Follow
Mithun P. Acharya
Mithun P. Acharya
Senior Leader -- Artificial Intelligence, LexisNexis
Verified email at lexisnexis.com - Homepage
Title
Cited by
Cited by
Year
Mining API patterns as partial orders from source code: from usage scenarios to specifications
M Acharya, T Xie, J Pei, J Xu
Proceedings of the the 6th joint meeting of the European software …, 2007
3692007
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
D Westhoff, J Girao, M Acharya
IEEE Transactions on mobile computing 5 (10), 1417-1431, 2006
3482006
Intelligent jamming in wireless networks with applications to 802.11 b and other networks
D Thuente, M Acharya
Proc. of MILCOM 6, 100, 2006
2352006
Practical change impact analysis based on static program slicing for industrial software systems
M Acharya, B Robinson
Proceedings of the 33rd international conference on software engineering …, 2011
1702011
Secure comparison of encrypted data in wireless sensor networks
M Acharya, J Girao, D Westhoff
Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc …, 2005
832005
Mining API error-handling specifications from source code
M Acharya, T Xie
International Conference on Fundamental Approaches to Software Engineering …, 2009
712009
Intelligent jamming attacks, counterattacks and (counter) 2 attacks in 802.11 b wireless networks
M Acharya, D Thuente
Proceedings of the OPNETWORK-2005 Conference, Washington DC, USA, 2005
592005
Mining interface specifications for generating checkable robustness properties
M Acharya, T Xie, J Xu
2006 17th International Symposium on Software Reliability Engineering, 311-320, 2006
442006
Impact analysis of configuration changes for test case selection
X Qu, M Acharya, B Robinson
2011 IEEE 22nd International Symposium on Software Reliability Engineering …, 2011
392011
Intelligent jamming in 802.11 b wireless networks
M Acharya, T Sharma, D Thuente, D Sizemore
Proceedings of OPNETWORK. Washington DC, USA: OPNET, 2004
372004
Configuration selection using code change impact analysis for regression testing
X Qu, M Acharya, B Robinson
2012 28th IEEE International Conference on Software Maintenance (ICSM), 129-138, 2012
292012
Jamming vulnerabilities of IEEE 802.11 e
DJ Thuente, B Newlin, M Acharya
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
282007
Method for distributing keys for encrypted data transmission in a preferably wireless sensor network
J Girao, D Westhoff, MP Acharya
US Patent 7,702,905, 2010
182010
Oracle-based regression test selection
T Yu, X Qu, M Acharya, G Rothermel
2013 IEEE Sixth International Conference on Software Testing, Verification …, 2013
162013
Improving software reliability and productivity via mining program source code
T Xie, M Acharya, S Thummalapenta, K Taneja
2008 IEEE International Symposium on Parallel and Distributed Processing, 1-5, 2008
162008
Neighborhood structure assisted non-negative matrix factorization and its application in unsupervised point-wise anomaly detection
I Ahmed, XB Hu, MP Acharya, Y Ding
The Journal of Machine Learning Research 22 (1), 1624-1655, 2021
142021
Effective generation of interface robustness properties for static analysis
M Acharya, T Sharma, J Xu, T Xie
21st IEEE/ACM International Conference on Automated Software Engineering …, 2006
122006
Mining health models for performance monitoring of services
M Acharya, V Kommineni
2009 IEEE/ACM International Conference on Automated Software Engineering …, 2009
112009
Code drones
MP Acharya, C Parnin, NA Kraft, A Dagnino, X Qu
Proceedings of the 38th International Conference on Software Engineering …, 2016
92016
Machine learning enhanced real-time intrusion detection using timing information
H Xu, F Mueller
International Workshop on Trustworthy & Real-time Edge Computing for Cyber …, 2018
72018
The system can't perform the operation now. Try again later.
Articles 1–20