default search action
Yu Lei 0001
Person information
- affiliation: University of Texas at Arlington, Department of Computer Science and Engineering, USA
- affiliation (former): North Carolina State University, Department of Computer Science, Raleigh, NC, USA
Other persons with the same name
- Yu Lei — disambiguation page
- Yu Lei 0002 — Northwestern Polytechnical University, School of Electronics and Information, Xi'an, China (and 1 more)
- Yu Lei 0003 — Chinese Academy of Sciences, Shanghai Institute of Micro-System and Information Technology, State Key Laboratory of Functional Materials for Informatics, China
- Yu Lei 0004 — Hong Kong Polytechnic University, Hong Kong
- Yu Lei 0005 — China National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China
- Yu Lei 0006 — SUNY College at Old Westbury, School of Business, NY, USA
- Yu Lei 0007 — Inner Mongolia University, Department of Computer Science, Hohhot, China
- Yu Lei 0008 — Wuhan University of Technology, School of Automation, China
- Yu Lei 0009 — Southwest Jiaotong University, Chengdu, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c94]Sunny Shree, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
Proxima: A Proxy Model-Based Approach to Influence Analysis. AITest 2024: 64-72 - [c93]Krishna Khadka, Jaganmohan Chandrasekaran, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
A Combinatorial Approach to Hyperparameter Optimization. CAIN 2024: 140-149 - [c92]Krishna Khadka, Sunny Shree, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
Assessing the Degree of Feature Interactions that Determine a Model Prediction. ICSTW 2024: 180-187 - [c91]Sunny Shree, Krishna Khadka, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
Constructing Surrogate Models in Machine Learning Using Combinatorial Testing and Active Learning. ASE 2024: 1645-1654 - 2023
- [j35]Mengfei Ren, Xiaolei Ren, Huadong Feng, Jiang Ming, Yu Lei:
Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing. DTRAP 4(1): 9:1-9:24 (2023) - [j34]Andrea Bombarda, Silvia Bonfanti, Angelo Gargantini, Yu Lei, Feng Duan:
RATE: A model-based testing approach that combines model refinement and test execution. Softw. Test. Verification Reliab. 33(2) (2023) - [c90]Qiping Wei, Fadul Sikder, Huadong Feng, Yu Lei, Raghu Kacker, D. Richard Kuhn:
SmartExecutor: Coverage-Driven Symbolic Execution Guided by a Function Dependency Graph. BRAINS 2023: 1-8 - [c89]Mengfei Ren, Haotian Zhang, Xiaolei Ren, Jiang Ming, Yu Lei:
Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference. ESORICS (2) 2023: 467-486 - [c88]Huadong Feng, Xiaolei Ren, Qiping Wei, Yu Lei, Raghu Kacker, D. Richard Kuhn, Dimitris E. Simos:
MagicMirror: Towards High-Coverage Fuzzing of Smart Contracts. ICST 2023: 141-152 - [c87]Krishna Khadka, Jaganmohan Chandrasekaran, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
Synthetic Data Generation Using Combinatorial Testing and Variational Autoencoder. ICSTW 2023: 228-236 - 2022
- [j33]Raghu N. Kacker, D. Richard Kuhn, Yu Lei, Dimitris E. Simos:
Measuring the Adequacy of a Test Suite With Respect to a Modeled Test Space. IEEE Softw. 39(5): 62-67 (2022) - [j32]Chang Rao, Nan Li, Yu Lei, Jin Guo, Yadong Zhang, Raghu N. Kacker, D. Richard Kuhn:
Combinatorial Test Generation for Multiple Input Models With Shared Parameters. IEEE Trans. Software Eng. 48(7): 2606-2628 (2022) - [j31]Xintao Niu, Huayao Wu, Changhai Nie, Yu Lei, Xiaoyin Wang:
