


default search action
DSA 2020: Xi'an, China
- 7th International Conference on Dependable Systems and Their Applications, DSA 2020, Xi'an, China, November 28-29, 2020. IEEE 2020, ISBN 978-0-7381-2422-3

- David Shepherd:

Keynote Speech I The Push to Product - Strategies for Taking Your Research Into Practice. xviii-xx - Zhong-Hua Wang, Jian-Feng Ma, Wen Sheng Niu, Hui-Ya Li:

Architecture of Security Protection technology for Aviation Cyberspace. 21-24 - Shuting Kang, Tong Wang

, PengQi Wang, Feng Wang, Qian Dong, Guang Yang, Lingzhong Meng, Yunzhi Xue:
A Coverage-Based Effective Data Augmentation Framework. 25-30 - Xiaobing Wang, Xiaoyu Yang, Chunyi Li

:
A Formal Verification Method for Smart Contract. 31-36 - Songling Qin, Jinfu Chen, Zufa Zhang, Yisong Liu, Lingling Zhao, Bo Liu, Jingyi Chen:

A Malware Identification Approach Based on Improved SVM in Network Traffic. 37-40 - Jin Yang, Baoling Sheen, Juan Roa:

A Middle Layer Abstraction-Based Open Platform for V2X Safety and Application Study. 41-46 - Shanling Li, Zhanwei Hui:

A model based program comparison test method. 47-48 - Lingzhong Meng, Yang Bao, Shuting Kang, DongBo Zhao, Guang Yang, Yuan Shi, PengQi Wang, Qian Dong, Yunzhi Xue:

A rapid test method for autonomous ability of unmanned control strategy in dangerous situations. 49-57 - Limin Zhang, Giap Weng Ng, Yu-Beng Leau:

A real-time Information Exchange Strategy for Big Data Volume Systems Based on Internet of Things. 58-63 - Zhou Yang, Jueyu Chen:

A Smart Meter-Reading Framework With Secret Key Sharing and Support Vector Machine Algorithms. 64-68 - Dongcheng Li, W. Eric Wong, Matthew Chau, Sean Pan, Liang-Seng Koh:

A Survey ofNFC Mobile Payment: Challenges and Solutions using Blockchain and Cryptocurrencies. 69-77 - Hao Chen, Zhilei Ren, Lei Qiao, Zhide Zhou, Guojun Gao, Yue Ma, He Jiang:

AdaBoost-based Refused Bequest Code Smell Detection with Synthetic Instances. 78-89 - Qinchen Liu, Jianwen Xiang, Bin Xu, Dongdong Zhao, Wenhua Hu, Jian Wang:

Aging-Related Bugs Prediction Via Convolutional Neural Network. 90-98 - James Msughter Adeke, Jinfu Chen, Lei Zhang, Richard N. K. Mensah

, Kun Tong:
An Efficient Approach Based on Parameter Optimization for Network Traffic Classification Using Machine Learning. 99-107 - Gaolei Yi, Xinyi Wang, Yichen Wang:

An Empirical Study of Counterexample-Guided Fuzzing for Neural Networks Verification. 108-113 - Zekun Song, Yichen Wang, Wentao Wang, Jing Zhang:

An Empirical study of Exploring Relevant Metrics to Assess Software Product Quality. 114-124 - Yifei Yang, Wei Yuan, Yansong Li, Desheng Wang, Jia Liu, Tieke He:

An Empirical Study of Law Articles Prediction on Transportation Legal Cases. 125-130 - Shuyue Fan, Chun Liu, Zheng Li:

An Empirical Study on The Impact of The Interaction between Feature Selection and Sampling in Defect Prediction. 131-140 - Baodi Ning, Guanqin Zhang, Zexin Zhong

:
An Evolutionary Perspective: A Study of Anubis Android Banking Trojan. 141-150 - Cheng Li, Liang Kou, Xu Zhang:

An Intelligent Combination Algorithm for Traffic Flow Prediction. 151-156 - Qi Ao:

An Intrusion Detection Method for Industrial Control System against Stealthy Attack. 157-161 - Yudi Liu, Minyan Lu, Di Peng, Jie Wang, Jun Ai:

Analysis on Adversarial Robustness of Deep Learning Model LeNet-5 Based on Data Perturbation. 162-167 - Peng Li, Wei Niu:

Applications of LSTM Model for Aeroengine Forecasting. 168-172 - Anqi Wang, Hao Wang, Bo Jiang, Wing Kwong Chan:

Artemis: An Improved Smart Contract Verification Tool for Vulnerability Detection. 173-181 - Shiyi Kong, Minyan Lu, Chao Tang, Shuguang Wang:

Correlation Analysis between Software Structure Measures and Error Execution Path Deviation. 182-187 - Zhe Li, Zhijun Deng:

Data link network technology of UAV system. 188-189 - Quan Chen, Xi-Xi Zhang, Yu Chen, Wei Jiang, Guan Gui, Hikmet Sari:

Deep Learning-Based Automatic Safety Detection System for Crack Detection. 190-194 - Xiangfei Gao, Feng Gao:

Design and implementation of protocol processing model based on responsibility chain and reflection mechanism. 195-200 - Ying Zhao, Zhongwei Wang, Zhenghong Li, Rui Xu, Enliang Ding:

Design of a Center of Gravity Control Law with Unbalanced Fuel in Aircraft Wing Tanks. 201-205 - Jiang Wu, Yipeng Liu, Xin Gao, Lin Deng, Lei Guo, Xinyu Zhang:

Design of Multi-unmanned Platform Collaborative Demonstration Environment. 206-212 - Rui Chen, Tingting Yu, Yunsong Jiang, Chunpeng Jia, Chao Li, Dongdong Gao, Mengfei Yang:

Detecting Out-of-Bounds Array Access Errors in Aerospace Embedded Software. 213-218 - Haonan Yao, Yang Liu, Xiaoyi Zhang:

Developing deep LSTM model for real-time path planning in unknown environments. 219-225 - Zeqian Dong, Long Tang

, Cong Tian:
Distilling Knowledge in Adversarial Attack. 226-233 - Xueli Jie, Yun Lin:

DSR: A Deep Learning Framework Towards Modulation Signal Retrieval. 234-239 - Zhiqin Cao, Yichen Wang, Peng Guo, Bo Tian:

EFSM Test Data Generation Based on Fault Propagation and Multi-Population Genetic Algorithm. 240-245 - Shuang Zhang, Xinyu Wan, Deqi Kong, Yangming Guo:

Embedded Virtualization Computing Platform Security Architecture Based on Trusted Computing. 246-250 - Zhida Bao, Haojun Zhao:

Evaluation of Adversarial Attacks Based on DL in Communication Networks. 251-252 - Danmei Wang:

Face Determination Based on Multi-template and Convolution. 253-257 - Lilei Zhang, Jinyong Yao, Kai Wang:

Fast Test Method of Intelligent Image Recognition System Based on Antagonistic Samples. 258-262 - Xuliang Chen, Jianhui Jiang, Wei Zhang

, Xuzei Xia:
Fault Diagnosis for Open Source Software Based on Dynamic Tracking. 263-268 - Rui Wang, Jingchao Li, Bo Deng, Bin Zhang:

Fault Diagnosis Method of Equipotential Planet Map Based on Fusion Features. 269-274 - Jianfeng An, Hongjun You, Fengqing Xie, Yuanlin Yang, Jinhua Sun:

FIG-QEMU: A Fault Inject Platform Supporting Full System Simulation. 275-278 - Shouquan Xu:

FPGA Physical Automation Verification Technology Based on VCD Waveform. 279-284 - Long Tang

, Bin Yu:
Generating Adversarial Examples in Limited Queries with Image Encoding and Noise Decoding. 285-292 - Ke Yuan, Longwei Yang, Yabing Huang, Zheng Li:

Heart Disease Prediction Algorithm Based on Ensemble Learning. 293-298 - Yuzhi Zhou, Xi-Xi Zhang, Jinlong Sun, Jie Yang, Guan Gui:

Implementation of Mesh Flying Ad-hoc Network For Emergency Communication Systems. 299-304 - Yucheng Cui, Zhiyu Xi:

Intelligent Detumbling Control for a Micro-Satellite with Bounded Inputs. 305-310 - Xiao Zhang, Xiaoling Liu:

Interference Signal Recognition Based on Multi-Modal Deep Learning. 311-312 - Shudi Guo, Shihai Wang, Bin Liu, Tengfei Shi:

KBAA: An adversarial example generation method for KBQA task. 313-318 - Chengfeng Li, Xi Liu, Hui Wu, Haifeng Li:

Knowledge-based Defect Prediction and Test Case Generation for Radar Software Fault Prevention. 319-323 - Wei Jiang, Tianliang Liu, Yu Chen, Quan Chen, Xi-Xi Zhang, Guan Gui:

Lightweight Convolutional Neural Network-Based Method for Crane Safety Inspection. 324-329 - Yueyao Niu, Wei Han, Xiaodi Dai:

Load Balancing Evaluation of Multi-core Processors based on BMP Architecture. 330 - Chengying Mao

, Xiaorong Yi, Tsong Yueh Chen
:
Metamorphic Robustness Testing for Recommender Systems: A Case Study. 331-336 - Changbo Hou, Guowei Liu

, Lijie Hua, Yun Lin:
Multimodal Feature Fusion Recognition of Modulated Signals Based on Image and Waveform Domain. 337-342 - Li Liu, Peipei Yang, Tian Zhou, Yunyi Li, Wenmei Li, Guan Gui:

Nonon-Convex Low-Rank Minimization for Sparse-View CT Reconstruction via Nonlocal-Group Dictionary Learning. 343-348 - Yongfeng Yin, Xuefeng Wang, Qingran Su:

On Test Sequcence Generation of Time-Triggered Ethernet Using Genetic Algorithm. 349-354 - Pengpeng Sun, Yunwei Dong:

On Vulnerability Analysis of Nodes against Cross-domain Cascading Failures Propagation in Active Distribution Network Cyber-physical System. 355-363 - Gu Bin-Bing, Li Yin, Ting-Ting Jiang:

Parametric Software Defect Patterns Based on Test Perspective. 364-370 - Na Du, Zhihong Liang, Yuxiang Huang, Zhichang Guo, Hongji Yang, Sasa Wang:

Performance optimisation Method of PBFT Consensus for Supply Chain Integration SVM. 371-377 - Desheng Wang, Yubo Qian, Yu Xing, Yansong Li, Yifei Yang, Qing Wu, Tieke He:

Problem Kit System for Expression Ability Evaluation. 378-384 - Changbo Hou, Lijie Hua, Guowei Liu, Yun Lin:

Radar Signal Separation and Recognition based on Semantic Segmentation. 385-390 - ChaoHui Feng, Zhe Cui, GuangXiang Yang, ZhiSen Wang, XianXi Yang:

Reasearch on Similar Flight Numbers of LD Algorithm. 391-397 - Lei Song, Zhongxi Lu, Sirirat Petsangsri:

Reconstruction of Smart Learning Space Based on Digital Twin (DT) Technology. 398-406 - Zijian Zhang, Chaozhang Lv, Meijun Sun, Zheng Wang:

Reliable and Robust Weakly Supervised Attention Networks for Surface Defect Detection. 407-414 - Jiajia Chen, Ying Wang, Ao Li, Kezheng Lin:

Reliable Multiview Learning for Spectral Clustering. 415-422 - Liu Tang, You Li, Hongwei Wang, Huan Zhao, Luze Ma, Yuming Sun:

Research and implementation of an automatic simulation tool. 423-428 - Zhe Cui, XianXi Yang, ChaoHui Feng, GuangXiang Yang:

Research on Characteristics of Aircraft Traffic Flow in Airport Surface. 429-440 - Zhe Shen, Jingchao Li, Jialan Shen, Bin Zhang:

Research on Fault Diagnosis of Rolling Bearings Based on Fractal Dimension. 441-446 - Defei Hou, Yongfeng Yin, Qingran Su, Lijun Liu:

Software Refactoring Scheme Based on NSGA-II Algorithm. 447-452 - Yu-Ping Zhu, Jun Shao, Yong Cai

, Yue Shen:
Research on the Knowledge Ontology Model of Attribute-oriented Airworthiness Review Compliance Activities. 453-458 - Shuanqi Wang, Zhibo Li, Xin He, Ke Sheng, Jingxuan Zhou, Wei Wu:

Safety Argument Pattern Language of Safety-Critical Software. 459-467 - Xiao-Ting Meng, Li-Li Yu:

Security Testing of Unmanned Flight System. 468-471 - Xining Cui, Yukai Hao, Xiaodi Dai:

Simulation Verification Technology of Virtual-Real-Integration Avionics System. 472-477 - Junruo Sun, Huancheng Su, Haifeng Li, Chang Liu, Jiabin Chen, Xi Liu:

Software Defect Classification Approach Based on the Modified Latent Dirichlet Allocation Topic Model Considering the Domain Characters. 478-482 - Xinlei Zheng, Xi Liu:

Software Quality Measurement Combining Autonomy Evaluation for Intelligent Early-warning Information System. 483-488 - Ziqi Zhou, Yang Li, Bowang Jiang, Kaiyang Liu, Yingzi Wu, Yanni Wu:

Sonar Cross Section Recovery Method Based on Pole Features of Underwater Target. 489-490 - Xubing Wang, Jing You:

Summary of Tools in FPGA Static Timing Analysis. 491-492 - Yu Xin, Xiaohong Bao:

System Vulnerability Oriented to Strategies. 493-499 - PengQi Wang, Lin Geng, DongBo Zhao, Shuting Kang, Qian Dong, Guang Yang, Yuan Shi, Lingzhong Meng, Yunzhi Xue:

Task-driven Image Preprocessing Algorithm Evaluation Strategy. 500-508 - Li Yin:

Test Suite Generation for Software Reliability Testing Based on Hybrid Musa and Markov Method. 509-514 - Shuxiao Lv, Beibei Yin:

Testing DNN-Based Path Planning Algorithms by Metamorphic Testing. 515-526 - Jianchun Xie, Yahui Li, Zhonghua Wang, Linting Bai:

The Airborne Information Processing System Development Research. 527-531 - Yansong Li, Yu Xing, Yubo Qian, Desheng Wang, Yifei Yang, Qing Wu, Tieke He:

The Design and Implementation of Test System for Expression Ability Evaluation. 532-537 - Hengfeng Fu, Sen Wang:

The Evaluation Method of Speech Interference Effect Based on Deep Learning. 538-542 - Jie Wang, Minyan Lu, Jun Ai, Xueyuan Sun:

The Quantitative Relationship between Adversarial Training and Robustness of CNN Model. 543-549 - Taichun Qin, Shouwen Liu, Shouqing Huang, Yuege Zhou:

The test process date based quality defect detection strategy for spacecraft components. 550-554 - Zhibin Zhang, Dian Zhou, Jiqing Rao, Dongdong Zhao, Wenhua Hu, Jianwen Xiang, Zhongjin Liu, Yanzhen Xing:

VSFBS: Vulnerability Search in Firmware Based on String. 555-563

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














