An integrated hazard identification method based on the hierarchical Colored Petri Net R Wang, W Zheng, C Liang, T Tang Safety science 88, 166-179, 2016 | 39 | 2016 |
Safety case confidence propagation based on Dempster–Shafer theory R Wang, J Guiochet, G Motet, W Schön International Journal of Approximate Reasoning 107, 46-64, 2019 | 28 | 2019 |
Confidence assessment framework for safety arguments R Wang, J Guiochet, G Motet Computer Safety, Reliability, and Security: 36th International Conference …, 2017 | 24 | 2017 |
Modelling confidence in railway safety case R Wang, J Guiochet, G Motet, W Schön Safety science 110, 286-299, 2018 | 20 | 2018 |
DS theory for argument confidence assessment R Wang, J Guiochet, G Motet, W Schön Belief Functions: Theory and Applications: 4th International Conference …, 2016 | 19 | 2016 |
Automatic obstacle detection method for the train based on deep learning Q Zhang, F Yan, W Song, R Wang, G Li Sustainability 15 (2), 1184, 2023 | 14 | 2023 |
Automated Test Approach Based on All Paths Covered Optimal Algorithm and Sequence Priority Selected Algorithm W Zheng, C Liang, R Wang, W Kong IEEE Transactions on Intelligent Transportation Systems 15 (6), 2551-2560, 2014 | 13 | 2014 |
Confidence in safety argument-An assessment framework based on belief function theory R Wang INSA de Toulouse, 2018 | 6 | 2018 |
A framework for assessing safety argumentation confidence R Wang, J Guiochet, G Motet Software Engineering for Resilient Systems: 8th International Workshop …, 2016 | 6 | 2016 |
Research and application of the BFM-STAMP hazard analysis method R Wang, W Zheng 2013 IEEE International Conference on Intelligent Rail Transportation …, 2013 | 3 | 2013 |
Efficient generation of valid test inputs for deep neural networks via gradient search Z Jiang, H Li, R Wang Journal of Software: Evolution and Process 36 (4), e2550, 2024 | 2 | 2024 |
Important-unit Coverage for Recurrent Neural Network X Liu, H Li, R Wang, Z Jiang 2021 IEEE International Symposium on Software Reliability Engineering …, 2021 | 1 | 2021 |
A Review of Software Reliability Testing Techniques Z Jiang, H Li, D Zhang, R Wang, J Zhang, X Li, M Zhang, P Wang Journal of computing and information technology 28 (3), 147-164, 2020 | 1 | 2020 |
An Integrated Hazard Identification Method for Socio-technical Systems based on STPA. R Wang, W Zheng, C Liang, G Motet GI-Jahrestagung, 591-596, 2014 | 1 | 2014 |
Exploring the sequence-function space of microbial fucosidases A Martínez Gascueña, H Wu, R Wang, CD Owen, PJ Hernando, ... Communications Chemistry 7 (1), 137, 2024 | | 2024 |
Strong Transferable Adversarial Attacks via Ensembled Asymptotically Normal Distribution Learning Z Fang, R Wang, T Huang, L Jing Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2024 | | 2024 |
Intrusion Detection with Set-Valued Classification: Leveraging Dempster-Shafer Theory and Deep Learning L Wu, Y Xu, Z Dai, R Wang, L Chen 2023 9th International Conference on Computer and Communications (ICCC …, 2023 | | 2023 |
Uncertainty Quantification for Semantic Segmentation Models via Evidential Reasoning R Wang, M Wang, C Liang, Z Jiang International Conference on Computer Safety, Reliability, and Security, 218-229, 2023 | | 2023 |
Rear-End Collision Risk Analysis for Autonomous Driving C Liang, M Ghazel, Y Ci, NEE Faouzi, R Wang, W Zheng International Conference on Computer Safety, Reliability, and Security, 271-282, 2023 | | 2023 |
Approximate better, Attack stronger: Adversarial Example Generation via Asymptotically Gaussian Mixture Distribution Z Fang, R Wang, T Huang, L Jing arXiv preprint arXiv:2209.11964, 2022 | | 2022 |