A Theory of Pending Schemas in Combinatorial Testing. IEEE Trans. Software Eng. 48(10): 4119-4151 (2022) - [j30]Xintao Niu, Yanjie Sun, Huayao Wu, Gang Li, Changhai Nie, Yu Lei, Xiaoyin Wang:
Enhance Combinatorial Testing With Metamorphic Relations. IEEE Trans. Software Eng. 48(12): 5007-5029 (2022) - [c86]Sunny Shree, Jaganmohan Chandrasekaran, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
DeltaExplainer: A Software Debugging Approach to Generating Counterfactual Explanations. AITest 2022: 103-110 - [c85]Haotian Zhang, Mengfei Ren, Yu Lei, Jiang Ming:
One size does not fit all: security hardening of MIPS embedded systems via static binary debloating for shared libraries. ASPLOS 2022: 255-270 - [c84]Rui Huang, Chang Rao, Yu Lei, Jin Guo, Yadong Zhang:
Applying Combinatorial Testing to High-Speed Railway Automatic Train Protection System. ICST Workshops 2022: 49-56 - [c83]Ankita Ramjibhai Patel, Jaganmohan Chandrasekaran, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
A Combinatorial Approach to Fairness Testing of Machine Learning Models. ICST Workshops 2022: 94-101 - 2021
- [j29]Raghu N. Kacker, D. Richard Kuhn, Yu Lei, Dimitris E. Simos:
Factorials Experiments, Covering Arrays, and Combinatorial Testing. Math. Comput. Sci. 15(4): 715-739 (2021) - [j28]Raghu N. Kacker, D. Richard Kuhn, Yu Lei, Dimitris E. Simos:
Correction to: Factorials Experiments, Covering Arrays, and Combinatorial Testing. Math. Comput. Sci. 15(4): 741 (2021) - [c82]Jaganmohan Chandrasekaran, Ankita Ramjibhai Patel, Yu Lei, Raghu Kacker, D. Richard Kuhn:
Evaluation of T-Way Testing of DNNs in Autonomous Driving Systems. AITest 2021: 17-18 - [c81]Jaganmohan Chandrasekaran, Yu Lei, Raghu Kacker, D. Richard Kuhn:
A Combinatorial Approach to Explaining Image Classifiers. ICST Workshops 2021: 35-43 - [c80]Jaganmohan Chandrasekaran, Yu Lei, Raghu Kacker, D. Richard Kuhn:
A Combinatorial Approach to Testing Deep Neural Network-based Autonomous Driving Systems. ICST Workshops 2021: 57-66 - [c79]Xiaolei Ren, Michael Ho, Jiang Ming, Yu Lei, Li Li:
Unleashing the hidden power of compiler optimization on binary code difference: an empirical study. PLDI 2021: 142-157 - [c78]Mengfei Ren, Xiaolei Ren, Huadong Feng, Jiang Ming, Yu Lei:
Z-Fuzzer: device-agnostic fuzzing of Zigbee protocol implementation. WISEC 2021: 347-358 - [i1]Xiaolei Ren, Michael Ho, Jiang Ming, Yu Lei, Li Li:
Unleashing the Hidden Power of Compiler Optimization on Binary Code Difference: An Empirical Study. CoRR abs/2103.12357 (2021) - 2020
- [j27]Rick Kuhn, Raghu N. Kacker, Yu Lei, Dimitris E. Simos:
Input Space Coverage Matters. Computer 53(1): 37-44 (2020) - [j26]Xintao Niu, Changhai Nie, Jeff Yu Lei, Hareton Leung, Xiaoyin Wang:
Identifying Failure-Causing Schemas in the Presence of Multiple Faults. IEEE Trans. Software Eng. 46(2): 141-162 (2020) - [j25]Xintao Niu, Changhai Nie, Hareton Leung, Yu Lei, Xiaoyin Wang, Jiaxi Xu, Yan Wang:
An Interleaving Approach to Combinatorial Testing and Failure-Inducing Interaction Identification. IEEE Trans. Software Eng. 46(6): 584-615 (2020) - [j24]Laleh Shikh Gholamhossein Ghandehari, Yu Lei, Raghu Kacker, D. Richard Kuhn, Tao Xie, David Chenho Kung:
A Combinatorial Testing-Based Approach to Fault Localization. IEEE Trans. Software Eng. 46(6): 616-645 (2020) - [c77]Jaganmohan Chandrasekaran, Huadong Feng, Yu Lei, Raghu Kacker, D. Richard Kuhn:
Effectiveness of dataset reduction in testing machine learning algorithms. AITest 2020: 133-140 - [c76]D. Richard Kuhn, Raghu N. Kacker, Yu Lei, Dimitris E. Simos:
Combinatorial Methods for Explainable AI. ICST Workshops 2020: 167-170 - [c75]Dimitris E. Simos, Jeff Yu Lei, Changhai Nie:
General Message from the IWCT Workshop Chairs. ICST Workshops 2020: xviii
2010 – 2019
- 2019
- [j23]Junfei Xie, Yan Wan, Kevin Mills, James J. Filliben, Yu Lei, Zongli Lin:
M-PCM-OFFD: An effective output statistics estimation method for systems of high dimensional uncertainties subject to low-order parameter interactions. Math. Comput. Simul. 159: 93-118 (2019) - [j22]Dimitris E. Simos, Josip Bozic, Bernhard Garn, Manuel Leithner, Feng Duan, Kristoffer Kleine, Yu Lei, Franz Wotawa:
Testing TLS using planning-based combinatorial methods and execution framework. Softw. Qual. J. 27(2): 703-729 (2019) - [c74]Zhongwei Li, Feng Duan, Minh Nguyen, Hao Che, Yu Lei, Hong Jiang:
IPSO: A Scaling Model for Data-Intensive Applications. ICDCS 2019: 238-248 - [c73]Bernhard Garn, Dimitris E. Simos, Feng Duan, Yu Lei, Josip Bozic, Franz Wotawa:
Weighted Combinatorial Sequence Testing for the TLS Protocol. ICST Workshops 2019: 46-51 - [c72]Feng Duan, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
An Approach to T-Way Test Sequence Generation With Constraints. ICST Workshops 2019: 241-250 - [c71]Chang Rao, Nan Li, Yu Lei, Raghu N. Kacker, D. Richard Kuhn, Jin Guo:
Using Parameter Mapping to Avoid Forbidden Tuples in a Covering Array. ICST Workshops 2019: 251-259 - [c70]Andrea Bombarda, Silvia Bonfanti, Angelo Gargantini, Marco Radavelli, Feng Duan, Yu Lei:
Combining Model Refinement and Test Generation for Conformance Testing of the IEEE PHD Protocol Using Abstract State Machines. ICTSS 2019: 67-85 - 2018
- [j21]Richard H. Carver, Yu Lei:
Stateless techniques for generating global and local test oracles for message-passing concurrent programs. J. Syst. Softw. 136: 237-265 (2018) - [c69]Huadong Feng, Jaganmohan Chandrasekaran, Yu Lei, Raghu Kacker, D. Richard Kuhn:
A Method-Level Test Generation Framework for Debugging Big Data Applications. IEEE BigData 2018: 221-230 - [c68]Dimitris E. Simos, Rick Kuhn, Yu Lei, Raghu Kacker:
Combinatorial security testing course. HotSoS 2018: 10:1-10:3 - [c67]Chang Rao, Jin Guo, Nan Li, Yu Lei, Yadong Zhang, Yao Li:
Safety-Critical System Modeling in Model-Based Testing with Hazard and Operability Analysis. QRS 2018: 397-404 - [c66]Rick Kuhn, Dylan Yaga, Raghu Kacker, Jeff Yu Lei, Vincent C. Hu:
Pseudo-Exhaustive Verification of Rule Based Systems. SEKE 2018: 586-585 - 2017
- [c65]Sarker T. Ahmed Rumee, Donggang Liu, Yu Lei:
MirrorDroid: A framework to detect sensitive information leakage in Android by duplicate program execution. CISS 2017: 1-6 - [c64]Jing Xu, Yu Lei, Richard H. Carver:
Using Delta Debugging to Minimize Stress Tests for Concurrent Data Structures. ICST 2017: 35-46 - [c63]D. Richard Kuhn, Raghu N. Kacker, Yu Lei:
A Model for T-Way Fault Profile Evolution during Testing. ICST Workshops 2017: 162-170 - [c62]Feng Duan, Yu Lei, Linbin Yu, Raghu N. Kacker, D. Richard Kuhn:
Optimizing IPOG's Vertical Growth with Constraints Based on Hypergraph Coloring. ICST Workshops 2017: 181-188 - [c61]Chang Rao, Jin Guo, Nan Li, Yu Lei, Yadong Zhang, Yao Li, YaXin Cao:
Applying Combinatorial Testing to High-Speed Railway Track Circuit Receiver. ICST Workshops 2017: 199-207 - [c60]Jaganmohan Chandrasekaran, Huadong Feng, Yu Lei, D. Richard Kuhn, Raghu Kacker:
Applying Combinatorial Testing to Data Mining Algorithms. ICST Workshops 2017: 253-261 - [c59]Dimitris E. Simos, Josip Bozic, Feng Duan, Bernhard Garn, Kristoffer Kleine, Yu Lei, Franz Wotawa:
Testing TLS Using Combinatorial Methods and Execution Framework. ICTSS 2017: 162-177 - 2016
- [j20]D. Richard Kuhn, Raghu N. Kacker, Yu Lei:
Measuring and specifying combinatorial coverage of test input configurations. Innov. Syst. Softw. Eng. 12(4): 249-261 (2016) - [j19]Wenhua Wang, Sreedevi Sampath, Yu Lei, Raghu Kacker, D. Richard Kuhn, James Lawrence:
Using combinatorial testing to build navigation graphs for dynamic web applications. Softw. Test. Verification Reliab. 26(4): 318-346 (2016) - [c58]D. Richard Kuhn, Raghu N. Kacker, Yu Lei:
Estimating t-Way Fault Profile Evolution During Testing. COMPSAC Workshops 2016: 596-597 - [c57]David Kung, Jeff Yu Lei:
An Object-Oriented Analysis and Design Environment. CSEE&T 2016: 91-100 - [c56]Jaganmohan Chandrasekaran, Laleh S. Ghandehari, Yu Lei, Raghu Kacker, D. Richard Kuhn:
Evaluating the Effectiveness of BEN in Localizing Different Types of Software Fault. ICST Workshops 2016: 26-34 - [c55]D. Richard Kuhn, Vincent C. Hu, David F. Ferraiolo, Raghu N. Kacker, Yu Lei:
Pseudo-Exhaustive Testing of Attribute Based Access Control Rules. ICST Workshops 2016: 51-58 - [c54]Zachary B. Ratliff, D. Richard Kuhn, Raghu N. Kacker, Yu Lei, Kishor S. Trivedi:
The Relationship between Software Bug Type and Number of Factors Involved in Failures. ISSRE Workshops 2016: 119-124 - [c53]Nan Li, Yu Lei, Haider Riaz Khan, Jingshu Liu, Yun Guo:
Applying combinatorial test data generation to big data applications. ASE 2016: 637-647 - [c52]Dimitris E. Simos, Kristoffer Kleine, Laleh Shikh Gholamhossein Ghandehari, Bernhard Garn, Yu Lei:
A Combinatorial Approach to Analyzing Cross-Site Scripting (XSS) Vulnerabilities in Web Application Security Testing. ICTSS 2016: 70-85 - [c51]Nan Li, Jin Guo, Jeff Yu Lei, Yao Li, Chang Rao, YaXin Cao:
Towards Agile Testing for Railway Safety-critical Software. XP Workshops 2016: 18 - 2015
- [j18]D. Richard Kuhn, Renée C. Bryce, Feng Duan, Laleh Shikh Gholamhossein Ghandehari, Yu Lei, Raghu N. Kacker:
Combinatorial Testing: Theory and Practice. Adv. Comput. 99: 1-66 (2015) - [c50]Feng Duan, Yu Lei, Linbin Yu, Raghu N. Kacker, D. Richard Kuhn:
Improving IPOG's vertical growth based on a graph coloring scheme. ICST Workshops 2015: 1-8 - [c49]Laleh Shikh Gholamhossein Ghandehari, Jaganmohan Chandrasekaran, Yu Lei, Raghu Kacker, D. Richard Kuhn:
BEN: A combinatorial testing-based fault localization tool. ICST Workshops 2015: 1-4 - [c48]D. Richard Kuhn, Raghu N. Kacker, Yu Lei, Jose Torres-Jimenez:
Equivalence class verification and oracle-free testing using two-layer covering arrays. ICST Workshops 2015: 1-4 - [c47]Jing Xu, Yu Lei, Richard H. Carver, David Chenho Kung:
A Lightweight, Static Approach to Detecting Unbounded Thread-Instantiation Loops. ICST 2015: 1-10 - [c46]Linbin Yu, Feng Duan, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
