Follow
Ajay Kumar Jha
Ajay Kumar Jha
Assistant Professor, North Dakota State University
Verified email at ndsu.edu - Homepage
Title
Cited by
Cited by
Year
Developer mistakes in writing Android manifests: An empirical study of configuration errors
AK Jha, S Lee, WJ Lee
2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017
512017
An empirical study of collaborative model and its security risk in Android
AK Jha, WJ Lee
Journal of Systems and Software 137, 550-562, 2018
242018
Modeling and test case generation of inter-component communication in Android
AK Jha, S Lee, WJ Lee
Mobile Software Engineering and Systems (MOBILESoft), 2015 2nd ACM …, 2015
162015
Analysis of Permission-based Security in Android through Policy Expert, Developer, and End User Perspectives.
AK Jha, WJ Lee
J. Univers. Comput. Sci. 22 (4), 459-474, 2016
132016
An empirical study of configuration changes and adoption in Android apps
AK Jha, S Lee, WJ Lee
Journal of Systems and Software 156, 164-180, 2019
102019
Characterizing Android-specific crash bugs
AK Jha, S Lee, WJ Lee
2019 IEEE/ACM 6th International Conference on Mobile Software Engineering …, 2019
102019
Capture and Replay Technique for Reproducing Crash in Android Applications
AK Jha, WJ Lee
Proceedings of the 12th IASTED International Conference in Software …, 2013
62013
Annotation practices in Android apps
AK Jha, S Nadi
2020 IEEE 20th International Working Conference on Source Code Analysis and …, 2020
52020
A framework for testing Android apps by reusing test cases
AK Jha, DY Kim, WJ Lee
2019 IEEE/ACM 6th International Conference on Mobile Software Engineering …, 2019
52019
Activity-based Event Capture and Replay Technique for Reproducing Crashes in Android Applications
AK Jha, WJ Lee
IEMEK Journal of Embedded Systems and Applications 9 (1), 1-9, 2014
52014
PyMigBench: A Benchmark for Python Library Migration
M Islam, AK Jha, S Nadi, I Akhmetov
2023 IEEE/ACM 20th International Conference on Mining Software Repositories …, 2023
42023
Permission-based security in android application: from policy expert to end user
AK Jha, S Lee, WJ Lee
Proceedings of the 2015 Conference on research in adaptive and convergent …, 2015
42015
Value-deterministic search-based replay for android multithreaded applications
AK Jha, S Jeong, WJ Lee
Proceedings of the 2013 Research in Adaptive and Convergent Systems, 381-386, 2013
42013
A Log-Based Testing Approach for Detecting Faults Caused by Incorrect Assumptions About the Environment
S JEONG, AK JHA, Y SHIN, WJ LEE
IEICE Transactions on Information and Systems 103 (1), 170-173, 2020
32020
Mining Annotation Usage Rules: A Case Study with MicroProfile
B Nuryyev, AK Jha, S Nadi, YK Chang, E Jiang, V Sundaresan
2022 IEEE International Conference on Software Maintenance and Evolution …, 2022
22022
PyMigBench and PyMigTax: A Benchmark and Taxonomy for Python Library Migration
M Islam, AK Jha, S Nadi
arXiv preprint arXiv:2207.01124, 2022
22022
Virtual prototype generation by shockwave flash for simulating HW components of embedded system
SY Jang, AK Jha, WJ Lee
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1755-1756, 2014
22014
JTestMigBench and JTestMigTax: A benchmark and taxonomy for unit test migration
AK Jha, M Islam, S Nadi
2023 IEEE International Conference on Software Analysis, Evolution and …, 2023
12023
A Human-in-the-loop Approach to Generate Annotation Usage Rules
G Mansur, KJ Ajay, N Sarah, A Karim, C Yee-Kang, J Emily
Proceedings of the 32nd Annual International Conference on Computer Science …, 2022
2022
Characterizing Python Library Migrations
M ISLAM, AK JHA, I AKHMETOV, S NADI
The system can't perform the operation now. Try again later.
Articles 1–20