


default search action
24th QRS 2024: Cambridge, UK - Companion
- 24th IEEE International Conference on Software Quality, Reliability, and Security, QRS - Companion, Cambridge, United Kingdom, July 1-5, 2024. IEEE 2024, ISBN 979-8-3503-6565-8

- Boyuan Li, Duo Li, Chao Guo, Jianghai Li, Xiaojin Huang:

Heuristics for Strongly Killing Mutants in Software Mutation Testing. 1-10 - Hajar Homayouni, Maryam Mary Pourebadi, Steven T. Nguyen, Mohammad Hashemi, Hossein Shirazi:

Comprehensive Functional ETL Testing Methodologies for Real-World Data. 11-20 - Yi Liu, Lizhi Cai, Chenchen Chai, Yuan Ma:

An Approach to Optimize Symbolic Execution in Ethereum Smart Contracts. 21-30 - Zhahao Li

, Jinfu Chen, Haibo Chen, Leyang Xu, Wuhao Guo:
Detecting Bias in LLMs' Natural Language Inference Using Metamorphic Testing. 31-37 - Viraj Rohit Gala

, Martin A. Schneider, Marvin Vogt:
Towards an Evaluation Methodology of ML Systems from the Perspective of Robustness and Data Quality. 38-46 - Ilias Kalouptsoglou

, Miltiadis G. Siavvas, Apostolos Ampatzoglou, Dionysios D. Kehagias, Alexander Chatzigeorgiou:
Vulnerability Classification on Source Code Using Text Mining and Deep Learning Techniques. 47-56 - Ramon Barakat, Paul Weiß, Jasper Von Blanckenburg, Roman Kraus, Martin A. Schneider:

Enhancing Software Security Analysis: Targeted Test Case Generation through Constraint Solving in Interactive Application Security Testing. 57-63 - Tianyue Sun, Lina Gong, Jingxuan Zhang, Mingqiang Wei:

An Empirical Study on the Characteristics of Connected Knowledge Subgraphs on Stack Overflow. 64-73 - Haiyang Wang, Yihao Li, Yue Wang, Pan Liu, Pengxiao Li:

Navigating the Risks: A Review of Safety Issues in Large Language Models. 74-83 - Yi Yang, Manxian Liu, Kun Jia, Wenjie Dong, Jian Wang:

Towards LLM-Enhanced Digital Twins of Intelligent Computing Center. 84-89 - Jônatas A. Silva, Talles H. Medeiros, Fabrício Góes:

Large Language Models on Solving Integral Calculus Problems. 90-93 - Jingyu Yang, Hao Xu, Rongxiao Wang, Xuran Ming, Shoubin Li:

Generating Evaluation Criteria of Domain-Specific Large Language Model Using Word Vector Clustering. 94-100 - Fang Li, Yubin Qu, Chao Feng, Xianzhen Dou, Long Li:

A Fine-Grained Emotion Prediction Method Based on Large Language Models. 101-110 - Jingjing Guo, Xi Han:

Research on Intelligent Relic Interpretation System Based on a Large Language Model. 111-116 - M. Guzman, R. Bouchekir, A. Cook, J. Haindl:

On Safety Assurance of Symbolic Artificial Intelligence. 117-124 - Wenyao Xue

, Qingwei Ren, Yichen Wang:
An Empirical Study on Modeling Testing Requirements for Safety-Critical Software. 125-134 - Ying Zhao, Yi Zhu, Li Zhao, Zexin Li, Chan Yin:

ADS Modeling and Safety Verification in Extreme Driving Scenarios. 135-144 - Zexin Li, Yi Zhu, Li Zhao, Ying Zhao:

Safety decision of autonomous driving behavior based on Bayesian network and its verification method. 145-153 - Yafeng Shen, Lianzhi Qi, Shiyong Li, Siyou Ma, Fei Deng:

A SSCPS safety assessment method based on mission risk. 154-162 - Tse-Chuan Hsu, Han-Sheng Lu:

Exploring the Efficacy of Dynamic Approaches in Database Encryption and Translational Security. 163-169 - Ying Gao, Ruiying Li, Rui Kang:

