


default search action
Ziyuan Wang 0001
Person information
- affiliation: Nanjing University of Posts and Telecommunications, Nanjing, China
Other persons with the same name
- Ziyuan Wang — disambiguation page
- Ziyuan Wang 0002
— Tsinghua University, China - Ziyuan Wang 0003
— Swinburne University of Technology, Hawthorn, Victoria, Australia - Ziyuan Wang 0004
— University of British Columbia, Kelowna, BC, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j14]Zhi-Yi Zhang, Yichun Wang, Yongming Yao, Ziyuan Wang, Zhiqiu Huang:
A fine-grained evaluation of mutation operators to boost mutation testing for deep learning systems. Empir. Softw. Eng. 30(3): 63 (2025)
[i5]Yue Wang, Zhenyu Chen, Yuan Zhao, Chunrong Fang, Ziyuan Wang, Song Huang:
RUM: Rule+LLM-Based Comprehensive Assessment on Testing Skills. CoRR abs/2508.12922 (2025)- 2024
[j13]Yilin Yang
, Ziyuan Wang, Zhenyu Chen, Baowen Xu:
COPS: An improved information retrieval-based bug localization technique using context-aware program simplification. J. Syst. Softw. 207: 111868 (2024)
[j12]Peng Zhang
, Yang Wang
, Xutong Liu
, Zeyu Lu
, Yibiao Yang
, Yanhui Li
, Lin Chen
, Ziyuan Wang
, Chang-Ai Sun
, Xiao Yu
, Yuming Zhou
:
Assessing Effectiveness of Test Suites: What Do We Know and What Should We Do? ACM Trans. Softw. Eng. Methodol. 33(4): 86:1-86:32 (2024)- 2023
[j11]Ziyuan Wang
, Dexin Bu, Nannan Wang, Sijie Yu, Shanyi Gou, Aiyue Sun:
An empirical study on bugs in JavaScript engines. Inf. Softw. Technol. 155: 107105 (2023)
[c23]Zhuangyu Zhang, Zhiyi Zhang, Ziyuan Wang, Fang Chen, Zhiqiu Huang:
BTM: Black-Box Testing for DNN Based on Meta-Learning. QRS 2023: 581-592- 2022
[j10]Ziyuan Wang
, Dexin Bu, Xingpeng Xuan, Jia Gu:
An Empirical Study on Bugs in PHP. Int. J. Softw. Eng. Knowl. Eng. 32(6): 845-870 (2022)
[j9]Weisong Sun, Quanjun Zhang
, Chunrong Fang
, Yuchen Chen, Xingya Wang
, Ziyuan Wang:
Test case recommendation based on balanced distance of test targets. Inf. Softw. Technol. 150: 106994 (2022)
[j8]Zhiyi Zhang
, Ziyuan Wang, Fan Yang, Jiahao Wei, Yuqian Zhou, Zhiqiu Huang:
Random or heuristic? An empirical study on path search strategies for test generation in KLEE. J. Syst. Softw. 188: 111269 (2022)
[j7]Peng Zhang
, Yang Wang
, Xutong Liu
, Yanhui Li
, Yibiao Yang
, Ziyuan Wang
, Xiaoyu Zhou
, Lin Chen
, Yuming Zhou
:
Mutant Reduction Evaluation: What is There and What is Missing? ACM Trans. Softw. Eng. Methodol. 31(4): 69:1-69:46 (2022)
[j6]Ziyuan Wang
, Dexin Bu
, Aiyue Sun
, Shanyi Gou
, Yong Wang
, Lin Chen
:
An Empirical Study on Bugs in Python Interpreters. IEEE Trans. Reliab. 71(2): 716-734 (2022)
[c22]Yilin Yang, Ziyuan Wang, Zhenyu Chen, Baowen Xu:
Context-Aware Program Simplification to Improve Information Retrieval-Based Bug Localization. QRS 2022: 252-263
[i4]Quanjun Zhang, Yuan Zhao, Weisong Sun, Chunrong Fang, Ziyuan Wang, Lingming Zhang:
Program Repair: Automated vs. Manual. CoRR abs/2203.05166 (2022)
[i3]Peng Zhang, Yang Wang, Xutong Liu, Yibiao Yang, Yanhui Li, Lin Chen, Ziyuan Wang, Chang-Ai Sun, Yuming Zhou:
Test suite effectiveness metric evaluation: what do we know and what should we do? CoRR abs/2204.09165 (2022)- 2021
[j5]Zhiyi Zhang
, Pu Wang
, Hongjing Guo, Ziyuan Wang, Yuqian Zhou, Zhiqiu Huang:
DeepBackground: Metamorphic testing for Deep-Learning-driven image recognition systems accompanied by Background-Relevance. Inf. Softw. Technol. 140: 106701 (2021)
[c21]Yunjian Xu, Zhiyi Zhang, Yuqian Zhou, Ziyuan Wang, Zhiqiu Huang:
DeepMnist: A method of white box testing based on hierarchy. QRS Companion 2021: 712-717
[i2]Peng Zhang, Yang Wang, Xutong Liu, Yanhui Li, Yibao Yang, Ziyuan Wang, Xiaoyu Zhou, Lin Chen, Yuming Zhou:
Mutant reduction evaluation: what is there and what is missing? CoRR abs/2102.02978 (2021)- 2020
[j4]Ziyuan Wang, Chunrong Fang
, Lin Chen, Zhiyi Zhang:
A Revisit of Metrics for Test Case Prioritization Problems. Int. J. Softw. Eng. Knowl. Eng. 30(8): 1139-1167 (2020)
[c20]Weifeng Zhang, Zhen Pan, Ziyuan Wang:
Prediction Method of Code Review Time Based on Hidden Markov Model. WISA 2020: 168-175
2010 – 2019
- 2019
[j3]Zhiyi Zhang
, Yabin Wang, Ziyuan Wang
, Ju Qian:
How to Effectively Reduce Tens of Millions of Tests: An Industrial Case Study on Adaptive Random Testing. IEEE Trans. Reliab. 68(4): 1429-1443 (2019)
[c19]Yanshan Chen, Ziyuan Wang, Dong Wang, Yongming Yao, Zhenyu Chen:
Behavior Pattern-Driven Test Case Selection for Deep Neural Networks. AITest 2019: 89-90
[c18]Dong Wang, Ziyuan Wang, Chunrong Fang
, Yanshan Chen, Zhenyu Chen:
DeepPath: Path-Driven Testing Criteria for Deep Neural Networks. AITest 2019: 119-120
[c17]Yanshan Chen, Ziyuan Wang, Dong Wang, Chunrong Fang
, Zhenyu Chen:
Variable Strength Combinatorial Testing for Deep Neural Networks. ICST Workshops 2019: 281-284
[c16]Tianxing He, Shengcheng Yu
, Ziyuan Wang, Jieqiong Li, Zhenyu Chen:
From Data Quality to Model Quality: An Exploratory Study on Deep Learning. Internetware 2019: 18:1-18:6
[i1]Tianxing He, Shengcheng Yu, Ziyuan Wang, Jieqiong Li, Zhenyu Chen:
From Data Quality to Model Quality: an Exploratory Study on Deep Learning. CoRR abs/1906.11882 (2019)- 2016
[j2]Lin Chen, Wanwangying Ma, Yuming Zhou, Lei Xu, Ziyuan Wang, Zhifei Chen, Baowen Xu
:
Empirical analysis of network measures for predicting high severity software faults. Sci. China Inf. Sci. 59(12): 122901:1-122901:18 (2016)
[c15]Chiya Xu, Yuanchao Qi, Ziyuan Wang, Weifeng Zhang:
Analyzing Minimal Failure-Causing Schemas in Siemens Suite. ICST Workshops 2016: 35-38
[c14]Tianhao Pan, Weifeng Zhang, Ziyuan Wang, Lei Xu:
Recommendations Based on LDA Topic Model in Android Applications. QRS Companion 2016: 151-158- 2015
[c13]Xiaohong Zhang, Ziyuan Wang, Weifeng Zhang, Hui Ding, Lin Chen:
Spectrum-Based Fault Localization Method with Test Case Reduction. COMPSAC Workshops 2015: 548-549
[c12]Weifeng Zhang, Tianhao Pan, Yun Wang, Ziyuan Wang, Lei Xu:
UT-LDA Based Similarity Computing in Microblog. QRS Companion 2015: 197-201- 2013
[c11]Xiaoyan Qian, Weifeng Zhang, Yingzhou Zhang, Guoqiang Zhou, Ziyuan Wang:
Detecting Image Spam Based on K-Labels Propagation Model. IEEE WISA 2013: 170-175
[c10]Ziyuan Wang, Ting Guo, Wujie Zhou, Weifeng Zhang, Baowen Xu:
Generating Partial Covering Array for Locating Faulty Interactions in Combinatorial Testing. SEKE 2013: 578-583- 2012
[c9]Ziyuan Wang, Zhenyu Chen, Tsong Yueh Chen
, Baowen Xu
:
Fault class prioritization in Boolean expressions. SAC 2012: 1191-1196- 2011
[j1]Ziyuan Wang, Lin Chen, Baowen Xu
, Yan Huang:
Cost-Cognizant Combinatorial Test Case Prioritization. Int. J. Softw. Eng. Knowl. Eng. 21(6): 829-854 (2011)- 2010
[c8]Ziyuan Wang, Baowen Xu
, Lin Chen, Lei Xu:
Adaptive Interaction Fault Location Based on Combinatorial Testing. QSIC 2010: 495-502
[c7]Ziyuan Wang, Baowen Xu, Lin Chen, Zhenyu Chen:
Cost-Effective Combinatorial Test Case Prioritization for Varying Combination Weights. SEKE 2010: 273-278
[c6]Lin Chen, Ziyuan Wang, Lei Xu, Hongmin Lu, Baowen Xu
:
Test Case Prioritization for Web Service Regression Testing. SOSE 2010: 173-178
2000 – 2009
- 2009
[c5]Changbin Ji, Zhenyu Chen, Baowen Xu
, Ziyuan Wang:
A New Mutation Analysis Method for Testing Java Exception Handling. COMPSAC (2) 2009: 556-561- 2008
[c4]Ziyuan Wang, Baowen Xu
, Changhai Nie:
Greedy Heuristic Algorithms to Generate Variable Strength Combinatorial Test Suite. QSIC 2008: 155-160- 2007
[c3]Ziyuan Wang, Changhai Nie, Baowen Xu
:
Generating combinatorial test suite for interaction relationship. SOQUA 2007: 55-61- 2006
[c2]Changhai Nie, Baowen Xu
, Ziyuan Wang, Liang Shi:
Generating Optimal Test Set for Neighbor Factors Combinatorial Testing. QSIC 2006: 259-265
[c1]Changhai Nie, Baowen Xu, Liang Shi, Ziyuan Wang:
A New Heuristic for Test Suite Generation for Pair-wise Testing. SEKE 2006: 517-521
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-12-26 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







