Krasniqi, R., Do, H. (2023). Unveiling Buggy Class Relationships: A Novel Approach to Detecting Quality Bugs. IEEE International Conference on Software Maintenance and Evolution (ICSME).
Krasniqi, R., Do, H. (2023). Exploring Generalizability of NLP-based Models for Modern Software Development Cross-Domain Environments. The 2nd Workshop on Natural Language-based Software Engineering (NLBSE).
Krasniqi, R., Do, H. (2023). A Hierarchical Topical Modeling Approach for Recommending Repair of Quality Bugs Repair of Quality Bugs. The 30th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2023).
Krasniqi, R., Do, H. (2022). Automatically Capturing Quality-Related Concerns in Bug Reports for Efficient Bug Triaging. Evaluation and Assessment in Software Engineering (EASE).
Piparia, S., Adamo, D., Bryce, R., Do, H., Bryant, B. R. (2021). Combinatorial Testing of Context Aware Android Applications (Invited Paper). Proceedings of FedCSIS 2021, Federated Conference on Computer Science and Information Systems. 17-26.
Madala, K., Do, H. (2021). A Dependency-based Combinatorial Approach for Reducing Effort for Scenario-based Safety Analysis of Autonomous Vehicles. Other. nternational Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS).
Madala, K., Do, H. (2021). Resolving Confusion of Unknowns in Autonomous Vehicles: Types and Perspectives. Other. nternational Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS).
Madala, K., Do, H. (2021). Functional Safety Hazards for Machine Learning Components in Autonomous Vehicles. IEEE International Conference on Industrial Cyber-Physical Systems.
Madala, K., Do, H. (2021). The Need for Location-based Machine Learning Models for Level 5 Autonomous Vehicles. International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS).
Madala, K., Hang, K., Do, H., Tenbergen, B. (2020). SACC - A property driven approach to expose undesired behaviors among systems components. IEEE International Symposium on Software Reliability Engineering.
Gaither, D. C., Madala, K., Do, H., Bryant, B. R. (2019). VeriCCM: Improving the Syntax and Semantics of Requirements Models. Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing - SAC '19. 1881-1884. ACM Press. http://dx.doi.org/10.1145/3297280.3299745
Hettiarachchi, C., Do, H. (2019). A Systematic Requirements and Risks-Based Test Case Prioritization Using a Fuzzy Expert System. 2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS). IEEE. http://dx.doi.org/10.1109/qrs.2019.00054
Madala, K., Do, H., Aceituna, D. (2019). Exposing Off-Nominal Behaviors in Multi-Robot Coordination. 2019 IEEE/ACM 2nd International Workshop on Robotics Software Engineering (RoSE). IEEE. http://dx.doi.org/10.1109/rose.2019.00006
Azizi, M., Do, H. (2018). A collaborative filtering recommender system for test case prioritization in web applications. Proceedings of the 33rd Annual ACM Symposium on Applied Computing - SAC '18. ACM Press. http://dx.doi.org/10.1145/3167132.3167299
Madala, K., Do, H., Aceituna, D. (2018). A combinatorial approach for exposing off-nominal behaviors. Proceedings of the 40th International Conference on Software Engineering - ICSE '18. ACM Press. http://dx.doi.org/10.1145/3180155.3180204
Azizi, M., Do, H. (2018). Graphite: A Greedy Graph-Based Technique for Regression Test Case Prioritization. 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE. http://dx.doi.org/10.1109/issrew.2018.00014
Azizi, M., Do, H. (2018). ReTEST: A Cost Effective Test Case Selection Technique for Modern Software Development. 2018 IEEE 29th International Symposium on Software Reliability Engineering (ISSRE). IEEE. http://dx.doi.org/10.1109/issre.2018.00025
Madala, K., Do, H., Aceituna, D. (2018). A Knowledge Acquisition Approach for Off-Nominal Behaviors. 2018 4th International Workshop on Requirements Engineering for Self-Adaptive, Collaborative, and Cyber Physical Systems (RESACS). IEEE. http://dx.doi.org/10.1109/resacs.2018.00012
Aceituna, D., Madala, K., Do, H. (2018). Deriving Functional Safety Requirements Using Undesired Combination State Templates. 2018 4th International Workshop on Requirements Engineering for Self-Adaptive, Collaborative, and Cyber Physical Systems (RESACS). IEEE. http://dx.doi.org/10.1109/resacs.2018.00006
Madala, K., Piparia, S., Do, H., Bryce, R. C. (2018). Finding Component State Transition Model Elements Using Neural Networks: An Empirical Study. 2018 5th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE). IEEE. http://dx.doi.org/10.1109/aire.2018.00014
Madala, K., Do, H., Aceituna, D. Combinatorial Approach for Exposing Off-Nominal Behaviors. IEEE International Conference on Software Engineering (ICSE). IEEE.
Gaither, D., Do, H., Bryant, B. R. (2017). Toward Detection of Abnormal Behaviors in Timing and Security Requirements. The 24th Asia-Pacific Software Engineering Conference (APSEC). IEEE.
Azizi, M., Do, H. A Collaborative Filtering Recommender System for Test Case Prioritization in Web Applications. The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC). IEEE.
Madala, K., Do, H., Aceituna, D. (2017). Hierarchical Model Exploration for Exposing Off-Nominal Behaviors. 14th Workshop on Model-Driven Engineering, Verification, and Validation (MoDeVVa). IEEE.
Madala, K., Gaither, D. C., Nielsen, R. D., Do, H. (2017). Automated Identification of Component State Transition Model Elements from Requirements. Proceedings of the 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW), 4th International Workshop on Artificial Intelligence for Requirements (AIRE). 386--392. Institute of Electrical and Electronics Engineers (IEEE).
Nurmuradov, D., Bryce, R., Do, H. (2016). Multilevel coarse-to-fine-grained prioritization for GUI and web applications. Proceedings of the 7th International Workshop on Automating Test Case Design, Selection, and Evaluation - A-TEST 2016. ACM Press. http://dx.doi.org/10.1145/2994291.2994292
Nurmuradov, D., Bryce, Ren\'ee,, Do, H. (2016). Multilevel coarse-to-fine-grained prioritization for GUI and web applications. Proceedings of the 7th International Workshop on Automating Test Case Design, Selection, and Evaluation. 1--7.
Anderson, J., Do, H., Salem, S. (2016). Customized Regression Testing Using Telemetry Usage Patterns. 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE. http://dx.doi.org/10.1109/icsme.2016.30
Anderson, J., Do, H., Salem, S. (2015). Experience report: Mining test results for reasons other than functional correctness. 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE). IEEE. http://dx.doi.org/10.1109/issre.2015.7381834
Aceituna, D., Do, H. (2015). Exposing the susceptibility of off-nominal behaviors in reactive system requirements. 2015 IEEE 23rd International Requirements Engineering Conference (RE). IEEE. http://dx.doi.org/10.1109/re.2015.7320416
Anderson, J., Salem, S., Do, H. (2015). Striving for Failure: An Industrial Case Study about Test Failure Prediction. 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering. IEEE. http://dx.doi.org/10.1109/icse.2015.134
Aceituna, D., Do, H., Srinivasan, S. (2014). A systematic approach to transforming system requirements into model checking specifications. Companion Proceedings of the 36th International Conference on Software Engineering - ICSE Companion 2014. ACM Press. http://dx.doi.org/10.1145/2591062.2591183
Anderson, J., Salem, S., Do, H. (2014). Improving the effectiveness of test suite through mining historical data. Proceedings of the 11th Working Conference on Mining Software Repositories - MSR 2014. ACM Press. http://dx.doi.org/10.1145/2597073.2597084
Hettiarachchi, C., Do, H., Choi, B. (2014). Effective Regression Testing Using Requirements and Risks. 2014 Eighth International Conference on Software Security and Reliability. IEEE. http://dx.doi.org/10.1109/sere.2014.29
Schaefer, C. J., Do, H. (2014). Model-Based Exploratory Testing: A Controlled Experiment. 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops. IEEE. http://dx.doi.org/10.1109/icstw.2014.31
Hossain, M., Do, H., Eda, R. (2014). Regression Testing for Web Applications Using Reusable Constraint Values. 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops. IEEE. http://dx.doi.org/10.1109/icstw.2014.35
Andrews, A., Do, H. (2014). Trade-Off Analysis for Selective versus Brute-Force Regression Testing in FSMWeb. 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering. IEEE. http://dx.doi.org/10.1109/hase.2014.33
Schaefer, C., Hyunsook Do,, Slator, B. M. (2013). Crushinator: A framework towards game-independent testing. 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE. http://dx.doi.org/10.1109/ase.2013.6693143
Schwartz, A., Do, H. (2013). A Fuzzy Expert System for Cost-Effective Regression Testing Strategies. 2013 IEEE International Conference on Software Maintenance. IEEE. http://dx.doi.org/10.1109/icsm.2013.11
Arafeen, M. J., Do, H. (2013). Test Case Prioritization Using Requirements-Based Clustering. 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation. IEEE. http://dx.doi.org/10.1109/icst.2013.12
Alsanousi, B., Albesher, A. S., Do, H., Ludi, S. A. (2023). Investigating the user experience and evaluating usability issues in ai-enabled learning mobile apps: An analysis of user reviews. Other. 14(6), . Science and Information (SAI) Organization Limited.
2. Alsanousi, B., Ludi, S., Ludi, S. A. (2023). Investigating the user experience and evaluating usability issues in AI-enabled learning mobile apps: An analysis of user reviews.. 14(6), . Denton:. 3940 N Elm St.