Capacity and Time Reliability Evaluation for Time-Varying Networks. 170-176 - Zhangjun Lu

, Wei Zhang
, Hao Xu, Jianhui Jiang:
A Reliability Benchmarking Method for Linux. 177-186 - Qiuying Li, Limeng Zhang, Shuo Liu:

A-TCN: Attention-Based TCN for OSS Reliability Prediction on High-Dimensional Fault Dataset. 187-195 - Fatemeh Erfan, Martine Bellaïche, Talal Halabi:

Efficient Detection of Selfish Mining Attacks on Large-Scale Blockchain Networks. 196-205 - Luyao Zhang, Yutong Quan, Jiaxun Cao, Kyrie Zhixuan Zhou, Xin Tong:

Leveraging Social Media Sentiments and Ethical Signals for NFT Valuation. 206-215 - Yutong Quan, Xintong Wu, Wanlin Deng, Luyao Zhang:

Decoding Social Sentiment in DAO: A Comparative Analysis of Blockchain Governance Communities. 216-224 - Yulin Liu, Luyao Zhang:

The Economics of Blockchain Governance: Evaluate Liquid Democracy on the Internet Computer. 225-231 - Huang Zhou, Yongqiang Chen, Jiangchen Zhou, Wenxuan Wang:

Blockchain Implementation for Visual Art Copyright Protection. 232-239 - Qi Shao, Shunkun Yang, Yijing Zhou, Dan Lu, Qi Yao:

Complex Network Theory-based Deep Neural Network Degradation Analysis in the Context of Bit Attack. 240-249 - Mert Dedekoy, Alper Sen:

DeepDTS: Diverse Test Selection Method for Deep Neural Networks. 250-259 - Yijing Zhou, Shunkun Yang, Qi Shao, Yuhao Zhang:

Bit Attacking Deep Neural Networks Based on Complex Networks Theory. 260-268 - Jiyuan Sun, Haibo Yu, Jianjun Zhao:

Generating Adversarial Examples Using Parameter-Free Penalty Method. 269-278 - Wei Huang, Yuan Gao, Xiangling Fu, Zhiyi Song:

MFTCN: A Multi-Frequency Temporal Convolutional Network for Enhancing Temperature Prediction Dependability. 279-288 - Reynaldo Joshua Salaki

, Sanguk Park, Kihyeon Kwon:
Solar Panel Fault Detection: Applying Convolutional Neural Network for Advanced Fault Detection in Solar-Hydrogen System at University. 289-298 - Imen Chebbi, Sarra Abidi, Leila Ben Ayed:

Behavioral System Using SVM and CNN for Karate Injury Detection and Rehabilitation Process. 299-307 - Lu Wei, Chaojie Yang, Zhong Ma, Qin Yao:

Rapid Accuracy Loss Evaluation for Quantized Neural Networks Using Attention-Based Multifactor Modeling. 308-315 - Reynaldo Joshua Salaki

, Sanguk Park, Kihyeon Kwon:
AI-Driven Green Campus: Solar Panel Fault Detection Using ResNet-50 for Solar-Hydrogen System in Universities. 316-325 - Shahzad Nayab

, Franz Wotawa
:
Testing and Reinforcement Learning - A Structured Literature Review. 326-335 - Shou-Yu Lee, William Cheng-Chung Chu, Yao-Hsien Tseng, You-Gang Zhang, Hung-Lung Tsai:

Explainable AI Applied in Healthcare: A Case Study of Diabetes Prediction. 336-344 - Ruiyang Li, Jing Zhu, Xiaohu Luo, Zhao Ma:

Image Tampering Detection Method Based on Multi-Feature Fusion. 345-356 - Yunlong Zhong, Zhenglin Liang:

Granger Causality Analysis Between Sensor Data Based on Deep Gaussian Process Model. 357-362 - José A. Esquivel, Bradley Aldous, Ahmed M. Abdelmoniem

, Ahmad Alhilal, Linlin You:
Performance Profiling of Federated Learning Across Heterogeneous Mobile Devices. 363-372 - Chi Zhang, Jinfu Chen, Saihua Cai, Jingyi Chen, Chunlei Huang:

JFuzzer: Detecting Optimization Errors in JavaScript Just-In-Time Compilers. 373-382 - Koko Harianto, Feng-Jian Wang, Mahmoud M. Abouzeid:

Enhancing Incremental Dataflow Analysis in an IDE. 383-390 - Zixin Wu, Xiaoyun Zhou, Yi Zhu, Chenyu Wang, Guosheng Hao:

A Privacy Leakage Detection Method for Personalized Course Recommendation Based on Pi-Calculus. 391-400 - Fanjiang Xu, Zeyu Sun:

Defect-Introducing Defect Prediction Testing. 401-410 - Yuxing Liu, Jiaxi Li, Haiyang Wu, Xuchuan Zhou, Hengyuan Liu

:
Using $\mu \text{Bert}$ to Improve Mutation-Based Fault Localization for Novice Programs. 411-416 - Bin Du, Jize Yang, Shumei Wu, Zhanwen Zhang, Yong Liu:

Enhancing Programming Competition Performance: A Data-Driven Approach to Personalized Training. 417-422 - Xibing Yang, Guanglu Zhou, Xiaowei Guo:

Design and Application of Ship Information System Development Platform Architecture Based on OSGi. 423-431 - Zhongxi Wang, Shen Lil, Zhong Ma, Qin Yao:

High Accurate, Low Latency Conversion of Spiking Neural Networks with BLIF Neurons. 432-440 - Zhiqiang Zhu, Shikui Wang, Chengwen Li, Wei Zheng:

Failure Modelling and Analysis of Airborne Video Transmission System Based on Data Reliability. 441-446 - Shilong Zhang, Dongcheng Li, Man Zhao, Hui Li, W. Eric Wong:

Search-Based Automated Program Repair: A Survey. 447-456 - Shiyu Liu, Dongfang Li, Guang Yang, Mingyue Su, Wei Shen:

Research of Military Cyber Operation Forensic and Analysis in Russia-Ukraine Conflict. 457-463 - Ayodeji Ogundiran, Hongmei Chi, Jie Yan, Ruth Agada:

Advancing Forensic Examination of Cyber Predator Communication Through Machine Learning. 464-473 - Oluwatoyin Akinbi, Hongmei Chi, Jie Yan, Edward L. Jones:

Deciphering Livestream Contents: OCR-Driven Thumbnail Forensic Analysis. 474-483 - Mingfu Tuo, Wenliang Wu, Hongmei Zhang, Yongmei Zhao:

Review of Key Attribute Analysis and Verification Techniques for CPS. 484-487 - Pengpeng Sun, Bohan Shao, Wenliang Wu, Hongming Zhang:

Evaluating Importance of Nodes in Interdependent Networks. 488-499 - Jiayin Qi, Kun Jia, Yuxin Zhang, Xiaobing Feng, Haiyan Yan:

Wuli-Shili-Renli-Jili System Approach and Its Application in Large Model Value Alignment. 500-506 - Qing Cai, Beibei Yin, Jing-Ao Shi:

CGFuzz: A Dynamic Test Case Generation Method for DL Framework Based on Function Coverage. 507-516 - Ruifeng Li, Yanwen Liu, Chunjia Zhu, Zenghui Zhou, Zheng Zheng:

Adaptive Metamorphic Testing for Object Detection Systems. 517-526 - Yanwen Liu, Ruifeng Li, Hao Tao, Zheng Zheng:

Test Adequacy Criteria for Metamorphic Testing. 527-534 - Boxuan Wu, Jia Song, Chaoyue Zhao, Yunlong Hu, Weize Shang:

Fault Diagnosis Using Channelized Encoder-Decoder Frame for Distributed Redundant Inertial Navigation System. 535-543 - Zhijie Feng, Yu Lin, Chuqi Guo, Jianwen Xiang:

A Human-Machine Intervention Model of Autonomous Driving Vehicle. 544-553 - Chengfang Tan, Jun Ling, Shanshan Li, Wenquan Tian:

Sentiment Analysis of Comment Texts Based on Deep Learning. 554-558 - Weichao He, Yi Zhu, Mei Song, Zixin Wu, Guosheng Hao:

A Dynamic Interest-Aware Message-Passing GCN for Recommendation. 559-568 - Mengting Sun, Jun Li, Jiang Liu, Xiaohan Yang:

MTPI: Multimodal Trajectory Prediction for Autonomous Driving via Informer. 569-576 - Shunqing Xu, Shumei Wu, Zheng Li, Luxi Fan, Yong Liu:

Predictive Mutation-Based Fault Localization: Balancing Effectiveness and Cost. 577-582 - Xi Ding, Yi Zhu, Qiao Yu, Chongyang Huang:

A Model-Agnostic Interpretability Approach Based on Enhanced Hierarchical Clustering. 583-590 - Fan Zhang, Haoran Huang, Hongwu Lv, Meijuan Jia, Juntao Liu:

Soft Actor-Critic Based Anti-Attack XSS Detection. 591-600 - Chao-Nan Song, Yi Cao, Jin Jin, Qiong-Ying Fu, Rong-Sen Li, Hai-Bo Wang:

A Visualization Method for Association Analysis and Fusion Based on Large-Scale Polymorphic Information. 601-610 - Xule Gao, Rui Wang, Zhaohui Liu, Yi Ren:

A Land-Based War-Gaming Simulation Method Based on Multi-Agent Proximal Policy Optimization. 611-618 - Changjun Li, Jingyu Yang, Xi Wu, Guangwen Yang:

Analysis of Reliable Architecture Techniques for Adaptive Adversarial Systems of System. 619-624 - Yuanyuan Zhang, Yifan Du, Yichen Wang:

Effects of $\boldsymbol{L}_{\boldsymbol{p}}$-norm Deficits in Quantization Human Perception on Attack Methods. 625-632 - Xie Dong, Hu Yang, Qin Li, Zhang Jianfeng:

Implications for Running AI Applications on Serverless Platforms. 633-642 - Zhen-Yu Ma, Xiao-Yuan He, Sui-Ke Li, Chi Wang, Chao Zhang:

Research on Simulation System Software Reliability Demonstration Testing Scheme Based on Nonparametric Method. 643-650 - Kairui Wang, Yawen Wang

, Xi Wu, Shoubin Li, Qing Wang:
Do Agents Behave Aligned with Human Instructions? - An Automated Assessment Approach. 651-660 - Jinpeng Li

, Shanshan Jiao, Shengming Guo, Xiangfeng Luo:
Temporal Knowledge Graph Reasoning with Dual Guiding Constraints. 661-669 - Jinfu Chen, Yucheng Wu, Haibo Chen, Jingyi Chen, Ernest Akpaku

:
QAQA-SS: An Improved Fuzzing Approach with Seed Scheduling Based on the UCB Algorithm for QA Systems. 670-679 - Saif Ur Rehman Khan, Maha Younus, Javed Iqbal

, Muhammad Abdul Basit Ur Rahim:
A Fuzzy AHP-based Quantitative Framework to Prioritize the Crowd-Based Requirements. 680-691 - Hongwu Qin, Kexin Tang, Xiuqin Ma, Xuli Niu, Yijin Zheng:

An IT Community Code Quality Ranking Model Based on Sentiment Analysis and Fuzzy Multi-Attribute Decision-Making. 692-698 - Yadi Hu, Jinlong Tao, Yu Liang, Zhewei Xu, Zhangtao Jia:

Research on the Impact of Tester's Technical and Cognitive Factors on Aerospace Software Test Quality. 699-703 - Yiming Gao, Xiaopeng Yang, Tong Wu, Yuqian Zhou:

Histogram Publication with Shuffled Differential Privacy. 704-708 - Yucheng Zhang, Chenqiang Shen, Xiaolin Ju, Hao Shen

, Xiang Chen:
Ada4DP: Adversarial Enhanced Dual-Attentive Aggregation Learning for Defect Prediction. 709-718 - Sufan Zhang, Yuanxiang Yang, Ziyuan Wang:

Why Students Write Low-Quality Unit Testing Scripts: An Empirical Study from Software Testing Skill Competitions. 719-720 - Siwei Zhou, Xiaohong Peng, Yinghuai Yu, Yubin Qu, Ting Zeng:

Reliability Evaluation of Classroom Teaching with MCI in College Based on the DFT Model. 721-726 - Fumin Liu, Yuezhong Wu

, Haiyang Huang, Xuehao Shen, Jiefu Deng:
LMSA: Lightweight Multi-Scale Attention Model for Garbage Detection Based on YOLOV5. 727-736 - Xinpan Yuan, Jiabao Li

, Zhiqi Zhang, Zhigao Zeng, Qiang Liu:
Syntax-Dependency Orientation Guided Vision-and-Language Transformer for Image-Text Matching. 737-745 - Shiyu Tao, Qi Liu, Yonghong Zhang, Xiaodong Liu:

High Intensity Radar Echo Extrapolation Based on Stacked Generative Structure. 746-751 - Yucheng Zhao, Guangyu Wang, Mingxu Sun, Zhonghua Zhao, Yan Yan:

Methods for Removing Artifacts from EEG signals: A review. 752-758 - Guangyu Wang, Yucheng Zhao, Mingxu Sun, Wenhua Dong, Shiwei Zhu:

Different Control Methods for FES Cycling: Review. 759-766 - Zhihong Zeng, Dong-Meau Chang

, Tse-Chuan Hsu, Zhou Liang:
The Most Important Factors Chosen in Medical Clinical Data by Using Multi-Facet Clustering Variational Autoencoders (MFCVAE). 767-771 - Ping Yang, Shiwei Zhu, Oleksandr Koval, Yanqing Zhao, Junfeng Yu:

Evolutionary Review of Research Themes in Functional Electrical Stimulation with in the Rehabilitation Medicine Field. 772-778 - Ru Ji, Qi Liu, Yonghong Zhang, Xiaodong Liu:

A New Improved Method of Recurrent Memory Perception for Radar Echo Extrapolation. 779-785 - Zhilu Wang, Haiyang Lin, Qi Liu, Yonghong Zhang, Xiaodong Liu:

FedCST: Federated Learning on Heterogeneous Resource-constrained Devices Using Clustering and Split Training. 786-792 - Xinpan Yuan, Yuan Guo, Changhong Zhang, Zhigao Zeng:

Automatic Generation of Diagnostic Reports for Nasal Endoscopy Images: A Topic-Aware Multimodal Recurrent Model. 793-802 - Yaping Zhang, Jingguo Rong, Zhiran Gao, Su Zhang, Zhuoqun Zhang:

Research on Intelligent Recognition and Analysis of Power Grid Infrastructure Construction Based on YOLO. 803-807 - Wen-Li Wang, Shahid Hussain, Nathaniel V. Rondinelli, Mei-Huei Tang, Saif Ur Rehman Khan:

Recursive Generation of Multi-Qubits Control Gate to Facilitate the Grover's Quantum Algorithm in Large Scale Database Search. 808-815 - Fengjiao He, Chi Hu, Wansheng Yang, Hao Zhang, Fei Deng:

A Fuzzing Method for Embedded Bus Based on Dynamic Mutation of Message Sequences. 816-822 - Shasha Wu, Shiyong Li, Yanhong Peng, Siyou Ma, Fei Deng:

A Data Constraint Analysis Method for Full-Digital Simulation Test. 823-829 - Shiyong Li, Fei Deng, Xinglin Guo, Zhenxiao Sun, Zhuoliang Zou:

Research on Program Change Impact Analysis Methods Based on Software Networks. 830-838 - Ke Ding, Ziyuan Wang, Weifeng Zhang:

Directed Fuzzing with Adaptive Path Guidance and Weighted Distribution. 839-848 - Wenxuan Huang, Changsheng Ma, Ziyuan Wang:

The Effect of Variable Strength Combinatorial Coverage for Neurons on Fault Detection in Deep Neural Networks. 849-855 - Haocheng Guan, Dongcheng Li, Hui Li, Man Zhao, W. Eric Wong:

A Review of the Applications of Heuristic Algorithms in Test Case Generation Problem. 856-865 - Mengdan Wu, Daoyi Li, Yishen Zhao, Lei Liu:

Hybrid Attention Based Spatiotemporal Neural Network in Lifetime Prognostics of Lithium Batteries. 866-871 - Yujia Li, Canwei Shi, Zhiyu Duan, Fang Liu, Minghao Yang:

Fine-tuning BERT for Intelligent Software System Fault Classification. 872-879 - Meng Tian, Shihai Wang, Wentao Wu, Wandong Xie:

A Novel Approach for Software Defect Prediction Through Relational Association Rules Based on Cost-Sensitive Learning. 880-886 - Yue Cheng, Zhongyu Ding, Shaoqiang Zhang:

Finite Time-Based Adaptive Terminal Sliding Mode Fault-Tolerant Control for Port Automated Guided Vehicles. 887-895 - Tengfei Shi, Shihai Wang, Haoran Li, Shudi Guo, Yu Liu:

Generating Adversarial Samples Based on the Attack Robust Training Model. 896-901 - Yingxian Guo, Shihai Wang, Dong An, Yu Luo:

StasogFL: A Fault Localization Method Based on Statement Association Graph. 902-909 - Xuan Li, Qi Shao, Yuan Zhang, Jiangnan Wang:

An Ensemble Feature Selection Method Based on Symmetrical Uncertainty and Correlation for Software Defect Prediction. 910-919 - Xiaoliang Li, Yujia Li, Fang Liu, Fuping Zeng:

Research on the Integration Method of Software Static Testing Tools Based on Machine Learning. 920-925 - Tu Sun, Fuping Zeng, Xiaoze Liu:

A Fault Analysis and Reasoning Method for Vehicle Information Systems Based on Knowledge Graphs. 926-933 - Wentao Wu, Shihai Wang, Yuanxun Shao, Wandong Xie:

Software fault localization based on eigenvector centrality in complex network theory. 934-939 - Junhao Su, Xiangyang Qi, Jiamin Deng, Wenke Chen, Hongfeng Yan:

Aircraft Pose Perception Technology Based on Tire Detection for Automatic Docking of Towbarless Aircraft Tractors. 940-945 - Nan Ma, Genbao Xu, Yiheng Han, Beining Sun:

SA-P2T: Sparse Attention-based Pyramid Pooling Transformer Network for Object Detection. 946-951 - Jiaxing Li, Yanzhao Su, Mengmeng Yang, Zonghui Li, Jin Huang, Zhihua Zhong:

Topology Design of Electronic and Electrical Architecture for Time-Sensitive Network. 952-961 - Longjie Fan, Duanling Li, Linjie Ren, Xiao Su, Jin Huang:

Constraint-Following Robust Control for Flying Car: A Model-Based Approach. 962-969 - Kunkun Hao, Wen Cui, Lu Liu, Yuxi Pan, Zijiang Yang:

Integrating Data-Driven and Knowledge-Driven Methodologies for Safety-Critical Scenario Generation in Autonomous Vehicle Validation. 970-981 - Yingjun Qiao, Xingyu Li, Mengmeng Yang, Jin Huang, Zhihua Zhong:

Enhancing Traffic Safety at Unsignalized Intersections Through Constraint-Chain Based Cooperative Control. 982-989 - Ali Shakeri

:
Formalization of Operational Domain and Operational Design Domain for Automated Vehicles. 990-997 - Bo Wang, Yuerui Qi, Jin Huang, Zhihua Zhong:

Research on Parametric Generation of Automobile Styling Based on Grasshopper. 998-1003 - Zheng Fu, Yuhang Xu, Mengmeng Yang, Jin Huang, Diange Yang, Zhihua Zhong:

Immersive Traffic Interactive Simulator for Multi-Agent. 1004-1013 - Xuewei Tang, Mengmeng Yang, Kun Jiang, Jin Huang, Diange Yang:

UrbanME: A New Benchmark for HD Map Elements Extraction in Urban Traffic Scenes. 1014-1021 - Xuejun Liu, Xuerui Wang, Zhaichao Tang, Zikang Du, Zhen Chen:

An Algorithm Based on Monocular Vision for Unsafe Behavior Recognition of Human-Object Interaction in Inspection Vehicles for Hazardous Chemical Storage. 1022-1031 - Xuejun Liu, Xu Zhao, Zhongji Cui, Tianke Lei, Songbo Zhang:

Research on the Construction Method of Multimodal Dataset for Hazardous Chemicals Warehouse Applied to Inspection Vehicle. 1032-1037 - Hui Zhao, Xin Li, Cheng Xu

, Bingxin Xu, Hongzhe Liu:
A Survey of Automatic Driving Environment Perception. 1038-1047 - Zhiming Zhang, Jun Zhang, Yuansheng Liu:

MRM-LOOP: A Dynamic Visual Loop Closure Detection Algorithm Based on Motion Region Matching. 1048-1055 - Yangyang Fan, Yuansheng Liu:

Pedestrian Detection Method Based on Fusion of LIDAR and Camera. 1056-1061 - Nan Ma, Shangyuan Li, Yiheng Han, Mohan Wang:

PreBEV: Leveraging Predictive Flow for Enhanced Bird's-Eye View 3D Dynamic Object Detection. 1062-1066 - Anika Anwar, Nilesh Chakraborty, Mohammad Zulkernine:

Secure OTA Software Updates for Connected Vehicles Using LoRaWAN and Blockchain. 1067-1076 - Anika Anwar, Talal Halabi, Mohammad Zulkernine:

Cooperative Defense-in-Depth in Large-Scale Autonomous Vehicle Networks. 1077-1088 - Donghwan Shin

, Sanjeetha Pennada
:
Towards Simplification of Failure Scenarios for Machine Learning-Enabled Autonomous Systems. 1089-1090 - Nassim Sohaee:

Public Perception Toward Tesla Fatal Accidents: Neural Network Approach. 1091-1096 - Ruchika Gupta:

The Battle of Ethics in Autonomous Vehicles. 1097-1105 - Zhaojing Wang, Li Li, Bangchao Wang, Ruiqi Luo, Luyao Ye:

The Application of the Teaching Model of "Promoting Learning Through Competition, Promoting Teaching Through Competition" in the Course of Data Analysis and Mining. 1106-1112 - Yifan Tong, Zhaojing Wang, Xiaoyun Yan, Xinrong Hu, Lijun Li:

Industrial Process Fault Detection with Multi-View Feature Fusion Attention Mechanism Assisted Autoencoder Network. 1113-1122 - Tim Sonnekalb, Celestino Madera Castro, Bernd Gruner

, Clemens-Alexander Brust
, Wolfram Amme:
Vulnerability Prediction and Assessment Using Software Product Metrics and Machine Learning: What Does Not Work. 1123-1127 - Zhe Li, Zuchun Li, Jia Lu, Yimiao Zhang, Peng Ye:

YOLO-TSD: A Recognition and Detection Method for Traffic Sign Based on YOLOv5. 1128-1135 - Hongyan Wan, Teng Xiong, Zhiquan An, Xinrong Hu:

SIS: A Syntactic Information-based Span-level Model for Aspect Sentiment Triplets Extraction. 1136-1142 - Zhipeng Wang, Changxi Feng, Longfei Liu, Guotao Jiao, Peng Ye:

The Application of LLMs in the Analysis and Modeling of Software Requirements. 1143-1153 - Yuanbang Li, Jing Jiang, Chi Xu:

How to Choose a Suitable Method in Image Semantic Segmentation-An Experimental Study. 1154-1159 - Jiahui Huang, Shiyan Chen, Ziyang Weng, Huixin Ding, Li Zhao:

Preset Emotional Experience: Adaptive Detection and Complexity Interpretation of Implicit Order in Facial Emotion Recognition Calculations. 1160-1168 - Ziyi Jiang, Jingwei Zhang, Shiyan Chen, Jiahui Huang, Li Zhao:

Incarnation-Mediated: Cognitive Measurement of Virtual Scenes and Analysis of Complex Active Adaptive Behaviors in Realistic Scenography. 1169-1178 - Huixin Ding, Ziyang Weng, Ziyi Jiang, Jingwei Zhang:

Construction of Urban Governance Portrait Based on Space-Air-Ground Integrated Digital Intelligence Pedestal. 1179-1187 - Shiyan Chen, Ziyang Weng, Huixin Ding, Jiahui Huang:

Experiment on the Effectiveness of Air-Space Numerical Intelligence Modeling for National Security Strategic Information Needs. 1188-1196 - Jinha Park

, Chen Li
, Zhuangzhuang Dai, Christian Schlette:
Towards Safe Human-Robot Interaction: A Pilot Study on a Deep Learning-Assisted Workspace Monitoring System. 1197-1202 - Lawrence Ma, Lin Zou

:
A Creative Computing Approach to Forecasting Yield Shock of Winter Wheat. 1203-1212 - He-Lin Luo, Pei-Ying Lin, Tin-Kai Chen

, Andry Chowanda:
Research on the Utilization of Cloud Anchors in 5G Mobile Networks for Interactive Augmented Reality Display and Sculptural Art. 1213-1222 - Tin-Kai Chen

, Li-Hua Liu:
A Case Study into Collaborative Creation with Artificial Intelligence in Art Education in Taiwan. 1223-1232 - Yinwei Liu, Yuchen Jiang:

The Colour Temperature Intensity Adjusting Model for Improving Naked Eye 3D Holographic Computer Projection. 1233-1242 - Dong Ying, Bai Yijuan:

The Impact of Digital Technology Application on Tourist Enterprise Performance: The Moderating Role of Ownership Balance Degree. 1243-1250 - Chong Zeng, Yue Wu, Zisen Zhou, Yanju Yao, Hongji Yang:

Computational Imagination in Three-Dimension Scene Synthesis. 1251-1257 - Yifei Cao, Lingfeng Hao, Zhang Hua, Xingyao Kang:

Centralization or Decentralization? How Can Digital Transformation Empowers Firm Performance? 1258-1266 - Zhao Chen:

The Interweaving of Institutional Investors, Cloud Computing Technology and Sustainable Growth of Tourism Enterprises. 1267-1274 - Yifei Cao, Lingfeng Hao, Jing Hao, Li Zuoxue:

Artificial Intelligence as a New Engine for Boosting Economic Performance of Manufacturing Enterprises. 1275-1283 - Wen-Ying Chang:

Preliminary Exploration of Intelligent Virtual Avatars in the Virtual Influencer Industry. 1284-1291 - Lu Zhang, Lin Zou

, Meiyu Shi:
Immersing and Perceiving in Tourism Scenarios: The Interaction Mechanism between Digital Technologies and Tourists. 1292-1301 - Yani Liu:

Reshaping and Transforming of English Teaching in Higher Education in the ChatGPT Era: An Empirical Study Based on Big Data. 1302-1311 - Daniel Addai, Sarfraz Shaikh, Eric Xu, Wenbin Zhang

, Weifeng Xu:
A Graph-Based Approach for Discovering Evidence Relationships Across Multiple Devices in Group Crimes. 1312-1313 - Alexander Fischer

, Ramin Tavakoli Kolagari:
Harmonization of Security Standards for Embedded Systems in a Comprehensive Metamodel: The Security Abstraction Model. 1314-1315 - Ahmad Zayed, Amro Al-Said Ahmad

:
Evaluating the Performance Resilience of Serverless Applications using Chaos Engineering. 1316-1317 - Zhenyu Mao, Jialong Li, Dongming Jin, Munan Li, Kenji Tei:

Multi-Role Consensus Through LLMs Discussions for Vulnerability Detection. 1318-1319 - Roberto Bagnara, Abramo Bagnara, Federico Serafini, Nicola Vetrini:

C-Rusted: Safe and Secure Programming in Standard C. 1320-1321 - Shaomin Zhu, Haijiao Zhao, Jiaqi Huang, Ying Xing:

Survey on the Impact of Agile Development on Software Quality. 1322-1323 - Senjie Zhang, Shan Zhou, Lu Li, Chang Jia, Jinbo Wang:

Hardware Trojan Detection with Feature Fusion. 1324-1325

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














