Mining API patterns as partial orders from source code: from usage scenarios to specifications M Acharya, T Xie, J Pei, J Xu Proceedings of the the 6th joint meeting of the European software …, 2007 | 370 | 2007 |
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation D Westhoff, J Girao, M Acharya IEEE Transactions on mobile computing 5 (10), 1417-1431, 2006 | 348 | 2006 |
Intelligent jamming in wireless networks with applications to 802.11 b and other networks D Thuente, M Acharya Proc. of MILCOM 6, 100, 2006 | 241 | 2006 |
Practical change impact analysis based on static program slicing for industrial software systems M Acharya, B Robinson Proceedings of the 33rd international conference on software engineering …, 2011 | 170 | 2011 |
Secure comparison of encrypted data in wireless sensor networks M Acharya, J Girao, D Westhoff Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc …, 2005 | 82 | 2005 |
Mining API error-handling specifications from source code M Acharya, T Xie International Conference on Fundamental Approaches to Software Engineering …, 2009 | 77 | 2009 |
Intelligent jamming attacks, counterattacks and (counter) 2 attacks in 802.11 b wireless networks M Acharya, D Thuente Proceedings of the OPNETWORK-2005 Conference, Washington DC, USA, 2005 | 59 | 2005 |
Mining interface specifications for generating checkable robustness properties M Acharya, T Xie, J Xu 2006 17th International Symposium on Software Reliability Engineering, 311-320, 2006 | 43 | 2006 |
Impact analysis of configuration changes for test case selection X Qu, M Acharya, B Robinson 2011 IEEE 22nd International Symposium on Software Reliability Engineering …, 2011 | 38 | 2011 |
Intelligent jamming in 802.11 b wireless networks M Acharya, T Sharma, D Thuente, D Sizemore Proceedings of OPNETWORK. Washington DC, USA: OPNET, 2004 | 37 | 2004 |
Configuration selection using code change impact analysis for regression testing X Qu, M Acharya, B Robinson 2012 28th IEEE International Conference on Software Maintenance (ICSM), 129-138, 2012 | 33 | 2012 |
Jamming vulnerabilities of IEEE 802.11 e DJ Thuente, B Newlin, M Acharya MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007 | 28 | 2007 |
Method for distributing keys for encrypted data transmission in a preferably wireless sensor network J Girao, D Westhoff, MP Acharya US Patent 7,702,905, 2010 | 18 | 2010 |
Neighborhood structure assisted non-negative matrix factorization and its application in unsupervised point-wise anomaly detection I Ahmed, XB Hu, MP Acharya, Y Ding Journal of Machine Learning Research 22 (34), 1-32, 2021 | 17 | 2021 |
Oracle-based regression test selection T Yu, X Qu, M Acharya, G Rothermel 2013 IEEE Sixth International Conference on Software Testing, Verification …, 2013 | 16 | 2013 |
Improving software reliability and productivity via mining program source code T Xie, M Acharya, S Thummalapenta, K Taneja 2008 IEEE International Symposium on Parallel and Distributed Processing, 1-5, 2008 | 16 | 2008 |
Mining health models for performance monitoring of services M Acharya, V Kommineni 2009 IEEE/ACM International Conference on Automated Software Engineering …, 2009 | 11 | 2009 |
Effective generation of interface robustness properties for static analysis M Acharya, T Sharma, J Xu, T Xie 21st IEEE/ACM International Conference on Automated Software Engineering …, 2006 | 11 | 2006 |
Code drones MP Acharya, C Parnin, NA Kraft, A Dagnino, X Qu Proceedings of the 38th International Conference on Software Engineering …, 2016 | 9 | 2016 |
Machine learning enhanced real-time intrusion detection using timing information H Xu, F Mueller International Workshop on Trustworthy & Real-time Edge Computing for Cyber …, 2018 | 8 | 2018 |