default search action
Zude Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j9]Yao Lu, Xinjun Mao, Minghui Zhou, Yang Zhang, Zude Li, Tao Wang, Gang Yin, Huaimin Wang:
Motivation Under Gamification: An Empirical Study of Developers' Motivations and Contributions in Stack Overflow. IEEE Trans. Software Eng. 48(12): 4947-4963 (2022) - 2020
- [j8]Yao Lu, Xinjun Mao, Tao Wang, Gang Yin, Zude Li:
Improving students' programming quality with the continuous inspection process: a social coding perspective. Frontiers Comput. Sci. 14(5): 145205 (2020) - [c21]Yao Lu, Xinjun Mao, Minghui Zhou, Yang Zhang, Tao Wang, Zude Li:
Haste Makes Waste: An Empirical Study of Fast Answers in Stack Overflow. ICSME 2020: 23-34
2010 – 2019
- 2019
- [j7]Yao Lu, Xinjun Mao, Tao Wang, Gang Yin, Zude Li, Wanyuan Wang:
Studying in the 'Bazaar': An Exploratory Study of Crowdsourced Learning in GitHub. IEEE Access 7: 58930-58944 (2019) - 2018
- [j6]Yao Lu, Xinjun Mao, Zude Li, Yang Zhang, Tao Wang, Gang Yin:
Internal quality assurance for external contributions in GitHub: An empirical investigation. J. Softw. Evol. Process. 30(4) (2018) - [c20]Yao Lu, Xinjun Mao, Tao Wang, Gang Yin, Zude Li, Huaimin Wang:
Continuous inspection in the classroom: improving students' programming quality with social coding methods. ICSE (Companion Volume) 2018: 141-142 - 2016
- [c19]Yao Lu, Xinjun Mao, Zude Li, Yang Zhang, Tao Wang, Gang Yin:
Does the Role Matter? An Investigation of the Code Quality of Casual Contributors in GitHub. APSEC 2016: 49-56 - 2014
- [j5]Jun Long, Luda Wang, Zude Li, Zuping Zhang, Huiling Li, Guihu Zhao:
Lexical-semantic SLVM for XML Document Classification. J. Softw. 9(12): 3028-3034 (2014) - [c18]Jun Long, Luda Wang, Zude Li, Zuping Zhang:
Service retrieval based on hybrid SLVM of WSDL. Internetware 2014: 120-126 - 2013
- [c17]Jun Long, Luda Wang, Zude Li:
Research and design of the firewall penetration technology serving to distributed cloud resource. Internetware 2013: 16:1-16:4 - 2011
- [j4]Zude Li, Nazim H. Madhavji, Syed Shariyar Murtaza, Mechelle Gittens, Andriy V. Miranskyy, David Godwin, Enzo Cialini:
Characteristics of multiple-component defects and architectural hotspots: a large system case study. Empir. Softw. Eng. 16(5): 667-702 (2011) - [c16]Zude Li, Jun Long:
A Case Study of Measuring Degeneration of Software Architectures from a Defect Perspective. APSEC 2011: 242-249 - [c15]Syed Shariyar Murtaza, Nazim H. Madhavji, Mechelle Gittens, Zude Li:
Diagnosing new faults using mutants and prior faults. ICSE 2011: 960-963 - 2010
- [j3]Zude Li, Mechelle Gittens, Syed Shariyar Murtaza, Nazim H. Madhavji:
A towards an extended relational algebra for software architecture. ACM SIGSOFT Softw. Eng. Notes 35(3): 1-4 (2010) - [c14]Syed Shariyar Murtaza, Mechelle Gittens, Zude Li, Nazim H. Madhavji:
F007: finding rediscovered faults from the field using function-level failed traces of software in the field. CASCON 2010: 57-71
2000 – 2009
- 2009
- [c13]Xiaojun Ye, Zude Li, Bin Li, Feng Xie:
Trust and Privacy in Dissemination Control. ICEBE 2009: 173-180 - [c12]Zude Li, Mechelle Gittens, Syed Shariyar Murtaza, Nazim H. Madhavji, Andriy V. Miranskyy, David Godwin, Enzo Cialini:
Analysis of pervasive multiple-component defects in a large software system. ICSM 2009: 265-273 - [c11]Zude Li, Xiaojun Ye, Jianmin Wang:
Trusted resource dissemination in Internetware systems. Internetware 2009: 17 - [c10]Zude Li, Quazi Abidur Rahman, Remo Ferrari, Nazim H. Madhavji:
Does Requirements Clustering Lead to Modular Design?. REFSQ 2009: 233-239 - 2008
- [j2]Zude Li, Xiaojun Ye:
On Access-Unrestricted Data Anonymity and Privacy Inference Disclosure Control. Int. J. Inf. Secur. Priv. 2(4): 1-21 (2008) - [c9]Yalong Dong, Zude Li, Xiaojun Ye:
Privacy Inference Attacking and Prevention on Multiple Relative K-Anonymized Microdata Sets. APWeb 2008: 263-274 - 2007
- [c8]Xiaojun Ye, Zude Li, Yongnian Li:
Capture Inference Attacks for K-Anonymity with Privacy Inference Logic. DASFAA 2007: 676-687 - [c7]Zude Li, Quazi Abidur Rahman, Nazim H. Madhavji:
An Approach to Requirements Encapsulation with Clustering. WER 2007: 92-96 - 2006
- [j1]Zude Li, Xiaojun Ye:
Towards a dynamic multi-policy dissemination control model: (DMDCON). SIGMOD Rec. 35(1): 33-38 (2006) - [c6]Zude Li, Guoqiang Zhan, Xiaojun Ye:
Resource Management Continuity With Constraint Inheritance Relation. ARES 2006: 609-616 - [c5]Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang:
Privacy Preservation and Protection by Extending Generalized Partial Indices. BNCOD 2006: 102-114 - [c4]Zude Li, Guoqiang Zhan, Xiaojun Ye:
Towards a More Reasonable Generalization Cost Metric for K-Anonymization. BNCOD 2006: 258-261 - [c3]Zude Li, Guoqiang Zhan, Xiaojun Ye:
Towards an Anti-inference (K, l)-Anonymity Model with Value Association Rules. DEXA 2006: 883-893 - [c2]Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang:
FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy. TrustBus 2006: 132-141 - [c1]Zude Li, Guoqiang Zhan, Xiaojun Ye:
Role-Based Peer-to-Peer Model: Capture Global Pseudonymity for Privacy Protection. WAIM 2006: 193-204
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint