default search action
21st QRS 2021: Hainan, China - Companion
- 21st IEEE International Conference on Software Quality, Reliability and Security, QRS 2021 - Companion, Hainan, China, December 6-10, 2021. IEEE 2021, ISBN 978-1-6654-7836-6
- Meixi Liu, Weijiang Hong, Weiyu Pan, Chendong Feng:
A Robustness-Oriented Data Augmentation Method for DNN. 1-8 - Fei Ren, Yonghui Yang, Chi Hu, Yuyao Zhou, Siyou Ma:
ADVRET: An Adversarial Robustness Evaluating and Testing Platform for Deep Learning Models. 9-14 - Yuan Chen, Yu Zhao, Junjie Wang:
Application-oriented Serial Interface Communication Protocols Formal Modeling Method. 15-21 - Xinyi Wang, Gaolei Yi, Yichen Wang:
Automated Functional Testing of Search Engines using Metamorphic Testing. 22-29 - Ya Pan, Haiyang Ao, Yong Fan:
Metamorphic Testing for Autonomous Driving Systems in Fog based on Quantitative Measurement. 30-37 - Tongtong Bai, Yong Fan, Ya Pan, Mingshuang Qing:
Metamorphic Testing for Traffic Light Recognition in Autonomous Driving Systems. 38-44 - Xingya Wang, Shiyu Zhang, Fangxiao Liu, Lichao Feng, Zhihong Zhao:
MQP: Mutants Quality Prediction for Cost-Effective Mutation Testing. 45-50 - Lizhi Cai, Naiqi Wang, Mingang Chen, Jin Wang, Jilong Wang, Jiayu Gong:
Reports Aggregation of Crowdsourcing Test Based on Feature Fusion. 51-59 - Meiyuan Qian, Jun Luo, Yu Ge, Chen Sun, Xiuting Ge, Wanmin Huang:
Semantic-based false alarm detection approach via machine learning. 60-66 - Wansheng Yang, Fei Deng, Siyou Ma, Linbo Wu, Zhe Sun, Chi Hu:
Test Case Reuse Based on Software Testing Knowledge Graph and Collaborative Filtering Recommendation Algorithm. 67-76 - Ziyuan Wang, Jinwu Guo, Yanshan Chen, Feiyan She:
The Effect of Combinatorial Coverage for Neurons on Fault Detection in Deep Neural Networks. 77-82 - Dimitrios Tsoukalas, Miltiadis G. Siavvas, Maria Mathioudaki, Dionisis D. Kehagias:
An Ontology-based Approach for Automatic Specification, Verification, and Validation of Software Security Requirements: Preliminary Results. 83-91 - Steffen Lüdtke, Roman Kraus, Ramon Barakat, Martin A. Schneider:
Attack-based Automation of Security Testing for IoT Applications with Genetic Algorithms and Fuzzing. 92-100 - Theofanis Vassiliou-Gioles:
Quality Assurance of Micro-Services - When to trust your micro-service test results? 1-6 - Bingqing Zhang, Gaolei Yi, Yichen Wang, Qi Fei:
Research on generation algorithm of SOA-oriented integration test order. 107-116 - Ling-lin Gong, Yizhuo Zhang, Minghao Yang, Yujia Li, Fang Liu, Qi Yao:
A Review of Reliability, Vulnerability and Resilience Analysis of Smart Grid Based on Complex Network. 117-126 - Fuping Zeng, Yiran Ma, Guoqing Pan:
An Automatic Analysis Framework of Detailed-level Software Fault Modes and Effects Based on Code Model. 127-132 - Dengzhou Shi, Saihua Cai, Songling Qin, Zhenxin Wang, Qiyong Zhong, Ling Zhou:
An Identification Algorithm of Attacking Programs based on Quadratic Feature Selection and Fast Decision Tree. 133-140 - Shiyi Kong, Minyan Lu, Bo Sun, Jun Ai, Shuguang Wang:
Detection Software Content Failures using Dynamic Execution Information. 141-147 - Chi Zhang, Xinxue Lin, Jinfu Chen, Ye Geng:
Dirmap: Web Application Vulnerability Detection Platform Based on Script Code. 148-151 - Qi Shao, Weiwei Chen, Fuping Zeng, Zhijie Gao, Zhiyu Duan, Ouya Lin:
Quantitative Analysis of Software Fault-tolerance Design Modes Based on Probabilistic Model Checking. 152-160 - Hongman Li, Peng Xu, Qilin Zhao, Yihong Liu:
Research on fault diagnosis in early stage of software development based on Object-oriented Bayesian Networks. 161-168 - Qingyang Xu, Jinghui Meng, Yimeng Luo, Shuzhong Yang:
Uplink Transmission Performance Evaluation and Prediction of Railway Balise based on AHP-WNN. 169-176 - Jorrit Olthuis, Rodolfo Jordão, Francesco Robino, Sina Borrami:
VrFy: Verification of Formal Requirements using Generic Traces. 177-183 - Zhongxi Lu, Hongji Yang:
An Emotion-Oriented System for Creativity Stimulation. 184-191 - Lei Li, Shujun Liu, Xinran Li:
An Evaluation of the Quality of Answers to Academic Questions Relating to COVID-19 on Academic Social Q&A Platforms. 192-195 - Sijia Li, Yong Fan, Yue Ma, Ya Pan:
Evaluation of Dataset Distribution and Label Quality for Autonomous Driving System. 196-200 - Yinwei Liu, Lin Zou:
Hue-Saturation-Value (HSV) Colour Model Prediction and Incentive Mechanism Based on Okun's Law and Big Data Tracing. 201-209 - Xiaopeng Xu, Chuancai Liu, Xiaochun Zhang:
Parameter Estimation of Change Point Models based on the Discrete and Continuous Sampler. 210-215 - Antti Kariluoto, Joni Kultanen, Jukka Soininen, Arto Pärnänen, Pekka Abrahamsson:
Quality of Data in Machine Learning. 216-221 - Bosco Ndemeye, Shahid Hussain, Boyana Norris:
Threshold-Based Analysis of the Code Quality of High-Performance Computing Software Packages. 222-228 - Yuanlin Zhou, Yingxuan Song, Mideng Qian:
Unsupervised Anomaly Detection Approach for Multivariate Time Series. 229-235 - Mingfu Tuo, Jian Zhao, Hongmei Zhang, Yongmei Zhao:
A Hybrid Automata Based on Event Algebra for CPS Modelling. 236-241 - Liang Sun, Wenfeng Lin, Shaoxian Shu, Liuying Li:
An Interactive Ranking Algorithm for Program Static Analysis. 242-249 - Siyou Ma, Chi Hu, Fei Deng, Yuyao Zhou, Xiaohu Shang, Linbo Wu, Wei Zou, Chunlei Li, Wansheng Yang, Hao Zhang, Fei Ren:
Combinational Metamorphic Testing for Deep Learning based Target Detection CPS Systems. 250-255 - Ranjie Ding, Wenfeng Lin, Xiang Du, Liangze Yin:
Extend Rchecker for Accurate Analysis of Real Embedded Projects. 256-261 - Jing Wang, Yong Wang, Xue Wang:
Influencing Factors Analysis and Evaluation for Undergraduate Programming Ability. 262-269 - Zhi Deng, Zhao Shi, Zhenxin Wang, Tao Liu:
Research on Feature Optimization Scheme Based on Data Feature Enhancement. 270-278 - Chi Hu, Siyou Ma, Wansheng Yang, Zhe Sun, Fei Deng, Yonghui Yang:
Software Test Data Reuse Based on Domain Ontology Construction. 279-284 - Jing Guo:
Study on Automated Change Impact Domain Analysis in Regression Testing. 285-288 - Zhou Fang, Qilin Wu, Dashuai Guan:
Towards optimal resources allocation in cloud manufacturing: new task decomposition strategy and service composition model. 289-297 - Chenguang Wang, Zhixiao Sun, Qing Luo, Xinyu Wang, Tao Zhang, QianRu Wei, Jing Cheng, Depeng Gao:
A system for Evaluating the Robustness of Embedded Intelligent Chips and Models. 298-305 - Shin Nakajima, Takako Nakatani:
AI Extension of SQuaRE Data Quality Model. 306-313 - Yujun Dai, Shaoying Liu:
Applying Cognitive Complexity to Checklist-Based Human-Machine Pair Inspection. 314-318 - Le Manh Duc, Haibo Yu, Jianjun Zhao:
Bug Characteristics in Probabilistic Programming Systems: A Comprehensive Study. 319-325 - Jing Chen, Chunyan Ma, Zheng Chang:
Fault Localization and Test Oracle Generation Based on the Mutual Pattern of Discrete Path Variables. 326-332 - Minxuan Liu, Dang Duy Bui, Duong Dinh Tran, Kazuhiro Ogata:
Formal Specification and Model Checking of an Autonomous Vehicle Merging Protocol. 333-342 - Xuanqing Chen, Tadashi Dohi, Hiroyuki Okamura:
Investigating Trend/Cyclic/Clustering Decomposition in Software Fault Detection. 343-349 - Dimeng Li, Mengting Liang, Bin Xu, Xiao Yu, Junwei Zhou, Jianwen Xiang:
A Cross-Project Aging-Related Bug Prediction Approach Based on Joint Probability Domain Adaptation and k-means SMOTE. 350-358 - Qiyu Wang, Chenyang Ma, Jiangbin Zhao, Zhiqiang Cai:
Component reassignment of two balanced linear consecutive k-out-of-n systems. 359-364 - Xiaosheng Yu, Sheng Shen, Peng Chen, Zhongtu Liu:
Electronic Medical Record classification method based on LSTM of text word features dimensionality reduction. 365-371 - Jiqing Rao, Xiao Yu, Chen Zhang, Junwei Zhou, Jianwen Xiang:
Learning to rank software modules for effort-aware defect prediction. 372-380 - Xiaosheng Yu, Ruxin Gong, Peng Chen:
Question Classification Method in Disease Question Answering System Based on MCDPLSTM. 381-387 - Xiaosheng Yu, Hehuan Zhang, Jing Li:
Text Classification Method Based On Semi-Supervised Transfer Learning. 388-394 - Pan Guoyang, Yi Yang, Meng Li, Xueyang Hu, Weixing Huang, Jian Wang, Yun Wang:
A Graph based Calligraphy Similarity Compare Model. 395-400 - Hao Chen, Sihao Huang, Lian Zeng, Cong Luo, Wulan Huang, Pan Liu:
A New Model for Mining Superior Uploaders on Bilibili. 401-406 - Ye Geng, Saihua Cai, Songling Qin, Haibo Chen, Shang Yin:
An Efficient Network Traffic Classification Method based on Combined Feature Dimensionality Reduction. 407-414 - Hessamaldin Mohammadi, Wided Ghardallou, Ali Mili:
Assume, Capture, Verify, Establish: Ingredients for Scalable Software Analysis. 415-424 - Yi Yang, Meng Li, Xueyang Hu, Pan Guoyang, Weixing Huang, Jian Wang, Yun Wang:
Exploring Exposure Bias in Recommender Systems from Causality Perspective. 425-432 - Yihang Bo:
Reflect on the Application of Human-Machine Cooperation Technology in Film Art Creation in Virtual Production Era. 433-439 - Jiahui Chen, Shaobo Zhong, Xingtong Ge, Weichao Li, Hanjiang Zhu, Ling Peng:
Spatio-Temporal Knowledge Graph for Meteorological Risk Analysis. 440-447 - Teemu Autto, Joni Kultanen, Joonas Uusnäkki, Mikael Ovaska, Antti Kariluoto, Joonas Himmanen, Tapio Frantti, Pekka Abrahamsson, Mikko Virtaneva, Pasi Kaitila:
Visualizing Human Interactions in a Workspace Setting and Maintaining Privacy. 448-453 - Feng-Jian Wang, Faisal Fahmi, Hongji Yang:
A Research Agenda for Constructing an Environment to Help Develop a Creative Software. 454-462 - Wei Xie, Chunyan Xia, Yan Zhang, Tingting Huo, Xiao Chen:
Augmentation Method of Test Data for Path Coverage based on K-means Clustering. 463-469 - Heling Cao, Fangzheng Liu, Jianshu Shi, Yonghe Chu, Miaolei Deng:
Automated Repair of Java Programs with Random Search via Code Similarity. 470-477 - Xiaotong Gao, Yanfang Ma, Wei Zhou:
The Trustworthiness Measurement Model of Component-based Software Based on the Subjective and Objective Weight Allocation Method. 478-486 - Yuxin Deng, Zezhong Chen, Wenjie Du, Bifei Mao, Zhizhang Liang, Qiushi Lin, Jinghui Li:
Trustworthiness Derivation Tree: A Model of Evidence-Based Software Trustworthiness. 487-493 - Zheng Li, Jitao Shen, Yonghao Wu, Yong Liu, Zeyu Sun:
VSBFL: Variable Value Sequence Based Fault Localization for Novice Programs. 494-505 - Sangwon Hyun, Lingjun Liu, Hansu Kim, Esther Cho, Doo-Hwan Bae:
An Empirical Study of Reliability Analysis for Platooning System-of-Systems. 506-515 - Lama J. Moukahal, Mohammad Zulkernine, Martin Soukup:
Boosting Grey-box Fuzzing for Connected Autonomous Vehicle Systems. 516-527 - Dominic Phillips, Marwa A. Elsayed, Mohammad Zulkernine:
DeepGuard: A DeepBillboard Attack Detection Technique against Connected and Autonomous Vehicles. 528-535 - Liming Zhang, Shuo Jiang, Ke Huang, Yao Xiao, Linlin You, Ming Cai:
Knowledge Graph-based Network Analysis on the Elements of Autonomous Transportation System. 536-542 - Xiangling Wang, Siqi Yang, Jinyang Shao, Jun Chang, Ge Gao, Ming Li, Jifeng Xuan:
Object Removal for Testing Object Detection in Autonomous Vehicle Systems. 543-549 - Songtao Zhang, Jiawei Liu, Bintong Xu, Guandi Liu:
TauAud: Test Augmentation of Image Recognition in Autonomous Driving. 550-554 - Gabriele Baldoni, Julien Loudet, Luca Cominardi, Angelo Corsaro, Yong He:
Zenoh-based Dataflow Framework for Autonomous Vehicles. 555-560 - Man Zhao, Qianzhou He, Shenglong Li, Min Ren:
An Improved Local Search Algorithm with Pruning for Satellite Data Transmission Scheduling Problem. 561-568 - Yutao Sun, Haifeng Wu, Hui Li, Yuan Fu:
Machine Learning-based Mental Health Analysis and Early Warning for College Student. 569-578 - Xiang Liu, Chao Zhang, Yanjun Cao, Li Han, Zhiming Wu:
Multi-Radar Cooperative Task Planning using NSGA-II Algorithm. 579-583 - Hui Li, Man Zhao, Chenglu Zhang, Dengfeng Mo:
Multi-Satellite Mission Planning based on Multi-population Cooperative Parallel Evolutionary Algorithm. 584-588 - Qianzhou He, Yuan Tian, Dongcheng Li, Wenfeng Liu, Mingyong Jian:
Satellite Imaging Task Planning using Particle Swarm Optimization and Tabu Search. 589-595 - Shiying Xu, Zhao Chen, Xueze Zhang, Jikai Bian, Ruo Zhai:
Static routing-based delay analysis for low-orbiting satellite networks. 596-601 - Chong Chen, Dongcheng Li, Hui Li, Jie Zhang, Zhiming Wu:
Stopping Criteria for Satellite Imaging based on Improved Differential Evolution Algorithm. 602-609 - Shan Zhang, Zhao Chen, Wendi Sun, Xiaolu Xiao, Yi Ke:
Study On The Connection Rate Of LEO Communication Satellite. 610-614 - Fintan Duffy, Malika Bendechache, Irina Tal:
Can Solana's high throughput be an enabler for IoT? 615-621 - Liam Waters, Irina Tal:
CERCoin: Carbon tracking enabling Blockchain system for Electric Vehicles. 622-629 - Mikhail Zolotukhin, Timo Hämäläinen, Riku Immonen:
Curious SDN for network attack mitigation. 630-635 - Denis Rangelov, Budankailu Sameer Kumar Subudhi, Philipp Lämmel, Michell Boerger, Nikolay Tcholtchev, Jaffer Khan:
Design and Specification of a Blockchain-based P2P Energy Trading Platform. 636-643 - Alvin Thamrin, Haiping Xu:
Hierarchical Cloud-Based Consortium Blockchains for Healthcare Data Storage. 644-651 - Kazuki Hara, Takeshi Takahashi, Motoya Ishimaki, Kazumasa Omote:
Machine-learning Approach using Solidity Bytecode for Smart-contract Honeypot Detection in the Ethereum. 652-659 - Xiaokun Luan, Meng Sun:
Modeling and Verification of CKB Consensus Protocol in Coq. 660-667 - Imad Yassine, Talal Halabi, Martine Bellaïche:
Security Risk Assessment Methodologies in The Internet of Things: Survey and Taxonomy. 668-675 - Jisoo Kim, Eun-Sun Cho:
Support for the safety of EVM bytecode via function-call interceptor. 676-684 - Mingshuang Qing, Xiang Feng, Jun Luo, Wanmin Huang, Jingui Zhang, Ping Wang, Yong Fan, Xiuting Ge, Ya Pan:
A machine learning-based static analysis warning prioritization. 685-690 - Kunlong Wang, Kanjing Li, Jinhua Gao, Bing Liu, Zhi Fang, Wenjun Ke:
A Quantitative Evaluation Method of Software Usability Based on Improved GOMS Model. 691-697 - Ziyan Wang, Xiangping Chen, Xiaocong Zhou, Yuan Huang, Zibin Zheng, Jiajing Wu:
An Empirical Study of Solidity Language Features. 698-707 - Yongming Yao, Zhongju Yang, Ruizhi Qi, Chen Liu:
Android privacy protocol and permission consistency testing. 708-711 - Yunjian Xu, Zhiyi Zhang, Yuqian Zhou, Ziyuan Wang, Zhiqiu Huang:
DeepMnist: A method of white box testing based on hierarchy. 712-717 - Jin Wang:
Evolving the Edge and the Cloud: A hybrid computing paradigm. 718-721 - Haochen Wang, Jasulan Shokyshalov:
Importing Eye Tracking Regarding with Human Aspects in Software Quality. 722-726 - Zhihua Chen, Xiaolin Ju, Yiheng Shen, Xiang Chen:
Improving Blocking Bug Pair Prediction via Hybrid Deep Learning. 727-732 - Heling Cao, Zhiying Cui, Yangxia Meng, Yonghe Chu, Lei Li:
Mixed Granularity and Variable Mapping based Automatic Software Repair. 733-738 - Min Qian, Yan-Fu Li:
A Clustering-based Framework for Highly Imbalanced Fault Detection with the Applications on High-Speed Trains. 739-744 - Junqi Zeng, Zhenglin Liang, Chunhui Guo, Minyuan Song, Zongqi Xue:
A Gaussian Process Approach for Predictive Maintenance. 745-750 - Chunhui Guo, Zhenglin Liang, Junqi Zeng, Minyuan Song, Zongqi Xue:
A predictive Hidden semi-Markov Model for bridges subject to chloride-induced deterioration. 751-756 - Yipei Ge, Huan Wang, Zhiliang Liu:
Adversarial attack for deep-learning-based fault diagnosis models. 757-761 - Xuan Liu, Huixing Meng:
An Economic Evaluation Model of Predictive Maintenance Technology for Lithium-Ion Batteries. 762-766 - Zongqi Xue, Zhenglin Liang, Minyuan Song, Chunhui Guo, Junqi Zeng:
Base station network alarm streams modeling and prediction based on Cox proportional hazard model and copula. 767-772 - Minyuan Song, Zhenglin Liang, Zongqi Xue, Chunhui Guo, Junqi Zeng:
Remaining Useful Life Prediction for Multi-state Stochastic Deterioration Assets Based on Phase-type Distributions. 773-777 - Shiyu Liu, Dongfang Li, Yasha Chen, Guang Yang:
(Semi) automatic Assertion Generation from Controlled Chinese Natural Language: A Practice in Aerospace Industry. 778-782 - Chi Zhang, Qinyun Liu:
An Approach to Detecting Tourists Satisfaction based on Physical Data and Internet Data. 783-788 - Ryôichi Sasaki:
Application of Risk Assessment Method to Local Government Security Models. 1-8 - Shiyu Liu, Dongfang Li, Wei Shen, Zhihao Wang, Guang Yang, Xiaojing Song:
Application Research of Formal Verification in Aerospace FPGA. 797-805 - Tomoko Kaneko, Nobukazu Yoshioka, Ryôichi Sasaki:
Cyber-Security Incident Analysis by Causal Analysis using System Theory (CAST). 806-815 - Rhys Kirk, Hoang Nga Nguyen, Jeremy W. Bryans, Siraj A. Shaikh, David Evans, David Price:
Formalising UPTANE in CSP for Security Testing. 816-824 - Yuto Okawa, Shuji Yamaguchi, Hidehito Gomi, Tetsutaro Uehara:
Implementation of an extended FIDO2 authenticator using Attribute-Based Signatures. 825-832 - Junjie Lv, Linyu Li, Qiuchen Wu, Chuan Zhao:
Modeling and Simulation of Social E-commerce User Behavior based on Social E-commerce Simulator. 833-840