


default search action
53rd DSN 2023: Porto, Portugal - Workshops
- 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2023 - Workshops, Porto, Portugal, June 27-30, 2023. IEEE 2023, ISBN 979-8-3503-2543-0

- Tânia Esteves

, Ricardo Macedo
, Rui Oliveira
, João Paulo
:
Diagnosing applications' I/O behavior through system call observability. 1-8 - Jomar Domingos, Frederico Cerveira

, Raul Barbosa, Henrique Madeira
:
Predicting Cloud Applications Failures from Infrastructure Level Data. 9-16 - Szilárd Bozóki, Imre Kocsis, András Pataricza:

Underestimation-Aware Failure Statistical Model Creation for Large Scale Critical Systems. 17-24 - Ao Ding, Gaolei Li, Xiaoyu Yi, Yuchen Liu

:
IVSign: Interpretable Vulnerability Signature via Code Embedding and Static Analysis. 25-31 - Takashi Minohara, Masaya Shimakawa:

Security Risk Growth Models for Software Vulnerability Assessment. 32-35 - Chika Komiya, Naoto Yanai

, Kyosuke Yamashita
, Shingo Okamura:
JABBERWOCK: A Tool for WebAssembly Dataset Generation towards Malicious Website Detection. 36-39 - Vincenzo Maria Arricale, Michele Caggiano, Marcello Cinque, Angelo Coppola, Flavio Farroni, Mario Fiorentino

, Andrea Garofalo, Andrea Marchetta, Antimo Perfetto, Aleksandr Sakhnevych:
EMER-GO: real-time grip enhanced speed advisory for emergency intelligent transportation systems. 40-47 - Kilian Le Gall, Laurent Lemarchand, Catherine Dezan:

Multi-Objective Optimization for an Online Re-Planning of Autonomous Vehicles. 48-51 - José M. Pinheiro, Enio Vasconcelos Filho, Pedro M. Santos

, Luís Almeida:
An ETSI ITS-enabled Robotic Scale Testbed for Network-Aided Safety-Critical Scenarios. 52-59 - Franco Oberti, Ernesto Sánchez

, Alessandro Savino
, Filippo Parisi, Stefano Di Carlo:
PSP Framework: A novel risk assessment method in compliance with ISO/SAE-21434. 60-67 - João Pereira, Harrison Kurunathan

, Enio Vasconcelos Filho, Pedro M. Santos
:
Edge-Aided V2X Collision Avoidance with Platoons: Towards a Hybrid Evaluation Toolset. 68-71 - Omid Asghari

, Naghmeh Ivaki
, Henrique Madeira
:
Integration of U-space Safety Assessment Methodologies With Experimentation. 72-75 - Yuting Wu, Xin Lou

, Pengfei Zhou, Rui Tan, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Susceptibility of Autonomous Driving Agents to Learning-Based Action-Space Attacks. 76-83 - Patrick Grümer

, Pedro Brandão
:
An Automotive Cybersecurity Maturity Level Assessment Programme. 84-91 - Mehdi Maleki, Ashfaq Farooqui, Behrooz Sangchoolie:

CarFASE: A Carla-based Tool for Evaluating the Effects of Faults and Attacks on Autonomous Driving Stacks. 92-99 - Marina Dehez-Clementi, Jean-Christophe Deneuville, Emmanuel Lochin, Jérôme Lacan

:
BEAT-Traffic: a Blockchain-Enabled infrastructure for Anonymous-yet-Traceable Traffic reporting. 100-107 - Emanuel Vieira, João Almeida

, Joaquim Ferreira
, Paulo C. Bartolomeu:
Safeguarding Cooperative Maneuver Information with Practical Byzantine Fault Tolerance. 108-115 - Victoria Vu, Fredrik Warg

, Anders Thorsén
, Stig Ursing, Fredrik Sunnerstam, Jimmy Holler, Carl Bergenhem, Irina Cosmin:
Minimal Risk Manoeuvre Strategies for Cooperative and Collaborative Automated Vehicles. 116-123 - Niklas Bunzel, Ashim Siwakoti, Gerrit Klause:

Adversarial Patch Detection and Mitigation by Detecting High Entropy Regions. 124-128 - Xiaoyun Xu, Guilherme Perin, Stjepan Picek:

IB-RAR: Information Bottleneck as Regularizer for Adversarial Robustness. 129-135 - Niklas Bunzel, Lukas Graner

:
A Concise Analysis of Pasting Attacks and their Impact on Image Classification. 136-140 - Filipe Rodrigues, Rodrigo Simões, Nuno Neves:

FADO: A Federated Learning Attack and Defense Orchestrator. 141-148 - Júlio Mendonça

, Fumio Machida, Marcus Völp
:
Enhancing the Reliability of Perception Systems using N-version Programming and Rejuvenation. 149-156 - Muhidul Islam Khan, Gianfranco Nencioni:

Revenue Maximization of a Slice Broker in the Presence of Byzantine Faults. 157-162 - Jorge Castro-Godínez, Muhammad Abdullah Hanif, Muhammad Shafique

