default search action
23rd QRS 2023: Chiang Mai, Thailand - Companion
- 23rd IEEE International Conference on Software Quality, Reliability, and Security, QRS 2023 Companion, Chiang Mai, Thailand, October 22-26, 2023. IEEE 2023, ISBN 979-8-3503-5939-8
- W. Eric Wong, T. H. Tse, Suphamit Chittayasothorn, He Jiang:
Message from the Chairs QRS 2023. xx-xxi - Peishan Huang, Weijiang Hong, Zhenbang Chen, Ji Wang:
CSP based Formal Modeling and Verification of Behavior Trees. 1-2 - ChenXin Pang, Ya Pan, Hanli Bai:
Metamorphic Testing for the Deepfake Detection Model. 1-8 - Jianhong Wang, Yuta Ishimoto, Masanari Kondo, Yasutaka Kamei, Naoyasu Ubayashi:
Uncertainty-aware Metamorphic Testing for Robust Object Detection Models. 9-17 - Yuqi Hang, Chen Liu, Lifa Hu, Xinyi Gao:
Requirements-Driven Logic Testing for Deep Neural Networks. 18-24 - Yuanyuan Long, Yong Fan, Ya Pan:
Metamorphic Testing for Traffic Sign Detection and Recognition. 25-34 - Azeem Ahmad, Francisco Gomes de Oliveira Neto, Eduard Paul Enoiu, Kristian Sandahl, Ola Leifler:
The Comparative Evaluation of Test Prioritization Approaches in an Industrial Study. 35-44 - Jing Liu, Zijian Wang:
Optimal Second-Order Mutants Reduction Based on MOEA/D. 45-54 - Rui Su, Zhiyi Zhang, Yuqian Zhou, Yongming Yao:
Test Generation for Mutation Testing by Symbolic Execution. 55-61 - Sangharatna Godboley, Monika Rani Golla, P. Radha Krishna:
SC-MCC: A Stronger Code Coverage Criterion. 62-71 - Gaolei Yi, Zizhao Chen, Zhenyu Chen, W. Eric Wong, Nicholas Chau:
Exploring the Capability of ChatGPT in Test Generation. 72-80 - Junyuan Teng, Tingting Yu, Rui Chen, Dongdong Gao, Chunpeng Jia:
DeepHC: Efficient Generating Tests with High Coverage for Deep Neural Networks. 81-82 - Wenjing Zhang, Yong Li, Ming Wen, Ruiqi He:
Comparative Study of Ensemble Learning Methods in Just-in-time Software Defect Prediction. 83-92 - Yue Wang, Yong Li, Yuanyuan Ren, Junjie Yu:
Enhancing Cross-Project Just-In-Time Defect Prediction with Active Deep Learning. 93-102 - Feng Qiu, Pu Ji, Baojian Hua, Yang Wang:
CHEMFUZZ: Large Language Models-Assisted Fuzzing for Quantum Chemistry Software Bug Detection. 103-112 - Qiuying Li, Yulin Wen, Zitong Yan, Fuping Zeng:
METCN: A Multi-Task Enhanced TCN Model for Software Fault Detection and Correction Prediction. 113-121 - Vo Dai Trinh, Yuri Nishimura, Haibo Yu:
Development of a Web System for Detecting Bugs in Probabilistic Programs. 122-130 - Tong Wan, Lu Lu, Hao Xu, Quanyi Zou:
Software Vulnerability Detection via Doc2vec with path representations. 131-139 - Qi Yang, Hui Zhang, Xuanzheng Wang:
Software Vulnerability Detection Based on Binary Intermediate Slicing. 140-147 - Sangharatna Godboley, Shubhank Kulshreshtha, Prayanshu Agarwal, B. Ranilbala:
PRCMHFL: A Fault Localization Technique Based on Predicate Ranking and CMH Method. 148-156 - Vladislav Dubrovenski, Md Nazmul Karim, Erzhuo Chen, Dianxiang Xu:
Dynamic Access Control with Administrative Obligations: A Case Study. 157-166 - Yang Xu, Zhuotai Chen:
Familial Graph Classification of Malware based on Structured API Call Sequences. 167-175 - Pavel Dovgalyuk, Maria Klimushenkova, Natalia Fursova, Ivan Vasiliev, Vladislav Stepanov:
Natch: Detecting Attack Surface for Multi-Service Systems with Hybrid Introspection. 176-185 - Quentin Rouland, Stojanche Gjorcheski, Jason Jaskolka:
A Security Compliance-by-Design Framework Utilizing Reusable Formal Models. 186-195 - Arthur Grisel-Davy, Sebastian Fischmeister:
Independent Boot Process Verification using Side-Channel Power Analysis. 196-207 - Ryôichi Sasaki:
AI and Security - What Changes with Generative AI. 208-215 - Jiyun Shen, Yue Wang, Qingheng Wu, Yuan Zhao:
Privacy Policy Compliance Inspection of Financial Apps. 216-219 - Tianci Wang, Chunwang Li, Chunhui Wang, Tong Li, Ye Zhai:
A Deep Learning-Based Method for Identifying User Story Semantic Conflicts. 220-229 - Po-Chuan Ke, Yuan-Hsun Liao, Shou-Yu Lee, Shih-Yun Huang, William Cheng-Chung Chu:
A Service-Oriented Framework for An Integrated Study of Intelligent Data Collection and Application. 230-236 - Jiangchao Liu, Liqian Chen, Antoine Miné, Hengbiao Yu, Ji Wang:
Input Validation for Neural Networks via Local Robustness Verification. 237-246 - Yuanxin Liu, Rui Li, Yuxi Ma, Yunzhi Xue, Lingzhong Meng:
FCA: A Causal Inference Based Method for Analyzing the Failure Causes of Object Detection Algorithms. 247-256 - Bingchen Dong, Zhenglin Liang:
Modeling Stochastic Deterioration by Chloride Ion Erosion Through Sparse Identification of Nonlinear Dynamics. 257-262 - Xuan Wang, Li Liao, Dongyu Cao:
mpXim: A Decentralized Mixing Scheme based on a Multi-Party Discovering Protocol. 263-272 - Han-Sheng Lu, Tse-Chuan Hsu:
An Enhanced Software Architecture to Improve the MQTT Communications Encrypted Model. 273-279 - Miaomiao Feng, Wei Mi, Xiaodan Zhang, Baojian Chen, Mingming Huang:
A Smart Contract Vulnerability Detection Model Based on Multi-Type Features and Pre-Training Techniques. 280-289 - Sangharatna Godboley, P. Radha Krishna, Aditya Joshi, Ishita Gupta, Rahul Khatav:
Smart Contract Test Case Prioritization based on Frequency and Gas Consumption. 290-299 - Sourena Khanzadeh, Noama Fatima Samreen, Manar H. Alalfi:
Optimizing Gas Consumption in Ethereum Smart Contracts: Best Practices and Techniques. 300-309 - Xufeng Zhao, Qiuyang Wei, Xue-Yang Zhu, Wenhui Zhang:
A Smart Contract Development Framework for Maritime Transportation Systems. 310-319 - Wenqian Zhao, Meghana Patibandla, Junhua Ding:
An Approach for Ensuring the Privacy in Smart Contracts. 320-329 - Shangzhi Tang, Xuan Chen, Hongbin Xiao, Jiahao Wei, Zhi Li:
Using Problem Frames Approach for Key Information Extraction from Natural Language Requirements. 330-339 - Fehmi Jaafar, Darine Ameyed, Lavin Titare, Md Nematullah:
IoT Phishing Detection Using Hybrid NLP and Machine Learning Models Enhanced with Contextual Embedding. 340-349 - Yi-Hung Liu, Yin-Neng Feng, Sheng-Fong Chen:
Legal Events Classification in Online Social Community Posts. 350-355 - Ravi Varma Kumar Bevara, Ting Xiao, Farahnaz Hosseini, Junhua Ding:
Bias Analysis in Language Models using An Association Test and Prompt Engineering. 356-363 - Jinrun Liu, Xinyu Tang, Linlin Li, Panpan Chen, Yepang Liu:
ChatGPT vs. Stack Overflow: An Exploratory Comparison of Programming Assistance Tools. 364-373 - Rui Hu, Junhao Zhong, Minjie Ding, Zeyu Ma, Mingang Chen:
Evaluation of Hallucination and Robustness for Large Language Models. 374-382 - Zeming Dong, Qiang Hu, Yuejun Guo, Zhenya Zhang, Jianjun Zhao:
Boosting Source Code Learning with Text-Oriented Data Augmentation: An Empirical Study. 383-392 - Mingyang Geng, Dezun Dong, Pingjing Lu:
Hierarchical Semantic Graph Construction and Pooling Approach for Cross-language Code Retrieval. 393-402 - Mingyang Geng, Dezun Dong, Pingjing Lu:
Input Transformation for Pre-Trained-Model-Based Cross-Language Code Search. 403-412 - Meng Wu, Weixin Dong, Qiang Zhao, Zhizhong Pan, Baojian Hua:
An Empirical Study of Lightweight JavaScript Engines. 413-422 - Hongwu Qin, Peiming Xue, Xiuqin Ma, Bin Gao:
Code Quality Evaluation in IT Communities Based on Sentiment Analysis of User Comments. 423-429 - Letao Li, Likai Qiu, Shuang Li, Jiaqi Wang, Hualiang Zhu:
SmartPerf: Automated Speed Performance Test from Visual Perspective. 430-436 - Dongwen Zhang, Tongtong Wang, Yang Zhang:
Performance Prediction for Lock-based Programs. 437-446 - Bin Zhang, Chihiro Suzuki, Zhan Chen, Hun-ok Lim:
Improved Mechanism and Emotional Expression System of A Panda-type Emotional Robot. 447-450 - Xiangyu Li, Yihao Zhang, Xiaokun Luan, Xiaoyong Xue, Meng Sun:
MedTiny: Enhanced Mediator Modeling Language for Scalable Parallel Algorithms. 451-460 - Mahmoud M. Abouzeid, Pei-Shu Huang, Feng-Jian Wang:
Improving the Detection of Concurrent Artifact Anomalies in a Structured Workflow. 461-470 - Zheheng Liang, Jianming Chang, Wuqiang Shen, Chaosheng Yao, Lulu Wang:
ECIA: Elaborate Change Impact Analysis Based on Sub-Statement Level Dependency Graph. 471-480 - Sanjaya Kumar Panda, Sahil Chopra, Slokashree Padhi:
Solar Energy-Based Virtual Machine Placement Algorithm for Geo-Distributed Datacenters. 481-490 - Yanming Liu, Chuangchuang Zhang, Yihao Li, Shuning Zhang, Hongyong Yang:
Dependency Aware and Delay Guaranteed SFC Placement in Multi-domain Networks. 491-498 - Ilmaan Zia, Muhammad Abdul Basit Ur Rahim, Tairan Liu, Zhangying He:
Formal Modeling and Verification of Industrial Robotic Arm - A Case Study. 499-508 - Chunyan Xia, Song Huang, Yongming Yao, Changyou Zheng, Yutong Wang:
Generating Autonomous Driving Safety Violation Scenarios Based on Multi-Objective Optimization. 509-515 - Ryôichi Sasaki:
Reconsideration of Risk Communication and Risk Assessment Support Methods for Security. 516-523 - Waris Damkham, Shingo Kunihiro, Songpon Teerakanok, Tetsutaro Uehara:
Detecting Vulnerable OAuth 2.0 Implementations in Android Applications. 524-531 - Shuji Yamaguchi, Hidehito Gomi, Tetsutaro Uehara:
Enhancing Account Recovery with Location-based Dynamic Questions. 532-539 - Yuuki Kimura, Soramichi Akiyama, Atsuo Inomata, Tetsutaro Uehara:
On Collecting Onion Server Fingerprints and Identification of Their Operators. 540-548 - Perakorn Nimitkul, Akihiro Takai, Nariyoshi Yamai, Rei Nakagawa, Songpon Teerakanok:
The Study on the Blocking Time Reduction of the IDS/SON Cooperative Firewall System. 549-554 - Tomoaki Ohkawa, Hiroshi Yoshiura, Takayasu Yamaguchi:
Explainable Multimodal Fake Posts Detection Using Feature Extraction with Attention Mechanisms. 555-563 - Ryuga Kaneko, Taiichi Saito:
DNS Rebinding Attacks Against Browsers on Azure Virtual Machines. 564-571 - Andrew Bukangwa, Tetsutaro Uehara:
An Agent-Based Modeling Approach to Designing and Optimizing Bug Bounty Programs for Cybersecurity in Developing Countries. 572-581 - José Donato, Naghmeh Ivaki, Nuno Antunes:
Savery: A Framework for the Assessment and Comparison of Mobile Development Tools. 582-592 - Siqi Gu, Zhibiao Liu, Qiaoqing Liang, Zhimin Deng, Xiangyu Xiao:
Test Case Reuse Method Based on Deep Semantic Matching. 593-599 - Haoli Chen, Xiaocheng Chen, Xiaolei Sun, Qirui Zheng, Xiuting Ge:
Reducing Label Errors for Actionable Warning Identification. 600-604 - Bo Zhang, Yu Li, Yichen Wang:
Test Case Priority Ranking Method Based on Greedy Algorithm. 605-613 - Bo Zhang, Jiahao Li, Zeyu Fan, Yichen Wang:
An Input Space Modeling Method for Software Testing Considering Timing. 614-621 - Dongyuan Zhang, Chuanjiang Yu, ShiJun Xu, Xinyi Gao:
Enhancement of Robustness for Graph Neural Networks in AI Systems. 622-625 - Yumin Wang, Jinhao Xie, Wenqi Zhang, Yuan Yao, Gang Yang:
Research on Improved Algorithm of UAV Swarm Target Search Strategy Based on Freshness and Target Density. 626-632 - Xinhai Chen, Wei Liu, Chang Rao, Yu Zhang, Wanling Du:
Modelling and Verification of Cooperative Vehicle Infrastructure System at Intersections Based on Timed Automata. 633-642 - Mingfu Tuo, Xiaoqiang Zhao, Wenliang Wu, Bo Shen:
Safety Verification Technology of CPS Based on Theorem Proving. 643-645 - Yang Cao, Yunwei Dong:
Modeling and Discovering Data Race with Concurrent Code Property Graphs. 646-653 - Xiaoming Xie, Jinfa Xu, Suiyuan Shen, Wei Cao, Guigang Zhang:
Research on FCS Design Technology of Electric Tilting Quadrotor UAV. 654-661 - Wanjie Ren, Guojun Wang, Qi Liu, Xia Li, Rui Tuo:
Fitting and Peak Searching of Spectrum for Fourier Transform Infrared Spectrometer. 662-667 - Oscar Famous Darteh, Guojun Wang, Qi Liu, Xiaodong Liu, Amevi Acakpovi:
Enhancing Grid-Connected PV System Performance: Loss Analysis and Efficiency Improvement Strategies. 668-674 - Yinwei Liu:
A Computational Brain Colour Response Model for Achromatopsia. 675-681 - Lin Zou, Hongji Yang, Jintao Lin:
A Creative Computing Approach to Analysis of Speaker Intention Using the DIKCW Model. 682-692 - Xinyu He, Mengyao Cui, Yufan Chen, Longfei Liu, Bangchao Wang:
Intelligent Question Answering System Based on Cognitive Graph: A Case Study of Textile Fabrics. 693-702 - Peng Ye, Xinyi Lan, Yufan Chen, Zhipeng Wang, Wei Ye:
Research on the Construction of a Multimodal Cognitive Graph of Textile and Clothing. 703-712 - Ziyang Weng, Shuhao Wang, Jingwei Zhang:
The Hidden Order Framework: From Evidence-Based Prediction in Scenario Spaces to Prompt Learning in Image Production Processes. 713-723 - Ziyang Weng, Shuhao Wang, Jingwei Zhang:
The Man-Land Coupling Algorithm: A Priori Experiment with Remote Sensing Data to Facilitate the Revitalization of Great Sites Based on Complex Cognition. 724-732 - Ruiqi Luo, Zhenglong Li, Yinhua Xiang, Zhaojing Wang, Luyao Ye:
Outfit Compatibility Model with Multi-Modal Semantic Interaction Learning. 733-741 - Ruiqi Luo, Wenjie Zhang, Xiaoxiao Li, Zhaojing Wang, Luyao Ye:
Research on Active Detection Methods for Video Anomaly Events Based on Concept Semantics. 742-751 - Hongyan Wan, Zan Wang, Zhiquan An, Guotao Jiao, Xinnan Zhang:
A Novel Framework for High-category Coverage Clothing Recommendation System Based on Sentiment Analysis. 752-758 - Zhiyuan Zou, Zhipeng Wang, Longfei Liu, Changxi Feng, Bangchao Wang:
Cognitive Graph Empowered Textile and Clothing Intelligent Service Platform. 759-768 - Xiaodong Gou, Peng Zhou, Haitao Yang, Zhaomingyue Zheng, Ao Zhang:
Identifying Influential Nodes in Complex System from Multiscale Complex Network Perspective. 769-774 - Zhaomingyue Zheng, Wei Cheng, Xiaodong Gou, Guangyuan Wang:
Research on Micro Vibration Control of Satellite Flexible Structure Using Piezoelectric Variable Stiffness Actuator. 775-781 - Xiang Zhu, Wencai Wang, Zhizhi Cang, Yaguang Dang, Donghui Zhao:
Dynamic Comprehensive Risk Assessment of Coal Mill Based on CNN-LSTM and Analytic Hierarchy Process. 782-788 - Yijing Zhou, Mengdan Wu, Qi Yao, Zhiyu Duan, Shunkun Yang:
Voltage Prediction and Fault Detection by using Model Fusion Strategy for Lithium-ion Batteries. 789-796 - Zeyu Wang, Fuping Zeng:
Fault Localization of Software: A Literature Review. 797-806 - Jiahao Li, Bo Zhang, Zeyu Fan, Yichen Wang:
Multi-Population Genetic Algorithm Based EFSM Regression Test Data Generation. 807-815 - Muhammad Azeem, Saif Ur Rehman Khan, Naseem Ibrahim, Abdullah Yousafzai, Wen-Li Wang, Asif Kareem:
A Blockchain-Based Requirement Management Framework for Distributed Software Development Environment. 816-825 - Bhavraaj Singh, Muhammad Abdul Basit Ur Rahim, Shahid Hussain, Muhammad Rizwan Abid, Jie Zhao:
AI Ethics in Healthcare - A Survey. 826-833 - Satyam Sharma, Muhammad Abdul Basit Ur Rahim, Shahid Hussain, Muhammad Rizwan Abid, Tairan Liu:
Using Deep Reinforcement Learning And Formal Verification in Safety Critical Systems: Strategies and Challenges. 834-842 - Man Zhang, Shaukat Ali, Tao Yue:
Uncertainty-Wise Model Evolution with Genetic Programming. 843-844 - Hessamaldin Mohammadi, Wided Ghardallou, Elijah Brick, Ali Mili:
Assume(), Capture(), Verify(), Establish(): A Vocabulary for Static Program Analysis. 845-846 - Jiahao Li, Chengru Yang, Yichen Wang:
Genetic Algorithm Based EFSM Regression Test Sequence Generation. 847-848 - Liang Sun, Bailin Lu, Liangze Yin, Zhe Bu, Wenjing Jin:
OpenMP Program Verification Based on Bounded Model Checking. 849-850 - Nishan Xie, Rui Li, Yuxi Ma, Qian Dong, Lingzhong Meng:
VPIA-FMEA: A Method for Visual Perception Intelligent Algorithm FMEA. 851-852 - Yue Zhao, Wenliang Wu, Xingshe Zhou:
Effectiveness Evaluation of UAVs Search in Urban Environments. 853-858 - Bin Zhang, Ayumu Mori, Hun-Ok Lim:
Research on Object Categorization and Grabbing for a Cleaning Robot. 859-860 - Peng Lin, Ping Chen, Jingwei Shang, Qiaochun Qiu, Zhichang Huang:
Mining Potential Defect Patterns in Unmanned Systems from A Large Amount of Open Source Code. 861-862 - Jigang Liu, Ryôichi Sasaki, Tetsutaro Uehara:
An Ontology-Based Framework for Medical IoT Forensic Evidence. 863-864 - Yi Ji, Ryan Lekivetz, Simon Mak, Joseph Morgan:
BayesFLo: Bayesian Fault Localization for Software Testing. 865-866 - Wenlong Zheng, Baojian Hua, Zhuochen Jiang:
WASMDYPA: Effectively Detecting WebAssembly Bugs via Dynamic Program Analysis. 867-868 - Lei Xia, Yufei Wu, Baojian Hua:
Rustcheck: Safety Enhancement of Unsafe Rust via Dynamic Program Analysis. 871-872 - Yulia Kumar, Wenxiao Li, Kuan Huang, Michael Thompson, Brendan Hannon:
Natural Language Coding (NLC) for Autonomous Stock Trading: A New Dimension in No-Code/Low-Code (NCLC) AI. 873-874 - Yulia Kumar, Zachary Gordon, Patricia Morreale, J. Jenny Li, Brendan Hannon:
Love the Way You Lie: Unmasking the Deceptions of LLMs. 875-876 - Quankun Luo, Jiawen Deng, Liang Luo:
Optimizing Media Streaming in Edge-Cloud Systems: Leveraging Geography and User Behavior. 877-878
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.