Constraint handling in combinatorial test generation using forbidden tuples. ICST Workshops 2015: 1-9 - [c45]Vincent C. Hu, David F. Ferraiolo, D. Richard Kuhn, Raghu N. Kacker, Yu Lei:
Implementing and Managing Policy Rules in Attribute Based Access Control. IRI 2015: 518-525 - 2014
- [j17]Zhou Lei, Bolin Hu, Jianhua Guo, Luokai Hu, Wenfeng Shen, Yu Lei:
Scalable and efficient workload hotspot detection in virtualized environment. Clust. Comput. 17(4): 1253-1264 (2014) - [j16]Jin Liu, Juan Li, Xiaoping Sun, Yuan Xie, Jeff Yu Lei, Qiping Hu:
An Embedded Co-AdaBoost based construction of software document relation coupled resource spaces for cyber-physical society. Future Gener. Comput. Syst. 32: 198-210 (2014) - [j15]Jianli Ding, Jin Liu, Kaushik Roy Chowdhury, Wensheng Zhang, Qiping Hu, Jeff Yu Lei:
A particle swarm optimization using local stochastic search and enhancing diversity for continuous optimization. Neurocomputing 137: 261-267 (2014) - [j14]Dazhi Zhang, Donggang Liu, Christoph Csallner, David Chenho Kung, Yu Lei:
A distributed framework for demand-driven software vulnerability detection. J. Syst. Softw. 87: 60-73 (2014) - [c44]Linbin Yu, Feng Duan, Yu Lei, Raghu Kacker, D. Richard Kuhn:
Combinatorial Test Generation for Software Product Lines Using Minimum Invalid Tuples. HASE 2014: 65-72 - [c43]Laleh S. Ghandehari, Jacek Czerwonka, Yu Lei, Soheil Shafiee, Raghu Kacker, D. Richard Kuhn:
An Empirical Comparison of Combinatorial and Random Testing. ICST Workshops 2014: 68-77 - [c42]Rick Kuhn, Raghu Kacker, Yu Lei:
Estimating Fault Detection Effectiveness. ICST Workshops 2014: 154 - [c41]Junfei Xie, Yan Wan, Yi Zhou, Kevin Mills, James J. Filliben, Yu Lei:
Effective and scalable uncertainty evaluation for large-scale complex system applications. WSC 2014: 733-744 - 2013
- [j13]Jin Huang, Feiping Nie, Heng Huang, Yi-Cheng Tu, Yu Lei:
Social trust prediction using heterogeneous networks. ACM Trans. Knowl. Discov. Data 7(4): 17:1-17:21 (2013) - [c40]Itzel Dominguez Mendoza, D. Richard Kuhn, Raghu Kacker, Yu Lei:
CCM: A Tool for Measuring Combinatorial Coverage of System State Space. ESEM 2013: 291 - [c39]Linbin Yu, Yu Lei, Mehra Nouroz Borazjany, Raghu Kacker, D. Richard Kuhn:
An Efficient Algorithm for Constraint Handling in Combinatorial Test Generation. ICST 2013: 242-251 - [c38]Xintao Niu, Changhai Nie, Yu Lei, Alvin T. S. Chan:
Identifying Failure-Inducing Combinations Using Tuple Relationship. ICST Workshops 2013: 271-280 - [c37]D. Richard Kuhn, Itzel Dominguez Mendoza, Raghu Kacker, Yu Lei:
Combinatorial Coverage Measurement Concepts and Applications. ICST Workshops 2013: 352-361 - [c36]Laleh Shikh Gholamhossein Ghandehari, Mehra N. Borazjany, Yu Lei, Raghu Kacker, D. Richard Kuhn:
Applying Combinatorial Testing to the Siemens Suite. ICST Workshops 2013: 362-371 - [c35]Linbin Yu, Yu Lei, Raghu Kacker, D. Richard Kuhn:
ACTS: A Combinatorial Test Generation Tool. ICST 2013: 370-375 - [c34]Mehra N. Borazjany, Laleh Shikh Gholamhossein Ghandehari, Yu Lei, Raghu Kacker, Rick Kuhn:
An Input Space Modeling Methodology for Combinatorial Testing. ICST Workshops 2013: 372-381 - [c33]Jin Huang, Feiping Nie, Heng Huang, Yu Lei, Chris H. Q. Ding:
Social Trust Prediction Using Rank-k Matrix Recovery. IJCAI 2013: 2647-2653 - [c32]Laleh Shikh Gholamhossein Ghandehari, Yu Lei, David Chenho Kung, Raghu Kacker, D. Richard Kuhn:
Fault localization based on failure-inducing combinations. ISSRE 2013: 168-177 - [c31]Richard H. Carver, Yu Lei:
A Modular Approach to Model-Based Testing of Concurrent Programs. MUSEPAT 2013: 85-96 - [c30]Jing Xu, Yu Lei, Richard H. Carver, David Chenho Kung:
A Dynamic Approach to Isolating Erroneous Event Patterns in Concurrent Program Executions. MUSEPAT 2013: 97-109 - [c29]Linbin Yu, Yu Lei, Raghu Kacker, D. Richard Kuhn, Ram D. Sriram, Kevin Brady:
A general conformance testing framework for IEEE 11073 PHD's communication model. PETRA 2013: 12:1-12:8 - 2012
- [j12]Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner, Nathaniel Nystrom, Wenhua Wang:
SimFuzz: Test case similarity directed deep fuzzing. J. Syst. Softw. 85(1): 102-111 (2012) - [c28]Zhou Lei, Jinfeng Xiang, Zhebo Zhou, Feng Duan, Yu Lei:
A multi-objective scheduling strategy based on MOGA in cloud computing environment. CCIS 2012: 386-391 - [c27]Linbin Yu, Yu Lei, Raghu Kacker, D. Richard Kuhn, James Lawrence:
Efficient Algorithms for T-way Test Sequence Generation. ICECCS 2012: 220-229 - [c26]Laleh Shikh Gholamhossein Ghandehari, Yu Lei, Tao Xie, D. Richard Kuhn, Raghu Kacker:
Identifying Failure-Inducing Combinations in a Combinatorial Test Set. ICST 2012: 370-379 - [c25]Mehra N. Borazjany, Linbin Yu, Yu Lei, Raghu Kacker, Rick Kuhn:
Combinatorial Testing of ACTS: A Case Study. ICST 2012: 591-600 - [c24]D. Richard Kuhn, James M. Higdon, James Lawrence, Raghu Kacker, Yu Lei:
Combinatorial Methods for Event Sequence Testing. ICST 2012: 601-609 - [c23]Kiran Shakya, Tao Xie, Nuo Li, Yu Lei, Raghu Kacker, D. Richard Kuhn:
Isolating Failure-Inducing Combinations in Combinatorial Testing Using Test Augmentation and Classification. ICST 2012: 620-623 - [c22]Jie Li, Changhai Nie, Yu Lei:
Improved Delta Debugging Based on Combinatorial Testing. QSIC 2012: 102-105 - [c21]Jin Liu, Juan Li, Yuan Xie, Jeff Yu Lei, Qiping Hu:
An Embedded Co-AdaBoost and Its Application in Classification of Software Document Relation. SKG 2012: 173-180 - 2011
- [j11]Jim Lawrence, Raghu Kacker, Yu Lei, D. Richard Kuhn, Michael A. Forbes:
A Survey of Binary Covering Arrays. Electron. J. Comb. 18(1) (2011) - [c20]Wenhua Wang, Yu Lei, Donggang Liu, David Chenho Kung, Christoph Csallner, Dazhi Zhang, Raghu Kacker, Rick Kuhn:
A combinatorial approach to detecting buffer overflow vulnerabilities. DSN 2011: 269-278 - 2010
- [j10]Richard H. Carver, Yu Lei:
Distributed reachability testing of concurrent programs. Concurr. Comput. Pract. Exp. 22(18): 2445-2466 (2010) - [j9]Richard H. Carver, Yu Lei:
A class library for implementing, testing, and debugging concurrent programs. Int. J. Softw. Tools Technol. Transf. 12(1): 69-88 (2010) - [c19]Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner, Wenhua Wang:
Detecting vulnerabilities in C programs using trace-based testing. DSN 2010: 241-250 - [c18]Richard H. Carver, Jeff Yu Lei:
A Stateful Approach to Testing Monitors in Multithreaded Programs. HASE 2010: 54-63
2000 – 2009
- 2009
- [j8]Rick Kuhn, Raghu Kacker, Yu Lei, Justin Hunter:
Combinatorial Software Testing. Computer 42(8): 94-96 (2009) - [c17]Wenhua Wang, Yu Lei, Sreedevi Sampath, Raghu Kacker, Rick Kuhn, James Lawrence:
A combinatorial approach to building navigation graphs for dynamic web applications. ICSM 2009: 211-220 - [c16]Chunying Zhao, Kang Zhang, Yu Lei:
Abstraction of multiple executions of object-oriented programs. SAC 2009: 549-550 - 2008
- [j7]W. Eric Wong, Yu Lei:
Reachability Graph-Based Test Sequence Generation for Concurrent Programs. Int. J. Softw. Eng. Knowl. Eng. 18(6): 803-822 (2008) - [j6]Rick Kuhn, Yu Lei, Raghu Kacker:
Practical Combinatorial Testing: Beyond Pairwise. IT Prof. 10(3): 19-23 (2008) - [j5]Yu Lei, Raghu Kacker, D. Richard Kuhn, Vadim Okun, James Lawrence:
IPOG/IPOG-D: efficient test generation for multi-way combinatorial testing. Softw. Test. Verification Reliab. 18(3): 125-148 (2008) - [c15]Wenhua Wang, Sreedevi Sampath, Yu Lei, Raghu Kacker:
An Interaction-Based Test Sequence Generation Approach for Testing Web Applications. HASE 2008: 209-218 - [c14]Dazhi Zhang, Wenhua Wang, Donggang Liu, Yu Lei, David Chenho Kung:
Reusing Existing Test Cases for Security Testing. ISSRE 2008: 323-324 - [c13]Vangelis Metsis, Zhengyi Le, Yu Lei, Fillia Makedon:
Towards an evaluation framework for assistive environments. PETRA 2008: 12 - 2007
- [j4]Yu Lei, Richard H. Carver, Raghu Kacker, David Chenho Kung:
A combinatorial testing strategy for concurrent programs. Softw. Test. Verification Reliab. 17(4): 207-225 (2007) - [c12]Yu Lei, Raghu Kacker, D. Richard Kuhn, Vadim Okun, James Lawrence:
IPOG: A General Strategy for T-Way Software Testing. ECBS 2007: 549-556 - 2006
- [j3]Qizhi Ye, Yu Lei, David Chenho Kung:
A Blocking-based Approach to Protocol Validation. Comput. J. 49(5): 541-553 (2006) - [j2]Yu Lei, Richard H. Carver:
Reachability Testing of Concurrent Programs. IEEE Trans. Software Eng. 32(6): 382-403 (2006) - [c11]Yu Lei, Richard H. Carver, David Chenho Kung, Vidur Gupta, Monica Hernandez:
A State Exploration-Based Approach to Testing Java Monitors. ISSRE 2006: 256-265 - 2005
- [c10]Yu Lei, David Chenho Kung, Qizhi Ye:
A Blocking-Based Approach to Protocol Validation. COMPSAC (1) 2005: 301-306 - [c9]Yu Lei, S. Purushothaman Iyer:
An Approach to Unfolding Asynchronous Communication Protocols. FM 2005: 334-349 - [c8]W. Eric Wong, Yu Lei, Xiao Ma:
Effective Generation of Test Sequences for Structural Testing of Concurrent Programs. ICECCS 2005: 539-548 - [c7]Yu Lei, Richard H. Carver:
A New Algorithm for Reachability Testing of Concurrent Programs. ISSRE 2005: 346-355 - 2004
- [c6]Yu Lei, Richard H. Carver:
Reachability Testing of Semaphore-Based Programs. COMPSAC 2004: 312-317 - [c5]Yu Lei, Richard H. Carver:
Reachability testing of monitor-based programs. IASTED Conf. on Software Engineering and Applications 2004: 312-317 - [c4]Richard H. Carver, Yu Lei:
A General Model for Reachability Testing of Concurrent Programs. ICFEM 2004: 76-98 - 2002
- [j1]Kuo-Chung Tai, Yu Lei:
A Test Generation Strategy for Pairwise Testing. IEEE Trans. Software Eng. 28(1): 109-111 (2002) - [c3]Yu Lei, Kuo-Chung Tai:
Efficient Reachability Testing of Asynchronous Message-Passing Programs. ICECCS 2002: 35- - [c2]Yu Lei, Kuo-Chung Tai:
Blocking-based Simultaneous Reachability Analysis of Asynchronous Message-passing Programs. ISSRE 2002: 316-328
1990 – 1999
- 1998
- [c1]Yu Lei, Kuo-Chung Tai:
In-Parameter-Order: A Test Generation Strategy for Pairwise Testing. HASE 1998: 254-261
Coauthor Index
aka: Laleh S. Ghandehari
aka: Raghu N. Kacker
aka: Rick Kuhn
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-30 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint