default search action
19th QRS 2019: Sofia, Bulgaria - Companion
- 19th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion 2019, Sofia, Bulgaria, July 22-26, 2019. IEEE 2019, ISBN 978-1-7281-3925-8
Automobile Software Security and Safety
- Daniel S. Fowler, Jeremy W. Bryans, Madeline Cheah, Paul Wooderson, Siraj A. Shaikh:
A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example. 1-8 - Jake Hayward, Andrew Tomlinson, Jeremy W. Bryans:
Adding Cyberattacks To An Industry-Leading CAN Simulator. 9-16 - Lama Moukahal, Mohammad Zulkernine:
Security Vulnerability Metrics for Connected Vehicles. 17-23 - Clifford Liem, Dan Murdock, Andrew Williams, Martin Soukup:
Highly Available, Self-Defending, and Malicious Fault-Tolerant Systems for Automotive Cybersecurity. 24-27 - Christian Lidström, Carl Bondesson, Mattias Nyberg, Jonas Westman:
Improved Pattern for ISO 26262 ASIL Decomposition with Dependent Requirements. 28-35 - Ryo Kurachi, Hiroaki Takada, Naoki Adachi, Hiroshi Ueda, Yukihiro Miyashita:
DDCAN: Delay-Time Deliverable CAN Network. 36-41 - Dennis Kengo Oka, Tommi Makila, Rikke Kuipers:
Integrating Application Security Testing Tools into ALM Tools in the Automotive Industry. 42-45
Automated Intelligent Software Testing
- Jinyu Zhang, Honghui Zhao, Yumeng Yang, Jiaqi Yan:
Towards Transparency and Trustworthy: A Used-Car Deposit Platform Based on Blockchain. 46-50 - Siyou Ma, Feng Gao, Yunqiang Yan:
Study on Hybrid Collaborative Simulation Testing Method Towards CPS. 51-56 - Yusong Chen, Yang Gao, Yufeng Zhou, Menghui Chen, Xingyue Ma:
Design of an Automated Test Tool Based on Interface Protocol. 57-61 - Shu Zhang, Ge Yan, Yu Li, Jia Liu:
Evaluation of Judicial Imprisonment Term Prediction Model Based on Text Mutation. 62-65 - Tieke He, Shenghao Chen, Lian Hao, Jia Liu:
Quality Driven Judicial Data Governance. 66-70 - Xiuting Ge, Ya Pan, Yong Fan, Chunrong Fang:
AMDroid: Android Malware Detection Using Function Call Graphs. 71-77 - Wenhong Liu, Jiahong Jiang, Zhongtian Li, Jun Yang, Yakui Song, Zhaohui Dou:
A Baseline Evaluation Method Based on Principal Component Analysis for Software Test Case Design. 78-83 - Baogui Chen, Zhuoyang Li, Siyuan Shen, Zhipeng Zou, Tieke He:
Judicial Knowledge Reasoning Based on Representation Learning. 84-88 - Yunqiang Yan, Linbo Wu, Yanhong Peng, Changhai Nie:
A Test Case Design Method Based on Path Depth Coverage. 89-96
Cyber Resiliency: Technologies, Economics and Strategy
- Michael Atighetchi, Borislava I. Simidchieva, Katarzyna Olejnik:
Security Requirements Analysis - A Vision for an Automated Toolchain. 97-104
Data-Driven System Quality Assurance
- Celia Chen, Michael Shoga, Barry W. Boehm:
Exploring the Dependency Relationships between Software Qualities. 105-108 - Yasir Malik, Carlos Renato Salim Campos, Fehmi Jaafar:
Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis. 109-113 - Zekun Song, Yichen Wang, Pengyang Zong, Zhiwei Ren, Di Qi:
An Empirical Study of Comparison of Code Metric Aggregation Methods-on Embedded Software. 114-119 - María José Salamea, Carles Farré:
Influence of Developer Factors on Code Quality: A Data Study. 120-125 - Iosif Itkin, Andrey Novikov, Rostislav Yavorskiy:
Development of Intelligent Virtual Assistant for Software Testing Team. 126-129 - Martí Manzano, Claudia P. Ayala, Cristina Gómez, Lidia López Cuesta:
A Software Service Supporting Software Quality Forecasting. 130-132
Human and Social Aspects of Software Quality
- Hui Wang, Tieke He, Zhipeng Zou, Siyuan Shen, Yu Li:
Using Case Facts to Predict Accusation Based on Deep Learning. 133-137 - Wu Wen, Jiahui Sun, Ya Li, Peng Gu, Jianfeng Xu:
Design and Implementation of Software Test Laboratory Based on Cloud Platform. 138-144 - Baogui Chen, Yu Li, Shu Zhang, Hao Lian, Tieke He:
A Deep Learning Method for Judicial Decision Support. 145-149 - Linbo Wu, Yunqiang Yan, Feng Gao, Xiaohong Chen, Changhai Nie:
Research on Modeling and Verification Methods for Embedded Software Systems Based on SysML. 150-157 - Amr ElBanna, Nashwa Abdelbaki:
NONYM!ZER: Mitigation Framework for Browser Fingerprinting. 158-163
Model Checking and Software Testing and Verification
- Zhiqin Cao, Jinyu Yin, Yichen Wang, Yu Li, Jintao Zhang:
An Empirical Study of Open Source Flight Control Software Program Model Checking. 164-169 - Onur Kilinççeker, Alper Silistre, Moharram Challenger, Fevzi Belli:
Random Test Generation from Regular Expressions for Graphical User Interface (GUI) Testing. 170-176 - Konrad Fögen, Horst Lichter:
Repairing Over-Constrained Models for Combinatorial Robustness Testing. 177-184 - Caleb King, Joseph Morgan, Ryan Lekivetz:
Design Fractals: A Graphical Method for Evaluating Binary Covering Arrays. 185-190 - Nikolay Brayanov, Arno Eichberger:
Automation in Hardware-in-the-Loop Units Development and Integration. 191-197
Quality Engineering
- Anna Gromova, Iosif Itkin, Sergey Pavlov, Alexander Korovayev:
Raising the Quality of Bug Reports by Predicting Software Defect Indicators. 198-204 - Rong Wang, Shaoying Liu:
Branch Sequence Coverage Criterion for Testing-Based Formal Verification with Symbolic Execution. 205-212 - Yonghui Yang, Fei Deng, Yunqiang Yan, Feng Gao:
A Fault Localization Method Based on Conditional Probability. 213-218 - Yu Gao, Hua Li, Yuanping Li, Bowei Liu, Xianrong Wang, Hongwei Ruan:
Using TLA+ to Specify Leader Election of Raft Algorithm with Consideration of Leadership Transfer in Multiple Controllers. 219-226 - Petar Afric, Lucija Sikic, Adrian Satja Kurdija, Goran Delac, Marin Silic:
REPD: Source Code Defect Prediction As Anomaly Detection. 227-234 - Ying Wang, Jian Dong, Sen Zhang, Decheng Zuo:
B-SEFI: A Binary Level Soft Error Fault Injection Tool. 235-241
Reliability and Resilience of Complex Systems
- Xiaohong Wang, Yuan Zhang, Lizhi Wang, Dawei Lu, Yusheng Sun, Jun Yao, Tielin Ma, Xiaohui Wang:
Task Decision-Making for UAV Swarms Based on Robustness Evaluation. 242-248 - Xiaoyue Wu, Haiyue Yu:
A Petri Net Modeling Approach for Reliability of PMS with Time Redundancy. 249-254 - Heng Zhang, Jing Jiang, Zhenling Mo, Qiang Miao:
A Remaining Useful Life Prediction Framework for Multi-sensor System. 255-259 - Qian Zhao, Xiang Jia, Bo Guo:
Bayesian Estimation of Residual Life for Weibull Distributed Products Based on the Fusion of Different Forms of Expert Information. 260-267
Software Engineering and Big Data
- Pan Liu, Yudong Li, Zhaojun Li:
Some Thoughts on Model-Based Test Optimization. 268-274 - Yi Yang, Jian Wang, Weixing Huang, Guoqing Li, Lan Huang:
Crowd Intelligence-Based Interactive Creation Platform. 275-280 - Ge Yan, Yu Li, Siyuan Shen, Shu Zhang, Jia Liu:
Law Article Prediction Based on Deep Learning. 281-284 - Yihang Bo:
Emotion-Based Interactive Art Design. 285-290 - Meng Li, Jian Wang, Yi Yang, Weixing Huang, Wenjuan Du:
Improving GAN-Based Calligraphy Character Generation using Graph Matching. 291-295 - Jiawei Liu, Zhenzhen Wang, Ge Yan, Hao Lian:
Quality Measurement of Judgment Documents. 296-299
Software Engineering and Knowledge Management
- Thomas Hirsch, Christian Schindler, Matthias Müller, Thomas Schranz, Wolfgang Slany:
An Approach to Test Classification in Big Android Applications. 300-308 - Zhongzhao Zhang, Yanzhong Dang:
Complicated Causality Discovering and Presenting Based on Enterprise Knowledge Management. 309-315 - Yingying Wang, Guoqiang Li:
Detect Triangle Attack on Blockchain by Trace Analysis. 316-321 - Kenji Hisazumi:
Feature Extraction from Japanese Natural Language Requirements Documents for Software Product Line Engineering. 322-329 - Anis Kothia, Bobby Swar, Fehmi Jaafar:
Knowledge Extraction and Integration for Information Gathering in Penetration Testing. 330-335 - Yubin Wang, Yanzhong Dang:
Quick Solutions to Production Problems in Manufacturing Enterprises: A Knowledge Perspective. 336-341 - Dan Luo, Jiangning Wu:
Ranking Online Reviews Based on Consumer Preferences. 342-347 - Tao Li, Lili Rong:
Resilience of air Transport Network with the Complementary Effects of High-Speed Rail Network. 348-353 - Chunyu Xia, Tieke He, Wenlong Li, Zemin Qin, Zhipeng Zou:
Similarity Analysis of Law Documents Based on Word2vec. 354-357 - Bo Sun, Yachao Shao, Chao Chen:
Study on the Automated Unit Testing Solution on the Linux Platform. 358-361
System Reliability in Cloud Computing and Big Data
- Su Wu, Ziheng Wang, Chang Liu, Chenming Zhu, Shaozhi Wu, Kai Xiao:
Automatical Segmentation of Pelvic Organs After Hysterectomy by using Dilated Convolution U-Net++. 362-367 - Chang Liu, Shaozhi Wu, Su Wu, Ziheng Wang, Kai Xiao:
Reliable Automatic Organ Segmentation from CT Images using Deep CNN. 368-374
Security, Reliability, and Resilience in Wireless Sensor Networks and Smart Grid
- Yun Lin, Jie Chang:
Improving Wireless Network Security Based On Radio Fingerprinting. 375-379 - Selasi Kwame Ocansey, Changda Wang:
Search Over Encrypted Cloud Data With Secure Updates. 380-386 - Chaopeng Shen, Xiaotao Yan, Qiaozhen Liu, Jian Kang, Yang Liu, Xiaogang Zheng, Xige Zhang, Yuanyi Liu:
An FPGA Design and Implementation of 4G Network Security Algorithm Based on SNOW3G. 387-392
Safety and Security in Cyber-Physical Systems
- Yang Cao, Yunwei Dong, Xiaomin Wei, Xiao Wu:
AADL Vulnerability Modeling and Security Analysis Method. 399-406 - Yongfeng Yin, Yuyan Shao, Xuefeng Wang, Qingran Su:
A Flexible Cyber Security Experimentation Platform Architecture Based on Docker. 413-420
System Testing and Validation
- Nikolay Tcholtchev, Steven Ulrich, Faruk Catal, Wojciech Konitzer, Ramon Barakat, Andreas Hoffmann, Ina Schieferdecker:
The Need for Unified Testbed Management Across Multiple Teams and Stakeholders in a Large Scale Telecom Integration Context. 427-434 - Alexander Kaiser, Sascha Hackel:
Standards-Based IoT Testing with Open-Source Test Equipment. 435-441
Trustworthy Computing
- Mehmet Demir, Manar H. Alalfi, Ozgur Turetken, Alexander Ferworn:
Security Smells in Smart Contracts. 442-449 - Yu-Lun Huang, Wen-Lin Sun, Ying-Han Tang:
3aRAM: A 3-Layer AHP-Based Risk Assessment Model and its Implementation for an Industrial IoT Cloud. 450-457 - Benjamin Vignau, Raphaël Khoury, Sylvain Hallé:
10 Years of IoT Malware: A Feature-Based Taxonomy. 458-465 - Jun Lin, Lan Liu:
Research on Security Detection and Data Analysis for Industrial Internet. 466-470 - Saikat Das, Ahmed M. Mahfouz, Deepak Venugopal, Sajjan G. Shiva:
DDoS Intrusion Detection Through Machine Learning Ensemble. 471-477
Testing and Verification of Programmable Chips
- Shasha Zhang, Liang Cao:
Security and Fault Diagnosis-Based Assertion-Based Verification for FPGA. 478-481 - Yayun Hu, Dongfang Li:
Formal Verification Technology for Asynchronous Communication Protocol. 482-486 - Dongfang Li, Wei Shen, Zhihao Wang:
A Noval Method of Security Verification for JTAG Protection Function. 487-492 - Shuling Yang, Suzhi Cao, Lei Yan, Siyan Pan, Houpeng Wang, Jian Zhang, Dandan Cui:
Research on Heterogeneous Cloud Test Platform Based on Elastic Scaling Mechanism. 493-498 - Jiajie Dong, Long Xi, Mengxi Yu, Zeming Zhang:
Software Simulation Error Injection in RAM on RISC-V of PolarFire FPGA. 499-502
Industry Track
- Rudolf Ramler, Claus Klammer:
Enhancing Acceptance Test-Driven Development with Model-Based Test Generation. 503-504 - Satya Pradhan, Venky Nanniyur, Paddu Melanahalli, Munir Palla, Sunita Chulani:
Quality Metrics for Hybrid Software Development Organizations - A Case Study. 505-506
Fast Abstract
- Xuejiao Zhao, Lizhi Wang, Xiaohong Wang, Yusheng Sun, Tongmin Jiang, Zhiqiang Li, Yuan Zhang:
Reliable Life Prediction and Evaluation Analysis of Lithium-ion Battery Based on Long-Short Term Memory Model. 507-509 - Song Huang, Lele Chen, Zhanwei Hui, Jialuo Liu, Sen Yang, Qiang Chen:
A Method of Bug Report Quality Detection Based on Vector Space Model. 510-511 - Zhao Li, Yuhang Chen, Guoqiang Gong, Dongcheng Li, Ke Lv, Peng Chen:
A Survey of the Application of Combinatorial Testing. 512-513 - Barry W. Boehm, Doug Rosenberg, Neil G. Siegel:
Critical Quality Factors for Rapid, Scalable, Agile Development. 514-515 - Zhao Li, Yi Song, Guoqiang Gong, Dongcheng Li, Ke Lv, Jingsha He:
Applying Ordered Technique Set for Fault Localization. 516-517 - Jim A. Scheibmeir, Yashwant K. Malaiya:
An API Development Model for Digital Twins. 518-519 - Song Huang, Qiang Chen, Zhanwei Chen, Lele Chen, Jialuo Liu, Sen Yang:
A Test Cases Generation Technique Based on an Adversarial Samples Generation Algorithm for Image Classification Deep Neural Networks. 520-521 - Yunqi Du, Ya Pan, Haiyang Ao, Nimako Ottinah Alexander, Yong Fan:
Automatic Test Case Generation and Optimization Based on Mutation Testing. 522-523 - Junmei Sun, Kai Yan, Xuejiao Liu, Min Zhu, Lei Xiao:
Automatically Capturing and Reproducing Android Application Crashes. 524-525 - Patrick Kwaku Kudjo, Selasie Brown Aformaley, Solomon Mensah, Jinfu Chen:
The Significant Effect of Parameter Tuning on Software Vulnerability Prediction Models. 526-527 - Sa Meng, Yuanshun Dai, Liang Luo, Chang Liu:
Reliability Modeling and Optimization for Large-Scale Network Systems. 528-529 - Wenguang Xie, Yuyang Fan:
A Two-stage Personnel Recommendation Method Directed Towards Mobile Crowdsourcing Testing. 530-531
Posters
- Besma Khaireddine, Aleksandr Zakharchenko, Ali Mili:
Fault Density, Fault Depth and Fault Multiplicity: The Reward of Discernment. 532-533 - Song Huang, Sen Yang, Zhanwei Hui, Yongming Yao, Lele Chen, Jialuo Liu, Qiang Chen:
Runtime-Environment Testing Method for Android Applications. 534-535 - Yi Yao, Jiuluo Liu, Song Huang, Zhanwei Hui, Kaishun Wu, Lele Chen, Sen Yang, Qiang Chen:
Testing Adequacy of Convolutional Neural Network Based on Mutation Testing. 536-537 - Zhao Li, Yi Song, Peng Chen, Dongcheng Li, Guoqiang Gong, Ke Lv:
Progress of Word Embedding in Code Generation. 538-539 - Lisa Jöckel, Michael Kläs, Silverio Martínez-Fernández:
Safe Traffic Sign Recognition through Data Augmentation for Autonomous Vehicles Software. 540-541 - Toshiyuki Fujikura, Ryo Kurachi:
A Test Scenario Generation Method for High Requirement Coverage by using KAOS Method. 542-543 - Xiupei Mei, Imran Ashraf, Bo Jiang, Wing Kwong Chan:
A Fuzz Testing Service for Assuring Smart Contracts. 544-545
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.