jingyi Wang, Jun Sun, Shengchao Qin:
Verifying Complex Systems Probabilistically through Learning, Abstraction and Refinement. CoRR abs/1610.06371 (2016)
[i1]Jun Sun, Long H. Pham, Lyly Tran Thi, Jingyi Wang, Xin Peng:
Learning Likely Invariants to Explain Why a Program Fails. CoRR abs/1610.08607 (2016)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-19 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