:
Cross-Layer Approximations for System-Level Optimizations: Challenges and Opportunities. 163-166 - Sepide Saeedi

, Alessandro Savino
, Stefano Di Carlo:
Design Space Exploration of Approximate Computing Techniques with a Reinforcement Learning Approach. 167-170 - Luis G. León-Vega

, Jorge Castro-Godínez:
Generic Accuracy Configurable Matrix Multiplication-Addition Accelerator using HLS. 171-174 - Morteza Rezaalipour, Marco Biasion

, Ilaria Scarabottolo, George A. Constantinides, Laura Pozzi:
A Parametrizable Template for Approximate Logic Synthesis. 175-178 - Ali Piri, Salvatore Pappalardo, Salvatore Barone

, Mario Barbareschi, Bastien Deveautour, Marcello Traiola, Ian O'Connor, Alberto Bosio:
Input-aware accuracy characterization for approximate circuits. 179-182 - Pedro T. L. Pereira, Guilherme Paim

, Paulo F. Flores
, Eduardo A. C. da Costa
, Sergio Bampi:
AxASRE: A Novel Approach to Approximate Adder Synthesis Results Estimation. 183-186 - Roberto Rocco

, Gianluca Palermo:
Exploit Approximation to Support Fault Resiliency in MPI-based Applications. 187-190 - Florian Neugebauer, Vivek Vekariya

, Ilia Polian, John P. Hayes:
Stochastic Computing as a Defence Against Adversarial Attacks. 191-194 - Natalia Lylina, Stefan Holst, Hanieh Jafarzadeh, Alexandra Kourfali, Hans-Joachim Wunderlich:

Guardband Optimization for the Preconditioned Conjugate Gradient Algorithm. 195-198 - Morteza Rezaalipour, Lorenzo Ferretti, Ilaria Scarabottolo, George A. Constantinides, Laura Pozzi:

Multi-Metric SMT-Based Evaluation of Worst-Case-Error for Approximate Circuits. 199-202 - Somayeh Sadeghi Kohan, Sybille Hellebrand, Hans-Joachim Wunderlich:

Low Power Streaming of Sensor Data Using Gray Code-Based Approximate Communication. 203-206 - Michal Rozsíval

, Ales Smrcka:
NetLoiter: A Tool for Automated Testing of Network Applications using Fault-injection. 207-210 - Nithin Ravani Nanjundaswamy

, Gregor Nitsche, Frank Poppen, Kim Grüttner:
RISC-V Timing-Instructions for Open Time-Triggered Architectures. 211-214 - Shrishti Trivedi, Fredrik Warg

:
Evaluating the Safety Impact of Network Disturbances for Remote Driving with Simulation-Based Human-in-the-Loop Testing. 215-222 - C. G. Frédéric Bogaerts

, Naghmeh Ivaki
, José Fonseca
:
Using AI to Inject Vulnerabilities in Python Code. 223-230 - Janek Groß, Michael Kläs, Lisa Jöckel, Pascal Gerber:

Timeseries-aware Uncertainty Wrappers for Uncertainty Quantification of Information-Fusion-Enhanced AI Models based on Machine Learning. 231-238 - Thomas Bauer, Wolfgang Herzner, Bob Hruska, Katia Di Blasio, Zain Shahwar:

Modelling V&V Workflows to Improve Development Processes of Software-intensive Systems. 239-242 - Stylianos Basagiannis

, Ludovico Battista
, Anna Becchi
, Alessandro Cimatti, Georgios Giantamidis, Sergio Mover, Alberto Tacchella
, Stefano Tonetta, Vassilios A. Tsachouridis:
SMT-Based Stability Verification of an Industrial Switched PI Control Systems. 243-250 - Vítor Rodrigues

, André de Matos Pedro
:
llhsc: A DeviceTree Syntax and Semantic Checker. 251-258 - Iat Tou Leong

, Raul Barbosa:
Translating Natural Language Requirements to Formal Specifications: A Study on GPT and Symbolic NLP. 259-262 - Carlos Mão de Ferro, Anastasia Mavridou, Michael Dille, Francisco Martins:

Simplifying Requirements Formalization for Resource-Constrained Mission-Critical Software. 263-266 - András Földvári

, Francesco Brancati, András Pataricza:
Preliminary Risk and Mitigation Assessment in Cyber-Physical Systems. 267-274 - R. Bouchekir, M. Guzman, A. Cook, J. Haindl, R. Woolnough:

Formal Verification for Safe AI-based Flight Planning for UAVs*. 275-282 - Carlos Mão de Ferro, Tiago Cogumbreiro, Francisco Martins:

Formalizing Model Inference of MicroPython. 283-289 - Tiago Fragoso, David Silva, João Pedro Dias

, André Restivo
, Hugo Sereno Ferreira
:
SIMoT: A Low-fidelity Orchestrator Simulator for Task Allocation in IoT Devices. 290-296

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














