


default search action
24th QRS 2024: Cambridge, UK
- 24th IEEE International Conference on Software Quality, Reliability and Security, QRS 2024, Cambridge, United Kingdom, July 1-5, 2024. IEEE 2024, ISBN 979-8-3503-6563-4

- Linzhi Huang, Hanyu Pei, Yuechen Li

, Beibei Yin, Kai-Yuan Cai:
A Strategy of Dynamic Random Testing with Hybrid Distance Metrics for Quantum Programs. 1-12 - Thiago Santos de Moura

, Francisco Igor de Lima Mendes
, Everton L. G. Alves, Ismael Raimundo da Silva Neto, Cláudio de Souza Baptista:
An Automatic Approach for Uniquely Discovering Actionable Elements for Systematic GUI Testing in Web Applications. 13-24 - Qurban Ali

, Oliviero Riganelli, Leonardo Mariani:
Testing in the Evolving World of DL Systems: Insights from Python GitHub Projects. 25-35 - Huanze Meng, Zhiyi Zhang, Yuchen Ding, Shuxian Chen, Yongming Yao:

EATS: Efficient Adaptive Test Case Selection for Deep Neural Networks. 36-48 - Yinjie Xue, Zhiyi Zhang, Chen Liu, Shuxian Chen, Zhiqiu Huang:

DeepWeak: Weak Mutation Testing for Deep Learning Systems. 49-60 - Qi Yao, Yizhuo Zhang, Yujia Li, Fang Liu, Shunkun Yang:

Multimodal Multi-Objective Test Data Generation Method based on Particle Swarm Optimization. 61-71 - Jordan Doyle

, Thomas Laurent, Anthony Ventresque:
PADRAIG: Precise Android Automated Input Generation. 72-83 - Huaixu Lin, Bixin Li, Liang Liu, Lulu Wang, Jianming Chang:

OTCP-ISVM: Online Test Case Prioritization Based on Incremental Support Vector Machine. 84-94 - Ao Fan, Li Liao, Lulu Wang, Bixin Li:

Test Case Generation for Access Control Based on UML Activity Diagram. 95-104 - Byron DeVries, Erik M. Fredericks:

Triggering Adaptation via Contextual Metamorphic Relations. 105-114 - Amani Ayad, Samia Al Blwi, Ali Mili:

Detecting Faults vs. Revealing Failures: Exploring the Missing Link. 115-126 - Roberto Bagnara, Abramo Bagnara, Alessandro Benedetti, Patricia M. Hill:

The ACPATH Structural Complexity Metric. 127-138 - Afef Awadid, Xavier Le Roux, Boris Robert, Morayo Adedjouma, Eric Jenn:

Ensuring the Reliability of AI Systems through Methodological Processes. 139-146 - Taehyoun Kim, Duksan Ryu, Jongmoon Baik:

Enhancing Software Reliability Growth Modeling: A Comprehensive Analysis of Historical Datasets and Optimal Model Selections. 147-158 - Chun Yen Chang-Sundin, Ninad Chaudhari

, Mei-Hwa Chen:
Online Reliability Prediction for Web Applications: An Adaptive Approach with AdaRel. 159-168 - Lili Bo, Yuting He, Xiaobing Sun, Wangjie Ji, Xiaohan Wu:

A Software Bug Fixing Approach Based on Knowledge-Enhanced Large Language Models. 169-179 - Yangtao Liu, Hengyuan Liu

, Zezhong Yang, Zheng Li, Yong Liu:
Empirical Evaluation of Large Language Models for Novice Program Fault Localization. 180-191 - Hanwei Qian, Tingting Xu, Ziqi Ding, Wei Liu, Shaomin Zhu:

Exploring Large Language Models for Method Name Prediction. 192-203 - Yilongfei Xu, Jincao Feng, Weikai Miao:

Learning from Failures: Translation of Natural Language Requirements into Linear Temporal Logic with Large Language Models. 204-215 - Jie Zhu, Yun Miao, Tingting Xu, Junwu Zhu, Xiaolei Sun:

On the Effectiveness of Large Language Models in Statement-level Code Summarization. 216-227 - Jiahe Xu, Jingwei Xu, Taolue Chen, Xiaoxing Ma:

Symbolic Execution with Test Cases Generated by Large Language Models. 228-237 - Alexander Perko

, Franz Wotawa
:
Evaluating OpenAI Large Language Models for Generating Logical Abstractions of Technical Requirements Documents. 238-249 - Murray Dunne, Kylee Schram, Sebastian Fischmeister:

Weaknesses in LLM-Generated Code for Embedded Systems Networking. 250-261 - Qizheng Wu, Sen Wang, Xingyu Han, Lu Xu, Xiang Chen:

A Traffic Domain Classification Method Based On Large Model Multiple Optimization Strategies Neural Network. 262-271 - Chengquan Zhang, Yang Feng, Yaokun Zhang, Yuxuan Dai, Baowen Xu:

Beyond Memory Safety: an Empirical Study on Bugs and Fixes of Rust Programs. 272-283 - Yaping Feng, Ziyuan Wang:

Towards Understanding Bugs in Go Programming Language. 284-295 - Sijie Yu, Ziyuan Wang:

An Empirical Study on Bugs in Rust Programming Language. 296-305 - Adil Mukhtar, Dietmar Jannach, Franz Wotawa

:
Investigating Reproducibility in Deep Learning-Based Software Fault Prediction. 306-317 - Zong-Yi Chen, Chin-Yu Huang, Jing-Rong Lin, Chih-Chiang Fang, William Cheng-Chung Chu:

Employing CNN with Spatial Pyramid Pooling for Predicting Software Defects through Image Analysis. 318-327 - Qi Xue, Weiyuan Zhuang, Lei Zhao, Xiaofang Zhang:

TWAO: Time-Weight-Aware Oversampling Method for Just-in-Time Software Defect Prediction. 328-339 - Wenjie Liu, Weiqin Zou, Bingting Chen, Biyu Cai, Jingxuan Zhang:

Query Quality Prediction for Text Retrieval-based Bug Localization. 340-351 - Shwetha Gowdanakatte, Mahmoud Abdelgawad, Indrakshi Ray:

Assets Criticality Assessment of Industrial Control Systems: A Wind Farm Case Study. 352-363 - Manqing Zhang, Renliang Wu, Kang Su

, Yunwei Dong, Tao Zhang
:
Application Scenario Modeling and Verification for Unmanned Aerial Vehicle Swarm. 364-375 - Li Wang, Yunxiao Ma, Mingyue Li, Hua Li, Peilong Zhang:

A Method of Network Attack Named Entity Recognition based on Deep Active Learning. 376-387 - Alvi Jawad, Zoe Arnott, Jason Jaskolka:

Requirements for Applying SCIA: A Structured Cyberattack Impact Analysis Approach for ICS. 388-399 - Yunpeng Sun

, Zhichao Lian, Shuangquan Zhang, Zhanfeng Wang, Tao Duan:
A Novel Explainable Method based on Grad-CAM for Network Intrusion Detection. 400-406 - Xudong He:

Designing Deep Neural Net Controller for Quadrotor Attitude Stabilization. 407-417 - Mehar Prateek Kalra, Soniya, Apurva Narayan:

cf-TDFM: A Framework for Limiting Fault Infusion Attacks on Deep Neural Networks. 418-424 - Zheng-Hong Huang, Yu-Sung Wu, Ying-Dar Lin, Chia-Mu Yu, Wei-Bin Lee:

Neural Network-based Functional Degradation for Cyber-Physical Systems. 425-434 - Junjie Yu, Yong Li, Ming Wen, Qianren Yang:

Enhanced Privacy Protection in Graph Neural Networks Using Local Differential Privacy. 435-444 - Xue Zhang, Mingjiang Wang, Xiao Zeng:

Multi-modal Feature Fistillation Emotion Recognition Method For Social Media. 445-454 - Jens Christian Toftdahl, Kamrul Islam Shahin, Thomas Hylle:

Enhancing Data Retrieval with Custom Embedding Models and ChatGPT. 455-461 - Zhenxing Zhang, Jun Ge, Qikang Sun, Qianxiang An, Yihao Li:

Portable Intelligent ECG Monitoring System Based on End-Edge-Cloud Architecture. 462-470 - Lixia Ji, Shijie Xiao, Bingzhi Xu, Han Zhang:

Transferrable DP-Adapter Tuning: A Privacy-Preserving Multimodal Parameter-Efficient Fine-Tuning Framework. 471-482 - Taehyoun Kim, Duksan Ryu, Jongmoon Baik:

Automated Machine Learning for Enhanced Software Reliability Growth Modeling: A Comparative Analysis with Traditional SRGMs. 483-493 - Yantong Chen, Yuxin Shi, Jianzhao Ren, Jiabao Li:

An Improved Adaptive Angle Weakly Supervised Learning Object Detection. 494-503 - Xinyu Jia, Yu Zhou, Yasir Hussain, Wenhua Yang:

An Empirical Study on Python Library Dependency and Conflict Issues. 504-515 - Han-Lin Lu, Zong-Yuan Wu, Chien-Hsing Wu, Guan-Zhong Wang, Shih-Kun Huang:

Fuzzing Command-line Interface by Edge Coverage Guided Combinatorial Testing and Input Clustering. 516-525 - Jiangyun Xu, Jinbo Wang, Yunyun Ma, Lu Li, Chang Jia:

RumFuzz: Coverage-guided Greybox Fuzzing with Reasonable Use of Memory. 526-535 - Fan Shi, Zhiqiu Huang, Haiyu Pan, Yuting Chang, Heng Xu:

Fuzzy Safety and Liveness Properties in Linear-time. 536-545 - Jinfu Chen, Fei Yan, Saihua Cai, Shengran Wang, Jingyi Chen:

FMUZZ: A Novel Greybox Fuzzing Approach based on Mutation Strategy Optimization with Byte Scheduling. 550-561 - Nilesh Chakraborty, Shahrear Iqbal, Mohammad Zulkernine:

Building Secure Software for Smart Aging Care Systems: An Agile Approach. 562-571 - Robab Aghazadeh Chakherlou, Lorenzo Strigini:

Impact of Prior Beliefs on Dependability Prediction for a Changed System Using Pre-change Operational Evidence. 572-583 - Rakesh Podder

, Jack Sovereign, Indrajit Ray, Madhan B. Santharam, Stefano Righi:
The PIT-Cerberus Framework: Preventing Device Tampering During Transit. 584-595 - Irfan Ali Khan, Yu Luo, Weifeng Xu, Dianxiang Xu:

GNN-Based Transfer Learning and Tuning for Detecting Code Vulnerabilities across Different Programming Languages. 596-607 - Yuekai Huang, Junjie Wang, Song Wang, Rupeng Zhang

, Qing Wang:
Which API is Faster: Mining Fine-grained Performance Opinion from Online Discussions. 608-619 - Jiahao Ren, Jianming Chang, Lulu Wang, Zaixing Zhang, Bixin Li:

Graph-Based Salient Class Classification in Commits. 620-631 - Wenjie Liu, Gong Chen, Xiaoyuan Xie:

FMCS: Improving Code Search by Multi-Modal Representation Fusion and Momentum Contrastive Learning. 632-638 - Bahareh Afshinpour, Massih-Reza Amini, Roland Groz:

Semantic Log Partitioning: Towards Automated Root Cause Analysis. 639-648 - Jesse Nyyssölä, Mika Mäntylä

:
Event-level Anomaly Detection on Software logs: Role of Algorithm, Threshold, and Window Size. 649-656 - Jesse Nyyssölä, Mika Mäntylä

:
Speed and Performance of Parserless and Unsupervised Anomaly Detection Methods on Software Logs. 657-666 - Zhun Xu, Baohua Huang, Ningjiang Chen:

Log Parsing using Semantic Filtering based Prompt Learning. 667-676 - Quentin Nivon, Gwen Salaün:

Semi-Automated Refactoring of BPMN Processes. 677-688 - Yliès Falcone, Gwen Salaün, Ahang Zuo:

Dynamic Resource Allocation for Executable BPMN Processes Leveraging Predictive Analytics. 689-700 - Matej Klima, Miroslav Bures, Martin Blaha

:
Ant Colony Optimization Based Algorithm for Test Path Generation Problem with Negative Constraints. 701-712 - Changfeng Duan, Jing Liu, Jin Xu, Dongdong An, Yu Bao:

A Novel Approach for Traveling Salesman Problem Via Probe Machine. 713-723 - Alexander Müller-Lobeck, Gefei Zhang:

Model-Driven Development of Single-Page Applications Using UML State Machines and Maude. 724-732 - Miaoer Li, Yi Zhu, Yali Liu, Chan Yin:

Classification Method of Ethereum Smart Contracts Based on Statistical Model Checking. 733-744 - Zhen Yao, Jing Liu, Xiaohong Chen, Li Han, Haiying Sun:

Efficient Verification of Multi-Agent Systems Through Parallel. 745-756 - Christoph Dropmann, Daniel Schneider:

SIAF: Systematic Interference Analysis Framework for Household Microprocessor Services. 757-768 - Wenlin Cheng, Xingwei Wang, Bo Yi, Chuangchuang Zhang, Min Huang:

A Distributed Service Function Chain Orchestration Approach with VNF Reuse to Balance Latency and Resource Efficiency. 769-778

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














