


default search action
21st QRS 2021: Hainan, China
- 21st IEEE International Conference on Software Quality, Reliability and Security, QRS 2021, Hainan, China, December 6-10, 2021. IEEE 2021, ISBN 978-1-6654-5813-9

- Jin-lei Sun, Song Huang, Changyou Zheng, Meijuan Wang, Zhanwei Hui, Yixian Ding:

A Novel Method to Prevent Multiple Withdraw Attack on ERC20 Tokens. 1-7 - Joe Samuel, Jason Jaskolka, George O. M. Yee:

Analyzing Structural Security Posture to Evaluate System Design Decisions. 8-17 - Mohammadreza Hazhirpasand, Mohammad Ghafari:

Cryptography Vulnerabilities on HackerOne. 18-27 - Rui Mei

, Han-Bing Yan, Zhihui Han, Jian-Chun Jiang:
CTSCOPY: Hunting Cyber Threats within Enterprise via Provenance Graph-based Analysis. 28-39 - Saurabh Kumar

, Debadatta Mishra, Biswabandan Panda
, Sandeep Kumar Shukla:
DeepDetect: A Practical On-device Android Malware Detector. 40-51 - Lian Yu, Lei Zhang, Yuanyuan Zhang, Weiping Wen, Xuetao Du, Fei Cao:

Dynamic Interval-based Watermarking for Tracking down Network Attacks. 52-61 - Ana Ribeiro, João F. Ferreira, Alexandra Mendes:

EcoAndroid: An Android Studio Plugin for Developing Energy-Efficient Java Mobile Applications. 62-69 - Qinqin Wang, Hanbing Yan, Zhihui Han:

Explainable APT Attribution for Malware Using NLP Techniques. 70-80 - Xiuting Ge, Yifan Huang, Zhanwei Hui, Xiaojuan Wang, Xu Cao:

Impact of datasets on machine learning based methods in Android malware detection: an empirical study. 81-92 - Pascal Gadient, Oscar Nierstrasz, Mohammad Ghafari:

Security Header Fields in HTTP Clients. 93-101 - Marcus Birgersson, Cyrille Artho, Musard Balliu:

Security-Aware Multi-User Architecture for IoT. 102-113 - Xiaoxue Ma

, Imran Ashraf
, W. K. Chan:
Sound Predictive Atomicity Violation Detection§. 114-125 - Chih-Wei Hsu, Sun-Yuan Hsieh:

Strategies for Reducing Traffic Volume and Security on Smart Grid. 126-131 - Quentin Stiévenart

, Coen De Roover
, Mohammad Ghafari:
The Security Risk of Lacking Compiler Protection in WebAssembly. 132-139 - Zeyu Lu, Zhanquan Guo:

A Framework for Progressive Regression Testing PLC Programs. 140-148 - Kenya Saiki, Shaoying Liu, Hiroyuki Okamura, Tadashi Dohi:

A Tool to Support Vibration Testing Method for Automatic Test Case Generation and Test Result Analysis. 149-156 - Ying Shi, Beibei Yin, Zheng Zheng, Tiancheng Li:

An Empirical Study on Test Case Prioritization Metrics for Deep Neural Networks. 157-166 - Ezequiel Castellano

, Ahmet Cetinkaya, Paolo Arcaini
:
Analysis of Road Representations in Search-Based Testing of Autonomous Driving Systems. 167-178 - Xinyi Wang, Paolo Arcaini

, Tao Yue, Shaukat Ali:
Application of Combinatorial Testing to Quantum Programs. 179-188 - Lizhi Cai, Jilong Wang, Mingang Cheng, Jin Wang:

Automated Testing of Android Applications Integrating Residual Network and Deep Reinforcement Learning. 189-196 - Bo Jiang, Wenlin Wei, Li Yi, W. K. Chan:

DroidGamer: Android Game Testing with Operable Widget Recognition by Deep Learning. 197-206 - Alex Groce, Iftekhar Ahmed, Josselin Feist, Gustavo Grieco, Jiri Gesi, Mehran Meidani, Qihong Chen:

Evaluating and Improving Static Analysis Tools Via Differential Mutation Analysis. 207-218 - Yanzhou Mu, Zan Wang, Shuang Liu, Jun Sun, Junjie Chen, Xiang Chen:

HARS: Heuristic-Enhanced Adaptive Randomized Scheduling for Concurrency Testing. 219-230 - Tiange Cao, Zheng Li, Ruilian Zhao, Yang Yang:

Historical Information Stability based Reward for Reinforcement Learning in Continuous Integration Testing. 231-242 - Songyan Ji, Jian Dong, Junfu Qiu, Bowen Gu, Ye Wang, Tongqi Wang:

Increasing Fuzz Testing Coverage for Smart Contracts with Dynamic Taint Analysis. 243-247 - Jinfu Chen, Yiming Wu, Chengying Mao

, Tsong Yueh Chen
, Haibo Chen:
MMFC-ART: a Fixed-size-Candidate-set Adaptive Random Testing approach based on the modified Metric-Memory tree. 248-259 - Paulina Stevia Nouwou Mindom, Amin Nikanjam

, Foutse Khomh, John Mullins:
On Assessing The Safety of Reinforcement Learning algorithms Using Formal Methods. 260-269 - Stephan Valentan, Franz Wotawa:

On the Automation of Audio Plugin Testing*. 270-278 - Chunbai Yang, Imran Ashraf

, Xiaoxue Ma
, Hao Zhang
, W. K. Chan:
OPE: Transforming Programs with Clean and Precise Separation of Tested Intraprocedural Program Paths with Path Profiling. 279-290 - Chung-Hsuan Tsai, Shi-Chun Tsai, Shih-Kun Huang:

REST API Fuzzing by Coverage Level Guided Blackbox Testing. 291-300 - Hui Guo, Xiaoqiang Liu, Baiyan Li, Lizhi Cai, Yun Hu, Jing Cao:

SQDroid: A Semantic-Driven Testing for Android Apps via Q-learning. 301-310 - Clément Robert, Jérémie Guiochet, Hélène Waeselynck

, Luca Vittorio Sartori:
TAF: a Tool for Diverse and Constrained Test Case Generation. 311-321 - Sen Yang, Yifan Huang, Song Huang, Zhanwei Hui, Changyou Zheng:

Target Code-coverage and Efficiency in APP Automatic Compatibility Testing Based on Code Analysis. 322-327 - Cyrille Artho, Adam Benali, Rudolf Ramler:

Test Benchmarks: Which One Now and in Future? 328-336 - Run Luo, Song Huang, Meijuan Wang, Jinchang Hu, Jinhu Du:

Unit Crowdsourcing Software Testing of Go Program. 337-346 - Qi Yao, Fuping Zeng, Yizhuo Zhang, Minghao Yang, Zhiyu Duan, Shunkun Yang:

A Simulation based Intelligent Analysis Framework of Aircraft Reliability, Resilience and Vulnerability. 347-356 - Qing Liu, Linjie Pan, Baoquan Cui

, Jun Yan, Jian Zhang:
Dynamic Detection of AsyncTask Related Defects. 357-366 - Haowen Chen, Xiao-Yuan Jing, Baowen Xu:

Heterogeneous Defect Prediction through Joint Metric Selection and Matching. 367-377 - Zhe Liu, Rui Kang:

Multiple Error Types Software Belief Reliability Growth Model Based on Uncertain Differential Equation. 378-387 - Ning Luo, Yue Xiong:

Platform Software Reliability for Cloud Service Continuity - Challenges and Opportunities. 388-393 - Zixiang Wang, Siwei Zhou

, Dongdong Zhao, Jianwen Xiang:
Reliability-redundancy allocation problem considering imperfect fault coverage. 394-403 - Jiahui Liang, Weiqin Zou, Jingxuan Zhang, Zhiqiu Huang, Chenxing Sun:

A Deep Method Renaming Prediction and Refinement Approach for Java Projects. 404-413 - Tong Xu, Hua Li, Yunfei Bai:

An Online Model Integration Framework for Server Resource Workload Prediction. 414-421 - Sneh Patel, Brendan Park, Naser Ezzati-Jivan, Quentin Fournier

:
Automated Cause Analysis of Latency Outliers Using System-Level Dependency Graphs. 422-433 - Amirali Amiri

, Uwe Zdun, André van Hoorn, Schahram Dustdar
:
Automatic Adaptation of Reliability and Performance Trade-Offs in Service- and Cloud-Based Dynamic Routing Architectures. 434-445 - Jianshu Ding, Guisheng Fan, Huiqun Yu, Zijie Huang

:
Automatic Identification of High Impact Bug Report by Test Smells of Textual Similar Bug Reports. 446-457 - Diwei Chen, Beijun Shen, Yuting Chen:

ConLAR: Learning to Allocate Resources to Docker Containers under Time-Varying Workloads. 458-469 - Sunjae Kwon, Duksan Ryu, Jongmoon Baik:

eCPDP: Early Cross-Project Defect Prediction. 470-481 - Dingbang Fang, Shaoying Liu, Ai Liu

:
EPR: a Neural Network for Automatic Feature Learning from Code for Defect Prediction. 482-492 - Dapeng Yan

, Yuqing Niu, Kui Liu
, Zhe Liu, Zhiming Liu, Tegawendé F. Bissyandé:
Estimating the Attack Surface from Residual Vulnerabilities in Open Source Software Supply Chain. 493-502 - Eunseob Kim, Jongmoon Baik, Duksan Ryu:

Heterogeneous Defect Prediction through Correlation-Based Selection of Multiple Source Projects and Ensemble Learning. 503-513 - Fehmi Jaafar, Darine Ameyed, Amine Barrak

, Mohamed Cheriet:
Identification of Compromised IoT Devices: Combined Approach Based on Energy Consumption and Network Traffic Analysis. 514-523 - Daniel Afriyie, Yvan Labiche:

Predictors of Software Metric Correlation: A Non-parametric Analysis. 524-533 - Mario Blaum, Paul Muench:

Reliability of Centralized vs. Parallel Software Models for Composable Storage Systems. 534-542 - Chen Lang, Jidong Li, Takashi Kobayashi:

Software Defect Prediction via Multi-Channel Convolutional Neural Network. 543-554 - Haifeng Li, Chang Liu, Huancheng Su:

The bidirectional safety analysis & validation framework of system and software with its techniques and applications. 555-563 - Jingchi Wu

, Tadashi Dohi, Hiroyuki Okamura:
W-SRAT: Wavelet-based Software Reliability Assessment Tool. 564-573 - Sofien Boutaib, Maha Elarbi, Slim Bechikh, Fabio Palomba, Lamjed Ben Said:

A Possibilistic Evolutionary Approach to Handle the Uncertainty of Software Metrics Thresholds in Code Smells Detection. 574-585 - Davide Ginelli, Oliviero Riganelli, Daniela Micucci, Leonardo Mariani:

Exception-Driven Fault Localization for Automated Program Repair. 598-607 - Zhengyuan Wei

, W. K. Chan:
Fuzzing Deep Learning Models against Natural Robustness with Filter Coverage‡. 608-619 - Matteo Marra

, Guillermo Polito, Elisa Gonzalez Boix
:
Practical Online Debugging of Spark-like Applications. 620-631 - Nhat-Hoa Tran, Toshiaki Aoki:

SSpinJa: Facilitating Schedulers in Model Checking. 632-641 - Maximilian Willembrinck, Steven Costiou, Anne Etien, Stéphane Ducasse:

Time-Traveling Debugging Queries: Faster Program Exploration. 642-653 - Omar I. Al-Bataineh, Anastasiia Grishina

, Leon Moonen:
Towards More Reliable Automated Program Repair by Integrating Static Analysis Techniques. 654-663 - Azin Piran, Che-Pin Chang, Amin Milani Fard

:
Vulnerability Analysis of Similar Code. 664-671 - Jie Qian, Xiaolin Ju, Xiang Chen, Hao Shen

, Yiheng Shen:
AGFL: A Graph Convolutional Neural Network-Based Method for Fault Localization. 672-680 - Haoren Wang, Haochen Jin, Zhanqi Cui, Rongcun Wang:

CBFL: Improving Software Fault Localization by Analyzing Statement Complexity. 681-690 - Xu Lu, Cong Tian, Bin Yu, Zhenhua Duan:

Improving Quality of Counterexamples in Model Checking via Automated Planning. 691-701 - Xiao Kan, Cong Sun, Shen Liu, Yongzhe Huang, Gang Tan, Siqi Ma

, Yumei Zhang:
Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking. 702-713 - Guoliang Dong, Jun Sun, Xingen Wang, Xinyu Wang, Ting Dai:

Towards Repairing Neural Networks Correctly. 714-725 - Zijie Chen, Tao Zhang

, Xiao Peng:
A Novel API Recommendation Approach By Using Graph Attention Network. 726-737 - Jing Yu, Chenguang Mao, Xiaojun Ye:

A Novel Tree-based Neural Network for Android Code Smells Detection. 738-748 - Yu-Lun Huang, Ching-Yu Hung, Hsiao-Te Hu:

A Protocol-based Intrusion Detection System using Dual Autoencoders. 749-758 - Xueyong Tan, Jing Liu:

ACLM: Software Aging Prediction of Virtual Machine Monitor Based on Attention Mechanism of CNN-LSTM Model. 759-767 - Jinfu Chen, Shang Yin, Saihua Cai, Chi Zhang, Yemin Yin, Ling Zhou:

An Efficient Network Intrusion Detection Model Based on Temporal Convolutional Networks. 768-775 - Siao-Fang Lin, Chin-Yu Huang, Neil C. Fang:

Applying a Deep-Learning Approach to Predict the Quality of Web Services. 776-785 - Jianwei Zeng, Tao Zhang

, Zhou Xu:
DG-Trans: Automatic Code Summarization via Dynamic Graph Attention-based Transformer. 786-795 - Alexander Zimin, Igor Mishchenko, Rebecca Steinert:

Event stream classification with limited labeled data for e-commerce monitoring. 796-806 - Junfeng Tian, Chenxin Wang, Zhen Li, Yu Wen:

Generating Adversarial Examples of Source Code Classification Models via Q-Learning-Based Markov Decision Process. 807-818 - Ben Tang, Bin Li, Lili Bo, Xiaoxue Wu, Sicong Cao

, Xiaobing Sun:
GrasP: Graph-to-Sequence Learning for Automated Program Repair. 819-828 - Shiyi Yang

, Hui Guo, Nour Moustafa:
Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network. 829-840 - Pradeep K. Mahato

, Apurva Narayan:
MINTS: Unsupervised Temporal Specifications Miner. 841-851 - Jiandong Li, Shaoying Liu, Ai Liu

, Runhe Huang:
Multilevel Traceability Links Establishments Between SOFL Formal Specifications and Java Codes Using Multi-dimensional Similarity Measures. 852-863 - Franz Wotawa, Herbert Mühlburger:

On the Effects of Data Sampling for Deep Learning on Highly Imbalanced Data from SCADA Power Grid Substation Networks for Intrusion Detection. 864-872 - Meng Zhang, Chuanqi Tao, Hongjing Guo, Zhiqiu Huang:

Recovering Semantic Traceability between Requirements and Source Code Using Feature Representation Techniques. 873-882 - Chunsheng An, Jingtong Sun, Yifeng Wang, Qingjie Wei:

A K-means Improved CTGAN Oversampling Method for Data Imbalance Problem. 883-887 - Hao Chen, Song Huang, Yuchan Liu, Run Luo, Yifei Xie:

An Effective Crowdsourced Test Report Clustering Model Based on Sentence Embedding. 888-899 - Jianmin Zhang, Tiejun Li, Siqing Fu

:
An Incomplete Unsatisfiable Cores Extracting Algorithm to Promote Routing. 900-905 - Yongchao Wang, Yu Zhou, Taolue Chen

, Jingxuan Zhang, Wenhua Yang, Zhiqiu Huang:
Hybrid Collaborative Filtering-Based API Recommendation. 906-914 - Zhenyu Pan, Tianyuan Hu, Chen Qian, Bixin Li:

ReDefender: A Tool for Detecting Reentrancy Vulnerabilities in Smart Contracts Effectively. 915-925 - Bo Jiang, Yifei Chen, Dong Wang, Imran Ashraf

, W. K. Chan:
WANA: Symbolic Execution of Wasm Bytecode for Extensible Smart Contract Vulnerability Detection. 926-937 - Cristina Aguilera González, Laia Albors Zumel, Jesús Antoñanzas Acero, Valentina Lenarduzzi, Silverio Martínez-Fernández

, Sonia Rabanaque Rodríguez:
A preliminary investigation of developer profiles based on their activities and code quality: Who does what? 938-945 - Dandan Wang, Qing Wang, Junjie Wang, Lin Shi

:
Accept or Not? An Empirical Study on Analyzing the Factors that Affect the Outcomes of Modern Code Review? 946-955 - Elaine Venson, Ting Fung Lam, Bradford K. Clark, Barry W. Boehm:

Analyzing Software Security-related Size and its Relationship with Vulnerabilities in OSS. 956-965 - Alvi Jawad, Jason Jaskolka:

Analyzing the Impact of Cyberattacks on Industrial Control Systems using Timed Automata. 966-977 - Xin Zhang, Jiwei Yan, Baoquan Cui, Jun Yan, Jian Zhang:

Are the Scala Checks Effective? Evaluating Checks with Real-world Projects. 978-989 - Juanjuan Shen, Yu Zhou, Yongchao Wang, Xiang Chen, Tingting Han, Taolue Chen

:
Evaluating Code Summarization with Improved Correlation with Human Assessment. 990-1001 - Eduardo Mendes, Fábio Petrillo:

Log severity levels matter: A multivocal mapping. 1002-1013 - Eduardo Andreetta Fontana, Fábio Petrillo:

Mapping breakpoint types: an exploratory study. 1014-1023 - Ya Gao, Wenhui Zhang, Xue-Yang Zhu:

Multi-Agent Automata and Its Application to LDLK Satisfiability Checking. 1024-1035 - Francisco Ribeiro

, Rui Abreu
, João Saraiva
:
On Understanding Contextual Changes of Failures. 1036-1047 - Pascal Gadient, Pascal Gerig, Oscar Nierstrasz, Mohammad Ghafari:

Phish What You Wish. 1048-1059 - Keiin Sa, Yu Bai, Chenggang Wang:

Research on Mining of Government Data Based on Enhanced-Object Exchange Model. 1060-1068 - Kaiqi Liu

, Ji Wu, Haiyan Yang, Qing Sun, Ruiyuan Wan:
SRTEF: Automatic Test Function Recommendation with Scenarios for Implementing Stepwise Test Case. 1069-1078 - Emilio Rivera-Landos, Foutse Khomh, Amin Nikanjam

:
The Challenge of Reproducible ML: An Empirical Study on The Impact of Bugs. 1079-1088 - Ekincan Ufuktepe

, Tugkan Tuglular, Kannappan Palaniappan:
The Relation between Bug Fix Change Patterns and Change Impact Analysis. 1089-1099 - Abraham Chan, Niranjhana Narayanan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan:

Understanding the Resilience of Neural Network Ensembles against Faulty Training Data. 1100-1111

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














