
Zhiqiu Huang
Zhi-qiu Huang – Huang Zhiqiu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j79]Shuyu Bian, Guohua Shen, Zhiqiu Huang, Yang Yang, Jinghan Li, Xiaoyu Zhang:
PABC: A Patent Application System Based on Blockchain. IEEE Access 9: 4199-4210 (2021) - [j78]Yuxuan Zhang, Senzhang Wang, Bing Chen, Jiannong Cao, Zhiqiu Huang:
TrafficGAN: Network-Scale Deep Traffic Prediction With Generative Adversarial Nets. IEEE Trans. Intell. Transp. Syst. 22(1): 219-230 (2021) - 2020
- [j77]Yasir Hussain
, Huang Zhiqiu
, Muhammad Azeem Akbar
, Ahmed Alsanad
, Abeer Abdul-Aziz Alsanad, Asif Nawaz
, Izhar Ahmed Khan
, Zaheer Ullah Khan
:
Context-Aware Trust and Reputation Model for Fog-Based IoT. IEEE Access 8: 31622-31632 (2020) - [j76]Jingxuan Zhang
, Siyuan Liu, Junpeng Luo, Jiahui Liang, Zhiqiu Huang
:
Exploring the Characteristics of Identifiers: A Large-Scale Empirical Study on 5, 000 Open Source Projects. IEEE Access 8: 140607-140620 (2020) - [j75]Chuanqi Tao, Panpan Bao, Zhiqiu Huang:
Code line generation based on deep context-awareness of onsite programming. Sci. China Inf. Sci. 63(9): 1-3 (2020) - [j74]Yan Cao, Zhiqiu Huang, Yaoshen Yu, Changbo Ke, Zihao Wang:
A topology and risk-aware access control framework for cyber-physical space. Frontiers Comput. Sci. 14(4): 144805 (2020) - [j73]Yasir Hussain, Zhiqiu Huang, Yu Zhou, Senzhang Wang:
Deep Transfer Learning for Source Code Modeling. Int. J. Softw. Eng. Knowl. Eng. 30(5): 649-668 (2020) - [j72]Chuanqi Tao, Hongjing Guo, Zhiqiu Huang:
Identifying security issues for mobile applications based on user review summarization. Inf. Softw. Technol. 122: 106290 (2020) - [j71]Yasir Hussain
, Zhiqiu Huang, Yu Zhou
, Senzhang Wang:
CodeGRU: Context-aware deep learning with gated recurrent unit for source code modeling. Inf. Softw. Technol. 125: 106309 (2020) - [j70]Wenhua Yang, Minxue Pan
, Yu Zhou
, Zhiqiu Huang:
Developer portraying: A quick approach to understanding developers on OSS platforms. Inf. Softw. Technol. 125: 106336 (2020) - [j69]Weiwei Li, Wenzhou Zhang, Xiuyi Jia, Zhiqiu Huang:
Effort-Aware semi-Supervised just-in-Time defect prediction. Inf. Softw. Technol. 126: 106364 (2020) - [j68]Wenhua Yang, Chang Xu, Haibo Ye, Yu Zhou, Zhiqiu Huang:
智能化信息物理系统中非确定性的分类研究 (Taxonomy of Uncertainty Factors in Intelligence-oriented Cyber-physical Systems). 计算机科学 47(3): 11-18 (2020) - [j67]Yunfan Zhang, Yu Zhou, Zhiqiu Huang:
基于语义相似度的API使用模式推荐 (Semantic Similarity Based API Usage Pattern Recommendation). 计算机科学 47(3): 34-40 (2020) - [j66]Tianbao Du, Guohua Shen
, Zhi-qiu Huang, Yaoshen Yu, Dexiang Wu:
Automatic traceability link recovery via active learning. Frontiers Inf. Technol. Electron. Eng. 21(8): 1217-1225 (2020) - [j65]Asif Nawaz, Zhiqiu Huang, Senzhang Wang, Muhammad Azeem Akbar, Hussain Alsalman, Abdu Gumaei:
GPS Trajectory Completion Using End-to-End Bidirectional Convolutional Recurrent Encoder-Decoder Architecture with Attention Mechanism. Sensors 20(18): 5143 (2020) - [j64]Muhammad Azeem Akbar
