Weiqiang Kong
Weiqiang Kong
Verified email at - Homepage
Cited by
Cited by
Rosf: Leveraging information retrieval and supervised learning for recommending code snippets
H Jiang, L Nie, Z Sun, Z Ren, W Kong, T Zhang, X Luo
IEEE Transactions on Services Computing 12 (1), 34-46, 2016
Software for wearable devices: Challenges and opportunities
H Jiang, X Chen, S Zhang, X Zhang, W Kong, T Zhang
2015 IEEE 39th Annual Computer Software and Applications Conference 3, 592-597, 2015
A lightweight integration of theorem proving and model checking for system verification
W Kong, K Ogata, T Seino, K Futatsugi
12th Asia-Pacific Software Engineering Conference (APSEC'05), 8 pp., 2005
Multilevel permission extraction in android applications for malware detection
Z Wang, K Li, Y Hu, A Fukuda, W Kong
2019 international conference on computer, information and telecommunication …, 2019
An smt-based approach to bounded model checking of designs in state transition matrix
W Kong, T Shiraishi, N Katahira, M Watanabe, T Katayama, A Fukuda
IEICE transactions on information and systems 94 (5), 946-957, 2011
Algebraic approaches to formal analysis of the mondex electronic purse system
W Kong, K Ogata, K Futatsugi
Integrated Formal Methods: 6th International Conference, IFM 2007, Oxford …, 2007
Induction-guided falsification
K Ogata, M Nakano, W Kong, K Futatsugi
Formal Methods and Software Engineering: 8th International Conference on …, 2006
Facilitating multicore bounded model checking with stateless explicit-state exploration
W Kong, L Liu, T Ando, H Yatsu, K Hisazumi, A Fukuda
The Computer Journal 58 (11), 2824-2840, 2015
Formalization and model checking of sysml state machine diagrams by csp#
T Ando, H Yatsu, W Kong, K Hisazumi, A Fukuda
Computational Science and Its Applications–ICCSA 2013: 13th International …, 2013
A specification translation from behavioral specifications to rewrite specifications
M Nakamura, W Kong, K Ogata, K Futatsugi
IEICE transactions on information and systems 91 (5), 1492-1503, 2008
Towards sustainable information infrastructure platform for smart mobility-project overview
A Fukuda, K Hisazumi, S Ishida, T Mine, T Nakanishi, H Furusho, ...
2016 5th IIAI International Congress on Advanced Applied Informatics (IIAI …, 2016
Compiler testing: a systematic literature analysis
Y Tang, Z Ren, W Kong, H Jiang
Frontiers of Computer Science 14, 1-20, 2020
From local to global semantic clone detection
Y Yuan, W Kong, G Hou, Y Hu, M Watanabe, A Fukuda
2019 6th International Conference on Dependable Systems and Their …, 2020
Formal verification of software designs in hierarchical state transition matrix with SMT-based bounded model checking
W Kong, N Katahira, M Watanabe, T Katayama, K Hisazumi, A Fukuda
2011 18th Asia-Pacific Software Engineering Conference, 81-88, 2011
Detecting compiler warning defects via diversity-guided program mutation
Y Tang, H Jiang, Z Zhou, X Li, Z Ren, W Kong
IEEE Transactions on Software Engineering 48 (11), 4411-4432, 2021
Garakabu2: an SMT-based bounded model checker for HSTM designs in ZIPC
W Kong, G Hou, X Hu, T Ando, K Hisazumi, A Fukuda
Journal of information security and applications 31, 61-74, 2016
Translation rules of SysML state machine diagrams into CSP# toward formal model checking
T Ando, H Yatsu, W Kong, K Hisazumi, A Fukuda
International Journal of Web Information Systems 10 (2), 151-169, 2014
Towards reliable e-government systems with the OTS/CafeOBJ method
W Kong, K Ogata, K Futatsugi
IEICE TRANSACTIONS on Information and Systems 93 (5), 974-984, 2010
SDLV: Verification of steering angle safety for self-driving cars
H Wu, D Lv, T Cui, G Hou, M Watanabe, W Kong
Formal Aspects of Computing 33, 325-341, 2021
An SMT-based approach to bounded model checking of designs in communicating state transition matrix
W Kong, N Katahira, W Qian, M Watanabe, T Katayama, A Fukuda
2011 International Conference on Computational Science and Its Applications …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20