


default search action
DSA 2021: Yinchuan, China
- 8th International Conference on Dependable Systems and Their Applications, DSA 2021, Yinchuan, China, August 5-6, 2021. IEEE 2021, ISBN 978-1-6654-4391-3

- Siqiao Li

, Tadashi Dohi, Hiroyuki Okamura:
A Comprehensive Evaluation for Burr-Type NHPP-based Software Reliability Models. 1-11 - Ju Zeng, Xiaopan Zhang

:
An Adaptive Large Neighborhood Search for Two-Dimensional Packing with Conflict Penalty. 12-19 - Mingshuang Qing, Xiuting Ge, Zhanwei Hui, Ya Pan, Yong Fan, Xiaojuan Wang, Xu Cao:

An Empirical Study on Spectral Clustering-based Software Defect Detection. 20-29 - Guang Yang, Xiang Chen, Jinxin Cao, Shuyuan Xu, Zhanqi Cui, Chi Yu, Ke Liu:

ComFormer: Code Comment Generation via Transformer and Fusion Method-based Hybrid Code Representation. 30-41 - Yanxin Jia, Xiang Chen, Shuyuan Xu, Guang Yang, Jinxin Cao:

EKD-BSP: Bug Report Severity Prediction by Extracting Keywords from Description. 42-53 - Zheng Li, Xiaotang Zhou, Deli Yu, Yonghao Wu, Yong Liu, Xiang Chen:

Fault Localization-Guided Test Data Generation Approach for Novice Programs. 54-65 - Zheng Li, Butian Shi, Haifeng Wang, Yong Liu, Xiang Chen:

HMBFL: Higher-Order Mutation-Based Fault Localization. 66-77 - Wei Zheng, Tianren Shen, Xiang Chen:

Just-in-Time Defect Prediction Technology based on Interpretability Technology. 78-89 - Yuhua Chen, Ningjiang Chen, Wenxiu Xu, Linming Lian, Huan Tu:

MFRL-CA: Microservice Fault Root Cause Location based on Correlation Analysis. 90-101 - Zhilei Ren, Xiaofei Fan, Xiaochen Li, Zhide Zhou, He Jiang:

Multi-objective Evolutionary Algorithm for String SMT Solver Testing. 102-113 - Yadong Xu

, Beibei Sun:
Multiscale Dense Convolutional Networks for Intelligent Fault Diagnosis of Rolling Bearing. 114-119 - Cong Xiong, Xiang Chen, Fuzhou Peng, Lei Wang:

Optimal Gateway Station Placement for Transmission Delay Minimization in Broadband LEO Satellite Communication System. 120-127 - Haipeng Wang

, W. K. Chan:
Orchid: Building Dynamic Test Oracles with Training Bias for Improving Deep Neural Network Models †. 128-139 - Hao Zhang

, W. K. Chan:
Plum: Exploration and Prioritization of Model Repair Strategies for Fixing Deep Learning Models †. 140-151 - Jian Qu, Xiaobo Ma, Wenmao Liu:

Querent-centric Domain Name System Modeling and Its Application in Passive Software Discovery. 152-160 - Ting-Yan Yu, Chin-Yu Huang, Neil C. Fang:

Use of Deep Learning Model with Attention Mechanism for Software Fault Prediction. 161-171 - Xin Wang, Xiaobo Ma, Jian Qu:

A Link Flooding Attack Detection Method based on Non-Cooperative Active Measurement. 172-177 - Jing Zhu, Song Huang, Yaqing Shi, Kaishun Wu, Yanqiu Wang:

A Method of Random Forest Classification based on Fuzzy Comprehensive Evaluation. 178-183 - Lei Chen, Yuyu Yuan, Hongpu Jiang, Ting Guo, Pengqian Zhao, Jinsheng Shi:

A Novel Trust-based Model for Collaborative Filtering Recommendation Systems using Entropy. 184-188 - Zherui Zhang, Ya Tu:

A Pruning Neural Network for Automatic Modulation Classification. 189-194 - Xingjun Chen, Mengjie Shan:

A Recommendation Method for Process Modeling based on Clustering and Graph Neural Network. 195-201 - Qiucheng Sun, Yuyu Yuan, Ting Guo, Lei Chen:

A Trusted Solution to Hyperledger Fabric Reordering Problem. 202-207 - Dingning Liu, Yuyu Yuan, Tengfei Xue, Lei Chen:

An Efficient Batch Verification Scheme for SM2 Signatures. 208-212 - Florian Klück, Franz Wotawa

, Gerhard Neubauer, Jianbo Tao, Mihai Nica:
Analysing Experimental Results Obtained when Applying Search-based Testing to Verify Automated Driving Functions. 213-219 - Yunwei Dong, Qian-wen Gou, Pei Tang:

Architecture-Level Schedulability Analysis with IO Constraint using AADL. 220-229 - Tugkan Tuglular, Deniz Egemen Coskun:

Behavior-Driven Development of Software Product Lines. 230-239 - Yangyang Zhang, Zengzhi Liu, Qiang Han, Wenyuan Zhang:

Development of System Life Cycle Processes Standardization and Future Evolution Analysis†. 240-246 - Jiping Huang, Wei Qiao, Mengfei Xu:

Distributed Countermeasure Algorithm based on Deep Reinforcement Learning. 247-250 - Shuangshuang Huang, Xiaobo Ma, Huafeng Bian:

Effectively and Efficiently Defending Shadowsocks against Website Fingerprinting Attacks. 251-256 - Xinyue Yang, Jian Zhang, Shan Zhou, Bin Wang, Ruixue Wang:

Generating Test Scenarios using SysML Activity Diagram. 257-264 - Xiao Xiao, Tadashi Dohi:

Interval Estimation for Non-Parametric NHPP-based Software Reliability Model via Simulation-based Bootstrap. 265-270 - Hongpu Jiang, Yuyu Yuan, Ting Guo, Pengqian Zhao:

Measuring Trust and Automatic Verification in Multi-Agent Systems. 271-277 - Jiaxin Lin, Zhichao Zhou

, Xiangyu Wu, Changbo Hou:
MPSK Signal Modulation Recognition based on Decision Fusion. 278-283 - Huafeng Bian, Xiaobo Ma, Pengyu Pan:

On the Performance Evaluation of Congestion Control Algorithms against DDoS Attacks. 284-288 - Meijuan Wang, Song Huang, Hui Li, Jingli Han:

Ontology Dependence Closure based on Privacy Association. 289-294 - Renyan Jiang, Shihai Xiao:

Performance Comparison of Three Parameter Estimation Methods on Heavily Censored Data. 295-301 - Jiajun Ai, Lijie Hua, Jin Liu, Shunshun Chen, Yongjian Xu, Changbo Hou:

Radar Signal Separation Recognition Method based on Semantic Segmentation. 302-306 - Guoli Zhao, Chang Liu, Shaofang Li, Zenghao Tian, Xi Liu, Haifeng Li:

Radar System Testability Design and Demonstration based on Fault Modes and Software Control. 307-314 - Qingbo Ji, Lingjie Wang, Changbo Hou, Qiang Zhang, Qingquan Liu, Yue Jiang:

SAR and Optical Image Matching Eased on Phase Congruency and Template Matching. 315-320 - Xinrui Wang, Yun Lin:

Small Sample Electromagnetic Signal Recognition based on Time Series Data Augmentation. 321-326 - Yongjian Xu, Chunjie Zhang, Guowei Liu, Ziwei Wang, Zhichao Zhou, Changbo Hou:

Target Tracking Algorithm based on Electromagnetic and Image Trajectory Matching. 327-331 - Jie Li, Yue Wang:

Transient Fault Tolerance on Multicore Processor in AMP mode. 332-337 - Kunyu Gao, Jinbo Wang, Bin Wang, Ruixue Wang, Jiao Jia:

UAV Test Data Generation Method based on CycleGAN. 338-343 - Van Duc Nguyen, Ewout Zwanenburg, Steffen Limmer, Wessel Luijben, Thomas Bäck

, Markus Olhofer:
A Combination of Fourier Transform and Machine Learning for Fault Detection and Diagnosis of Induction Motors. 344-351 - Gaolei Yi, Xiaoyu Yang, Pu Huang

, Yichen Wang:
A Coverage-Guided Fuzzing Framework based on Genetic Algorithm for Neural Networks. 352-358 - Wei Zheng, Zheng Chen, Xiaoxue Wu, Weiqiang Fu, Bowen Sun, Jingyuan Cheng:

A Domain Knowledge-Guided Lightweight Approach for Security Bug Reports Prediction. 359-368 - Zongxiang Lin, Yongkan Sun:

A Model for Ship-Helicopter Cooperative Anti-Submarine Tracking based on Favorable Situation. 369-372 - Ye Tian, Beibei Yin, Chenglong Li:

A Model-based Test Cases Generation Method for Spacecraft Software. 373-382 - Xiaoyu Yang, Xiaobing Wang:

A Practical Method based on MSVL for Verification of Social Network. 383-389 - Siming Zheng, Hongwei Liu, Hongji Yang:

A Survey of Story-Generation Apps and Online Systems between 2017 and 2020. 390-398 - Weiyu Liu, Qian Dong, PengQi Wang, Guang Yang, Lingzhong Meng, You Song, Yuan Shi, Yunzhi Xue:

A Survey on Autonomous Driving Datasets. 399-407 - Yue Shen, Yu Li, Yuping Zhu, Yong Cai

, Jun Shao:
An Airborne Requirements Verification Method based on Requirement Elements using CRF. 408-413 - Hui Guan, Guorong Cai, Chuan Zhao:

An Automatic Approach to Extracting Requirement Dependencies based on Semantic Web. 414-420 - Jiayuan Wei, Xingyu Miao, Yongqi Ge:

An Energy-Efficient Strategy based on Q-Learning for Energy Harvesting-based Wireless Sensor Network. 421-427 - Haoran Yu, Yijie Gao, Jiang Wu:

An Indoor Positioning System based on Intelligent Terminal. 428-433 - Song Huang, Zhen Yang

, Changyou Zheng, Jinyong Wan:
An Intellectual Property Data Access Control Method for Crowdsourced Testing System. 434-438 - Yuxuan Yan, Xingjun Chen:

An Interactive Computer Assisted Design System: Architecture and Design. 439-443 - Tao Song, Wei Wang, Dongcheng Li, Yining Zhao:

An Optimal Resource Scheduling of Debris Monitoring using Particle Swarm Algorithm with Constriction Factor. 444-450 - Weihua Jin

, Bo Sun, Zhidong Li, Lei Zhang, Shijie Zhang:
Analytical Investigation of Anomaly Detection Methods based on Time-Domain Features and Autoencoders in Satellite Power Subsystem. 451-460 - Lu Zhang, Shimiao Gao, Meiyu Shi:

Applying Animation for the Interpretation of Beijing Symbols in the Second Dimensional Space. 461-466 - Junfeng Zhao, Ke Zhao:

Applying Microservice Refactoring to Object-2riented Legacy System. 467-473 - Mingxi Li, Bei-Bei Yin:

ARB-BERT: An Automatic Aging-Related Bug Report Classification Method based on BERT. 474-483 - Lili Fan, Yong Wang, Tao Liu:

Automatic Test Path Generation and Prioritization using UML Activity Diagram. 484-490 - Yikang Shao, Jun Ai:

Code Comprehensibility Evaluation for Java Class based on LDA Topic Model. 491-498 - Pei-Shu Huang, Faisal Fahmi

, Feng-Jian Wang, Hongji Yang:
Constructing A Creative Service Software with Semantic Web. 499-507 - Congran Zhang, Tao Shi, Jun Ai, Wei Tian:

Construction of GUI Elements Recognition Model for AI Testing based on Deep Learning. 508-515 - Jiang Wu, Xiaodong Fan, Kaixiang Zhang:

Decision-Making Method of UAV Maneuvering in Close-Range Confrontation based on Deep Reinforcement Learning. 516-521 - Jiankang Li, Yang Liu:

Deep Reinforcement Learning based Adaptive Real-Time Path Planning for UAV. 522-530 - Shanshan Wang, Qingnan Wu, Huifang Dong:

Design and Implementation of Serial Rabbit Ear Removal Architecture based on FPGA in Passive Detection. 531-535 - Tao Liu, Yuebo Wang, Chao Chen, Jixiu Li, Qinglu Pu:

Design and Implementation of Software Test System for Aviation Communication Radio Station. 536-540 - Yanmei Jiang, Mingsheng Liu:

Design of A Reliable Algorithmic with Deep Learning and Transfer Learning for Load Combination Recognition. 541-550 - Dongcheng Li, W. Eric Wong, Wei Wang, Yao Yao, Matthew Chau:

Detection and Mitigation of Label-Flipping Attacks in Federated Learning Systems with KPCA and K-Means. 551-559 - Liu Lian:

Dictionary Learning Algorithm based on Restricted Boltzmann Machine. 560-565 - Zhongxi Lu, Jinli Luo, Hongji Yang:

Emotions Behind Divergent Thinking. 566-571 - Jinbo Gong, Xu Zhang, Yaowu Liu, Xiaopan Zhang

:
Event Graph based Warship Formation Air Defense Scheduling Model and Algorithm. 572-580 - Shaojie Ai, Weize Shang, Jia Song, Guobiao Cai:

Fault Diagnosis of the Four-Rotor Unmanned Aerial Vehicle using the Optimized Deep Forest Algorithm based on the Wavelet Packet Translation. 581-589 - Junlong Lian, Chenhui Cui

, Weifeng Sun, Yiming Wu, Rubing Huang:
KD-RRT: Restricted Random Testing based on K-Dimensional Tree. 590-599 - Jie Zhang, Lin Yan, Rong Wang, Cong Tian, Zhenhua Duan:

Malware Detection using CNN via Word Embedding. 600-607 - Haoran Jia, Yuyu Yuan, Qiang Han, Pengqian Zhao, Ting Guo:

Multi-Agent Trust Evaluation Model based on Reinforcement Learning. 608-613 - Dongpu Sun:

Multi-Granularity Information Expression Application on Patent Text Clustering. 614-619 - Junpeng Zhang, Xingjun Chen:

Multi-UAV Reconnaissance Task Assignment based on Wide-Area Search Scenario. 620-625 - Junfeng Nie:

Operational Task Decomposition Method based on Extended HTN Planning. 626-630 - Yongming Yao, Yulin Wang, Weiyi Jiang

, Ziyuan Wang, Song Huang:
Privacy Protocol Analysis based on Android Application. 631-638 - Youdi Gong, Yunzhi Xue, Qian Dong, Guang Yang, PengQi Wang, Yuan Shi, Lingzhong Meng:

Quality Evaluation of Image Dataset based on Label File. 639-646 - Zhidong Li, Bo Sun, Lei Zhang, Weihua Jin

:
Satellite On-2rbit Anomaly Detection and Adaptive Model Updating Method. 647-655 - Ling-lin Gong, Yujia Li, Hongfu Chen, Xin Xu, Fang Liu:

Scenario-based Reliability Testing Methods for Smart Grid Dispatching and Control System. 656-663 - Xiangyu Wu, Jing Zhang, Changbo Hou, Guowei Liu, Jie Zhang, Jin Liu:

Signal Modulation Recognition based on Convolutional Autoencoder and Time-Frequency Analysis. 664-668 - Jiaxi Xu

, Jun Ai, Tao Shi:
Software Defect Prediction for Specific Defect Types based on Augmented Code Graph Representation. 669-678 - Chiyang Gao, Wenbing Luo, Fei Xie:

Software Selection Test of Enterprise-Level Big Data Analysis Platform. 679-684 - Hanyuan Wu, Xiangmin Li, Zhiyu Xi:

Stability Analysis and Parameter Design for Stabilizing One Delay Point in Two-Delay Differential Equations. 685-691 - Guang Yang, Yunzhi Xue, Lingzhong Meng, PengQi Wang, Yuan Shi, Qinghong Yang, Qian Dong:

Survey on Autonomous Vehicle Simulation Platforms. 692-699 - Xiaomeng Chen, Jinbo Wang, Shan Zhou, Panpan Xue, Jiao Jia:

Test Case Reuse based on ESIM Model. 700-705 - Dongmei Dong, Wuwu Hua, Zhihao Liu, Yunyu Fang, Yue Hou:

Test Method of Flight Control Software based on Input Field Model. 706-711 - QingGuo Yan, Jun Zhao, Xianguang Cha, Wei Dai, ZeJia He, Lin Cui, LingShuang Yu:

The Evaluation of Teaching Effect based on Interpretable Machine Learning. 712-715 - Cong Li, Qiang Han, Bingbing Lei, Haide Liu, Cong Liu, Yu He:

Timing Attacks in Single-Chip Microcomputer through Workflow Verification. 716-721 - Yining Wang, Chunyi Li, Xiaobing Wang:

Verification of CTCS-3 using TMSVL. 722-729 - Huanhuan Wu, Zheng Li, Zhanqi Cui, Jiaming Zhang:

A Mutation-based Approach to Repair Deep Neural Network Models. 730-731 - Yumin Gao, Daojin Nie, Huimin Gan, Zhiyong Cao, Ning Lin, Cuicui Sun:

A Novel Building Worker Detection based on Cross Feature Pyramid Network. 732-733 - Aibin Yan, Aoran Cao, Kuikui Qian, Liang Ding, Zhihui He, Zhengzheng Fan, Xiaoqing Wen:

A Reliable and Low-Cost Flip-Flop Hardened against Double-Node-Upsets. 734-736 - Mengxia Wang, Wenqiang Fan:

An Improved Simhash Algorithm for Academic Paper Checking System. 737-738 - Yongchao Meng, Peihan Qi, Xiaoyu Zhou, Zan Li:

Capability Analysis Method for Electromagnetic Spectrum. 739-740 - Pengyu Pan, Xiaobo Ma, Huafeng Bian:

Exploiting Bitcoin Mining Pool for Stealthy and Flexible Botnet Channels. 741-742 - Shuowen Fu, Xin Zhao, Yunpeng Chen, Yaqi Xu, Xiaoli Li, Fangfang Zhou, Ying Zhao:

Heterogeneous Graph Modeling and Visualization for Cyber Asset Management. 743-744 - Shihao Wang, Haoran Zha:

Impact of Mechanism and Influencing Factors of Radio Frequency Fingerprint on Wireless Devices. 745-746 - Kuixian Li, Jibo Shi:

Modulation Recognition Algorithm based on Digital Communication Signal Time-Frequency Image. 747-748 - Zhihui Shan, Qiang Han, Meng Han:

Proof of Greatest Number Program and Find. 749-750 - Pan Liu, Jiaqi Yan, Xiaoyu Song:

Three Classifications of Big Data-based Software Testing. 751-752 - Wenjin Yin, Zhijiang Yuan, Fei Long, Ye Zhao:

Underwater Unmanned Vehicle Search Path Optimization Arithmetic. 753-755

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














