default search action
34th ISSRE 2023: Florence, Italy
- 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, Florence, Italy, October 9-12, 2023. IEEE 2023, ISBN 979-8-3503-1594-3
- Xutan Peng, Yipeng Zhang, Jingfeng Yang, Mark Stevenson:
On the Vulnerabilities of Text-to-SQL Models. 1-12 - Zhaoyang Yu, Changhua Pei, Shenglin Zhang, Xidao Wen, Jianhui Li, Gaogang Xie, Dan Pei:
AutoKAD: Empowering KPI Anomaly Detection with Label-Free Deployment. 13-23 - Yang Chen, Jianfeng Jiang, Shoumeng Yan, Hui Xu:
Mind Your Enclave Pointers! Detecting Privacy Leaks for SGX Apps via Sparse Taint Analysis. 24-35 - Jinyang Liu, Tianyi Yang, Zhuangbin Chen, Yuxin Su, Cong Feng, Zengyin Yang, Michael R. Lyu:
Practical Anomaly Detection over Multivariate Monitoring Metrics for Online Services. 36-45 - Chiming Duan, Tong Jia, Huaqian Cai, Ying Li, Gang Huang:
AFALog: A General Augmentation Framework for Log-based Anomaly Detection with Active Learning. 46-56 - Dongwen Li, Shenglin Zhang, Yongqian Sun, Yang Guo, Zeyu Che, Shiqi Chen, Zhenyu Zhong, Minghan Liang, Minyi Shao, Mingjie Li, Shuyang Liu, Yuzhi Zhang, Dan Pei:
An Empirical Analysis of Anomaly Detection Methods for Multivariate Time Series. 57-68 - Shenglin Zhang, Zhongjie Pan, Heng Liu, Pengxiang Jin, Yongqian Sun, Qianyu Ouyang, Jiaju Wang, Xueying Jia, Yuzhi Zhang, Hui Yang, Yongqiang Zou, Dan Pei:
Efficient and Robust Trace Anomaly Detection for Large-Scale Microservice Systems. 69-79 - Philipp Straubinger, Gordon Fraser:
A Survey on What Developers Think About Testing. 80-90 - Pedro Henrique Kuroishi, José Carlos Maldonado, Auri Marcelo Rizzo Vincenzi:
Towards the Implementation of a Mobile Application Testing Infrastructure at Von Braun Labs. 91-101 - Kush Jain, Goutamkumar Tulajappa Kalburgi, Claire Le Goues, Alex Groce:
Mind the Gap: The Difference Between Coverage and Mutation Score Can Guide Testing Efforts. 102-113 - João Paulo Diniz, Fischer Ferreira, Fabiano Cutigi Ferrari, Eduardo Figueiredo:
Do Mutations of Strongly Subsuming Second-Order Mutants Really Mask Each Other? 114-124 - Andrea Ceccarelli, Tommaso Zoppi:
Intrusion detection without attack knowledge: generating out-of-distribution tabular data. 125-136 - José D'Abruzzo Pereira, Marco Vieira:
An Approach to Characterize the Security of Open-Source Functions using LSP. 137-147 - Jiawei Huang, Hao Han, Fengyuan Xu, Bing Chen:
SAPPX: Securing COTS Binaries with Automatic Program Partitioning for Intel SGX. 148-159 - Fanlang Zeng, Zhuoruo Zhang, Rui Chang, Chenyang Yu, Zijun Zhang, Yongwang Zhao:
Lark: Verified Cross-Domain Access Control for Trusted Execution Environments. 160-171 - Wenjing Wang, Shida Lu, Jianhui Luo, Chengrong Wu:
DeepUserLog: Deep Anomaly Detection on User Log Using Semantic Analysis and Key-Value Data. 172-182 - Xingjian Zhang, Yinqin Zhao, Chang Liu, Long Wang, Xin Yang, Yefei Hou, Zhongwen Lan, Xining Hu, Beibei Miao, Ming Yang, Xiangyi Jing, Sijie Li:
fKPISelect: Fault-Injection Based Automated KPI Selection for Practical Multivariate Anomaly Detection. 183-194 - Xiaoda Xie, Songlei Jian, Chenlin Huang, Fengyuan Yu, Yunjia Deng:
LogRep: Log-based Anomaly Detection by Representing both Semantic and Numeric Information in Raw Messages. 194-206 - Shiming He, Ying Lei, Ying Zhang, Kun Xie, Pradip Kumar Sharma:
Parameter-Efficient Log Anomaly Detection based on Pre-training model and LORA. 207-217 - Adam G. Emerson, Allison Sullivan:
Crucible: Graphical Test Cases for Alloy Models. 218-227 - Miriam Ugarte Querejeta, Eunkyoung Jee, Lingjun Liu, Pablo Valle, Aitor Arrieta, Miren Illarramendi Rezabal:
Search-based Test Case Selection for PLC Systems using Functional Block Diagram Programs. 228-239 - Lin Yang, Junjie Chen, Hanmo You, Jiachen Han, Jiajun Jiang, Zhe Sun, Xinqi Lin, Fang Liang, Yuning Kang:
Can Code Representation Boost IR-Based Test Case Prioritization? 240-251 - Maojin Li, Yan Lei, Huan Xie, Jiaguo Wang, Chunyan Liu, Zhengxiong Deng:
Contrastive Coincidental Correctness Representation Learning. 252-263 - Yujin Zhao, Ling Jiang, Ye Tao, Songlin Zhang, Changlong Wu, Yifan Wu, Tong Jia, Ying Li, Zhonghai Wu:
How to Manage Change-Induced Incidents? Lessons from the Study of Incident Life Cycle. 264-274 - Jiaying Li, Yan Lei, Shanshan Li, Haifang Zhou, Yue Yu, Zhouyang Jia, Yingwei Ma, Teng Wang:
A Two-Stage Framework for Ambiguous Classification in Software Engineering. 275-286 - Yujin Zhao, Ling Jiang, Ye Tao, Songlin Zhang, Changlong Wu, Tong Jia, Xiaosong Huang, Ying Li, Zhonghai Wu:
Identifying Root-Cause Changes for User-Reported Incidents in Online Service Systems. 287-297 - Haozhe Li, Minghua Ma, Yudong Liu, Si Qin, Bo Qiao, Randolph Yao, Harshwardhan Chaturvedi, Tri Tran, Murali Chintalapati, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang:
CODEC: Cost-Effective Duration Prediction System for Deadline Scheduling in the Cloud. 298-308 - Shuncheng Tang, Zhenya Zhang, Jixiang Zhou, Yuan Zhou, Yan-Fu Li, Yinxing Xue:
EvoScenario: Integrating Road Structures into Critical Scenario Generation for Autonomous Driving System Testing. 309-320 - Jixiang Zhou, Shuncheng Tang, Yan Guo, Yan-Fu Li, Yinxing Xue:
From Collision to Verdict: Responsibility Attribution for Autonomous Driving Systems Testing. 321-332 - Qiang Wen, Fumio Machida:
Characterizing Reliability of Three-version Traffic Sign Classifier System through Diversity Metrics. 333-343 - Jubril Gbolahan Adigun, Tom Philip Huck, Matteo Camilli, Michael Felderer:
Risk-driven Online Testing and Test Case Diversity Analysis for ML-enabled Critical Systems. 344-354 - Jieming Zhu, Shilin He, Pinjia He, Jinyang Liu, Michael R. Lyu:
Loghub: A Large Collection of System Log Datasets for AI-driven Log Analytics. 355-366 - Vithor Gomes Ferreira Bertalan, Daniel Aloise:
Using Transformer Models and Textual Analysis for Log Parsing. 367-378 - Stefan Petrescu, Floris den Hengst, Alexandru Uta, Jan S. Rellermeyer:
Log Parsing Evaluation in the Era of Modern Software Systems. 379-390 - Yintong Huo, Cheryl Lee, Yuxin Su, Shiwen Shan, Jinyang Liu, Michael R. Lyu:
EvLog: Identifying Anomalous Logs over Software Evolution. 391-402 - Hui Guo, Ting Su, Xiaoqiang Liu, Siyi Gu, Jingling Sun:
Effectively Finding ICC-related Bugs in Android Apps via Reinforcement Learning. 403-414 - Abhishek Tiwari, Jyoti Prakash, Christian Hammer:
Demand-driven Information Flow Analysis of WebView in Android Hybrid Apps. 415-426 - Shaokun Zhang, Hanwen Lei, Yuanpeng Wang, Ding Li, Yao Guo, Xiangqun Chen:
APIMind: API-driven Assessment of Runtime Description-to-permission Fidelity in Android Apps. 427-438 - Shaokun Zhang, Linna Wu, Yuanchun Li, Ziqi Zhang, Hanwen Lei, Ding Li, Yao Guo, Xiangqun Chen:
ReSPlay: Improving Cross-Platform Record-and-Replay with GUI Sequence Matching. 439-450 - João R. Campos, Ernesto Costa, Marco Vieira:
Online Failure Prediction Through Fault Injection and Machine Learning: Methodology and Case Study. 451-461 - Chen Yang, Yuanchun Li, Hao Lu, Jinliang Yuan, Qibo Sun, Shangguang Wang, Mengwei Xu:
Evaluating and Enhancing the Robustness of Federated Learning System against Realistic Data Corruption. 462-473 - Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan:
Evaluating the Effect of Common Annotation Faults on Object Detection Techniques. 474-485 - Jiahao Shi, Sihang Jiang, Bo Xu, Yanghua Xiao:
ServerRCA: Root Cause Analysis for Server Failure using Operating System Logs. 486-496 - Haiyang Li, Qing Gao, Shikun Zhang:
Assessing and Improving Dataset and Evaluation Methodology in Deep Learning for Code Clone Detection. 497-508 - Huashan Lei, Shuai Zhang, Jun Wang, Guanping Xiao, Yepang Liu, Yulei Sui:
Why Do Deep Learning Projects Differ in Compatible Framework Versions? An Exploratory Study. 509-520 - Hongjing Guo, Chuanqi Tao, Zhiqiu Huang:
Multi-Objective White-Box Test Input Selection for Deep Neural Network Model Enhancement. 521-532 - Zhiyang Zhou, Jie Liu, Wensheng Dou, Shuo Li, Liangyi Kang, Muzi Qu, Dan Ye:
Fixing Robust Out-of-distribution Detection for Deep Neural Networks. 533-544 - Kaitai Zhu, Xingya Wang, Zhenyu Chen, Song Huang, Junhua Wu:
Evaluating Ethereum Reentrancy Detection Tools via Mutation Testing. 545-555 - Lei Yu, Junyi Lu, Xianglong Liu, Li Yang, Fengjun Zhang, Jiajia Ma:
PSCVFinder: A Prompt-Tuning Based Framework for Smart Contract Vulnerability Detection. 556-567 - Huijuan Zhu, Kaixuan Yang, Liangmin Wang, Zhicheng Xu, Victor S. Sheng:
GraBit: A Sequential Model-Based Framework for Smart Contract Vulnerability Detection. 568-577 - Mengliang Li, Xiaoxue Ren, Han Fu, Zhuo Li, Jianling Sun:
ConvMHSA-SCVD: Enhancing Smart Contract Vulnerability Detection through a Knowledge-Driven and Data-Driven Framework. 578-589 - Chen Zhang, Shuo Feng, Wenzhi Xie, Dongdong Zhao, Jianwen Xiang, Roberto Pietrantuono, Roberto Natella, Domenico Cotroneo:
IFCM: An improved Fuzzy C-means clustering method to handle Class Overlap on Aging-related Software Bug Prediction. 590-600 - Tong Zhou, Chenxi Zhang, Xin Peng, Zhenghui Yan, Pairui Li, Jianming Liang, Haibing Zheng, Wujie Zheng, Yuetang Deng:
TraceStream: Anomalous Service Localization based on Trace Stream Clustering with Online Feedback. 601-611 - Xinmeng Xia, Yang Feng:
Detecting Interpreter Bugs via Filling Function Calls in Skeletal Program Enumeration. 612-622 - Aayush Garg, Renzo Degiovanni, Facundo Molina, Maxime Cordy, Nazareno Aguirre, Mike Papadakis, Yves Le Traon:
Enabling Efficient Assertion Inference. 623-634 - Ehsan Mashhadi, Hossein Ahmadvand, Hadi Hemmati:
Method-Level Bug Severity Prediction using Source Code Metrics and LLMs. 635-646 - Junyi Lu, Lei Yu, Xiaojia Li, Li Yang, Chun Zuo:
LLaMA-Reviewer: Advancing Code Review Automation with Large Language Models through Parameter-Efficient Fine-Tuning. 647-658 - Udit Kumar Agarwal, Abraham Chan, Karthik Pattabiraman:
Resilience Assessment of Large Language Models under Transient Hardware Faults. 659-670 - Jie Shi, Sihang Jiang, Bo Xu, Jiaqing Liang, Yanghua Xiao, Wei Wang:
ShellGPT: Generative Pre-trained Transformer Model for Shell Language Understanding. 671-682 - André Storhaug, Jingyue Li, Tianyuan Hu:
Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding. 683-693 - Jiaxian Lin, Tianyu Li, Yang Chen, Guangsheng Wei, Jiadong Lin, Sen Zhang, Hui Xu:
foREST: A Tree-based Black-box Fuzzing Approach for RESTful APIs. 695-705 - Kairui Wang, Yawen Wang, Junjie Wang, Qing Wang:
Fuzzing with Sequence Diversity Inference for Sequential Decision-making Model Testing. 706-717 - Chunlin Wang, Hongliang Liang:
Value Peripheral Register Values for Fuzzing MCU Firmware. 718-729 - Yafan Huang, Zhengyang He, Lingda Li, Guanpeng Li:
Characterizing Runtime Performance Variation in Error Detection by Duplicating Instructions. 730-741 - Chukri Soueidi, Yliès Falcone, Sylvain Hallé:
Dynamic Program Analysis with Flexible Instrumentation and Complex Event Processing. 742-751 - Juan Manuel Copia, Facundo Molina, Nazareno Aguirre, Marcelo F. Frias, Alessandra Gorla, Pablo Ponzio:
Precise Lazy Initialization for Programs with Complex Heap Inputs. 752-762 - Guancheng Wang, Yiqian Wu, Qihao Zhu, Yingfei Xiong, Xin Zhang, Lu Zhang:
A Probabilistic Delta Debugging Approach for Abstract Syntax Trees. 763-773 - Hongna Geng, Ming Zhong, Peihua Zhang, Fang Lv, Xiaobing Feng:
OPTango: Multi-central Representation Learning against Innumerable Compiler Optimization for Binary Diffing. 774-785 - Xin Liu, Yuan Tan, Xuan Hai, Qingchen Yu, Qingguo Zhou:
Hidden-in-Wave: A Novel Idea to Camouflage AI-Synthesized Voices Based on Speaker-Irrelative Features. 786-794 - Nima Shiri Harzevili, Jiho Shin, Junjie Wang, Song Wang, Nachiappan Nagappan:
Automatic Static Vulnerability Detection for Machine Learning Libraries: Are We There Yet? 795-806
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.