, Sajjad Mahmood
, Zhiqiu Huang, Arif Ali Khan
, Mohammad Shameem
:
Readiness model for requirements change management in global software development. J. Softw. Evol. Process. 32(10) (2020) - [j63]Yunfei Meng
, Zhiqiu Huang
, Guohua Shen
, Changbo Ke
:
SDN-Based Security Enforcement Framework for Data Sharing Systems of Smart Healthcare. IEEE Trans. Netw. Serv. Manag. 17(1): 308-318 (2020) - [j62]Fei Wang
, Zhibin Yang
, Zhi-qiu Huang
, Chengwei Liu, Yong Zhou, Jean-Paul Bodeveix, Mamoun Filali:
An Approach to Generate the Traceability Between Restricted Natural Language Requirements and AADL Models. IEEE Trans. Reliab. 69(1): 154-173 (2020) - [j61]Senzhang Wang, Jiannong Cao, Hao Chen, Hao Peng, Zhiqiu Huang:
SeqST-GAN: Seq2Seq Generative Adversarial Nets for Multi-step Urban Crowd Flow Prediction. ACM Trans. Spatial Algorithms Syst. 6(4): 22:1-22:24 (2020) - [c49]Asif Nawaz, Zhiqiu Huang, Senzhang Wang, Amara Naseer:
Deep neural architecture for geospatial trajectory completion over occupancy gridmap. CLOUD 2020: 37-39 - [c48]Asif Nawaz, Zhiqiu Huang, Senzhang Wang:
SSMDL: Semi-supervised Multi-task Deep Learning for Transportation Mode Classification and Path Prediction with GPS Trajectories. APWeb/WAIM (2) 2020: 391-405 - [c47]Senzhang Wang, Hao Miao, Hao Chen, Zhiqiu Huang:
Multi-task Adversarial Spatial-Temporal Networks for Crowd Flow Prediction. CIKM 2020: 1555-1564 - [c46]Muhammad Azeem Akbar, Zhiqiu Huang, Yu Zhou, Faisal Mehmood, Yasir Hussain, Muhammad Hamza:
Towards continues code recommendation and implementation system: An Initial Framework. EASE 2020: 439-444 - [i9]Yu Zhou, Xinying Yang, Taolue Chen, Zhiqiu Huang, Xiaoxing Ma, Harald C. Gall:
Boosting API Recommendation with Implicit Feedback. CoRR abs/2002.01264 (2020) - [i8]Yunfei Meng, Zhiqiu Huang, Senzhang Wang, Guohua Shen, Changbo Ke:
SOM-based DDoS Defense Mechanism using SDN for the Internet of Things. CoRR abs/2003.06834 (2020) - [i7]Yunfei Meng, Zhiqiu Huang, Guohua Shen, Changbo Ke:
A Security Policy Model Transformation and Verification Approach for Software Defined Networking. CoRR abs/2005.13206 (2020)
2010 – 2019
- 2019
- [j60]Haibo Ye
, Li Sheng, Tao Gu, Zhiqiu Huang:
SELoc: Collect Your Location Data Using Only a Barometer Sensor. IEEE Access 7: 88705-88717 (2019) - [j59]Dexiang Wu
, Guohua Shen
, Zhi-qiu Huang
, Yan Cao, Tianbao Du:
A Trust-Aware Task Offloading Framework in Mobile Edge Computing. IEEE Access 7: 150105-150119 (2019) - [j58]Yan Cao, Zhiqiu Huang, Changbo Ke, Jian Xie, Jin Wang:
A topology-aware access control model for collaborative cyber-physical spaces: Specification and verification. Comput. Secur. 87 (2019) - [j57]Yong Wang, Zhiqiu Huang, Yong Li, Rongcun Wang, Qiao Yu:
Spectrum-Based Fault Localization Framework to Support Fault Understanding. IEICE Trans. Inf. Syst. 102-D(4): 863-866 (2019) - [j56]Changbo Ke, Zhiqiu Huang, Jiayu Wu:
面向大数据的隐私发布暴露检测方法 (Big Data Oriented Privacy Disclosure Detection Method for Information Release). 计算机科学 46(10): 148-153 (2019) - [j55]Yu Zhou
, Xin Yan
, Wenhua Yang, Taolue Chen
, Zhiqiu Huang:
Augmenting Java method comments generation with context information based on neural networks. J. Syst. Softw. 156: 328-340 (2019) - [j54]Haibo Ye
, Kai Dong, Tao Gu, Zhiqiu Huang:
SMinder: Detect a Left-behind Phone using Sensor-based Context Awareness. Mob. Networks Appl. 24(1): 171-183 (2019) - [j53]Senzhang Wang
, Xiaoming Zhang
, Fengxiang Li, Philip S. Yu, Zhiqiu Huang:
Efficient Traffic Estimation With Multi-Sourced Data by Parallel Coupled Hidden Markov Model. IEEE Trans. Intell. Transp. Syst. 20(8): 3010-3023 (2019) - [c45]Lei Ai, Zhiqiu Huang, Weiwei Li, Yu Zhou, Yaoshen Yu:
SENSORY: Leveraging Code Statement Sequence Information for Code Snippets Recommendation. COMPSAC (1) 2019: 27-36 - [i6]Yasir Hussain, Zhiqiu Huang, Senzhang Wang, Yu Zhou:
CodeGRU: Context-aware Deep Learning with Gated Recurrent Unit for Source Code Modeling. CoRR abs/1903.00884 (2019) - [i5]Yu Zhou, Yanqi Su, Taolue Chen, Zhiqiu Huang, Harald C. Gall, Sebastiano Panichella:
User Review-Based Change File Localization for Mobile Applications. CoRR abs/1903.00894 (2019) - [i4]Yunfei Meng, Zhiqiu Huang, Senzhang Wang, Yu Zhou, Guohua Shen, Changbo Ke:
Behavior-aware Service Access Control Mechanism using Security Policy Monitoring for SOA Systems. CoRR abs/1908.10201 (2019) - [i3]Yasir Hussain, Zhiqiu Huang, Yu Zhou, Senzhang Wang:
Deep Transfer Learning for Source Code Modeling. CoRR abs/1910.05493 (2019) - [i2]Yasir Hussain, Zhiqiu Huang, Yu Zhou, Senzhang Wang:
DeepVS: An Efficient and Generic Approach for Source Code Modeling Usage. CoRR abs/1910.06500 (2019) - 2018
- [j52]Yong Wang
, Zhiqiu Huang, BingWu Fang, Yong Li
:
Spectrum-Based Fault Localization via Enlarging Non-Fault Region to Improve Fault Absolute Ranking. IEEE Access 6: 8925-8933 (2018) - [j51]Haibo Ye
, Wenhua Yang, Yunyu Yao, Tao Gu, Zhiqiu Huang:
BTrack: Using Barometer for Energy Efficient Location Tracking on Mountain Roads. IEEE Access 6: 66998-67009 (2018) - [j50]Liming Fang, Chunpeng Ge, Zhiqiu Huang, Jiandong Wang:
Privacy preserving cloud data sharing system with flexible control. Comput. Electr. Eng. 70: 978-986 (2018) - [j49]Shuanglong Kan, Zhiqiu Huang:
Partial Order Reduction for the full Class of State/Event Linear Temporal Logic. Comput. J. 61(5): 629-644 (2018) - [j48]Yunfei Meng, Zhiqiu Huang, Yu Zhou, Changbo Ke:
Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities. Future Gener. Comput. Syst. 86: 1-11 (2018) - [j47]Yong Wang
, Zhiqiu Huang, Rongcun Wang, Qiao Yu:
Spectrum-Based Fault Localization Using Fault Triggering Model to Refine Fault Ranking List. IEICE Trans. Inf. Syst. 101-D(10): 2436-2446 (2018) - [j46]Jia-xin Jiang
, Zhi-qiu Huang, Wei-wei Ma, Yan Cao:
Using information flow analysis to detect implicit information leaks for web service composition. Frontiers Inf. Technol. Electron. Eng. 19(4): 494-502 (2018) - [j45]Huanfeng Peng, Zhi-qiu Huang
