


default search action
21st QRS 2021: Hainan, China - Companion
- 21st IEEE International Conference on Software Quality, Reliability and Security, QRS 2021 - Companion, Hainan, China, December 6-10, 2021. IEEE 2021, ISBN 978-1-6654-7836-6

- Meixi Liu, Weijiang Hong, Weiyu Pan, Chendong Feng:

A Robustness-Oriented Data Augmentation Method for DNN. 1-8 - Fei Ren, Yonghui Yang, Chi Hu, Yuyao Zhou, Siyou Ma:

ADVRET: An Adversarial Robustness Evaluating and Testing Platform for Deep Learning Models. 9-14 - Yuan Chen, Yu Zhao, Junjie Wang:

Application-oriented Serial Interface Communication Protocols Formal Modeling Method. 15-21 - Xinyi Wang, Gaolei Yi, Yichen Wang:

Automated Functional Testing of Search Engines using Metamorphic Testing. 22-29 - Ya Pan, Haiyang Ao, Yong Fan:

Metamorphic Testing for Autonomous Driving Systems in Fog based on Quantitative Measurement. 30-37 - Tongtong Bai, Yong Fan, Ya Pan, Mingshuang Qing:

Metamorphic Testing for Traffic Light Recognition in Autonomous Driving Systems. 38-44 - Xingya Wang

, Shiyu Zhang, Fangxiao Liu, Lichao Feng, Zhihong Zhao:
MQP: Mutants Quality Prediction for Cost-Effective Mutation Testing. 45-50 - Lizhi Cai, Naiqi Wang, Mingang Chen, Jin Wang, Jilong Wang, Jiayu Gong:

Reports Aggregation of Crowdsourcing Test Based on Feature Fusion. 51-59 - Meiyuan Qian, Jun Luo, Yu Ge, Chen Sun, Xiuting Ge, Wanmin Huang:

Semantic-based false alarm detection approach via machine learning. 60-66 - Wansheng Yang, Fei Deng, Siyou Ma, Linbo Wu, Zhe Sun, Chi Hu:

Test Case Reuse Based on Software Testing Knowledge Graph and Collaborative Filtering Recommendation Algorithm. 67-76 - Ziyuan Wang, Jinwu Guo, Yanshan Chen, Feiyan She:

The Effect of Combinatorial Coverage for Neurons on Fault Detection in Deep Neural Networks. 77-82 - Dimitrios Tsoukalas, Miltiadis G. Siavvas, Maria Mathioudaki, Dionisis D. Kehagias:

An Ontology-based Approach for Automatic Specification, Verification, and Validation of Software Security Requirements: Preliminary Results. 83-91 - Steffen Lüdtke, Roman Kraus

, Ramon Barakat
, Martin A. Schneider
:
Attack-based Automation of Security Testing for IoT Applications with Genetic Algorithms and Fuzzing. 92-100 - Theofanis Vassiliou-Gioles

:
Quality Assurance of Micro-Services - When to trust your micro-service test results? 1-6 - Bingqing Zhang, Gaolei Yi, Yichen Wang, Qi Fei:

Research on generation algorithm of SOA-oriented integration test order. 107-116 - Ling-lin Gong, Yizhuo Zhang, Minghao Yang, Yujia Li, Fang Liu, Qi Yao:

A Review of Reliability, Vulnerability and Resilience Analysis of Smart Grid Based on Complex Network. 117-126 - Fuping Zeng, Yiran Ma, Guoqing Pan:

An Automatic Analysis Framework of Detailed-level Software Fault Modes and Effects Based on Code Model. 127-132 - Dengzhou Shi, Saihua Cai, Songling Qin, Zhenxin Wang, Qiyong Zhong, Ling Zhou:

An Identification Algorithm of Attacking Programs based on Quadratic Feature Selection and Fast Decision Tree. 133-140 - Shiyi Kong, Minyan Lu, Bo Sun, Jun Ai, Shuguang Wang:

Detection Software Content Failures using Dynamic Execution Information. 141-147 - Chi Zhang, Xinxue Lin, Jinfu Chen, Ye Geng:

Dirmap: Web Application Vulnerability Detection Platform Based on Script Code. 148-151 - Qi Shao, Weiwei Chen, Fuping Zeng, Zhijie Gao, Zhiyu Duan, Ouya Lin:

Quantitative Analysis of Software Fault-tolerance Design Modes Based on Probabilistic Model Checking. 152-160 - Hongman Li, Peng Xu, Qilin Zhao, Yihong Liu:

Research on fault diagnosis in early stage of software development based on Object-oriented Bayesian Networks. 161-168 - Qingyang Xu, Jinghui Meng, Yimeng Luo, Shuzhong Yang:

Uplink Transmission Performance Evaluation and Prediction of Railway Balise based on AHP-WNN. 169-176 - Jorrit Olthuis

, Rodolfo Jordão, Francesco Robino, Sina Borrami:
VrFy: Verification of Formal Requirements using Generic Traces. 177-183 - Zhongxi Lu, Hongji Yang:

An Emotion-Oriented System for Creativity Stimulation. 184-191 - Lei Li, Shujun Liu, Xinran Li:

An Evaluation of the Quality of Answers to Academic Questions Relating to COVID-19 on Academic Social Q&A Platforms. 192-195 - Sijia Li, Yong Fan, Yue Ma, Ya Pan:

Evaluation of Dataset Distribution and Label Quality for Autonomous Driving System. 196-200 - Yinwei Liu

, Lin Zou
:
Hue-Saturation-Value (HSV) Colour Model Prediction and Incentive Mechanism Based on Okun's Law and Big Data Tracing. 201-209 - Xiaopeng Xu, Chuancai Liu, Xiaochun Zhang:

Parameter Estimation of Change Point Models based on the Discrete and Continuous Sampler. 210-215 - Antti Kariluoto, Joni Kultanen

, Jukka Soininen, Arto Pärnänen, Pekka Abrahamsson:
Quality of Data in Machine Learning. 216-221 - Bosco Ndemeye, Shahid Hussain, Boyana Norris:

Threshold-Based Analysis of the Code Quality of High-Performance Computing Software Packages. 222-228 - Yuanlin Zhou, Yingxuan Song, Mideng Qian:

Unsupervised Anomaly Detection Approach for Multivariate Time Series. 229-235 - Mingfu Tuo, Jian Zhao, Hongmei Zhang, Yongmei Zhao:

A Hybrid Automata Based on Event Algebra for CPS Modelling. 236-241 - Liang Sun, Wenfeng Lin, Shaoxian Shu, Liuying Li:

An Interactive Ranking Algorithm for Program Static Analysis. 242-249 - Siyou Ma, Chi Hu, Fei Deng, Yuyao Zhou, Xiaohu Shang, Linbo Wu, Wei Zou, Chunlei Li, Wansheng Yang, Hao Zhang, Fei Ren:

Combinational Metamorphic Testing for Deep Learning based Target Detection CPS Systems. 250-255 - Ranjie Ding, Wenfeng Lin, Xiang Du, Liangze Yin:

Extend Rchecker for Accurate Analysis of Real Embedded Projects. 256-261 - Jing Wang, Yong Wang, Xue Wang:

Influencing Factors Analysis and Evaluation for Undergraduate Programming Ability. 262-269 - Zhi Deng, Zhao Shi, Zhenxin Wang, Tao Liu:

Research on Feature Optimization Scheme Based on Data Feature Enhancement. 270-278 - Chi Hu, Siyou Ma, Wansheng Yang, Zhe Sun, Fei Deng, Yonghui Yang:

Software Test Data Reuse Based on Domain Ontology Construction. 279-284 - Jing Guo:

Study on Automated Change Impact Domain Analysis in Regression Testing. 285-288 - Zhou Fang, Qilin Wu, Dashuai Guan:

Towards optimal resources allocation in cloud manufacturing: new task decomposition strategy and service composition model. 289-297 - Chenguang Wang, Zhixiao Sun, Qing Luo, Xinyu Wang, Tao Zhang, QianRu Wei, Jing Cheng, Depeng Gao:

A system for Evaluating the Robustness of Embedded Intelligent Chips and Models. 298-305 - Shin Nakajima, Takako Nakatani:

AI Extension of SQuaRE Data Quality Model. 306-313 - Yujun Dai, Shaoying Liu:

Applying Cognitive Complexity to Checklist-Based Human-Machine Pair Inspection. 314-318 - Le Manh Duc, Haibo Yu, Jianjun Zhao:

Bug Characteristics in Probabilistic Programming Systems: A Comprehensive Study. 319-325 - Jing Chen, Chunyan Ma, Zheng Chang:

Fault Localization and Test Oracle Generation Based on the Mutual Pattern of Discrete Path Variables. 326-332 - Minxuan Liu, Dang Duy Bui, Duong Dinh Tran, Kazuhiro Ogata:

Formal Specification and Model Checking of an Autonomous Vehicle Merging Protocol. 333-342 - Xuanqing Chen, Tadashi Dohi, Hiroyuki Okamura:

Investigating Trend/Cyclic/Clustering Decomposition in Software Fault Detection. 343-349 - Dimeng Li, Mengting Liang, Bin Xu, Xiao Yu, Junwei Zhou, Jianwen Xiang:

A Cross-Project Aging-Related Bug Prediction Approach Based on Joint Probability Domain Adaptation and k-means SMOTE. 350-358 - Qiyu Wang, Chenyang Ma, Jiangbin Zhao

, Zhiqiang Cai:
Component reassignment of two balanced linear consecutive k-out-of-n systems. 359-364 - Xiaosheng Yu, Sheng Shen, Peng Chen, Zhongtu Liu:

Electronic Medical Record classification method based on LSTM of text word features dimensionality reduction. 365-371 - Jiqing Rao, Xiao Yu, Chen Zhang, Junwei Zhou, Jianwen Xiang:

Learning to rank software modules for effort-aware defect prediction. 372-380 - Xiaosheng Yu, Ruxin Gong, Peng Chen:

Question Classification Method in Disease Question Answering System Based on MCDPLSTM. 381-387 - Xiaosheng Yu, Hehuan Zhang, Jing Li:

Text Classification Method Based On Semi-Supervised Transfer Learning. 388-394 - Pan Guoyang, Yi Yang, Meng Li, Xueyang Hu, Weixing Huang, Jian Wang, Yun Wang:

A Graph based Calligraphy Similarity Compare Model. 395-400 - Hao Chen, Sihao Huang, Lian Zeng, Cong Luo, Wulan Huang, Pan Liu:

A New Model for Mining Superior Uploaders on Bilibili. 401-406 - Ye Geng, Saihua Cai, Songling Qin, Haibo Chen, Shang Yin:

An Efficient Network Traffic Classification Method based on Combined Feature Dimensionality Reduction. 407-414 - Hessamaldin Mohammadi, Wided Ghardallou, Ali Mili:

Assume, Capture, Verify, Establish: Ingredients for Scalable Software Analysis. 415-424 - Yi Yang, Meng Li, Xueyang Hu, Pan Guoyang, Weixing Huang, Jian Wang, Yun Wang:

Exploring Exposure Bias in Recommender Systems from Causality Perspective. 425-432 - Yihang Bo:

Reflect on the Application of Human-Machine Cooperation Technology in Film Art Creation in Virtual Production Era. 433-439 - Jiahui Chen, Shaobo Zhong, Xingtong Ge, Weichao Li, Hanjiang Zhu, Ling Peng:

Spatio-Temporal Knowledge Graph for Meteorological Risk Analysis. 440-447 - Teemu Autto, Joni Kultanen

, Joonas Uusnäkki, Mikael Ovaska, Antti Kariluoto, Joonas Himmanen, Tapio Frantti, Pekka Abrahamsson, Mikko Virtaneva, Pasi Kaitila:
Visualizing Human Interactions in a Workspace Setting and Maintaining Privacy. 448-453 - Feng-Jian Wang, Faisal Fahmi

