


default search action
11th DSA 2024: Taicang, Suzhou, China
- 11th International Conference on Dependable Systems and Their Applications, DSA 2024, Taicang, Suzhou, China, November 2-3, 2024. IEEE 2024, ISBN 979-8-3315-3239-0

- Bobing Shen, Haibo Zhang:

Pruning-Based Optimization of Model Distillation Algorithm Using Explainable Machine Learning Methods. 1-5 - Chongyang Huang, Yi Zhu, Qiao Yu, Yi Ding, Guosheng Hao:

Software Defect Prediction Model Based on Syntactic Semantics and Flow Information Features. 6-15 - Haoran Zhang, Guang Yang, Hongyun Yu, Lingzhong Meng, Baolin Yan:

Deep Learning Model Risk Identification and Control Technology. 16-24 - Li Rui:

Prediction of Carbon Emissions Based on PCA and Neural Network Models under the "Dual Carbon" Background. 25-34 - Mengfei Guo, Dong Guo, Mo Li:

Metrics and Testing Methods for Artificial Intelligence Software Quality Models and Their Application Examples. 35-42 - Tse-Chuan Hsu, Dong-Meau Chang

:
Retrainable Hand Gesture Recognition Model Driven by Edge AI. 43-48 - Wenqian Zhao, Lavanya Pobbathi, Srinivasan Ramprasath, Meghana Patibandla:

Generative AI for Smart Contracts in Real Estate Business. 49-59 - Xiaobing Feng, Ling Feng, Xiujuan Xu, Jiaqi Qiao, Wenjian Zhang:

Fin-MLGAT: Line Graph Attention Network for Dialogue Emotion Recognition in Stock Market and its Evaluations. 60-67 - Xiaobing Feng, Ling Feng, Pengfei Jiao, Zhiliang Zheng, Qing Bao:

WVRF_CGT: WVRF Automatic Filter Based Cascading Graph Transformer for Information Diffusion in Stock Q&A Platform. 68-74 - Zhi Wang, Bo Shen:

An Efficient Task Scheduling for Security and Stability Control System Models on Multi-Core Systems. 75-85 - Alvi Jawad, Jason Jaskolka:

Interplay of Attacker Behaviors and Dependability Attributes in Industrial Control System Impact Analysis. 86-95 - Sergei Hammer Né Bauer, Peter Schartner:

Functional Safety Evaluation for Cybersecurity Measures in Low-End Automotive Control Units. 96-105 - Eun-Young Kang

, Gaurav Choudhary
, Miguel Campusano
, Morten Kühnrich, Anders Pedersen:
Enhancing Dependability of Industrial Robots: Security and Safety Assessments Based on Model-Driven Engineering. 106-113 - Kun Leng, Li Liu, He Zhang, Yihao Li, Pan Liu:

Detection and Estimation of False Data Injection Attacks by Unmanned Surface Vessels. 114-119 - Yin Zhao, Meng Li, Yongcheng Su, Kailin Zi, Cong Zeng:

MetBench: A Numerical Expression Metamorphic Relations Benchmark Data Set. 120-131 - Long Kang, Jun Ai, Minyan Lu:

Automated Structural Test Case Generation for Human-Computer Interaction Software Based on Large Language Model. 132-140 - Yingxiang Huang, Minyan Lu, Xun Long:

Semantic-Guided Adaptive Exploration Testing for GUI Software. 141-149 - Zhangfeng Ju, Wenxiu Ma, Yuanheng Li, Yifan Guo, Ran Ju:

Analysis on Individual Manned and Unmanned Cooperation Interoperable Computing. 142-148 - Yihao Li, Lei Xiao, Weiwei Zhuang, Xiaozhu Xie, Jiawei Zhang:

Prioritization of Crowdsourced Test Reports Based on Defect Severity and Frequency Weighting. 150-160 - Kadiatou Diallo, Zizhao Chen, W. Eric Wong, Shou-Yu Lee:

An Analysis and Comparison of Mutation Testing Tools for Python. 161-169 - Yang Xu, Tingting Yu, Rui Chen:

Coverage-Guided Testing for Automatic Speech Recognition Systems. 170-171 - Jiao Li, Wensheng Peng, Zhaoyang Zeng, Ming Xu:

A Review of Reliability Verification Technology for Aviation Intelligent Systems. 172-181 - Hongyang Zhao, Jiawang Chen, Beishui Liu, Shuai Li:

A Hybrid Malicious Node Detection Approach Based on Fuzzy Trust Model and Bayesian Belief in Wireless Sensor Networks. 182-188 - Yutao Zhang, Jun Ai:

Semantic-Weighted Word Error Rate Based on BERT for Evaluating Automatic Speech Recognition Models. 189-198 - Yuheng Su, Yi Zhu, Mei Song, Weichao He, Guosheng Hao:

A Time-Aware Recommendation Model with Social Impact. 199-208 - Xun Long, Jun Ai, Jieyu Zhao, Yingxiang Huang:

A Vulnerability Propagation Impact Analysis Approach Based on Code Semantics with LLM. 209-216 - Haoli Chen, Chunlei Zhu, Liang Zhang, Yan Zhao, Lie Wang:

A Survey of Mutation Based Testing Adequacy Study on Smart Contract. 217-220 - Chunyan Xia, Changyou Zheng, Yuchen Xia, Xiangjing Kong, Xiayi Song:

Survey on Simulation Testing of Autonomous Driving System. 221-229 - Mahmoud M. Abouzeid, Pei-Shu Huang, Feng-Jian Wang:

Enhancing the Detection of Anomalous Artifact Operations in Temporal Structured Workflows. 230-241 - Jiawei Zhang, Lei Xiao, Miaojun Li, Zhaorui Meng, Yihao Li:

HYDBre: A Hybrid Retrieval Method for Detecting Duplicate Software Bug Reports. 242-251 - Yingqiang He, Xingjun Chen, Yitao Wang:

Target Threat Judgement Based on Entropy-Topsis Method and Intent Classification. 252-259 - Wentao Zhao, Guang Yang, Mengcen Jiang, Lingzhong Meng, Mengmeng Wang:

A Survey of Comprehensive Evaluation Methods. 260-268 - Mingwei Tang, Yihan Qin, Lu Zhang, Hongru Lu, Tingyu Zhang:

A Quantitative Evaluation Approach for Online Review Quality Based on the AHP-Fuzzy Comprehensive Evaluation. 269-279 - Chuangchuang Zhang, Shou-Yu Lee, Pan Liu, Hongyong Yang, William Cheng-Chung Chu:

Robustness Aware SFC Placement in NFV-Enabled Multi-Domain Networks Under Resource Demand Uncertainty. 280-288 - Mingwei Shi, Hongquan Shi:

Planning Model of Air Defense Kill Webs Based on Genetic Algorithm. 289-296 - He Zhou, Rui Kang:

A Reliable Extrapolative Capacity Estimation Method for Complex Distributed Web Services. 297-304 - Xiaoquan Gao, Fan Liu, Tianhao Wu, Hongxiao Liu, Yuan Zhou:

Research on Data Augmentation Methods for Small Sample Image Datasets. 305-312 - Yifan Guo, Wenjun Xue, Wenxiu Ma, Zhangfeng Ju, Yuanheng Li:

Research on Methods for Presenting Battlefield Situation Hotspots. 313-319 - Yuanheng Li, Zhangfeng Ju, Wenxiu Ma, Wenjun Xue, Yifan Guo:

Design of Individual Soldier Multimedia Command and Control System Based on Ad Hoc Wireless Mesh Network. 320-323 - Jinzhao Ma, Zhenyu Fang, Jiangbin Zheng, Jun Cao:

A Virtual Texture Technology Realized on Low Computational Power Platforms. 324-330 - Zhiping Zhang, Xin Zhao, Jiangbin Zheng:

Virtualized TCP/IP Protocol Stack Based on VxWorks. 331-335 - Xin Zhao, Zhiping Zhang, Jiangbin Zheng:

Container Design Based on VxWorks. 336-341 - Wen Ye, Xinyi Zhu, Yanjing Guo, Mingyu Huang:

Infrared Object Detection Based YOLOv8s from UAV Images. 349-357 - Xinsheng Zhang, Jing Hu, Junlong Xiao:

YOLOv8s-D2: A Novel Object Defect Detection Algorithm Based on Improved YOLOv8s. 358-364 - Zixuan Zhu, Qingxia Li, Zhenyu Fang:

YOLO-Based Component Detection System for Electrical Diagrams. 365-373 - Jing Hu, Xinsheng Zhang:

StyleEditorGAN: Transformer-Based Image Inversion and Realistic Facial Editing. 374-380 - Wenxiu Ma, Yuanheng Li, Xingwei Xue, Keke Pei, Yifan Guo:

Research on 3D Visualization of Human Body Actions. 381-385 - Phillip Zhang, Hongji Yang:

Introduction of a Time-Parameter for State Analysis in Affective Computing. 386-392 - Xiaoxu Qi, Mengmeng Mao:

A Computational Model for Spatial Exploration in Regional Economic Collaborative Development: A Case Study. 393-400 - Zetian Shen:

A Comparative Study of Hybrid CNN and Vision Transformer Models for Facial Emotion Recognition. 401-408 - Chong Zeng, Zisen Zhou, Yun Zhang, Zhongxi Lu, Hongji Yang:

Deep-Deploying Imagination in Creative Computer for Dependent System Design. 409-416 - Lu Zhang, Meiyu Shi:

Exploring the Healing Power of Digital Technology in Promoting Health and Well-Being: A Case Study of Smart Tourism Applications. 417-425 - Cheng Chang, Lina Feng, Yuan Li, Yangrui Kang:

Distributed Spectrum Sensing Structure Design Based on Distributed Deep Neural Network. 426-427 - Pan Liu, Ruyi Luo, Chengwu Jiang, Tong Gao, Yihao Li:

AI-Assisted Bug Detection in Open-Source Software. 428-429 - Miltiadis G. Siavvas, Georgia Xanthopoulou, Ilias Kalouptsoglou

, Dionysios D. Kehagias, Dimitrios Tzovaras:
Digital Transformation of Security Standards: Requirements Extraction using Large Language Models. 430-431 - Songcheng Xie, Shengpeng Zhu, Qifan He, Zhanqi Cui:

Autonomous Driving Software Testing Based on Interpretation Analysis. 432-433

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