, LinYuan Liu, Yong Li, Dajuan Fan, Yu-qing Wang:
Preserving privacy information flow security in composite service evolution. Frontiers Inf. Technol. Electron. Eng. 19(5): 626-638 (2018) - [j44]Shuanglong Kan, Zhiqiu Huang:
Detecting safety-related components in statecharts through traceability and model slicing. Softw. Pract. Exp. 48(3): 428-448 (2018) - [c44]Min Yuan, Zhiqiu Huang:
Efficient Verification of Service-Based Applications for Flexible Modeling. SCC 2018: 97-104 - [c43]Yasir Hussain, Zhiqiu Huang:
TRFIoT: Trust and Reputation Model for Fog-based IoT. ICCCS (6) 2018: 187-198 - [c42]Zhe Chen, Junqi Yan, Wenming Li, Ju Qian, Zhiqiu Huang:
Runtime verification of memory safety via source transformation. ICSE (Companion Volume) 2018: 264-265 - [c41]Jinmiao Xu, Zhibin Yang, Zhiqiu Huang, Yong Zhou, Chengwei Liu, Lei Xue, Jean-Paul Bodeveix, Mamoun Filali:
Hierarchical Behavior Annex: Towards an AADL Functional Specification Extension. MEMOCODE 2018: 88-98 - 2017
- [j43]Changbo Ke
, Zhiqiu Huang, Xiaohui Cheng:
Privacy Disclosure Checking Method Applied on Collaboration Interactions Among SaaS Services. IEEE Access 5: 15080-15092 (2017) - [j42]Yong Li
, Zhiqiu Huang, Yong Wang
, BingWu Fang:
Evaluating Data Filter on Cross-Project Defect Prediction: Comparison and Improvements. IEEE Access 5: 25646-25656 (2017) - [j41]Weiwei Li
, Shuanglong Kan, Zhiqiu Huang:
A Better Translation From LTL to Transition-Based Generalized Büchi Automata. IEEE Access 5: 27081-27090 (2017) - [j40]Yong Wang, Zhiqiu Huang, Yong Li, BingWu Fang:
Lightweight fault localization combined with fault context to improve fault absolute rank. Sci. China Inf. Sci. 60(9): 092113:1-092113:16 (2017) - [j39]Chi Zhang, Zhiqiu Huang, Zewen Ding:
支持抽象解释的静态分析方法的形式化体系研究 (Research on Static Analysis Formalism Supporting Abstract Interpretation). 计算机科学 44(12): 126-130 (2017) - [j38]Changbo Ke, Zhiqiu Huang, Fu Xiao:
基于本体概念相似度的软件构件检索方法 (Software Component Retrieval Method Based on Ontology Concept Similarity). 计算机科学 44(12): 144-149 (2017) - [j37]Shuanglong Kan, Zhiqiu Huang, Zhe Chen, Weiwei Li, Yutao Huang:
Partial order reduction for checking LTL formulae with the next-time operator. J. Log. Comput. 27(4): 1095-1131 (2017) - [j36]BingWu Fang, Zhiqiu Huang, Yong Li, Yong Wang:
υ-Support vector machine based on discriminant sparse neighborhood preserving embedding. Pattern Anal. Appl. 20(4): 1077-1089 (2017) - [j35]Yi Zhu, Zhiqiu Huang, Hang Zhou:
Modeling and verification of Web services composition based on model transformation. Softw. Pract. Exp. 47(5): 709-730 (2017) - [j34]Yinling Liu
, Guohua Shen, Zhiqiu Huang, Zhibin Yang:
Quantitative risk analysis of safety-critical embedded systems. Softw. Qual. J. 25(2): 503-527 (2017) - [j33]Senzhang Wang, Xiaoming Zhang, Jianping Cao, Lifang He
, Leon Stenneth, Philip S. Yu, Zhoujun Li, Zhiqiu Huang:
Computing Urban Traffic Congestions by Incorporating Sparse GPS Probe Data and Social Media Data. ACM Trans. Inf. Syst. 35(4): 40:1-40:30 (2017) - [c40]Yu Zhou, Ruihang Gu, Taolue Chen, Zhiqiu Huang, Sebastiano Panichella, Harald C. Gall
:
Analyzing APIs documentation and code to detect directive defects. ICSE 2017: 27-37 - [c39]Mirza Khudadad, Zhiqiu Huang:
Intrusion Detection with Tree-Based Data Mining Classification Techniques by Using KDD. MLICOM (2) 2017: 294-303 - [c38]Qi Zhang, Zhiqiu Huang, Jian Xie:
Distributed System Model Using SysML and Event-B. MLICOM (1) 2017: 326-336 - [c37]Shenghui Su, Jianhua Zheng, Shuwang Lü, Zhiqiu Huang, Zhoujun Li, Zhenmin Tang
:
Idology and Its Applications in Public Security and Network Security. PAISI 2017: 129-149 - 2016
- [j32]Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren:
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles. Comput. J. 59(7): 970-982 (2016) - [j31]Weiwei Li, Zhiqiu Huang, Xiuyi Jia, Xinye Cai:
Neighborhood based decision-theoretic rough set models. Int. J. Approx. Reason. 69: 1-17 (2016) - [j30]Yi Zhu, Zhiqiu Huang, Guangquan Zhang, Hang Zhou, Fangxiong Xiao:
Multi-Resource Modeling of Real-Time Software Based on Resource Timed Process Algebra. Int. J. Softw. Eng. Knowl. Eng. 26(7): 1099-1116 (2016) - [j29]Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi:
Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distributed Comput. 89: 1-12 (2016) - [j28]Xueming Zhang, Zhiqiu Huang, Yi Sun:
基于RBAC的隐私访问控制研究 (Research on Privacy Access Control Based on RBAC). 计算机科学 43(1): 166-171 (2016) - [j27]Guangying Chen, Zhiqiu Huang, Zhe Chen, Shuanglong Kan:
面向DO-333的襟缝翼控制单元安全性分析 (Safety Analysis of Slat and Flap Control Unit for DO-333). 计算机科学 43(5): 150-156 (2016) - [j26]Weiwei Li, Zhiqiu Huang, Qing Li:
Three-way decisions based software defect prediction. Knowl. Based Syst. 91: 263-274 (2016) - [c36]Shuanglong Kan, Zhiqiu Huang, Zhe Chen:
Partial Order Reduction for State/Event Systems. ICFEM 2016: 329-345 - [c35]Senzhang Wang, Lifang He
, Leon Stenneth, Philip S. Yu, Zhoujun Li, Zhiqiu Huang:
Estimating Urban Traffic Congestions with Multi-sourced Data. MDM 2016: 82-91 - [c34]Yong Wang, Zhiqiu Huang:
Weighted Control Flow Subgraph to Support Debugging Activities. QRS Companion 2016: 131-134 - [c33]Yong Wang, Zhiqiu Huang, Yong Li, BingWu Fang:
Lightweight Fault Localization Combining with Fault-Context. SATE 2016: 96-101 - [i1]Shenghui Su, Jianhua Zheng, Zhiqiu Huang, Zhoujun Li, Zhenmin Tang, Jian Wang, Shuwang Lü:
Idology and Its Applications in Public Security and Network Security. CoRR abs/1609.05601 (2016) - 2015
- [j25]Yonglong Zhang, Bin Li, Zhiqiu Huang, Jin Wang
, Junwu Zhu:
SGAM: strategy-proof group buying-based auction mechanism for virtual machine allocation in clouds. Concurr. Comput. Pract. Exp. 27(18): 5577-5589 (2015) - [j24]Yu Zhou, Yankai Huang, Ou Wei, Zhiqiu Huang:
Verifying specifications with associated attributes in graph transformation systems. Frontiers Comput. Sci. 9(3): 364-374 (2015) - [j23]Changbo Ke, Ruchuan Wang, Fu Xiao, Zhiqiu Huang:
Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing. J. Commun. 10(1): 55-63 (2015) - [j22]Chuan Ni, Zhiqiu Huang, Shanshan Wang, Chuanlin Huang:
基于属性的支持策略本体推理的访问控制方法研究 (Attribute-based Access Control Method Supporting Policies Ontology Reasoning). 计算机科学 42(3): 96-101 (2015) - [j21]Zhipeng Wu, Zhiqiu Huang, Shanshan Wang, Dejian Cao:
一种基于故障扩展SysML活动图的安全性验证框架研究 (Research on Framework of Safety Verification Based on Fault-extended SysML Activity Diagram). 计算机科学 42(7): 222-228 (2015) - [j20]Liang Zhou, Zhiqiu Huang, Chuanlin Huang:
故障树领域本体及SWRL规则的构建方法研究 (Construction Method for Fault Tree Domain Ontology Supporting SWRL Rules). 计算机科学 42(8): 198-202 (2015) - [j19]Liming Fang, Zhiqiu Huang, Jiandong Wang:
标准模型下增强的无需安全信道的带关键词搜索的公钥加密 (Secure Channel Free Searchable Encryption in Standard Model). 计算机科学 42(11): 197-202 (2015) - [j18]Fei Wang, Guohua Shen, Zhiqiu Huang, Lin Ma, Chang Liu, Haifeng Li, Lili Liao:
一种结合线性时序逻辑和故障树的软件安全验证方法 (Method Combining Linear Temporal Logic and Fault Tree for Software Safety Verification). 计算机科学 42(12): 71-75 (2015) - [j17]Chuanlin Huang, Zhiqiu Huang, Jun Hu, Zhipeng Wu, Siqi Wang:
A MDE-Based Approach to the Safety Verification of Extended SysML Activity Diagram. J. Softw. 10(1): 56-70 (2015) - [j16]Zhe Chen, Yi Gu, Zhiqiu Huang, Jun Zheng, Chang Liu, Ziyi Liu:
Model checking aircraft controller software: a case study. Softw. Pract. Exp. 45(7): 989-1017 (2015) - [j15]Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi:
On the Security of A Privacy-Preserving Product Calculation Scheme. IEEE Trans. Dependable Secur. Comput. 12(3): 373-374 (2015) - [c32]Zhe Chen, Ou Wei, Zhiqiu Huang, Hongwei Xi:
Formal Semantics of Runtime Monitoring, Verification, Enforcement and Control. TASE 2015: 63-70 - [e1]Zhiqiu Huang, Xingming Sun, Junzhou Luo, Jian Wang:
Cloud Computing and Security - First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers. Lecture Notes in Computer Science 9483, Springer 2015, ISBN 978-3-319-27050-0 [contents] - 2014
- [j14]Dajuan Fan, Zhiqiu Huang, Lei Tang:
A Correctness Assurance Approach to Automatic Synthesis of Composite Web Services. IEICE Trans. Inf. Syst. 97-D(6): 1535-1545 (2014) - [j13]Changbo Ke, Zhiqiu Huang, Weiwei Li, Yi Sun, Fangxiong Xiao:
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing. J. Appl. Math. 2014: 240425:1-240425:11 (2014) - [j12]Jiajun Lu, Zhiqiu Huang, Changbo Ke:
Verification of Behavior-aware Privacy Requirements in Web Services Composition. J. Softw. 9(4): 944-951 (2014) - [j11]Qiang Ge, Guohua Shen, Zhiqiu Huang, Changbo Ke:
The Application of SWRL Based Ontology Inference for Privacy Protection. J. Softw. 9(5): 1217-1222 (2014) - [j10]Yi Sun, Zhiqiu Huang, Changbo Ke:
Using Game Theory to Analyze Strategic Choices of Service Providers and Service Requesters. J. Softw. 9(11): 2918-2924 (2014) - [c31]Yonglong Zhang, Bin Li, Zhiqiu Huang, Jin Wang
, Junwu Zhu, Huanfeng Peng:
Strategy-Proof Auction Mechanism with Group Price for Virtual Machine Allocation in Clouds. CBD 2014: 60-68 - [c30]Guohua Shen, Yinling Liu, Fei Wang, Jia Si, Zi Wang, Zhiqiu Huang, Dazhou Kang:
OMReasoner: combination of multi-matchers for ontology matching: results for OAEI 2014. OM 2014: 142-148 - 2013
- [j9]Ruiqiang Yu, Zhiqiu Huang, Lin Wang, Hongjie Zhang:
Analyzing Temporal Constraints for Web Services Composition. J. Softw. 8(5): 1051-1057 (2013) - [j8]Changbo Ke, Zhiqiu Huang, Mei Tang:
Supporting negotiation mechanism privacy authority method in cloud computing. Knowl. Based Syst. 51: 48-59 (2013) - [c29]Bingfeng Xu, Zhiqiu Huang, Jun Hu, Ou Wei, Yu Zhou:
Minimal cut sequence generation for state/event fault trees. Middleware Doctoral Symposium 2013: 3:1-3:6 - [c28]Weiwei Li, Zhiqiu Huang, Xiuyi Jia:
Two-Phase Classification Based on Three-Way Decisions. RSKT 2013: 338-345 - 2012
- [j7]Xinye Cai, Ou Wei, Zhiqiu Huang:
Evolutionary Approaches for Multi-Objective Next Release Problem. Comput. Informatics 31(4): 847- (2012) - [j6]Changbo Ke, Zhiqiu Huang:
Self-adaptive semantic web service matching method. Knowl. Based Syst. 35: 41-48 (2012) - [c27]Yu Zhou, Xuefeng Yan, Zhiqiu Huang:
A Graph Transformation Based Approach for Modeling Component-Level Migration in Mobile Environments. COMPSAC Workshops 2012: 152-157 - [c26]Guohua Shen, Zhiqiu Huang, Changbao Tian, Qiang Ge, Wei Zhang:
Feature modeling and Verification based on Description Logics. SEKE 2012: 422-425 - [c25]Guohua Shen, Changbao Tian, Qiang Ge, Yiquan Zhu, Lili Liao, Zhiqiu Huang, Dazhou Kang:
OMReasoner: using multi-matchers and reasoner for ontology matching: results for OAEI 2012. OM 2012 - 2011
- [j5]LinYuan Liu, Haibin Zhu
, Zhiqiu Huang, Dongqing Xie:
Minimal privacy authorization in web services collaboration. Comput. Stand. Interfaces 33(3): 332-343 (2011) - [j4]LinYuan Liu, Haibin Zhu
, Zhiqiu Huang:
Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms. Expert Syst. Appl. 38(4): 4540-4549 (2011) - [j3]Fangxiong Xiao, Zhiqiu Huang, Zining Cao, Jun Hu, LinYuan Liu, Min Yuan:
Unified Modelling Functional and Non-Functional Aspects of Web Services Composition Using PTCCS 1. Int. J. Web Serv. Res. 8(4): 47-80 (2011) - [c24]Guohua Shen, Lantao Jin, Ziyue Zhao, Zhe Jia, Wenmin He, Zhiqiu Huang:
OMReasoner: using reasoner for ontology matching: results for OAEI 2011. OM 2011 - 2010
- [c23]Xiaofei Zhao, Zhiqiu Huang:
Checking Structural Integrity for Metadata Repository Systems by Means of Description Logics. DASFAA Workshops 2010: 118-129 - [c22]Min Yuan, Zhiqiu Huang, Xiang Li, Yan Yan:
Towards a Formal Verification Approach for Business Process Coordination. ICWS 2010: 361-368 - [c21]Yuankang Fang, Ziyang Zhen, Zhiqiu Huang, Chao Zhang:
Multi-objective Fuzzy Clustering Method for Image Segmentation Based on Variable-Length Intelligent Optimization Algorithm. ISICA (1) 2010: 329-337 - [c20]Yi Zhu, Zhiqiu Huang, Zining Cao, Hang Zhou, Min Yuan:
An MDE Based Approach for Generating Software Architecture Models from Formal Specifications. QSIC 2010: 373-376 - [c19]