![](https://dblp1.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
47th COMPSAC 2023: Torino, Italy
- Hossain Shahriar, Yuuichi Teranishi, Alfredo Cuzzocrea, Moushumi Sharmin, Dave Towey, A. K. M. Jahangir Alam Majumder, Hiroki Kashiwazaki, Ji-Jiang Yang, Michiharu Takemoto, Nazmus Sakib, Ryohei Banno, Sheikh Iqbal Ahamed:
47th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2023, Torino, Italy, June 26-30, 2023. IEEE 2023, ISBN 979-8-3503-2697-0 - Alfredo Cuzzocrea, Moushumi Sharmin, Yuuichi Teranishi, Dave Towey:
IEEE COMPSAC 2023 - Resilient Computing and Computing for Resilience in a Sustainable Cyber-Physical World: Summary and Future Research Directions. xlix-l - Ahmet Tikna, Marco Roveri
, Daniele Fontanelli
, Luigi Palopoli:
When graphs meet game theory: a scalable approach for robotic car racing. 1-8 - Houari Bettahar
, Vieira Arthur, Quan Zhou:
Robotic Gel Dispensing based on Visual Servoing for Fiber Threading. 9-17 - Martí Caro
, Jordi Fornt, Jaume Abella:
Efficient Diverse Redundant DNNs for Autonomous Driving. 18-27 - Katerina Goseva-Popstojanova
, Denny Hood, Johann Schumann, Noble Nkwocha:
The Anatomy of Software Changes and Bugs in Autonomous Operating System. 28-38 - Masaya Fujiwaka, Kousuke Nogami:
Robust 6D Pose Estimation for Texture-varying Objects in Autonomous System. 39-44 - Kevin Schmidt, Sabolc Jut:
Towards Environment-Dependent Model Switching for Performance and Accuracy Conscious Object Detection in Day- and Nighttime Urban Traffic Environments. 45-50 - Niccolò De Bona, Luca Santoro
, Davide Brunelli, Daniele Fontanelli
:
Adaptive Expected Reactive algorithm for Heterogeneous Patrolling Systems based on Target Uncertainty. 51-56 - Anoop Bhagyanath, Klaus Schneider
:
Program Balancing in Compilation for Buffered Hybrid Dataflow Processors. 57-66 - Ahmad Rezaei
, Johannes Nau, Johannes Richter, Detlef Streitferdt, Jörg Schambach:
FACEE: Framework for Automating CNN Explainability Evaluation. 67-78 - Jonas Peeck, Robin Hapka, Rolf Ernst:
Efficient hard real-time implementation of CNNs on multi-core architectures. 79-90 - Yuji Muraoka, Kenichi Kourai:
Memory-virtualizing and -devirtualizing VM Migration with Private Virtual Memory. 91-96 - Theodora Adufu, Yoonhee Kim:
L2 Cache Access Pattern Analysis using Static Profiling of an Application. 97-102 - Myke Morais de Oliveira
, Ellen Francine Barbosa:
Multilevel modeling for the analysis and prediction of school dropout: a systematic review. 103-112 - Alice Barana, Marina Marchisio, Matteo Sacchet:
Orientative teaching with Open Educational Resources: the role of teachers in students' transition from high school to university. 113-121 - Yuqian Zhuang, Liang Wang, Mingya Zhang, Shan Lin, Hao Hu, Xianping Tao:
OPTES: A Tool for Behavior-based Student Programming Progress Estimation. 122-131 - Han Wan, Mengying Li, Zihao Zhong, Xiaoyan Luo:
Early Prediction of Student Performance with LSTM-Based Deep Neural Network. 132-141 - Nicolas Dobbins, Ali R. Hurson
, Sahra Sedigh Sarvestani:
Personalizing Student Graduation Paths Using Expressed Student Interests. 142-143 - Yue Jiang, Hoi Yan Lin, Long Fai Cheung, Henry C. B. Chan, Ping Li:
Hybrid/Online Teaching: A Survey and Key Issues. 152-157 - Salim Saay
, Alex Norta:
Requirements for an international educational collaboration system architecture, a case study: Coláiste Nano Nagle School in Limerick, Ireland, and Irshad High School in Kabul, Afghanistan. 158-163 - Xuedong Ou, Jing Liu:
LogKT: Hybrid Log Anomaly Detection Method for Cloud Data Center. 164-173 - Bin Liu, Xiaoyu Bai, Xinyue Su, Chenxi Song, Zhuohan Yao, Xing Wei, Haixi Zhang:
DAC-PPYOLOE+: A Lightweight Real-time Detection Model for Early Apple Leaf Pests and Diseases under Complex Background. 174-182 - Ngoc Nhu Trang Nguyen
, Hong Linh Truong
:
Context-aware, Composable Anomaly Detection in Large-scale Mobile Networks. 183-192 - Juhani Kivimäki
, Aleksey Lebedev, Jukka K. Nurminen
:
Failure Prediction in 2D Document Information Extraction with Calibrated Confidence Scores. 193-202 - Rong Liu, Zemao Chen, Jiayi Liu:
A Hybrid Intrusion Detection System Based on Feature Selection and Voting Classifier. 203-212 - Yu-Heng Wu, Torbjörn E. M. Nordling:
Towards course of disease based epidemiological modelling: motivation and computational optimization. 213-222 - Abdulaziz Alajaji, Walter Gerych, Kavin Chandrasekaran, Luke Buquicchio, Emmanuel Agu, Elke A. Rundensteiner:
Adversarial Human Context Recognition: Evasion Attacks and Defenses. 223-232 - Arunavo Dey, Tanzima Z. Islam, Chase Phelps
, Christopher Kelly:
Signal Processing Based Method for Real-Time Anomaly Detection in High-Performance Computing. 233-240 - Amirhossein Layegh, Amir Hossein Payberah, Ahmet Soylu, Dumitru Roman, Mihhail Matskin:
ContrastNER: Contrastive-based Prompt Tuning for Few-shot NER. 241-249 - Jinyi Wang
, Tong Li, Hongyu Gao:
Application Recommendation based on Metagraphs: Combining Behavioral and Published Information. 250-259 - Raoudha Nouisser, Salma Kammoun Jarraya, Mohamed Hammami:
Human Activity Dataset of Top Frequent Elderly Emergencies for Monitoring Applications using Kinect. 260-267 - Patrick Day, Stefano Iannucci, Ioana Banicescu:
Generating Host-Based Data from Network Traces for Intrusion Detection. 268-273 - Juha Mylläri
, Jukka K. Nurminen
:
Discrepancy Scaling for Fast Unsupervised Anomaly Localization. 274-279 - Ying-Feng Hsu:
Historical Redundant Process Data Recovery based on Genetic Algorithm. 280-285 - Jorma Valjakka, Juha Mylläri
, Lalli Myllyaho
, Juhani Kivimäki
, Jukka K. Nurminen
:
Anomaly Localization in Audio via Feature Pyramid Matching. 286-291 - Davide Napolitano, Luca Cagliero
:
GX-HUI: Global Explanations of AI Models based on High-Utility Itemsets. 292-297 - Martin Woo, Farhana H. Zulkernine, Hanady M. Abdulsalam
:
Examining Feasibility and Efficacy of Traditional Stream Clustering Algorithms on Complex Human Activity Recognition Data. 298-303 - Xinrui Liu, Wenzheng Liu, Yuxiang Li, Xiaoyong Tang, Tan Deng, Ronghui Cao:
Improved Deep Embedded K-Means Clustering with Implicit Orthogonal Space Transformation. 304-309 - Gary M. Weiss, Luisa A. L. Rosa, Hyun Jeong, Daniel D. Leeds:
An Analysis of Grading Patterns in Undergraduate University Courses. 310-315 - Raveen Narendra Babu, Chung-Horng Lung, Marzia Zaman:
Performance Evaluation of Transformer-based NLP Models on Fake News Detection Datasets. 316-321 - Shimin Tao, Yilun Liu, Weibin Meng, Jingyu Wang, Yanqing Zhao, Chang Su, Weinan Tian, Min Zhang, Hao Yang, Xun Chen:
DA-Parser: A Pre-trained Domain-aware Parsing Framework for Heterogeneous Log Analysis. 322-327 - Jesús Huete, Abdulhakim Ali Qahtan, Marwan Hassani:
PrefixCDD: Effective Online Concept Drift Detection over Event Streams using Prefix Trees. 328-333 - Ming-Chang Lee, Jia-Chun Lin, Volker Stolz:
NP-Free: A Real-Time Normalization-free and Parameter-tuning-free Representation Approach for Open-ended Time Series. 334-339 - Chi Mai Nguyen, Phat Trien Thai, Duy Khang Lam, Van Tuan Nguyen:
A Real-Time Text Analysis System. 340-345 - Abdul Mutakabbir, Chung-Horng Lung, Samuel A. Ajila
, Marzia Zaman, Kshirasagar Naik, Richard Purcell, Srinivas Sampalli:
Spatio-Temporal Agnostic Deep Learning Modeling of Forest Fire Prediction Using Weather Data. 346-351 - Chase Phelps
, Tanzima Z. Islam:
Automatic Parallelization of Cellular Automata for Heterogeneous Platforms. 352-361 - Cui Zhang, Hui Yang, Jun Li, Yunhua He, Jie Zhang, Qiuyan Yao, Chao Li:
An Efficient and Verifiable Polynomial Cross-chain Outsourcing Calculation Scheme for IoT. 362-369 - Wanpeng Shao, Ken'ichi Kakizaki, Shunsuke Araki, Tomohisa Mukai:
Reflections Removal Produced by Multiple Transparent and Reflective Glass Objects in TLS Measurements. 370-379 - Chiara Vercellino
, Giacomo Vitali
, Paolo Viviani
, Alberto Scionti, Andrea Scarabosio, Olivier Terzo, Edoardo Giusto
, Bartolomeo Montrucchio:
Neural optimization for quantum architectures: graph embedding problems with Distance Encoder Networks. 380-389 - Xiali Li, Yandong Chen, Yanyin Zhang, Bo Liu, Licheng Wu:
A phased game algorithm combining deep reinforcement learning and UCT for Tibetan Jiu chess. 390-395 - Chenghan Wang, Shanshan Wang, Chuan Zhao, Wenyue Wang, Bin Hu, Youmian Wang, Lin Wang, Zhenxiang Chen:
Decentralized Reinforced Anonymous FLchain: a Secure Federated Learning Architecture for the Medical Industry. 396-405 - Yumi Fujita, Sho Tsugawa:
Limiting the Spread of Misinformation on Multiplex Social Networks. 406-411 - Yifang Xu, Zhuopeng Li, Huaxiao Liu, Yuzhou Liu:
AGAA: An Android GUI Accessibility Adapter for Low Vision Users. 412-421 - Aditi Dubey, Likhitadevi Athina, Swapna S. Gokhale:
Is Twitter a News Source or a Social Platform: A Case Study of Covid-19 Vaccine Conversations. 422-427 - Pedro Henrique Teixeira, Nádia Félix F. da Silva, Rogerio Salvini:
Machine Learning Based Method for Auditing Personnel Expenses in Public Expenditure. 428-437 - Jiuqi Wei, Ying Li, Yufan Fu
, Youyi Zhang, Xiaodong Li:
Data Interoperating Architecture (DIA): Decoupling Data and Applications to Give Back Your Data Ownership. 438-447 - Hongyi Zhang, Jingya Li, Zhiqiang Tyler Qi, Anders Aronsson, Jan Bosch, Helena Holmström Olsson:
Multi-Agent Reinforcement Learning in Dynamic Industrial Context. 448-457 - Yuxin Zhang, Gaode Chen
, Lei Wang, Xiaobo Guo, Liyue Ren:
MIRec: Neural News Recommendation with Multi-Interest and Popularity-Aware Modeling. 458-465 - Sushmi Thushara Sukumar, Chung-Horng Lung, Marzia Zaman:
Knowledge Graph Generation for Unstructured Data Using Data Processing Pipeline. 466-471 - Samantha Dobesh, Jamey Albert, Shameem Ahmed, Moushumi Sharmin:
Moving Towards an Accessible Approach to Music Therapy for Autistic People: A Systematic Review. 472-480 - Cecilia Fissore, Francesco Floris, Marina Marchisio, Sergio Rabellino:
Learning analytics to monitor and predict student learning processes in problem solving activities during an online training. 481-489 - Xiang-Li Lu, Hwai-Jung Hsu, William Cheng-Chung Chu:
Public Bicycle Flow Forecasting using Spatial and Temporal Graph Neural Network. 490-499 - Wesley B. R. Herculano, Everton L. G. Alves, Melina Mongiovi:
Assessing and Improving the Quality of Generated Tests in the Context of Maintenance Tasks. 500-501 - Yongqiang Gao, Zhihan Li:
Deep Reinforcement Learning Based Rendering Service Placement for Cloud Gaming in Mobile Edge Computing Systems. 502-511 - Yerkezhan Sartayeva, Yunfei Liu
, Yik Him Ho, Henry C. B. Chan:
Positioning Vectors for Mobile Ad-Hoc Positioning. 512-517 - Shuichiro Shimatani, Hiroki Kashiwazaki, Nobukazu Iguchi:
SRv6 Network Debugging Support System Assigning Identifiers to SRH. 518-525 - Kazunori Fujiwara, Shuji Sannomiya, Akira Sato, Kenichi Yoshida:
Latency analysis of JP and Root DNS servers from packet capture data. 526-531 - Ionut Manea
, Dragos-Daniel Taralunga
:
Fetal ECG Signal Processing for Fetal Monitoring Based on BSS and EMD. 532-538 - Md Abdullah Al Hafiz Khan, Manohar Murikipudi, Abm. Adnan Azmee:
Post-stroke Exercise Assessment using Hybrid Quantum Neural Network. 539-548 - Allison Hsu, Ying-Feng Hsu:
Comprehensive Analysis of Dieting Apps: Effectiveness, Design, and Frequency Usage. 549-557 - Jay Ganesh, Ajay Bansal:
Transformer-based Automatic Mapping of Clinical Notes to Specific Clinical Concepts. 558-563 - Mohammad Yousef Alkhawaldeh
, Muhammad Arsyad Subu
, Nabeel Al-Yateem, Syed Azizur Rahman, Fatma Refaat Ahmed, Jacqueline Maria Dias, Mohannad Eid AbuRuz, Ahmad Rajeh Saifan, Amina Al-Marzouqi, Heba Hesham Hijazi, Mohamad Qasim Alshabi, Ahmed Hossain
:
OB-GYN Telehealth Access and Utilization During COVID-19: Racial and Sociodemographic Disparities. 564-568 - Fatma Refaat Ahmed, Ragad Ghassan Zabin, Rawan Saad Abukoush, Abdullah Ahmad Alnahoum, Mohammad Yousef Alkhawaldeh
, Nabeel Al-Yateem, Muhammad Arsyad Subu
, Amina Alboloshi, Amina Al-Marzouqi, Alkhansa Ahmad Alawad, Syed Azizur Rahman, Ahmed Hossain
:
Usability differences of telehealth technologies by Multi-linguistic and Multi-cultural users in UAE. 569-573 - Honghe Zhou, Phuong Dinh Nguyen, Lin Deng
, Weifeng Xu, Josh Dehlinger, Suranjan Chakraborty:
Reconstructing Android User Behavior through Timestamped State Models. 574-585 - Leo Song, Steven H. H. Ding:
Milo: Attacking Deep Pre-trained Model for Programming Languages Tasks with Anti-analysis Code Obfuscation. 586-594 - Jianyi Zhang
, Leixin Yang, Yuyang Han
, Zixiao Xiang, Xiali Hei:
A Small Leak Will Sink Many Ships: Vulnerabilities Related to mini-programs Permissions. 595-606 - Junhao Li, Yujian Zhang:
SILK: Constraint-guided Hybrid Fuzzing. 607-616 - Samer Y. Khamaiseh
, Derek Bagagem, Abdullah S. Al-Alaj
, Mathew Mancino, Hakem Alomari, Ahmed Aleroud:
Target-X: An Efficient Algorithm for Generating Targeted Adversarial Images to Fool Neural Networks. 617-626 - Shuxin Zhang, Jinghua Zhu:
Privacy Protection Federated Learning Framework Based on Blockchain and Committee Consensus in IoT Devices. 627-636 - Mordechai Guri:
AirKeyLogger: Hardwareless Air-Gap Keylogging Attack. 637-647 - Jie Yin, Yutaka Ishikawa, Atsuko Takefusa:
A Linux Audit and MQTT-based Security Monitoring Framework. 648-657 - Weihan Ou, Steven H. H. Ding:
MaGnn: Binary-Source Code Matching by Modality-Sharing Graph Convolution for Binary Provenance Analysis. 658-666 - Gebrehiwet B. Welearegai, Chenpo Hu, Christian Hammer:
Detecting and Preventing ROP Attacks using Machine Learning on ARM. 667-677 - Adebayo Omotosho
, Yaman Qendah, Christian Hammer:
IDS-MA: Intrusion Detection System for IoT MQTT Attacks Using Centralized and Federated Learning. 678-688 - Anup Das:
Preserving Privacy of Neuromorphic Hardware From PCIe Congestion Side-Channel Attack. 689-698 - Xiangfei Xu, Tianyuan Hu, Bixin Li, Li Liao:
CCDetector: Detect Chaincode Vulnerabilities Based on Knowledge Graph. 699-704 - Min Li, Bo Cui, Wenhan Hou, Ru Li:
Research on Malicious Account Detection Mechanism of Ethereum Based on Community Discovery. 705-710 - Konstantinos Tsiounis, Kostas Kontogiannis:
Reputation-Based Trust Assessment of Transacting Service Components. 711-716 - Keisuke Hamajima, Daisuke Kotani, Yasuo Okabe:
Partial Outsourcing of Malware Dynamic Analysis Without Disclosing File Contents. 717-722 - Mahdi Ghafourian, Julian Fiérrez, Luis F. Gomez, Rubén Vera-Rodríguez, Aythami Morales, Zohra Rezgui
, Raymond N. J. Veldhuis:
Toward Face Biometric De-identification using Adversarial Examples. 723-728 - Xuebin Ma, Nan Xiang, Yulan Gao:
RL-KDA: A K-degree Anonymity Algorithm Based on Reinforcement Learning. 729-734 - Geming Xia, Jian Chen, Xinyi Huang, Chaodong Yu, Zhong Zhang:
FL-PTD: A Privacy Preserving Defense Strategy Against Poisoning Attacks in Federated Learning. 735-740 - Richard Cardone, Smruti Padhy, Steve Black, Joe Stubbs
, Sean B. Cleveland
:
A Decentralized Authorization and Security Framework for Distributed Research Workflows. 741-746 - Ning Qin, Hongyan Mao, Yiwen Liu, Kai Chen:
Modeling and Verifying Privacy-Preserving Authentication Scheme for VANET Using CSP. 747-752 - Long Chen, Qiaojuan Wang, Yanqing Song, Jianguo Chen:
Security is Readily to Interpret: Quantitative Feature Analysis for Botnet Encrypted Malicious Traffic. 753-758 - Xuebin Ma, Xuejian Qi, Yulei Meng, Tao Yang:
Improved Bayesian network differential privacy data-releasing method based on junction tree. 759-764 - Mst. Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea:
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks. 765-776 - Yixuan Wang
, Bo Zhao, Weidong Li, Lingzi Zhu:
An Ontology-Centric Approach for Network Security Situation Awareness. 777-787 - David Faragó, Michael Färber, Christian Petrov:
A Full-fledged Commit Message Quality Checker Based on Machine Learning. 788-799 - Yonghao Wu, Shuaihua Tian, Zezhong Yang, Zheng Li, Yong Liu, Xiang Chen:
Identifying Coincidental Correct Test Cases with Multiple Features Extraction for Fault Localization. 800-809 - Yuqi Guo, Zheheng Liang, Shihao Zhu, Jinqiu Wang, Zijiang Yang, Wuqiang Shen, Jinbo Zhang, Yan Cai:
Sound Predictive Fuzzing for Multi-threaded Programs. 810-819 - Keyuan Zong, Baojian Hua, Yang Wang, Shuang Hu, Zhizhong Pan:
MePof: A Modular and End-to-End Profile-Guided Optimization Framework for Android Kernels. 820-829 - Parul Parul, Kostas Kontogiannis, Chris Brealey:
Prediction of Bug Inducing Commits Using Metrics Trend Analysis. 830-839 - Wenhua Hu, Lei Liu
, Peixin Yang, Kuan Zou, Jiajun Li, Guancheng Lin, Jianwen Xiang:
Revisiting "code smell severity classification using machine learning techniques". 840-849 - Hao Shen, Xiaolin Ju, Xiang Chen, Guang Yang:
EDP-BGCNN: Effective Defect Prediction via BERT-based Graph Convolutional Neural Network. 850-859 - Vladislav Dubrovenski, Erzhuo Chen, Dianxiang Xu:
SMT-Based Verification of NGAC Policies. 860-869 - Luxi Fan, Zheng Li, Hengyuan Liu
, Doyle Paul, Haifeng Wang, Xiang Chen, Yong Liu:
SGS: Mutant Reduction for Higher-order Mutation-based Fault Localization. 870-875 - Yunhe Feng, Sreecharan Vanam, Manasa Cherukupally, Weijian Zheng, Meikang Qiu, Haihua Chen
:
Investigating Code Generation Performance of ChatGPT with Crowdsourcing Social Data. 876-885 - Bangfu Liu, Zheng Li, Ruilian Zhao, Ying Shang:
A Self-attention Agent of Reinforcement Learning in Continuous Integration Testing. 886-891 - Shifan Liu, Zhanqi Cui, Xiang Chen, Jun Yang, Li Li, Liwei Zheng:
TBCUP: A Transformer-based Code Comments Updating Approach. 892-897 - Tanjila Kanij, Xiaojiao Du, John C. Grundy, Anuradha Madugalla, Devi Karolita
:
An Approach to Generating Diverse Personas for Children and the Elderly for Software Development. 898-903 - Yuandou Wang, Nikita Janse, Riccardo Bianchi, Spiros Koulouzis
, Zhiming Zhao:
Towards a Service-based Adaptable Data Layer for Cloud Workflows. 904-911 - Lin Miao, Dave Towey
, Yingrui Ma, Tsong Yueh Chen, Zhi Quan Zhou:
Exploring Metamorphic Testing for Fake-News Detection Software: A Case Study. 912-923