Krasniqi, R., Do, H. (2023). Towards Semantically Enhanced Detection of Emerging Quality Concerns in Source Code. Other.
Krasniqi, R., Do, H. (2023). A Multi-Model Framework for Semantically Enhancing Detection of Quality-Related Bug Report Descriptions. Empirical Software Engineering.
Madala, K., Do, H., Tenbergen, B. (2023). ADSA – Association-Driven Safety Analysis to Expose Unknown Safety Issues. IEEE Transactions on Dependable and Secure Computing.
Madala, K., Do, H., Tenbergen, B. (2022). Identifying Safety Issues from Energy Conservation Requirements. Other.
Madala, K., Do, H. (2022). A Hierarchical Dependency-Driven Scenario-Based Testing for Autonomous Vehicles. Other.
Madala, K., Piparia, S., Blanco, E., Do, H., Bryce, R. (2021). Model Elements Identification using Neural Networks: A Comprehensive Study. Other. 26(1), 32.
Madala, K., Piparia, S., Blanco, E., Do, H., Bryce, R. C. (2020). Model elements identification using neural networks: a comprehensive study. Other. 1--30. Springer.
Eda, R., Do, H. (2019). An efficient regression testing approach for PHP Web applications using test selection and reusable constraints. Other. 27(4), 1383-1417. Springer Science and Business Media LLC. http://dx.doi.org/10.1007/s11219-019-09449-2
Anderson, J., Azizi, M., Salem, S., Do, H. (2019). On the use of usage patterns from telemetry data for test case prioritization. Other. 113, 110-130. Elsevier BV. http://dx.doi.org/10.1016/j.infsof.2019.05.008
Aceituna, D., Do, H. (2019). Addressing the state explosion problem when visualizing off-nominal behaviors in a set of reactive requirements. Other. 24(2), 161-180. Springer Science and Business Media LLC. http://dx.doi.org/10.1007/s00766-017-0281-y
Aceituna, D., Do, H. (2017). Addressing the state explosion problem when visualizing off-nominal behaviors in a set of reactive requirements. Other. 22, . Springer Nature. http://dx.doi.org/10.1007/s00766-017-0281-y
Schwartz, A., Do, H. (2016). Cost-effective regression testing through Adaptive Test Prioritization strategies. Journal of Systems and Software. 115, 61-81. Elsevier BV. http://dx.doi.org/10.1016/j.jss.2016.01.018
Srikanth, H., Hettiarachchi, C., Do, H. (2016). Requirements based test prioritization using risk factors: An industrial study. Journal of Information and Software Technology. 69, 71-83. Elsevier BV. http://dx.doi.org/10.1016/j.infsof.2015.09.002
Hettiarachchi, C., Do, H., Choi, B. (2016). Risk-based test case prioritization using a fuzzy expert system. Journal of Information and Software Technology. 69, 1-15. Elsevier BV. http://dx.doi.org/10.1016/j.infsof.2015.08.008
Do, H., Hossain, M. (2014). An efficient regression testing approach for PHP web applications: a controlled experiment. Journal of Software Testing, Verification, and Reliability. 24(5), 367-385.
Aceituna, D., Walia, G., Do, H., Lee, S. (2014). Model-based requirements verification method: Conclusions from two controlled experiments. Journal of Information and Software Technology. 56(3), 321-334.
Do, H., Hossain, M. (2014). An efficient regression testing approach for PHP web applications: a controlled experiment. Journal of Software Testing, Verification, and Reliability. 24(5), 367-385. Wiley-Blackwell. http://dx.doi.org/10.1002/stvr.1540
Aceituna, D., Walia, G., Do, H., Lee, S. (2014). Model-based requirements verification method: Conclusions from two controlled experiments. Journal of Information and Software Technology. 56(3), 321-334. Elsevier BV. http://dx.doi.org/10.1016/j.infsof.2013.11.004
Marback, A., Do, H., He, K., Kondamarri, S., Xu, D. (2013). A threat model-based approach to security testing. Software: Practice and Experience. 43(2), 241-258.
Marback, A., Do, H., He, K., Kondamarri, S., Xu, D. (2012). Journal of Software: Practice and Experience. 43, 241-258.
Do, H., Mirarab, S., Tahvildari, L., Rothermel, G. (2010). IEEE Transactions on Software Engineering. 36(5), .
Orso, A., Do, H., Rothermel, G., Harrold, M. J., Rosenblum, D. S. (2007). Journal of Software Testing, Verification, and Reliability. 17(2), .
Do, H., Rothermel, G., Kinneer, A. (2006). Other. 11(1), .
Do, H., Rothermel, G. (2006). IEEE Transactions on Software Engineering. 32(9), .
Do, H., Elbaum, S., Rothermel, G. (2005). Other. 10(4), .