default search action
22nd QRS 2022: Guangzhou, China - Companion
- 22nd IEEE International Conference on Software Quality, Reliability, and Security, QRS 2022 - Companion, Guangzhou, China, December 5-9, 2022. IEEE 2022, ISBN 979-8-3503-1991-0
- Qiliang Yang, Lizhi Cai, Jiayu Gong, Minlu Tang, Yi Lin:
Attribute-Based Non-Interactive Privacy-Protected Crowd-Sourcing Software Testing Engineer Selection Mechanism. 1-7 - Changming Xu, Hengfeng Ding, Xuejian Zhang, Cong Wang, Hongji Yang:
A Data-Efficient Method of Deep Reinforcement Learning for Chinese Chess. 1-8 - Arash Golibagh Mahyari:
A Hierarchical Deep Neural Network for Detecting Lines of Codes with Vulnerabilities. 1-7 - Maxime Méré, Frédéric Jouault, Loïc Pallardy, Richard Perdriau:
Modeling Trust Relationships in Blockchain Applications: The Case of Reconfigurable Systems-on-Chip. 1-8 - Wei Guo, Leyang Zhou, Jia Liu, Miaomiao Liu:
Internet Governance: Social Mentality and Public Emotion Analysis on Online Media during the COVID-19 Epidemic in Mainland China. 1-8 - Zhongge Zhao, Jiang Shao, Ming Zhang:
Multiphysics Simulation Methods for Microsystem Interconnections. 1-7 - Lisa M. DiSalvo, Gabriela Viviana Saenz, W. Eric Wong, Dongcheng Li:
Social Media Safety Practices and Flagging Sensitive Posts. 8-15 - Tomoko Kaneko:
Security Resilience - Considerations from the Application of the Functional Resonance Method (FRAM) to Information Security Incidents. 16-23 - Xiang Wang, Xing Zhang, Changda Wang:
Generalized Network Temperature for DDoS Detection through Rényi Entropy. 24-33 - Ryohei Sato, Hidetoshi Kawaguchi, Yuichi Nakatani:
A Stochastic Model for Calculating Well-Founded Probabilities of Vulnerability Exploitation. 34-43 - Irdin Pekaric, David Arnold, Michael Felderer:
Simulation of Sensor Spoofing Attacks on Unmanned Aerial Vehicles using the Gazebo Simulator. 44-53 - Marcos Felipe, Haiping Xu:
A Scalable Storage Scheme for On-Chain Big Data using Historical Blockchains. 54-61 - Shinya Haga, Taisei Takahashi, Kazumasa Omote:
Multi Pair Swap-Based Weather Derivative DeFi. 62-69 - Jingyuan Cai, Ying Zhou, Tianyuan Hu, Bixin Li:
PTLC: Protect the Identity Privacy during Cross-Chain Asset Transaction More Effectively. 70-78 - Rana Zeeshan, Irina Tal:
Technical Usability Assessment of Security Analysis Tools for Ethereum Based Smart Contracts. 87-95 - Wenxuan Wang, Yongqiang Chen, Jiangchen Zhou, Huan Jin:
Hyperledger Fabric-Based Copyright Management System for Clothing design drawings. 96-101 - Yixin Fan, Guozhi Hao, Jun Wu:
Transferable Unique Copyright Across AI Model Trading: A Blockchain-Driven Non-Fungible Token Approach. 102-105 - Xiangke Mao, Chao Li, Guigang Zhang, Xin Wei, Chunxiao Xing:
Application of Blockchain in Trusted Data Provenance. 106-112 - Bo Su, Zeyuan Zhang, Yuansheng Zhang, Qingyue Yang, Jiong Jiang:
Real-Time Control Algorithm of Intelligent Energy-Saving Lights based on IoT. 113-119 - Ryôichi Sasaki:
Trial Application of Risk Assessment Method for Metaverse. 120-128 - Takeya Horiuchi, Hiroshi Yoshiura, Yoichi Midorikawa, Hideki Yoshii, Masatsugu Ichino:
Machine Learning based Re-identification of Location Histories using Contact Information Collected from Social Networking Services. 129-136 - Eina Hashimoto, Masatsugu Ichino, Hiroshi Yoshiura:
Breaking Anonymity of Social Media by Profiling from Multimodal Information. 137-144 - Taichi Hasegawa, Taiichi Saito, Ryôichi Sasaki:
Analyzing Metadata in PDF Files Published by Police Agencies in Japan. 145-151 - Hoang Viet Nguyen, Tetsutaro Uehara:
Hierarchical Action Embedding for Effective Autonomous Penetration Testing. 152-157 - Wenhong Liu, Jinliang Gao, Qiong Xue, Dong Guo, Wei Zhang:
Evaluation of Software Testing Adequacy based on AHP and BPNN. 158-165 - Yue Liu, Lichao Feng, Xingya Wang, Shiyu Zhang:
DeepBoundary: A Coverage Testing Method of Deep Learning Software based on Decision Boundary Representation. 166-172 - Haoran Li, Shihai Wang, Tengfei Shi, Xinyue Fang, Jian Chen:
TSDTest: A Efficient Coverage Guided Two-Stage Testing for Deep Learning Systems. 173-178 - Chenxi He, Wenhong Liu, Shuang Zhao, Jiawei Liu, Yang Yang:
An Empirical Study towards Characterizing Neural Machine Translation Testing Methods. 179-182 - Wenhong Liu, Yong Li, Bo Huang:
Evaluation of Intelligent Information System. 183-188 - Yifei Liu, Yankun Gao, Yang Liu:
IMGA: Improved Microbial Genetic Algorithm. 189-192 - Yao Huang, Bingqing Zhang, Yichen Wang:
Automated Modeling of Web Service Composition and Testing: A UML Sequence Diagram-Based Approach. 193-200 - Alexander Poth, Olsi Rrjolli, Andreas Riel:
Integration- and System-Testing Aligned with Cloud-Native Approaches for DevOps. 201-208 - Jinfu Chen, Yemin Yin, Saihua Cai, Ye Geng, Longxia Huang:
An Improved Test Case Generation Method based on Test Requirements for Testing Software Component. 209-218 - Yaming Zhang, Lijin Wu, Xiaomei Shen, Zehua Shen, Tongli Tang:
Dependability Analysis and Verification Technology of Artificial Intelligence Software. 226-232 - Yunyun Pang, Qiang Ye, Yang Lu:
Analysis of Velocity Deviation of Satellite-Rocket Separation and Orbit Accuracy of Satellite Caused by Multiple Factors. 240-245 - Zhanyi Hou, Ling-lin Gong, Minghao Yang, Yizhuo Zhang, Shunkun Yang:
Software Bug Prediction based on Complex Network Considering Control Flow. 246-254 - Zhiyu Duan, Yujia Li, Pubo Ma, Xiaodong Gou, Shunkun Yang:
A Multi-Layer Fault Triggering Framework based on Evolutionary Strategy Guided Symbolic Execution for Automated Test Case Generation. 255-262 - Dong An, Shihai Wang, Liandie Zhu, Xunli Yang, Xiaobo Yan:
Prefilter: A Fault Localization Method using Unlabelled Test Cases based on K-Means Clustering and Similarity. 263-269 - Canwei Shi, Ling-lin Gong, Qi Shao, Qi Yao, Zhiyu Duan:
Visual-ISAM: A Visualization Method for Software Failure Analysis and Evaluation based on Knowledge Graph Utilizing Improved SALKU Model. 270-277 - Wentao Wu, Shihai Wang, Yuanxun Shao, Mingxing Zhang, Wandong Xie:
A Software Defect Prediction Classifier based on Three Minimum Support Threshold Association Rule Mining. 278-282 - Chao Xiong, Zhiyi Zhang, Yuqian Zhou, Chen Liu, Zhiqiu Huang:
IEMT: Inequality-Based Metamorphic Testing for Autonomous Driving Models. 283-287 - Samia Al Blwi, Amani Ayad, Besma Khaireddine, Imen Marsit, Ali Mili:
Quantifying the Effectiveness of Mutant Sets. 288-297 - Yu Su, Xinping Hu, Xiang Chen, Yubin Qu, Qianshuang Meng:
CIL-BSP: Bug Report Severity Prediction based on Class Imbalanced Learning. 298-306 - Fangyuan Tian, Wenhong Liu, Shuang Zhao, Jiawei Liu:
Face Recognition Fairness Assessment based on Data Augmentation: An Empirical Study. 315-318 - Wenhong Liu, Zhiyuan Peng, Shuang Zhao, Jiawei Liu:
Similarity Analysis in Data Element Matching based on Word2vec. 319-323 - Xiangyu Shi, Xiaolin Ju, Xiang Chen, Guilong Lu, Mengqi Xu:
SemirFL: Boosting Fault Localization via Combining Semantic Information and Information Retrieval. 324-332 - Xiaowei Guo, Ning Cao, Xibing Yang:
The Real-Time General Display and Control Platform Designing Method based on Software Product Line. 333-339 - Yue Ma, Ya Pan, Yong Fan:
Metamorphic Testing for the Medical Image Classification Model. 340-346 - Boying Wu, Sigong Zhang, Weirong Tian, Hang Wang:
Application and Development Prospect of Monitoring Screen based on Three.js Unit Equipment Control System. 347-351 - Mingxing Zhang, Shihai Wang, Wentao Wu, Weiguo Qiu, Wandong Xie:
A Software Multi-Fault Clustering Ensemble Technology. 352-358 - Jiandong Li, Shaoying Liu:
Requirements-Related Fault Prevention Mechanism for SOFL Formal Specification-Based Programming. 359-367 - Xunli Yang, Bin Liu, Dong An, Wandong Xie, Wei Wu:
A Fault Localization Method Based on Similarity Weighting with Unlabeled Test Cases. 368-374 - Pingyan Wang, Shaoying Liu, Ai Liu, Wen Jiang:
Detecting Security Vulnerabilities with Vulnerability Nets. 375-383 - Shoma Hamada, Haibo Yu, Vo Dai Trinh, Yuri Nishimura, Jianjun Zhao:
Bug Patterns in Probabilistic Programming Systems. 384-391 - Jiaxi Xu, Jingwei Shang, Zhichang Huang:
CFIWSE: A Hybrid Preprocessing Approach for Defect Prediction on Imbalance Real-World Datasets. 392-401 - Bing Zheng, Hua Li:
Automatic Labeling of SDN Controller Defect Text based on Neural Topic Model. 402-410 - Xuanye Wang, Lu Lu, Boye Wang, Yudong Shang, Hao Yang:
Software Defect Prediction via GIN with Hybrid Graphical Features. 411-416 - Ziyang Weng, Ziyu Zhang, Yinger Liang, Biyi Dai:
Generalized Perceptual Modeling: Virtual Human Face Modeling and Expression Recognition Considering Emotion Understanding. 417-424 - Yunhao Li, Shijie Chen, Jiancheng Zhao:
Recommendation Algorithm for Graph Convolutional Networks based on Multi-Ralational Knowledge Graph. 425-430 - Xinwei Liu, Chuanqi Tao:
A Dead Code Evaluation Method based on Complex Network. 431-436 - Wenjin Zhu, Zhifeng Zheng:
A Selective Maintenance Strategy on Network-Based System with Constrained Flow. 437-438 - An Wu, Chen Zheng, Zao Hou, Feng Duan, Zhiqiang Cai:
An Excellence Level Evaluation Model of Intelligent Manufacturing Unit. 439-443 - Ning Wang:
Resilience Analysis of Urban Rail Transit Network Under Large Passenger Flow. 444-446 - Wenjia Long, Kaizhi Wang, Xuan Wang:
Reliability Analysis of a Computer-Based Interlocking System with a Double 2-out-of-2 Redundancy Structure using Algebraic Binary Decision Diagrams. 447-453 - Yuegui Feng, Guangwei Qing, Qianfei Zhou:
Elevator Maintenance Site Selection Optimization via Fine-Tuned K-Means. 454-461 - Guangwei Qing, Qianfei Zhou, Huifang Wang:
Intelligent Guidance Method for Elevator Emergency Treatment based on Automatic Recommendation and Fault Prediction. 462-468 - Yujuan Cheng:
A Learning Path Recommendation Method for Knowledge Graph of Professional Courses. 469-476 - Wenjun Wei, Junhua Wu:
Code Generation Method based on Structured Tree Input and AST Decoder Attention Augmentation. 477-484 - Xiao Chen, Junhua Wu:
Code Search Method Based on Multimodal Representation. 485-491 - Ziyang Weng, Shuhao Wang, Weixin Yan, Anna Li:
Chinese Character Creation Algorithm: Evaluation of the Effectiveness of Topological Similarity of Remote Sensing Images Considering the Description of Sparse Geographic Structure. 492-498 - Jiahao Li, Xinhao Cui, Yichen Wang, Feng Xie:
An Empirical Study of Software Testing Quality based on Natural Experiments. 499-508 - Qian-Kun Yao, Yuqian Zhou, Ya-Qi Dong:
Quantum Random Access Codes with Mutually Unbiased Bases in Three-Dimensional Hilbert Space. 509-514 - Ya-Qi Dong, Yuqian Zhou, Qian-Kun Yao:
Characterization of Nonlocality in Chained Quantum Networks. 515-520 - Tianyu Xu, Guanglin Li, Jun Lu, Ziyuan Wang:
An Approach of Locating Minimal Failure-Causing Schema for Boolean-Specifications. 521-524 - Sen Zhang, Hongyan Wan, Yong Xiao, Ziruo Li:
IRRT: An Automated Software Requirements Traceability Tool based on Information Retrieval Model. 525-532 - Huan Jin, Hongyan Wan, Ziruo Li, Wenxuan Wang:
An Empirical Study on Software Requirements Classification Method based on Mobile App User Comments. 533-541 - Yahan Yu, Yixuan Xu, Jian Wang, Zhenxing Li, Bin Cao:
Anti-Money Laundering Risk Identification of Financial Institutions based on Aspect-Level Graph Neural Networks. 542-546 - Chao Li, Guigang Zhang, Xiangke Mao, Jian Zhang, Chunxiao Xing:
Multi-Chain Model and Cross-Chain Communication Protocol for Financial Transactions. 547-551 - Yahan Yu, Yun Wang, Guigang Zhang, Yi Yang, Jian Wang:
Question Answering Algorithm for Grid Fault Diagnosis based on Graph Neural Network. 552-557 - Wanqing Cheng, Xiujie Zhao:
Maintenance Optimization for Dependent Two-Unit Systems Considering Stochastic Degradation and Imperfect Maintenance. 558-561 - Bin Han, Mu-Xia Sun, Lai-Kan Muk, Yanfu Li, Hans D. Schotten:
Flexible and dependable manufacturing beyond xURLLC: A novel framework for communication-control co-design. 562-568 - Hengfei Yang, Bo Shen, Gaoyang Xu, Yonghua Chen:
Modeling Method and Correctness Verification of Power Grid Safety and Stability Control Strategy System. 569-575 - Mingfu Tuo, Xiaoqiang Zhao, Bo Shen, Wenliang Wu:
Modeling and Real-Time Verification for CPS based on Time Automata. 576-579 - Raheela Chand, Saif Ur Rehman Khan, Shahid Hussain, Wen-Li Wang:
TTAG+R: A Dataset of Google Play Store's Top Trending Android Games and User Reviews. 580-586 - Muhammad Azeem Akbar, Arif Ali Khan, Sajjad Mahmood, Saima Rafi:
A Vision of DevOps Requirements Change Management Standardization. 587-592 - Syed Haider Ali, Anish Goel, Aditya Singirikonda, Ali Y. Khan, Ting Xiao:
Towards a Comprehensive Dataset for Next-Day Wildfire Prediction. 593-598 - Yuanbang Li, Kai Wang, Xiaoyu Guo, Zhongyuan Hua, Yong Xiao:
Data Driven User Feature Construction and Requirement Generation in Mobile Applications. 599-607 - Xinrong Hu, Jingjing Huang, Junping Liu, Qiang Zhu, Jie Yang:
Knowledge Graph Question Answering based on Contrastive Learning and Feature Transformation. 608-615 - Yongfeng Gu, Yuxuan Zhou, Hao Ding, Fan Jia, Shiping Wang:
Exploring the Impact of Grouping Strategies on Cooperative Co-evolutionary Algorithms for Solving the Advertising Budget Allocation Problem. 616-620 - Yongfeng Gu, Hao Ding, Kecai Gu, Xiaoguang Huang, Hua Wu:
A Comparison Analysis of Constraint-Handling Techniques on Rule Selection Problem in Credit Risk Assessment: An Industrial View. 621-625 - Zhongyuan Hua, Ke Ye:
Colonization Strategy Algorithm: A Deviation Algorithm Optimization based on Spatial Autocorrelation Theory. 626-633 - Shuhao Wang, Zhijun Lin, Zhimo Weng, Anna Li:
Mapping Method between 2D Landscape Image and 3D Spatial Data based on Adversarial Relative Depth Constraint Network. 634-642 - Ziyang Weng, Shuhao Wang, Weixin Yan, Yinger Liang:
Prototype Algorithm: Number Chain Features in Spatial Similarity Calculation of Time-Series Graph Sources. 643-650 - Haocheng Guan, Dongcheng Li, Hui Li, Man Zhao:
A Crawler-Based Vulnerability Detection Method for Cross-Site Scripting Attacks. 651-655 - Changjian Li, Dongcheng Li, Man Zhao, Hui Li:
A Light-Weight Convolutional Neural Network for Facial Expression Recognition using Mini-Xception Neural Networks. 656-661 - Jinyong Lin, Wenlong Cai, Xiangrui Fan, Wenjie Dong, Shuo Zhang:
A FANETs System for Autonomous Aerocraft Flying Formation. 662-666 - Mengao Li, Hanting Zhao, Wenxiu Zhang, Xiqiao Pang, Tao Feng:
Software Technology Status Management under the Trend of Ship Informatization. 667-672 - Chen Li, Dimitrios Chrysostomou, Hongji Yang:
A Natural Language-enabled Virtual Assistant for Human-Robot Interaction in Industrial Environments. 673-678 - Lin Zhu, Luyi Bai, Xuesong Hao, Hongji Yang:
A General Characterization of Representing Spatiotemporal Knowledge Graph based on OWL. 679-686 - Qinyun Liu, Xiaopeng Xu:
Script Based Pattern Recognition for a Portrait Tracking System on Broadcast Online Scenes. 694-699 - Chen Li, Xiaochun Zhang, Chengyuan Yu, Xin Shu, Xiaopeng Xu:
LLCF: A Load- and Location-Aware Collaborative Filtering Algorithm to Predict QoS of Web Service. 700-707 - Lingfei Ma, Liming Nie, Chenxi Mao, Yaowen Zheng, Yang Liu:
An Empirical Study of the Impact of COVID-19 on OSS Development. 708-717 - Tse-Chuan Hsu, William Cheng-Chung Chu, Shyh-Wei Chen:
The IoT Service Agent Model based on Federated Learning to Improve Service Quality. 718-722 - Yue Wu, Xiang Li, Jiafeng Zhou:
A Creative Computing Approach to Optimising Citizens' Fashion Education based on Design Thinking for Responding to Micro-Level Needs of Smart City Development. 723-731 - Yinwei Liu:
Visual Sensitivity Controlling Colour Model in Creative Computing. 732-739 - Qinyun Liu, William Cheng-Chung Chu, Xiaochun Zhang, Shou-Yu Lee, Wei Mo:
A Quantum Information and Cybernetics Based Algorithm for Creativity Applying in Cultural Heritage Products Design. 740-745 - Chuan Zhao, Huilei Cao:
Risk Evaluation of the Destination Port Logistics based on Self-Organizing Map Computing. 746-751 - Kai-Yuan Cai:
Towards Research on Information Gravitation. 752-753 - Haoran Sun, Xiaolong Zhu, Conghua Zhou:
Deep Reinforcement Learning for Video Summarization with Semantic Reward. 754-755 - Rubia Fatima, Affan Yasin, Lin Liu, Jianmin Wang:
What Should Abeeha do? an Activity for Phishing Awareness. 756-757 - Hugo Bourreau, Emeric Guichet, Amine Barrak, Benoît Simon, Fehmi Jaafar:
On Securing the Communication in IoT Infrastructure using Elliptic Curve Cryptography. 758-759 - Xiangjun Han, Baojian Hua, Yang Wang, Ziyao Zhang:
RUSTY: Effective C to Rust Conversion via Unstructured Control Specialization. 760-761 - Xuedong Ou, Jing Liu:
Log Anomaly Detection Method based on Hybrid Transformer-BiLSTM Models. 762-763 - Hao Yin, Dongyu Cao, Ying Zhou:
RandomMix: An Effective Framework to Protect User Privacy Information on Ethereum. 764-765 - Jiahao He, Dongyu Cao, Ying Zhou:
TrustAuction: A TEE based Privacy Protection Framework for Auction Contracts. 766-767 - Changtian He, Qing Sun, Ji Wu, Haiyan Yang, Tao Yue:
Feature Difference based Misclassified Sample Detection for CNN Models Deployed in Online Environment. 768-769 - Xue Geng, Sheng-rong Zou, Ju-yi Yao:
Systematic Transformation Method from UML to Event-B. 770-771 - Haotian Yu, Xiaoguang Li, Yuefeng Du:
Deep Learning Fuzz Testing Methods for Unstructured Case. 772-773 - Linhan Li, Qianying Zhang, Shijun Zhao, Zhi-Ping Shi, Yong Guan:
Design and Implementation of OOM Module based on Rust. 774-775 - Quanzhou Li, Zhenguo Liu, Ning Hu, Shuqi Zhong, Keqiang Cheng:
A New Method for Quality Analysis of Multi-Process Manufacture. 776-777 - Zongqi Xue, Zhenglin Liang:
Resilience Analysis under the Impact of Cell Failures in the Practical Telecommunication base Station Networks. 778-779 - Shengran Wang, Jinfu Chen, Saihua Cai, Chi Zhang, Haibo Chen:
A Novel Coverage-Guided Greybox Fuzzing Method based on Grammar-Aware with Particle Swarm Optimization. 780-781 - Renjie Huang, Banghu Yin, Liqian Chen:
Using Fuzzing to Help Abstract Interpretation Based Program Verification. 782-783
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.