default search action
DSA 2020: Xi'an, China
- 7th International Conference on Dependable Systems and Their Applications, DSA 2020, Xi'an, China, November 28-29, 2020. IEEE 2020, ISBN 978-0-7381-2422-3
- David Shepherd:
Keynote Speech I The Push to Product - Strategies for Taking Your Research Into Practice. xviii-xx - Zhong-Hua Wang, Jian-Feng Ma, Wen Sheng Niu, Hui-Ya Li:
Architecture of Security Protection technology for Aviation Cyberspace. 21-24 - Shuting Kang, Tong Wang, PengQi Wang, Feng Wang, Qian Dong, Guang Yang, Lingzhong Meng, Yunzhi Xue:
A Coverage-Based Effective Data Augmentation Framework. 25-30 - Xiaobing Wang, Xiaoyu Yang, Chunyi Li:
A Formal Verification Method for Smart Contract. 31-36 - Songling Qin, Jinfu Chen, Zufa Zhang, Yisong Liu, Lingling Zhao, Bo Liu, Jingyi Chen:
A Malware Identification Approach Based on Improved SVM in Network Traffic. 37-40 - Jin Yang, Baoling Sheen, Juan Roa:
A Middle Layer Abstraction-Based Open Platform for V2X Safety and Application Study. 41-46 - Shanling Li, Zhanwei Hui:
A model based program comparison test method. 47-48 - Lingzhong Meng, Yang Bao, Shuting Kang, DongBo Zhao, Guang Yang, Yuan Shi, PengQi Wang, Qian Dong, Yunzhi Xue:
A rapid test method for autonomous ability of unmanned control strategy in dangerous situations. 49-57 - Limin Zhang, Giap Weng Ng, Yu-Beng Leau:
A real-time Information Exchange Strategy for Big Data Volume Systems Based on Internet of Things. 58-63 - Zhou Yang, Jueyu Chen:
A Smart Meter-Reading Framework With Secret Key Sharing and Support Vector Machine Algorithms. 64-68 - Dongcheng Li, W. Eric Wong, Matthew Chau, Sean Pan, Liang-Seng Koh:
A Survey ofNFC Mobile Payment: Challenges and Solutions using Blockchain and Cryptocurrencies. 69-77 - Hao Chen, Zhilei Ren, Lei Qiao, Zhide Zhou, Guojun Gao, Yue Ma, He Jiang:
AdaBoost-based Refused Bequest Code Smell Detection with Synthetic Instances. 78-89 - Qinchen Liu, Jianwen Xiang, Bin Xu, Dongdong Zhao, Wenhua Hu, Jian Wang:
Aging-Related Bugs Prediction Via Convolutional Neural Network. 90-98 - James Msughter Adeke, Jinfu Chen, Lei Zhang, Richard N. K. Mensah, Kun Tong:
An Efficient Approach Based on Parameter Optimization for Network Traffic Classification Using Machine Learning. 99-107 - Gaolei Yi, Xinyi Wang, Yichen Wang:
An Empirical Study of Counterexample-Guided Fuzzing for Neural Networks Verification. 108-113 - Zekun Song, Yichen Wang, Wentao Wang, Jing Zhang:
An Empirical study of Exploring Relevant Metrics to Assess Software Product Quality. 114-124 - Yifei Yang, Wei Yuan, Yansong Li, Desheng Wang, Jia Liu, Tieke He:
An Empirical Study of Law Articles Prediction on Transportation Legal Cases. 125-130 - Shuyue Fan, Chun Liu, Zheng Li:
An Empirical Study on The Impact of The Interaction between Feature Selection and Sampling in Defect Prediction. 131-140 - Baodi Ning, Guanqin Zhang, Zexin Zhong:
An Evolutionary Perspective: A Study of Anubis Android Banking Trojan. 141-150 - Cheng Li, Liang Kou, Xu Zhang:
An Intelligent Combination Algorithm for Traffic Flow Prediction. 151-156 - Qi Ao:
An Intrusion Detection Method for Industrial Control System against Stealthy Attack. 157-161 - Yudi Liu, Minyan Lu, Di Peng, Jie Wang, Jun Ai:
Analysis on Adversarial Robustness of Deep Learning Model LeNet-5 Based on Data Perturbation. 162-167 - Peng Li, Wei Niu:
Applications of LSTM Model for Aeroengine Forecasting. 168-172 - Anqi Wang, Hao Wang, Bo Jiang, Wing Kwong Chan:
Artemis: An Improved Smart Contract Verification Tool for Vulnerability Detection. 173-181 - Shiyi Kong, Minyan Lu, Chao Tang, Shuguang Wang:
Correlation Analysis between Software Structure Measures and Error Execution Path Deviation. 182-187 - Zhe Li, Zhijun Deng:
Data link network technology of UAV system. 188-189 - Quan Chen, Xi-Xi Zhang, Yu Chen, Wei Jiang, Guan Gui, Hikmet Sari:
Deep Learning-Based Automatic Safety Detection System for Crack Detection. 190-194 - Xiangfei Gao, Feng Gao:
Design and implementation of protocol processing model based on responsibility chain and reflection mechanism. 195-200 - Ying Zhao, Zhongwei Wang, Zhenghong Li, Rui Xu, Enliang Ding:
Design of a Center of Gravity Control Law with Unbalanced Fuel in Aircraft Wing Tanks. 201-205 - Jiang Wu, Yipeng Liu, Xin Gao, Lin Deng, Lei Guo, Xinyu Zhang:
Design of Multi-unmanned Platform Collaborative Demonstration Environment. 206-212 - Rui Chen, Tingting Yu, Yunsong Jiang, Chunpeng Jia, Chao Li, Dongdong Gao, Mengfei Yang:
Detecting Out-of-Bounds Array Access Errors in Aerospace Embedded Software. 213-218 - Haonan Yao, Yang Liu, Xiaoyi Zhang:
Developing deep LSTM model for real-time path planning in unknown environments. 219-225 - Zeqian Dong, Long Tang, Cong Tian:
Distilling Knowledge in Adversarial Attack. 226-233 - Xueli Jie, Yun Lin:
DSR: A Deep Learning Framework Towards Modulation Signal Retrieval. 234-239 - Zhiqin Cao, Yichen Wang, Peng Guo, Bo Tian:
EFSM Test Data Generation Based on Fault Propagation and Multi-Population Genetic Algorithm. 240-245 - Shuang Zhang, Xinyu Wan, Deqi Kong, Yangming Guo:
Embedded Virtualization Computing Platform Security Architecture Based on Trusted Computing. 246-250 - Zhida Bao, Haojun Zhao:
Evaluation of Adversarial Attacks Based on DL in Communication Networks. 251-252 - Danmei Wang:
Face Determination Based on Multi-template and Convolution. 253-257 - Lilei Zhang, Jinyong Yao, Kai Wang:
Fast Test Method of Intelligent Image Recognition System Based on Antagonistic Samples. 258-262 - Xuliang Chen, Jianhui Jiang, Wei Zhang, Xuzei Xia:
Fault Diagnosis for Open Source Software Based on Dynamic Tracking. 263-268 - Rui Wang, Jingchao Li, Bo Deng, Bin Zhang:
Fault Diagnosis Method of Equipotential Planet Map Based on Fusion Features. 269-274 - Jianfeng An, Hongjun You, Fengqing Xie, Yuanlin Yang, Jinhua Sun:
FIG-QEMU: A Fault Inject Platform Supporting Full System Simulation. 275-278 - Shouquan Xu:
FPGA Physical Automation Verification Technology Based on VCD Waveform. 279-284 - Long Tang, Bin Yu:
Generating Adversarial Examples in Limited Queries with Image Encoding and Noise Decoding. 285-292 - Ke Yuan, Longwei Yang, Yabing Huang, Zheng Li:
Heart Disease Prediction Algorithm Based on Ensemble Learning. 293-298 - Yuzhi Zhou, Xi-Xi Zhang, Jinlong Sun, Jie Yang, Guan Gui:
Implementation of Mesh Flying Ad-hoc Network For Emergency Communication Systems. 299-304 - Yucheng Cui, Zhiyu Xi:
Intelligent Detumbling Control for a Micro-Satellite with Bounded Inputs. 305-310 - Xiao Zhang, Xiaoling Liu:
Interference Signal Recognition Based on Multi-Modal Deep Learning. 311-312 - Shudi Guo, Shihai Wang, Bin Liu, Tengfei Shi:
KBAA: An adversarial example generation method for KBQA task. 313-318 - Chengfeng Li, Xi Liu, Hui Wu, Haifeng Li:
Knowledge-based Defect Prediction and Test Case Generation for Radar Software Fault Prevention. 319-323 - Wei Jiang, Tianliang Liu, Yu Chen, Quan Chen, Xi-Xi Zhang, Guan Gui:
Lightweight Convolutional Neural Network-Based Method for Crane Safety Inspection. 324-329 - Yueyao Niu, Wei Han, Xiaodi Dai:
Load Balancing Evaluation of Multi-core Processors based on BMP Architecture. 330 - Chengying Mao, Xiaorong Yi, Tsong Yueh Chen:
Metamorphic Robustness Testing for Recommender Systems: A Case Study. 331-336 - Changbo Hou, Guowei Liu, Lijie Hua, Yun Lin:
Multimodal Feature Fusion Recognition of Modulated Signals Based on Image and Waveform Domain. 337-342 - Li Liu, Peipei Yang, Tian Zhou, Yunyi Li, Wenmei Li, Guan Gui:
Nonon-Convex Low-Rank Minimization for Sparse-View CT Reconstruction via Nonlocal-Group Dictionary Learning. 343-348 - Yongfeng Yin, Xuefeng Wang, Qingran Su:
On Test Sequcence Generation of Time-Triggered Ethernet Using Genetic Algorithm. 349-354 - Pengpeng Sun, Yunwei Dong:
On Vulnerability Analysis of Nodes against Cross-domain Cascading Failures Propagation in Active Distribution Network Cyber-physical System. 355-363 - Gu Bin-Bing, Li Yin, Ting-Ting Jiang:
Parametric Software Defect Patterns Based on Test Perspective. 364-370 - Na Du, Zhihong Liang, Yuxiang Huang, Zhichang Guo, Hongji Yang, Sasa Wang:
Performance optimisation Method of PBFT Consensus for Supply Chain Integration SVM. 371-377 - Desheng Wang, Yubo Qian, Yu Xing, Yansong Li, Yifei Yang, Qing Wu, Tieke He:
Problem Kit System for Expression Ability Evaluation. 378-384 - Changbo Hou, Lijie Hua, Guowei Liu, Yun Lin:
Radar Signal Separation and Recognition based on Semantic Segmentation. 385-390 - ChaoHui Feng, Zhe Cui, GuangXiang Yang, ZhiSen Wang, XianXi Yang:
Reasearch on Similar Flight Numbers of LD Algorithm. 391-397 - Lei Song, Zhongxi Lu, Sirirat Petsangsri:
Reconstruction of Smart Learning Space Based on Digital Twin (DT) Technology. 398-406 - Zijian Zhang, Chaozhang Lv, Meijun Sun, Zheng Wang:
Reliable and Robust Weakly Supervised Attention Networks for Surface Defect Detection. 407-414 - Jiajia Chen, Ying Wang, Ao Li, Kezheng Lin:
Reliable Multiview Learning for Spectral Clustering. 415-422 - Liu Tang, You Li, Hongwei Wang, Huan Zhao, Luze Ma, Yuming Sun:
Research and implementation of an automatic simulation tool. 423-428 - Zhe Cui, XianXi Yang, ChaoHui Feng, GuangXiang Yang:
Research on Characteristics of Aircraft Traffic Flow in Airport Surface. 429-440 - Zhe Shen, Jingchao Li, Jialan Shen, Bin Zhang:
Research on Fault Diagnosis of Rolling Bearings Based on Fractal Dimension. 441-446 - Defei Hou, Yongfeng Yin, Qingran Su, Lijun Liu:
Software Refactoring Scheme Based on NSGA-II Algorithm. 447-452 - Yu-Ping Zhu, Jun Shao, Yong Cai, Yue Shen:
Research on the Knowledge Ontology Model of Attribute-oriented Airworthiness Review Compliance Activities. 453-458 - Shuanqi Wang, Zhibo Li, Xin He, Ke Sheng, Jingxuan Zhou, Wei Wu:
Safety Argument Pattern Language of Safety-Critical Software. 459-467 - Xiao-Ting Meng, Li-Li Yu:
Security Testing of Unmanned Flight System. 468-471 - Xining Cui, Yukai Hao, Xiaodi Dai:
Simulation Verification Technology of Virtual-Real-Integration Avionics System. 472-477 - Junruo Sun, Huancheng Su, Haifeng Li, Chang Liu, Jiabin Chen, Xi Liu:
Software Defect Classification Approach Based on the Modified Latent Dirichlet Allocation Topic Model Considering the Domain Characters. 478-482 - Xinlei Zheng, Xi Liu:
Software Quality Measurement Combining Autonomy Evaluation for Intelligent Early-warning Information System. 483-488 - Ziqi Zhou, Yang Li, Bowang Jiang, Kaiyang Liu, Yingzi Wu, Yanni Wu:
Sonar Cross Section Recovery Method Based on Pole Features of Underwater Target. 489-490 - Xubing Wang, Jing You:
Summary of Tools in FPGA Static Timing Analysis. 491-492 - Yu Xin, Xiaohong Bao:
System Vulnerability Oriented to Strategies. 493-499 - PengQi Wang, Lin Geng, DongBo Zhao, Shuting Kang, Qian Dong, Guang Yang, Yuan Shi, Lingzhong Meng, Yunzhi Xue:
Task-driven Image Preprocessing Algorithm Evaluation Strategy. 500-508 - Li Yin:
Test Suite Generation for Software Reliability Testing Based on Hybrid Musa and Markov Method. 509-514 - Shuxiao Lv, Beibei Yin:
Testing DNN-Based Path Planning Algorithms by Metamorphic Testing. 515-526 - Jianchun Xie, Yahui Li, Zhonghua Wang, Linting Bai:
The Airborne Information Processing System Development Research. 527-531 - Yansong Li, Yu Xing, Yubo Qian, Desheng Wang, Yifei Yang, Qing Wu, Tieke He:
The Design and Implementation of Test System for Expression Ability Evaluation. 532-537 - Hengfeng Fu, Sen Wang:
The Evaluation Method of Speech Interference Effect Based on Deep Learning. 538-542 - Jie Wang, Minyan Lu, Jun Ai, Xueyuan Sun:
The Quantitative Relationship between Adversarial Training and Robustness of CNN Model. 543-549 - Taichun Qin, Shouwen Liu, Shouqing Huang, Yuege Zhou:
The test process date based quality defect detection strategy for spacecraft components. 550-554 - Zhibin Zhang, Dian Zhou, Jiqing Rao, Dongdong Zhao, Wenhua Hu, Jianwen Xiang, Zhongjin Liu, Yanzhen Xing:
VSFBS: Vulnerability Search in Firmware Based on String. 555-563
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.