, Hongji Yang:
A Research Agenda for Constructing an Environment to Help Develop a Creative Software. 454-462 - Wei Xie, Chunyan Xia, Yan Zhang, Tingting Huo, Xiao Chen:

Augmentation Method of Test Data for Path Coverage based on K-means Clustering. 463-469 - Heling Cao, Fangzheng Liu, Jianshu Shi, Yonghe Chu, Miaolei Deng:

Automated Repair of Java Programs with Random Search via Code Similarity. 470-477 - Xiaotong Gao, Yanfang Ma, Wei Zhou:

The Trustworthiness Measurement Model of Component-based Software Based on the Subjective and Objective Weight Allocation Method. 478-486 - Yuxin Deng, Zezhong Chen, Wenjie Du, Bifei Mao, Zhizhang Liang, Qiushi Lin, Jinghui Li:

Trustworthiness Derivation Tree: A Model of Evidence-Based Software Trustworthiness. 487-493 - Zheng Li, Jitao Shen, Yonghao Wu, Yong Liu, Zeyu Sun:

VSBFL: Variable Value Sequence Based Fault Localization for Novice Programs. 494-505 - Sangwon Hyun, Lingjun Liu, Hansu Kim, Esther Cho, Doo-Hwan Bae:

An Empirical Study of Reliability Analysis for Platooning System-of-Systems. 506-515 - Lama J. Moukahal, Mohammad Zulkernine, Martin Soukup:

Boosting Grey-box Fuzzing for Connected Autonomous Vehicle Systems. 516-527 - Dominic Phillips, Marwa A. Elsayed

, Mohammad Zulkernine:
DeepGuard: A DeepBillboard Attack Detection Technique against Connected and Autonomous Vehicles. 528-535 - Liming Zhang, Shuo Jiang, Ke Huang, Yao Xiao

, Linlin You
, Ming Cai:
Knowledge Graph-based Network Analysis on the Elements of Autonomous Transportation System. 536-542 - Xiangling Wang, Siqi Yang, Jinyang Shao, Jun Chang, Ge Gao, Ming Li, Jifeng Xuan:

Object Removal for Testing Object Detection in Autonomous Vehicle Systems. 543-549 - Songtao Zhang, Jiawei Liu, Bintong Xu, Guandi Liu:

TauAud: Test Augmentation of Image Recognition in Autonomous Driving. 550-554 - Gabriele Baldoni, Julien Loudet, Luca Cominardi, Angelo Corsaro, Yong He:

Zenoh-based Dataflow Framework for Autonomous Vehicles. 555-560 - Man Zhao, Qianzhou He, Shenglong Li, Min Ren:

An Improved Local Search Algorithm with Pruning for Satellite Data Transmission Scheduling Problem. 561-568 - Yutao Sun, Haifeng Wu, Hui Li, Yuan Fu:

Machine Learning-based Mental Health Analysis and Early Warning for College Student. 569-578 - Xiang Liu, Chao Zhang, Yanjun Cao, Li Han, Zhiming Wu:

Multi-Radar Cooperative Task Planning using NSGA-II Algorithm. 579-583 - Hui Li, Man Zhao, Chenglu Zhang, Dengfeng Mo:

Multi-Satellite Mission Planning based on Multi-population Cooperative Parallel Evolutionary Algorithm. 584-588 - Qianzhou He, Yuan Tian, Dongcheng Li, Wenfeng Liu, Mingyong Jian:

Satellite Imaging Task Planning using Particle Swarm Optimization and Tabu Search. 589-595 - Shiying Xu, Zhao Chen

, Xueze Zhang, Jikai Bian, Ruo Zhai:
Static routing-based delay analysis for low-orbiting satellite networks. 596-601 - Chong Chen, Dongcheng Li, Hui Li, Jie Zhang, Zhiming Wu:

Stopping Criteria for Satellite Imaging based on Improved Differential Evolution Algorithm. 602-609 - Shan Zhang, Zhao Chen

, Wendi Sun, Xiaolu Xiao, Yi Ke:
Study On The Connection Rate Of LEO Communication Satellite. 610-614 - Fintan Duffy, Malika Bendechache

, Irina Tal:
Can Solana's high throughput be an enabler for IoT? 615-621 - Liam Waters, Irina Tal:

CERCoin: Carbon tracking enabling Blockchain system for Electric Vehicles. 622-629 - Mikhail Zolotukhin, Timo Hämäläinen

, Riku Immonen:
Curious SDN for network attack mitigation. 630-635 - Denis Rangelov, Budankailu Sameer Kumar Subudhi, Philipp Lämmel

, Michell Boerger, Nikolay Tcholtchev
, Jaffer Khan:
Design and Specification of a Blockchain-based P2P Energy Trading Platform. 636-643 - Alvin Thamrin, Haiping Xu

:
Hierarchical Cloud-Based Consortium Blockchains for Healthcare Data Storage. 644-651 - Kazuki Hara, Takeshi Takahashi, Motoya Ishimaki, Kazumasa Omote:

Machine-learning Approach using Solidity Bytecode for Smart-contract Honeypot Detection in the Ethereum. 652-659 - Xiaokun Luan, Meng Sun:

Modeling and Verification of CKB Consensus Protocol in Coq. 660-667 - Imad Yassine, Talal Halabi, Martine Bellaïche:

Security Risk Assessment Methodologies in The Internet of Things: Survey and Taxonomy. 668-675 - Jisoo Kim, Eun-Sun Cho:

Support for the safety of EVM bytecode via function-call interceptor. 676-684 - Mingshuang Qing, Xiang Feng, Jun Luo, Wanmin Huang, Jingui Zhang, Ping Wang, Yong Fan, Xiuting Ge, Ya Pan:

A machine learning-based static analysis warning prioritization. 685-690 - Kunlong Wang, Kanjing Li, Jinhua Gao, Bing Liu, Zhi Fang, Wenjun Ke:

A Quantitative Evaluation Method of Software Usability Based on Improved GOMS Model. 691-697 - Ziyan Wang, Xiangping Chen, Xiaocong Zhou, Yuan Huang, Zibin Zheng, Jiajing Wu:

An Empirical Study of Solidity Language Features. 698-707 - Yongming Yao, Zhongju Yang, Ruizhi Qi, Chen Liu:

Android privacy protocol and permission consistency testing. 708-711 - Yunjian Xu, Zhiyi Zhang, Yuqian Zhou, Ziyuan Wang, Zhiqiu Huang:

DeepMnist: A method of white box testing based on hierarchy. 712-717 - Jin Wang

:
Evolving the Edge and the Cloud: A hybrid computing paradigm. 718-721 - Haochen Wang, Jasulan Shokyshalov:

Importing Eye Tracking Regarding with Human Aspects in Software Quality. 722-726 - Zhihua Chen, Xiaolin Ju, Yiheng Shen, Xiang Chen:

Improving Blocking Bug Pair Prediction via Hybrid Deep Learning. 727-732 - Heling Cao, Zhiying Cui, Yangxia Meng, Yonghe Chu, Lei Li:

Mixed Granularity and Variable Mapping based Automatic Software Repair. 733-738 - Min Qian

, Yan-Fu Li:
A Clustering-based Framework for Highly Imbalanced Fault Detection with the Applications on High-Speed Trains. 739-744 - Junqi Zeng, Zhenglin Liang, Chunhui Guo, Minyuan Song, Zongqi Xue:

A Gaussian Process Approach for Predictive Maintenance. 745-750 - Chunhui Guo, Zhenglin Liang, Junqi Zeng, Minyuan Song, Zongqi Xue:

A predictive Hidden semi-Markov Model for bridges subject to chloride-induced deterioration. 751-756 - Yipei Ge, Huan Wang

, Zhiliang Liu:
Adversarial attack for deep-learning-based fault diagnosis models. 757-761 - Xuan Liu, Huixing Meng:

An Economic Evaluation Model of Predictive Maintenance Technology for Lithium-Ion Batteries. 762-766 - Zongqi Xue, Zhenglin Liang, Minyuan Song, Chunhui Guo, Junqi Zeng:

Base station network alarm streams modeling and prediction based on Cox proportional hazard model and copula. 767-772 - Minyuan Song, Zhenglin Liang, Zongqi Xue, Chunhui Guo, Junqi Zeng:

Remaining Useful Life Prediction for Multi-state Stochastic Deterioration Assets Based on Phase-type Distributions. 773-777 - Shiyu Liu, Dongfang Li, Yasha Chen, Guang Yang:

(Semi) automatic Assertion Generation from Controlled Chinese Natural Language: A Practice in Aerospace Industry. 778-782 - Chi Zhang, Qinyun Liu:

An Approach to Detecting Tourists Satisfaction based on Physical Data and Internet Data. 783-788 - Ryôichi Sasaki:

Application of Risk Assessment Method to Local Government Security Models. 1-8 - Shiyu Liu, Dongfang Li, Wei Shen, Zhihao Wang, Guang Yang, Xiaojing Song:

Application Research of Formal Verification in Aerospace FPGA. 797-805 - Tomoko Kaneko, Nobukazu Yoshioka, Ryôichi Sasaki:

Cyber-Security Incident Analysis by Causal Analysis using System Theory (CAST). 806-815 - Rhys Kirk, Hoang Nga Nguyen

, Jeremy W. Bryans, Siraj A. Shaikh, David Evans, David Price:
Formalising UPTANE in CSP for Security Testing. 816-824 - Yuto Okawa, Shuji Yamaguchi, Hidehito Gomi, Tetsutaro Uehara:

Implementation of an extended FIDO2 authenticator using Attribute-Based Signatures. 825-832 - Junjie Lv

, Linyu Li, Qiuchen Wu, Chuan Zhao:
Modeling and Simulation of Social E-commerce User Behavior based on Social E-commerce Simulator. 833-840 - Kento Yoshikawa, Takumi Awa, Risa Kusano, Masatsugu Ichino, Hiroshi Yoshiura:

Reliability-Disguised Attacks on Social Network to Accelerate Fake News Dissemination. 841-848 - Mingzu Zhang, Zhaoxia Tian, Lianzhu Zhang:

A Novel View: Edge is Operimetric Methods and Reliability Evaluation of Several kinds of Conditional Edge-connectivity of Interconnection Networks. 849-860 - Yan Wang, Lijuan Jia, Hongjian Cao, Ziqi Jing, Huan Huang:

Applications of Cucumber on Automated Functional Simulation Testing. 861-862 - Xiuyang Zhu, Fei Xie, Wenyu Du, Huan Huang:

Automatic Testing Methods for Response Time of Information Systems. 863-864 - Hong Zhang, Shuming Zhou, Zhenqin Yu, Xiaoqing Liu:

Extra (component) connectivity and diagnosability of bubble sort networks. 865-871 - Yugui Wang, Hao Wang, Zhenjiang Dong

, Weibei Fan, Yuanzheng Zhang:
Fast Reliable Routing Selection for Sparse Task Allocation in Mobile Crowdsourcing Systems. 872-878 - Lu Zhao, Lingyun Xu, Guojing Luo, Xiang Long, Jinhai Gong, Xiaobo Sang:

SecVerifier: A Practical Memory-Security Verifier. 879-880 - Xinyang Wang, Hu Renshun, Qiao Sun:

Shortest routing algorithm of the Exchanged Crossed Cube based on adjacent subcube group. 881-889 - Xiaoqing Liu, Shuming Zhou, Jiafei Liu, Zhengqin Yu:

Subgraph reliability of the cactus-based networks. 890-896 - Yufang Zhang, Ximeng Liu, Xiaoyan Li, Wanling Lin

, Hongbin Zhuang
:
The Rg-conditional connectivity and diagnosablility of generalized exchanged X-cubes. 897-904 - Bo Su, Qingyue Yang

, Bo Bai, Zeshan Yan, Lei Zhu, Shanliangkun He:
A Tobit traceless Kalman filter technique TUKF: handle truncated data. 905-911 - Hui Ren, Hongwei Ma, Jian Kang, Yang Liu, Lu Wang, Xiaogang Zheng:

Algorithm Analysis of Sparse Matrix Multiplication. 912-917 - Xianghao Zhan, Lifeng Lei, Liang Kou:

An electric power forecasting method based on dual time series attention mechanism neural network structure. 918-925 - Wenyue Sun, Changda Wang:

An Improved Mean Shift Clustering Algorithm for LFA Detection. 926-934 - Xing Wu, Fengxia Han, Hao Deng:

An Ontology Based Resource Description Model for Blockchain-IoT. 935-940 - Weicheng Zheng, Hao Deng, Fengxia Han:

GST-Net: A GIS-based Hybrid Prediction Model for Shared Bike Traffic Flow. 941-946 - Juzhen Wang:

Joint Vehicle Scheduling and Power Allocation for V2X Communications. 947-950 - Kun Yang, Yao Zhang, Yang Liu, Jun-Tao Liu, Kai Zhao:

Local filter-based sequential and distributed fusion state estimation for nonlinear multi-sensor systems with asynchronously correlated noises. 951-960 - Bin Wang, Ziyan Jiang, Yang Liu, Yuzhi Zhang, Ke Xu, Zhuang Yuan:

LoRa-based Fire Monitoring System. 961-967 - Zhong Tian, Wenli Ji, Liutao Xi, Ding-Ding Zhang:

Prediction of Overlying Rock Deformation based on LSTM in Optical Fiber Sensor Monitoring. 968-974 - Hongbo Zhang, Chenghao Huang, Ying Yang, Zhisen Wang, Zhe Cui, Lianghuang He:

PSO-LSSVM model-based waypoint traffic prediction study. 975-979 - Ying Yang, Chenghao Huang, Hongbo Zhang, ChaoHui Feng, Zhisen Wang, Zhe Cui:

Research on airspace security risk assessment technology based on knowledge Graph. 980-986 - Chenghao Huang, Hongbo Zhang, Ying Yang, Lianghuang He, Qiuqing Luo:

Research on fast generation and simulation technology of air traffic flow in control sector. 987-993 - Kangkang Dou, Yong Wang, Qixuan Yang, Yaxin Han, Zhao Yang:

Research on Mainstream DataBase Security Analysis Technology of Big Data Platform. 994-998 - Lianwei Qu, Jing Yang, Xueyun Yan, Lixin Ma, Qixuan Yang, Yaxin Han:

Research on Privacy Protection Technology for Data Publishing. 999-1005 - Yue Yin, Miao Liu, Guan Gui, Hikmet Sari:

Resource Allocation for UAV-Assisted MIMO-NOMA Wireless Caching Networks. 1006-1010 - Yuzhi Zhou, Jinlong Sun, Jie Yang, Guan Gui, Haris Gacanin, Fumiyuki Adachi:

Side Information-Aided Handover Strategy for Air-Ground Integrated Vehicular Networks. 1011-1016 - Yingxin Wang, Chuankun Li, Liang Kou:

Summary of Fault Diagnosis Technology in Smart Grid. 1017-1020 - Qian Chen, Changda Wang:

Traffic Matrix Estimation Based on Incomplete Network Link Loads Measurement. 1021-1026 - Zhicheng Lu, Ruochen Li, Huamiao Hu, Wen'an Zhou:

A code clone detection algorithm based on graph convolution network with AST tree edge. 1027-1032 - Yanjie Shao, Yanjun Wu, Mutian Yang, Tianyue Luo, Jingzheng Wu:

A Large-Scale Study on Vulnerabilities in Linux using Vtopia. 1-10 - Huoliang He, Shunkun Yang:

Automatic Bug Triage Using Hierarchical Attention Networks. 1043-1049 - Darine Ameyed, Fehmi Jaafar, Francis Charette Migneault

, Mohamed Cheriet:
Blockchain Based Model for Consent Management and Data Transparency Assurance. 1050-1059 - Sherlock A. Licorish, Thushika Nishatharan:

Contextual Profiling of Stack Overflow Java Code Security Vulnerabilities Initial Insights from a Pilot Study. 1060-1068 - Niels Doorn

, Tanja E. J. Vos, Beatriz Marín, Harrie Passier, Lex Bijlsma, Silvio Cacace:
Exploring students' sensemaking of test case design. An initial study. 1069-1078 - Fevzi Belli, Tugkan Tuglular, Ekincan Ufuktepe

:
Heterogeneous Modeling and Testing of Software Product Lines. 1079-1088 - Tingting Chen, Yang Zhang, Shu Chen, Tao Wang, Yiwen Wu:

Let's Supercharge the Workflows: An Empirical Study of GitHub Actions. 1-10 - Xudong He:

Modeling Cyber Physical Systems with Learning Enabled Components using Hybrid Predicate Transition Nets. 1099-1108 - Xiaodong Gou, Long Fan, Li Zhao, Qi Shao, Chong Bian, Shunkun Yang:

Multiscale Empirical Analysis of Software Network Evolution. 1109-1118 - Xiaochun Zhang, Chen Li

, Kuan-Lin Chen
, Dimitrios Chrysostomou
, Hongji Yang:
Stock Prediction with Stacked-LSTM Neural Networks. 1119-1125 - Takumi Tsutsui, Yoshiaki Shiraishi, Masakatu Morii:

Systemization of Vulnerability Information by Ontology for Impact Analysis. 1126-1134 - Moritz Platt

, Johannes Sedlmeir
, Daniel Platt, Jiahua Xu, Paolo Tasca
, Nikhil Vadgama, Juan Ignacio Ibañez
:
The Energy Footprint of Blockchain Consensus Mechanisms Beyond Proof-of-Work. 1135-1144 - Hongji Yang, Tian Liu:

The Influence of Handwriting and Word-Processing on Creativity in the Fiction Production: A Case Study of Fay Weldon's Fictions. 1145-1152 - Jose Luis de la Vara, Juan Manuel Morote:

A Proposal for Model-Based Reliability-Oriented System Design in Industry. 1153-1154 - Tianxiang Lv, Qihao Bao, Haibo Chen, Chi Zhang:

A Testing Method for Object-oriented Program based on Adaptive Random Testing with Variable Probability. 1155-1156 - Shengran Wang, Jinfu Chen, Jiaxiang Xi, Haibo Chen, Jingyi Chen:

An Adaptive Random Test Method based on Variable Probability Density Function with Particle Swarm Optimization. 1157-1158 - Wei Lin, Saihua Cai:

An Empirical Study on Vulnerability Detection for Source Code Software based on Deep Learning. 1159-1160 - Natalia Fursova, Pavel Dovgalyuk, Ivan Vasiliev, Maria Klimushenkova, Danila Egorov:

Detecting Attack Surface With Full-System Taint Analysis. 1161-1162 - Megha Quamara

, Gabriel Pedroza, Brahim Hamid:
Introducing a Multi-layered Model-based Design Approach towards Safety-Security Co-engineering. 1163-1164 - Ruiqi Luo, Bangchao Wang

, Xian Zhong
:
MDD4CER: Efficient Complex Event Recognition with Multiple-value Decision Diagram. 1165-1166 - Chuanjia Hou, Xiaotong Liu, Hao Yu, Tong Jia, Ying Li:

Mining Event Logic Graph from Open Q&A Site for Automated Program Repair. 1167-1168 - Yang Liu, Guofeng Zhang, Zhenbang Chen, Ziqi Shuai:

Selective Symbolization Based Efficient Symbolic Execution. 1169-1170 - Zheng Li, Zhanqi Cui, Huanhuan Wu, Yating Zheng:

Testing Autonomous Driving System based on Scenic. 1171-1172 - Lei Shi, Masanari Kondo, Naoyasu Ubayashi, Yasutaka Kamei:

Towards Better Coverage of Dataset with Software Product Line Engineering. 1173-1174 - Huan Wang, Tianli Men, Yan-Fu Li:

Transformer for High-Speed Train Wheel Wear Prediction with Multiplex Local-Global Temporal Fusion. 1175-1176

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














