


default search action
22nd QRS 2022: Guangzhou, China
- 22nd IEEE International Conference on Software Quality, Reliability and Security, QRS 2022, Guangzhou, China, December 5-9, 2022. IEEE 2022, ISBN 978-1-6654-7704-8

- Raphaël Khoury:

A Taxonomy of Software Flaws Leading to Buffer Overflows. 1-8 - Lili Bo, Xing Meng, Xiaobing Sun, Jingli Xia, Xiaoxue Wu:

A Comprehensive Analysis of NVD Concurrency Vulnerabilities. 9-18 - Benjamin Petit, Ahmed Khanfir, Ezekiel O. Soremekun

, Gilles Perrouin
, Mike Papadakis:
IntJect: Vulnerability Intent Bug Seeding. 19-30 - Kedrian James, Yufei Du, Sanjeev Das, Fabian Monrose:

Separating the Wheat from the Chaff: Using Indexing and Sub-Sequence Mining Techniques to Identify Related Crashes During Bug Triage. 31-42 - Cláudia Mamede, Eduard Pinconschi, Rui Abreu

, José Campos
:
Exploring Transformers for Multi-Label Classification of Java Vulnerabilities. 43-52 - Chen Qian, Tianyuan Hu, Bixin Li:

A BiLSTM-Attention Model for Detecting Smart Contract Defects More Accurately. 53-62 - Charilaos Skandylas, Narges Khakpour

, Javier Cámara:
Security Countermeasure Selection for Component-Based Software-Intensive Systems. 63-72 - Jin-lei Sun, Song Huang, Xingya Wang

, Meijuan Wang, Jinhu Du:
A Detection Method for Scarcity Defect of Blockchain Digital Asset based on Invariant Analysis. 73-84 - Bohan Zhang, Yafan Huang

, Guanpeng Li:
Salus: A Novel Data-Driven Monitor that Enables Real-Time Safety in Autonomous Driving Systems. 85-94 - Lizhi Cai, Jin Wang, Mingang Chen, Jilong Wang:

Automatic Collaborative Testing of Applications Integrating Text Features and Priority Experience Replay. 95-104 - Guangwei Tian, Jiongyi Chen, Kailun Yan, Shishuai Yang, Wenrui Diao:

Cast Away: On the Security of DLNA Deployments in the SmartTV Ecosystem. 105-116 - Dongdong Zhao, Zhao Wang, Huanhuan Li, Jianwen Xiang:

GAN-Based Privacy-Preserving Unsupervised Domain Adaptation. 117-126 - Xinrui Zhang, Jason Jaskolka:

Conceptualizing the Secure Machine Learning Operations (SecMLOps) Paradigm. 127-138 - Lin Wang, Fangxiao Li, Yunfei Xie, Leyi Shi:

Identity Authentication Strategy of Mobile Crowd Sensing based on CFL. 139-146 - Shenhui Zhang

, Wenkai Li, Xiaoqi Li, Boyi Liu:
AuthROS: Secure Data Sharing Among Robot Operating Systems based on Ethereum. 147-156 - Tao Wang, Chuanqi Tao, Hongjing Guo, Lijin Tang:

Semantic Feature Learning based on Double Sequences Structure for Software Defect Number Prediction. 157-166 - Xinghan Zhao, Cong Tian:

An Empirical Study on Software Defect Prediction using Function Point Analysis. 167-176 - Chenglin Li, Yangyang Zhao, Yibiao Yang:

An Empirical Study of the Bug Link Rate. 177-188 - Shaojian Qiu, Shaosheng Wang

, Xuhong Tian, Mengyang Huang, Qiong Huang:
Visualization-Based Software Defect Prediction via Convolutional Neural Network with Global Self-Attention. 189-198 - Bahareh Afshinpour, Roland Groz, Massih-Reza Amini:

Telemetry-Based Software Failure Prediction by Concept-Space Model Creation. 199-208 - Omar I. Al-Bataineh, Leon Moonen:

Towards Extending the Range of Bugs That Automated Program Repair Can Handle. 209-220 - Dániel Vince, Attila Szatmári

, Ákos Kiss, Árpád Beszédes:
Division by Zero: Threats and Effects in Spectrum-Based Fault Localization Formulas. 221-230 - Hao Chen, Haiyang Yang, Zilun Yan, Li Kuang, Lingyan Zhang:

CGMBL: Combining GAN and Method Name for Bug Localization. 231-241 - Xiaojuan Wang, Wenyu Zhang, Shanyan Lai, Chunyang Ye, Hui Zhou:

The Use of Pretrained Model for Matching App Reviews and Bug Reports. 242-251 - Yilin Yang, Ziyuan Wang, Zhenyu Chen, Baowen Xu:

Context-Aware Program Simplification to Improve Information Retrieval-Based Bug Localization. 252-263 - Zhishen Zhu, Hao Zhou, Qingya Yang, Chonghua Wang, Zhen Li:

Anomaly Detection in Encrypted Identity Resolution Traffic based on Machine Learning. 264-275 - Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Ryan K. L. Ko

, Dan Dongseong Kim
:
Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN Environments. 276-286 - Kazuki Yoda, Tomoki Nakamaru, Soramichi Akiyama, Shigeru Chiba:

An Anomaly-Based Approach for Detecting Modularity Violations on Method Placement. 287-298 - Yongzheng Xie, Hongyu Zhang, Muhammad Ali Babar:

LogGD: Detecting Anomalies from System Logs with Graph Neural Networks. 299-310 - Hezhen Liu, Zhi Jin, Zheng Zheng, Chengqiang Huang, Xun Zhang:

An Ontological Analysis of Safety-Critical Software and Its Anomalies. 311-320 - Fuqun Huang

, Bo Zhao, Henrique Madeira
:
A New Code Review Method based on Human Errors. 321-332 - Sebastian Hönel

, Morgan Ericsson, Welf Löwe, Anna Wingkvist:
Contextual Operationalization of Metrics as Scores: Is My Metric Value Good? 333-343 - Xiaotao Song, Jiafei Yan, Yuexin Huang, Hailong Sun, Hongyu Zhang:

A Collaboration-Aware Approach to Profiling Developer Expertise with Cross-Community Data. 344-355 - Manuel Carrero, Elena Enamorado-Díaz

, J. A. García-García, María J. Escalona:
Proposing a Quality Model for Evaluating and Identifying Opportunities in Clinical Practice Guideline Engines. 356-365 - Leo Silva

, Marília Castro, Miriam Bernardino Silva, Milena Santos, Uirá Kulesza, Margarida Lima, Henrique Madeira
:
Emotional Dashboard: a Non-Intrusive Approach to Monitor Software Developers' Emotions and Personality Traits. 366-375 - Debao Sang, Jing Liu, Haiying Sun, Jin Xu, Jiexiang Kang:

A Novel Approach for Bounded Model Checking Through Full Parallelism. 376-387 - Huiyu Liu, Jing Liu, Wei Yin, Haiying Sun, Chenchen Yang:

Safety SysML: An Executable Safety-Critical Avionics Requirement Modeling Language. 388-399 - Qihao Bao, Bixin Li, Tianyuan Hu, Dongyu Cao:

Model Checking the Safety of Raft Leader Election Algorithm. 400-409 - Xiaozhen Zhang, Zhaoming Yang, Hui Kong, Weiqiang Kong:

Formal Verification of Hierarchical Ptolemy II Synchronous-Reactive Models with Bounded Model Checking. 410-421 - Daisuke Ishii, Takashi Tomita

, Toshiaki Aoki, The Quyen Ngo, Thi Bich Ngoc Do, Hideaki Takai:
Coverage Testing of Industrial Simulink Models using Monte-Carlo and SMT-Based Methods. 422-433 - Chuangchuang Zhang, Yanming Liu, Hongyong Yang, Yihao Li, Shuning Zhang:

Availability and Cost aware Multi-'omain Service Deployment Optimization. 434-441 - Dániel Vince, Ákos Kiss:

Cache Optimizations for Test Case Reduction. 442-453 - Yi Qian, Ligeng Chen, Yuyang Wang, Bing Mao:

Nimbus: Toward Speed Up Function Signature Recovery via Input Resizing and Multi-Task Learning. 454-463 - Yaqing Shi, Song Huang, Jinyong Wan:

Reuse of Test Case based on Attributes Weight Optimization. 464-472 - Yuan Huang, Rong Wang, Xiangping Chen, Xiaocong Zhou, Ziyan Wang:

GOV: A Verification Method for Smart Contract Gas-Optimization. 473-479 - Amirali Amiri

, Uwe Zdun, Konstantinos Plakidas:
Stateful Depletion and Scheduling of Containers on Cloud Nodes for Efficient Resource Usage. 480-491 - Jia Yan, Xiangkun Jia, Lingyun Ying, Purui Su:

Understanding and Mitigating Label Bias in Malware Classification: An Empirical Study. 492-503 - Xueyong Sun, Qihao Bao, Bixin Li:

Can PoW Consensus Protocol Resist the Whale Attack? 504-515 - PengNan Hao, Zhen Li, Cui Liu, Yu Wen, Fanming Liu:

Towards Improving Multiple Authorship Attribution of Source Code. 516-526 - Longmin Deng, Dongdong Zhao, Junwei Zhou, Zhe Xia, Jianwen Xiang:

CBSDI: Cross-Architecture Binary Code Similarity Detection based on Index Table. 527-536 - Yuntao Zhang, Yanhao Wang, Yuwei Liu, Zhengyuan Pang, Binxing Fang:

PDG2Vec: Identify the Binary Function Similarity with Program Dependence Graph. 537-548 - Huiyu Liu, Jing Liu, Haiying Sun, Tengfei Li

, John Zhang:
Uncertainty-Aware Behavior Modeling and Quantitative Safety Evaluation for Automatic Flight Control Systems. 549-560 - Pedro David Almeida, Frederico Cerveira

, Raul Barbosa, Henrique Madeira
:
ucXception: A Framework for Evaluating Dependability of Software Systems. 561-570 - Abu Faisal, Mohammad Zulkernine:

SAS-GKE: A Secure Authenticated Scalable Group Key Exchange. 571-582 - Felicien Ihirwe, Davide Di Ruscio

, Simone Gianfranceschi, Alfonso Pierantonio:
Assessing the Quality of Low-Code and Model-Driven Engineering Platforms for Engineering IoT Systems. 583-594 - Pedro Almeida, João Pascoal Faria

, Bruno Lima
:
A Pattern-Based Test Platform for Families of Smart Health Products. 595-605 - Yezhou Liu, Jing Sun, Radu Nicolescu, Hai Wang

:
cPV - Simulation and Verification for Membrane Computing. 606-615 - Shuai Zhang, Meng Wang, Yi Liu, Yuhan Zhang, Bin Yu:

Multi-Transaction Sequence Vulnerability Detection for Smart Contracts based on Inter-Path Data Dependency. 616-627 - Yuyang Rong, Chibin Zhang, Jianzhong Liu, Hao Chen:

Valkyrie: Improving Fuzzing Performance Through Deterministic Techniques. 628-639 - Luca Giamattei, Antonio Guerriero

, Roberto Pietrantuono, Stefano Russo
:
Automated Grey-Box Testing of Microservice Architectures. 640-650 - Mingpei Cao, Yueze Zhang, Zhenxuan Feng, Jiahao Hu, Yuesheng Zhu:

TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing. 651-662 - Peng Yang, Chao Chang

, Yong Tang:
Crowdsourced Testing Task Assignment based on Knowledge Graphs. 663-671 - Gonçalo Carvalho, Nádia Medeiros, Henrique Madeira

, Bruno Cabral:
A Functional FMECA Approach for the Assessment of Critical Infrastructure Resilience. 672-681 - Zhengyuan Wei

, Haipeng Wang
, Imran Ashraf
, W. K. Chan:
Predictive Mutation Analysis of Test Case Prioritization for Deep Neural Networks. 682-693 - Kentaro Murakami, Jianjun Zhao:

Automated Synthesis of Quantum Circuits using Neural Network. 694-702 - Shuqi Liu, Yu Zhou, Tingting Han, Taolue Chen

:
Test Reuse based on Adaptive Semantic Matching across Android Mobile Applications. 703-709 - Jinhu Du, Song Huang, Xingya Wang

, Changyou Zheng, Jin-lei Sun:
Test Case Generation for Ethereum Smart Contract based on Data Dependency Analysis of State Variable. 710-720 - Nour Chetouane, Franz Wotawa:

Extracting Temporal Models from Data Episodes. 721-731 - Cong Wang, Haiying Sun, Hui Dou, HongTao Chen, Jing Liu:

MC/DC Test Case Automatic Generation for Safety-Critical Systems. 732-743 - Sai Chaithra Allala, Juan P. Sotomayor

, Dionny Santiago
, Tariq M. King, Peter J. Clarke
:
Generating Abstract Test Cases from User Requirements using MDSE and NLP. 744-753 - Minghao Yang, Shunkun Yang, Wenda Wu:

DeepRTest: A Vulnerability-Guided Robustness Testing and Enhancement Framework for Deep Neural Networks. 754-762 - Srijoni Majumdar, Ashutosh Varshney, Partha Pratim Das, Paul D. Clough, Samiran Chattopadhyay:

An Effective Low-Dimensional Software Code Representation using BERT and ELMo. 763-774 - Xudong He:

Building Safe and Stable DNN Controllers using Deep Reinforcement Learning and Deep Imitation Learning. 775-784 - Aizaz Sharif, Dusica Marijan:

Evaluating the Robustness of Deep Reinforcement Learning for Autonomous Policies in a Multi-Agent Urban Driving Environment. 785-796 - Lian Yu, Qi Jing, Ruomiao Li, Zhiya Cheng, Chang Xu:

ParGCN: Abnormal Transaction Detection based on Graph Neural Networks. 797-808 - Xuan Sheng, Zhaoyang Han, Piji Li, Xiangmao Chang:

A Survey on Backdoor Attack and Defense in Natural Language Processing. 809-820 - Yuhao Wei, Song Huang, Yu Wang, Ruilin Liu, Chunyan Xia:

Mutation Testing based Safety Testing and Improving on DNNs. 821-829 - Fanliang Chen

, Zheng Li, Ying Shang, Yang Yang:
Focus on New Test Cases in Continuous Integration Testing based on Reinforcement Learning. 830-841 - Yuechen Li

, Hanyu Pei
, Linzhi Huang, Beibei Yin:
A Distance-Based Dynamic Random Testing Strategy for Natural Language Processing DNN Models. 842-853 - Runbing Qin, Ningjiang Chen, Yihui Huang:

EDDNet: An Efficient and Accurate Defect Detection Network for the Industrial Edge Environment. 854-863 - Mubark Jedh, Jian Kai Lee, Lotfi Ben Othmane:

Evaluation of the Architecture Alternatives for Real-Time Intrusion Detection Systems for Vehicles. 864-873 - António Morais, Raul Barbosa, Nuno Lourenço, Frederico Cerveira

, Michele Lombardi, Henrique Madeira
:
Strategies for Improving the Error Robustness of Convolutional Neural Networks. 874-883 - Qiuyuan Chen, Zezhou Yang, Zhongxin Liu, Shanping Li, Cuiyun Gao:

Parameter Description Generation with the Code Parameter Flow. 884-895 - Catherine Tony

, Nicolás E. Díaz Ferreyra
, Riccardo Scandariato:
GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call Sequences. 896-906 - Cheng Wei, Zhiqiu Huang, Yaoshen Yu

:
Improved Methods of Pointer Mixture Network for Code Completion. 907-915 - David Georg Reichelt

, Stefan Kühne, Wilhelm Hasselbring
:
Automated Identification of Performance Changes at Code Level. 916-925 - Yanjie Shao, Tianyue Luo, Xiang Ling, Limin Wang, Senwen Zheng:

Cross Platform API Mappings based on API Documentation Graphs. 926-935 - Ahmed Khanfir, Matthieu Jimenez, Mike Papadakis, Yves Le Traon:

CodeBERT-nt: Code Naturalness via CodeBERT. 936-947 - Yubo Zhang, Yanfang Liu, Xinxin Fan, Yunfeng Lu:

RetCom: Information Retrieval-Enhanced Automatic Source-Code Summarization. 948-957 - Jingbo Yang, Jian Ren, Wenjun Wu:

API Misuse Detection Method Based on Transformer. 958-969 - Shuang Hu, Baojian Hua, Lei Xia, Yang Wang:

CRUST: Towards a Unified Cross-Language Program Analysis Framework for Rust. 970-981 - Shuang Hu, Baojian Hua, Yang Wang:

Comprehensiveness, Automation and Lifecycle: A New Perspective for Rust Security. 982-991 - Zhengyin Chen, Wenpin Jiao:

A Proactive Self-Adaptation Approach for Software Systems based on Environment-Aware Model Predictive Control. 992-1003 - Siqi Gu, Jiawei Liu, Zhanwei Hui, Wenhong Liu, Zhenyu Chen:

MetaA: Multi-Dimensional Evaluation of Testing Ability via Adversarial Examples in Deep Learning. 1004-1013 - Sebastian Frank

, Lion Wagner, M. Alireza Hakamian, Martin Straesser, André van Hoorn:
MiSim: A Simulator for Resilience Assessment of Microservice-Based Architectures. 1014-1025 - Cong Li, Qiang Han, Tao Zhang

, Bingbing Lei, Yu He:
Quantity-Simulation-Analysis Method based Novel RSA Timing Attack Algorithm for Single-Chip Microcomputer Platform. 1026-1035 - Tong Li, Tianai Zhang:

Continuous Usability Requirements Evaluation based on Runtime User Behavior Mining. 1036-1045 - Chuan-Min Chu, Chin-Yu Huang, Neil C. Fang:

Adopting Misclassification Detection and Outlier Modification to Fault Correction in Deep Learning-Based Systems. 1046-1056 - Jun Inoue, Hideaki Nishihara, Akira Mori:

Quantitative Analysis of Sparsely Synchronized Fail-Safe Processors. 1057-1068 - Bangchao Wang

, Yang Deng, Ruiqi Luo, Huan Jin:
An Empirical Study on Source Code Feature Extraction in Preprocessing of IR-Based Requirements Traceability. 1069-1078 - Nan-Jung Huang, Chih-Jen Huang, Shih-Kun Huang:

Pain Pickle: Bypassing Python Restricted Unpickler for Automatic Exploit Generation. 1079-1090 - Roberto Pietrantuono, Domenico Cotroneo, Ermeson C. Andrade, Fumio Machida:

An Empirical Study on Software Aging of Long-Running Object Detection Algorithms. 1091-1102 - Thorn Jansen, Fernando Pastor Ricós, Yaping Luo, Kevin van der Vlist, Robbert van Dalen, Pekka Aho, Tanja E. J. Vos:

Scriptless GUI Testing on Mobile Applications. 1103-1112 - Jing Ding, Liming Nie, Yang Liu, Zuohua Ding, Jifeng Xuan:

An Exploratory Study for GUI Posts on Stack Overflow. 1113-1124 - Wenyu Zhang, Xiaojuan Wang, Shanyan Lai, Chunyang Ye, Hui Zhou:

Fine-Tuning Pre-Trained Model to Extract Undesired Behaviors from App Reviews. 1125-1134 - Yuan Zhao, Gaolei Yi, Fan Liu, Zhanwei Hui, Jianhua Zhao:

A Framework for Scanning Privacy Information based on Static Analysis. 1135-1145 - Xueyong Tan, Jing Liu:

EWDLL: Software Aging State Identification based on LightGBM-LR Hybrid Model. 1146-1158

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














