Lin Deng
TitleCited byYear
Empirical Evaluation of the Statement Deletion Mutation Operator
L Deng, J Offutt, N Li
IEEE Sixth International Conference on Software Testing, Verification and†…, 2013
782013
Mutation Operators for Testing Android Apps
L Deng, J Offutt, P Ammann, N Mirzaei
Information and Software Technology, 2016
542016
Mutant Subsumption Graphs
B Kurtz, P Ammann, M Delamaro, J Offutt, L Deng
Tenth Workshop on Mutation Analysis (Mutation 2014), 2014
472014
Towards mutation analysis of Android apps
L Deng, N Mirzaei, P Ammann, J Offutt
Software Testing, Verification and Validation Workshops (ICSTW), 2015 IEEE†…, 2015
372015
Experimental evaluation of SDL and one-op mutation for C
ME Delamaro, L Deng, VHS Durelli, N Li, J Offutt
2014 IEEE Seventh International Conference on Software Testing, Verification†…, 2014
372014
Semi-supervised classification based on subspace sparse representation
G Yu, G Zhang, Z Zhang, Z Yu, L Deng
Knowledge and Information Systems 43 (1), 81-101, 2015
312015
Is bytecode instrumentation as good as source code instrumentation: An empirical study with industrial tools (experience report)
N Li, X Meng, J Offutt, L Deng
24th IEEE International Symposium on Software Reliability Engineering (ISSRE†…, 2013
242013
Barriers to Usable Security? Three Organizational Case Studies
D Caputo, S Pfleeger, A Sasse, P Ammann, J Offutt, L Deng
IEEE Security & Privacy 14, 22-32, 2016
232016
Growing a reduced set of mutation operators
ME Delamaro, L Deng, N Li, V Durelli, J Offutt
2014 Brazilian Symposium on Software Engineering, 81-90, 2014
122014
An experimental evaluation of web mutation operators
U Praphamontripong, J Offutt, L Deng, JJ Gu
2016 IEEE Ninth International Conference on Software Testing, Verification†…, 2016
92016
Is Mutation Analysis Effective at Testing Android Apps?
L Deng, J Offutt, D Samudio
2017 IEEE International Conference on Software Quality, Reliability and†…, 2017
62017
A resource-based approach to extend UML diagrams for web applications
L Deng, W Xu, S Frezza
2011 International Conference on Computer Science and Service System (CSSS†…, 2011
62011
A comprehensive model for management and validation of federal big data analytical systems
FA Batarseh, R Yang, L Deng
Big Data Analytics 2 (1), 2017
52017
A resource-based approach to formalize use case specification for web applications
W Xu, L Deng, Y Liu
2010 IEEE International Conference on Progress in Informatics and Computing†…, 2010
32010
Annotating Resources in Sequence Diagrams for Testing Web Security
W Xu, L Deng, Q Zheng
2012 Ninth International Conference on Information Technology-New†…, 2012
22012
Defects and Vulnerabilities in Smart Contracts, a Classification using the NIST Bugs Framework
W Dingman, A Cohen, N Ferrara, A Lynch, P Jasinski, PE Black, L Deng
International Journal of Networked and Distributed Computing 7 (3), 121-132, 2019
12019
Expansion of cyber attack data from unbalanced datasets using generative adversarial networks
T Merino, M Stillwell, M Steele, M Coplan, J Patton, A Stoyanov, L Deng
International Conference on Software Engineering Research, Management and†…, 2019
12019
Experimental Evaluation of Redundancy in Android Mutation Testing
L Deng, J Offutt
International Journal of Software Engineering and Knowledge Engineering 28†…, 2018
12018
Measurement of Source Code Readability Using Word Concreteness and Memory Retention of Variable Names
W Xu, D Xu, L Deng
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC†…, 2017
12017
Using stereo vision to construct 3-D surface models
W Xu, L Deng, Q Zheng, S Frezza
IEEE Potentials 31 (2), 31-37, 2012
12012
The system can't perform the operation now. Try again later.
Articles 1–20