default search action
Lin Deng 0001
Person information
- affiliation: Towson University, Towson, MD, USA
Other persons with the same name
- Lin Deng — disambiguation page
- Lin Deng 0002 — Chinese Academy of Sciences, South China Sea Institute of Oceanology, Guangzhou, China
- Lin Deng 0003 — Sichuan University, National Key Laboratory of Fundamental Science on Synthetic Vision, Chengdu, China
- Lin Deng 0004 — Beijing Jiaotong University, Department of Physics, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Josue Molina-Morales, Lin Deng, Josh Dehlinger, Suranjan Chakraborty:
Mutant-Kraken: A Mutation Testing Tool for Kotlin. ICSTW 2024: 227-236 - 2023
- [c29]Honghe Zhou, Phuong Dinh Nguyen, Lin Deng, Weifeng Xu, Josh Dehlinger, Suranjan Chakraborty:
Reconstructing Android User Behavior through Timestamped State Models. COMPSAC 2023: 574-585 - [c28]Jonathan Li, Steven Pugh, Honghe Zhou, Lin Deng, Josh Dehlinger, Suranjan Chakraborty:
Experimental Evaluation of Adversarial Attacks Against Natural Language Machine Learning Models. SERA 2023: 341-344 - [c27]Eric Xu, Alex S. Xu, Danny Ferreira, Lin Deng:
A Hands-on Digital Forensic Lab to Investigate Morris Worm Attack. SIGCSE (2) 2023: 1283 - 2022
- [c26]Weifeng Xu, Lin Deng, Dianxiang Xu:
Towards Designing Shared Digital Forensics Instructional Materials. COMPSAC 2022: 117-122 - [c25]Honghe Zhou, Lin Deng, Weifeng Xu, Wei Yu, Josh Dehlinger, Suranjan Chakraborty:
Towards Internet of Things (IoT) Forensics Analysis on Intelligent Robot Vacuum Systems. SERA 2022: 91-98 - [c24]Lin Deng, Bingyang Wei, Jin Guo, Matt Benke, Tyler Howard, Matt Krause, Aman Patel:
Securing Sensitive Data in Java Virtual Machines. SERA 2022: 128-131 - 2021
- [c23]Garrett Partenza, Trevor Amburgey, Lin Deng, Josh Dehlinger, Suranjan Chakraborty:
Automatic Identification of Vulnerable Code: Investigations with an AST-Based Neural Network. COMPSAC 2021: 1475-1482 - [c22]Samuel Peacock, Lin Deng, Josh Dehlinger, Suranjan Chakraborty:
Automatic Equivalent Mutants Classification Using Abstract Syntax Tree Neural Networks. ICST Workshops 2021: 13-18 - [c21]Rajesh Kumar Gnanasekaran, Suranjan Chakraborty, Josh Dehlinger, Lin Deng:
Using Recurrent Neural Networks for Classification of Natural Language-based Non-functional Requirements. REFSQ Workshops 2021 - [c20]Suranjan Chakraborty, Lin Deng, Josh Dehlinger:
Towards authentic undergraduate research experiences in software engineering and machine learning. EASEAI@ESEC/SIGSOFT FSE 2021: 54-57 - 2020
- [c19]Lin Deng, Josh Dehlinger, Suranjan Chakraborty:
Teaching Software Testing with Free and Open Source Software. ICST Workshops 2020: 412-418
2010 – 2019
- 2019
- [j5]Wesley Dingman, Aviel Cohen, Nick Ferrara, Adam Lynch, Patrick Jasinski, Paul E. Black, Lin Deng:
Defects and Vulnerabilities in Smart Contracts, a Classification using the NIST Bugs Framework. Int. J. Networked Distributed Comput. 7(3): 121-132 (2019) - [c18]Patrick Chapman, Dianxiang Xu, Lin Deng, Yin Xiong:
Deviant: A Mutation Testing Tool for Solidity Smart Contracts. Blockchain 2019: 319-324 - [c17]Cody Baker, Lin Deng, Suranjan Chakraborty, Josh Dehlinger:
Automatic Multi-class Non-Functional Software Requirements Classification Using Neural Networks. COMPSAC (2) 2019: 610-615 - [c16]Lin Deng, Jing Tian, Christopher Cornwell, Victoria Phillips, Long Chen, Amro Alsuwaida:
Towards an Augmented Reality-Based Mobile Math Learning Game System. HCI (35) 2019: 217-225 - [c15]Nicholas Saccente, Josh Dehlinger, Lin Deng, Suranjan Chakraborty, Yin Xiong:
Project Achilles: A Prototype Tool for Static Method-Level Vulnerability Detection of Java Source Code Using a Recurrent Neural Network. ASE Workshops 2019: 114-121 - [c14]Nicholas Visalli, Lin Deng, Amro Alsuwaida, Zachary Brown, Manish Joshi, Bingyang Wei:
Towards Automated Security Vulnerability and Software Defect Localization. SERA 2019: 90-93 - [c13]Wesley Dingman, Aviel Cohen, Nick Ferrara, Adam Lynch, Patrick Jasinski, Paul E. Black, Lin Deng:
Classification of Smart Contract Bugs Using the NIST Bugs Framework. SERA 2019: 116-123 - 2018
- [j4]Lin Deng, Jeff Offutt:
Experimental Evaluation of Redundancy in Android Mutation Testing. Int. J. Softw. Eng. Knowl. Eng. 28(11-12): 1597-1618 (2018) - [c12]Lin Deng, Jeff Offutt:
Reducing the Cost of Android Mutation Testing. SEKE 2018: 542-541 - 2017
- [j3]Lin Deng, Jeff Offutt, Paul Ammann, Nariman Mirzaei:
Mutation operators for testing Android apps. Inf. Softw. Technol. 81: 154-168 (2017) - [c11]Weifeng Xu, Dianxiang Xu, Lin Deng:
Measurement of Source Code Readability Using Word Concreteness and Memory Retention of Variable Names. COMPSAC (1) 2017: 33-38 - [c10]Lin Deng, Jeff Offutt, David Samudio:
Is Mutation Analysis Effective at Testing Android Apps? QRS 2017: 86-93 - 2016
- [j2]Deanna D. Caputo, Shari Lawrence Pfleeger, M. Angela Sasse, Paul Ammann, Jeff Offutt, Lin Deng:
Barriers to Usable Security? Three Organizational Case Studies. IEEE Secur. Priv. 14(5): 22-32 (2016) - [c9]Upsorn Praphamontripong, Jeff Offutt, Lin Deng, Jingjing Gu:
An Experimental Evaluation of Web Mutation Operators. ICST Workshops 2016: 102-111 - 2015
- [j1]Guo-Xian Yu, Guoji Zhang, Zili Zhang, Zhiwen Yu, Lin Deng:
Semi-supervised classification based on subspace sparse representation. Knowl. Inf. Syst. 43(1): 81-101 (2015) - [c8]Lin Deng, Nariman Mirzaei, Paul Ammann, Jeff Offutt:
Towards mutation analysis of Android apps. ICST Workshops 2015: 1-10 - 2014
- [c7]Bob Kurtz, Paul Ammann, Márcio Eduardo Delamaro, Jeff Offutt, Lin Deng:
Mutant Subsumption Graphs. ICST Workshops 2014: 176-185 - [c6]Márcio Eduardo Delamaro, Lin Deng, Vinicius Humberto Serapilha Durelli, Nan Li, Jeff Offutt:
Experimental Evaluation of SDL and One-Op Mutation for C. ICST 2014: 203-212 - [c5]Márcio Eduardo Delamaro, Lin Deng, Nan Li, Vinicius Humberto Serapilha Durelli, Jeff Offutt:
Growing a Reduced Set of Mutation Operators. SBES 2014: 81-90 - 2013
- [c4]Lin Deng, Jeff Offutt, Nan Li:
Empirical Evaluation of the Statement Deletion Mutation Operator. ICST 2013: 84-93 - [c3]Nan Li, Xin Meng, Jeff Offutt, Lin Deng:
Is bytecode instrumentation as good as source code instrumentation: An empirical study with industrial tools (Experience Report). ISSRE 2013: 380-389 - 2012
- [c2]Weifeng Xu, Lin Deng, Qing Zheng:
Annotating Resources in Sequence Diagrams for Testing Web Security. ITNG 2012: 873-874
2000 – 2009
- 2008
- [c1]Lin Deng, Xiaoming Wen:
Efficient Bar-Code Watermark System to Protectagricultural Products Information Andcopyright. CCTA (3) 2008: 1637-1645
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 22:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint