default search action
Yukun Dong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j18]Yukun Dong, Lingjie Kong, Lulu Zhang, Shuqi Wang, Xiaoshan Liu, Shuai Liu, Mingcheng Chen:
A search-and-fill strategy to code generation for complex software requirements. Inf. Softw. Technol. 177: 107584 (2025) - [j17]Yukun Dong, Shuqi Wang, Lulu Zhang, Xiaoshan Liu, Shuai Liu:
Automatic detection of infeasible paths in large-scale program based on program summaries. Sci. Comput. Program. 239: 103183 (2025) - 2024
- [j16]Yukun Dong, Qi Yuan, Rongrong Peng, Shengtao Wang, Junqi Sun:
An iterative 3D human body reconstruction method driven by personalized dimensional prior knowledge. Appl. Intell. 54(11-12): 738-748 (2024) - [j15]Shanchen Pang, Rongrong Peng, Yukun Dong, Qi Yuan, Shengtao Wang, Junqi Sun:
JointMETRO: a 3D reconstruction model for human figures in works of art based on transformer. Neural Comput. Appl. 36(20): 11711-11725 (2024) - [j14]Yukun Dong, Xiaotong Cheng, Yufei Yang, Lulu Zhang, Shuqi Wang, Lingjie Kong:
A method to identify overfitting program repair patches based on expression tree. Sci. Comput. Program. 235: 103105 (2024) - [c10]Tianye Ma, Yukun Dong, Yidan Hu, Rui Zhang:
Privacy-Preserving Ridesharing via Probabilistic Matching. IWQoS 2024: 1-2 - 2023
- [j13]Yukun Dong, Yeer Tang, Xiaotong Cheng, Yufei Yang, Shuqi Wang:
SedSVD: Statement-level software vulnerability detection based on Relational Graph Convolutional Network with subgraph embedding. Inf. Softw. Technol. 158: 107168 (2023) - [j12]Yukun Dong, Yeer Tang, Xiaotong Cheng, Yufei Yang:
DeKeDVer: A deep learning-based multi-type software vulnerability classification framework using vulnerability description and source code. Inf. Softw. Technol. 163: 107290 (2023) - [c9]Yidan Hu, Yukun Dong, Wenxin Chen, Yingfei Dong, Rui Zhang:
Authenticating Outsourced Location-Based Skyline Queries under Shortest Path Distance. CNS 2023: 1-9 - [c8]Yukun Dong, Yidan Hu, Aisha Aseeri, Depeng Li, Rui Zhang:
Location Inference under Temporal Correlation. ICCCN 2023: 1-10 - [c7]Yukun Dong, Zhengwu Lu, Rui Zhang:
Locally Differentially Private and Fair Key-Value Aggregation. SoICT 2023: 16-23 - 2022
- [j11]Yukun Dong, Yuxue Sun, Xun Wang:
Automatic Repair Method for Null Pointer Dereferences Guided by Program Dependency Graph. Symmetry 14(8): 1555 (2022) - [j10]Yukun Dong, Daolong Tang, Xiaotong Cheng, Yufei Yang:
Quality Evaluation Method of Automatic Software Repair Using Syntax Distance Metrics. Symmetry 14(8): 1751 (2022) - 2021
- [c6]Tao Song, Rui Zhang, Yukun Dong, Fubin Liu, Yu Zhang, Rongrong Peng:
MMDA: Disease Analysis Model Based on Anthropometric Measurement. BIBM 2021: 3092-3098 - [c5]Tao Song, Rui Zhang, Yukun Dong, Xixi Tao, Hongcui Lu, Baohua Liu:
Mesh2Measure: A Novel Body Dimensions Measurement Based on 3D Human Model. INTETAIN 2021: 80-99 - [i1]Shanchen Pang, Xixi Tao, Yukun Dong:
An Efficient Style Virtual Try on Network. CoRR abs/2105.13183 (2021) - 2020
- [j9]Yukun Dong, Li Zhang, Shanchen Pang, Wenjing Yin, Mengying Wu, Meng Wu, Haojie Li:
Automatic Repair of Semantic Defects Using Restraint Mechanisms. Symmetry 12(9): 1563 (2020) - [j8]Xun Wang, Baohua Liu, Yukun Dong, Shanchen Pang, Xixi Tao:
Anthropometric Landmarks Extraction and Dimensions Measurement Based on ResNet. Symmetry 12(12): 1997 (2020) - [j7]Yukun Dong, Mengying Wu, Shanchen Pang, Li Zhang, Wenjing Yin, Meng Wu, Haojie Li:
Automated Program-Semantic Defect Repair and False-Positive Elimination without Side Effects. Symmetry 12(12): 2076 (2020) - [j6]Yukun Dong, Meng Wu, Li Zhang, Wenjing Yin, Mengying Wu, Haojie Li:
Priority Measurement of Patches for Program Repair Based on Semantic Distance. Symmetry 12(12): 2102 (2020) - [c4]Yukun Dong, Li Zhang, Shanchen Pang, Hao Liu, Wenjing Yin, Mengying Wu, Meng Wu, Haojie Li:
Automatic Repair of Semantic Defects Using Restraint Mechanisms. FCS 2020: 567-583
2010 – 2019
- 2019
- [j5]Yukun Dong, Wenjing Yin, Shudong Wang, Li Zhang, Lin Sun:
Memory Leak Detection in IoT Program Based on an Abstract Memory Model SeqMM. IEEE Access 7: 158904-158916 (2019) - [j4]Yukun Dong, Jiantao Zhang, Zhen Li, Yong Hu, Yong Deng:
Combination of Evidential Sensor Reports with Distance Function and Belief Entropy in Fault Diagnosis. Int. J. Comput. Commun. Control 14(3): 329-343 (2019) - 2018
- [j3]Yukun Dong:
A sound abstract memory model for static analysis of C programs. Int. J. Comput. Sci. Eng. 16(3): 255-264 (2018) - 2016
- [c3]Yukun Dong:
Fully Detection of Illegal Memory Access Defects. CISIS 2016: 449-455 - [c2]Yukun Dong, Yalan Wang:
Fully Detection of Illegal Value Use Defects. INCoS 2016: 492-497 - 2014
- [j2]Yukun Dong, Dahai Jin, Yunzhan Gong:
Symbolic Procedure Summary Using Region-based Symbolic Three-valued Logic. J. Comput. 9(3): 774-780 (2014) - [j1]Yukun Dong:
An Approach for Identifying Detecting Objects of Null Dereference. J. Softw. 9(11): 2771-2777 (2014) - 2013
- [c1]Yukun Dong, Ying Xing, Dahai Jin, Yunzhan Gong, Kai Liu:
An Approach to Fully Recognizing Addressable Expression. QSIC 2013: 149-152
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint