


default search action
20th QRS 2020: Macau, SAR, China
- 20th IEEE International Conference on Software Quality, Reliability and Security, QRS 2020, Macau, China, December 11-14, 2020. IEEE 2020, ISBN 978-1-7281-8913-0

- Hong Lu

, Chengyi Wang, Jiacheng Gui, Hao Huang:
PBLInv: Postcondition-based Loop Invariant Learning for C Programs. 1-12 - Haihua Chen, Jiangping Chen, Junhua Ding:

Data Evaluation and Enhancement for Quality Improvement of Machine Learning. 13 - Besma Khaireddine

, Aleksandr Zakharchenko
, Ali Mili:
A Semantic Definition of Faults and Its Implications. 14-21 - Alexander Poth, Burkhard Meyer, Peter Schlicht, Andreas Riel:

Quality Assurance for Machine Learning - an approach to function and system safeguarding. 22-29 - Ai Gong, Yi Zhong, Weiqin Zou, Yangyang Shi, Chunrong Fang

:
Incorporating Android Code Smells into Java Static Code Metrics for Security Risk Prediction of Android Applications. 30-40 - Xiwei Qiu, Yuanshun Dai, Peng Sun, Xin Jin:

PHM Technology for Memory Anomalies in Cloud Computing for IaaS. 41-51 - Max Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, Andreas Rauber:

Have It Your Way: Generating Customized Log Data Sets with a Model-driven Simulation Testbed. 52 - Kwabena Ebo Bennin

, Nauman Bin Ali
, Jürgen Börstler
, Xiao Yu:
Revisiting the Impact of Concept Drift on Just-in-Time Quality Assurance. 53-59 - Fangwei Chen, Li Zhang, Xiaoli Lian:

An improved mapping method for automated consistency check between software architecture and source code. 60-71 - Bingming Wang, Shi Ying, Guoli Cheng, Yiyao Li:

A log-based anomaly detection method with the NW ensemble rules. 72-82 - Sihang Wang, Jing Liu:

HARRD: Real-time Software Rejuvenation Decision Based on Hierarchical Analysis under Weibull Distribution. 83-90 - Steve Counsell, Giuseppe Destefanis, Steve Swift, Mahir Arzoky, Davide Taibi

:
On the Link Between Refactoring Activity and Class Cohesion Through the Prism of Two Cohesion-Based Metrics. 91-98 - Jingcheng Yuan, Toshiaki Aoki

, Xiaoyun Guo
:
Comprehensive Robustness Evaluation of File Systems with Model Checking. 99-110 - Thomas Karanikiotis, Michail D. Papamichail, Kyriakos C. Chatzidimitriou, Napoleon-Christos I. Oikonomou

, Andreas L. Symeonidis, Sashi K. Saripalle:
Continuous Implicit Authentication through Touch Traces Modelling. 111-120 - Jie Zhang, Cong Tian, Zhenhua Duan, Liang Zhao:

RTPDroid: Detecting Implicitly Malicious Behaviors Under Runtime Permission Model. 121 - Jiannan Liu, Kun Xiao, Lei Luo, Yun Li, Lirong Chen:

An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection. 122-129 - Rui Wang

, Cyrille Artho, Lars Michael Kristensen
, Volker Stolz
:
Multi-objective Search for Model-based Testing. 130-141 - Oussama Jebbar, Ferhat Khendek

, Maria Toeroe:
Architecture for the Automation of Live Testing of Cloud Systems. 142-151 - Antonia Bertolino, Antonello Calabrò

, Guglielmo De Angelis, Francisco Gortázar, Francesca Lonetti
, Michel Maes-Bermejo
, Guiomar Tuñón de Hita:
Quality-of-Experience driven configuration of WebRTC services through automated testing. 152-159 - Jinfu Chen, Lingling Zhao, Minmin Zhou, Yisong Liu, Songling Qin:

An Approach to Determine the Optimal k-Value of K-means Clustering in Adaptive Random Testing. 160-167 - Bo Yang, Yuze He, Huai Liu

, Yixin Chen, Zhi Jin:
A Lightweight Fault Localization Approach based on XGBoost. 168-179 - Shasha Cheng, Xuefeng Yan, Arif Ali Khan:

A Similarity Integration Method based Information Retrieval and Word Embedding in Bug Localization. 180-187 - Alex Groce, Josie Holmes:

Practical Automatic Lightweight Nondeterminism and Flaky Test Detection and Debugging for Python. 188-195 - Pavel Dovgalyuk, Ivan Vasiliev, Natalia Fursova, Denis Dmitriev, Mikhail Abakumov, Vladimir Makarov:

Non-intrusive Virtual Machine Analysis and Reverse Debugging with SWAT. 196-203 - Xin Li, Xiaoxing Yang

, Jianmin Su, Wushao Wen:
A Multi-Objective Learning Method for Building Sparse Defect Prediction Models. 204-211 - Yuli Tian, Ning Li, Jeff Tian, Wei Zheng:

How Well Just-In-Time Defect Prediction Techniques Enhance Software Reliability? 212-221 - Kunsong Zhao, Zhou Xu, Tao Zhang

, Yutian Tang
:
Simplified Deep Forest Model based Just-In-Time Defect Prediction for Android Mobile Apps. 222 - Yi Yao, Yuchan Liu, Song Huang, Hao Chen, Jialuo Liu, Fan Yang:

Cross-Project Dynamic Defect Prediction Model for Crowdsourced test. 223-230 - Muhammad Ilyas Azeem, Qiang Peng, Qing Wang:

Pull Request Prioritization Algorithm based on Acceptance and Response Probability. 231-242 - Vasileios Matsoukas

, Themistoklis Diamantopoulos, Michail D. Papamichail, Andreas L. Symeonidis:
Towards Analyzing Contributions from Software Repositories to Optimize Issue Assignment. 243-253 - Changjing Wang, Fan Xu, Haimei Luo, Qing Huang, Zhengkang Zuo:

Development Method of Three Kinds of Typical Tree Structure Algorithms and Isabelle-based Machine Assisted Verification. 254-264 - Lukás Korencik, Petr Rockai, Henrich Lauko, Jiri Barnat:

On Symbolic Execution of Decompiled Programs. 265-272 - Xiaoqi Li

, Ting Chen, Xiapu Luo, Tao Zhang
, Le Yu, Zhou Xu:
STAN: Towards Describing Bytecodes of Smart Contract. 273-284 - Lian Yu, Lijun Liu, Yanbing Jiang, Qi Jing, Bei Zhao, Chen Zhang:

Attack Graph Auto-Generation for Blockchains based on Bigraphical Reaction Systems. 285-296 - Weisong Sun, Guangyao Xu, Zijiang Yang, Zhenyu Chen:

Early Detection of Smart Ponzi Scheme Contracts Based on Behavior Forest Similarity. 297-309 - Tengfei Li

, Jing Liu, Jiexiang Kang, Haiying Sun, Wei Yin, Xiaohong Chen, Hui Wang:
STSL: A Novel Spatio-Temporal Specification Language for Cyber-Physical Systems. 309-319 - Qi Shao, Shunkun Yang, Chong Bian, Xiaodong Gou:

Reliability Evaluation of FPGA with Common Cause Failure in Multi-Phase Mission. 320 - Sina Niedermaier, Stefan Heisse, Stefan Wagner

:
Correct and Control Complex IoT Systems: Evaluation of a Classification for System Anomalies. 321-328 - Yuqian Pan, Haichun Zhang, Mingyang Gong, Zhenglin Liu:

Process-variation Effects on 3D TLC Flash Reliability: Characterization and Mitigation Scheme. 329-334 - Shuaibing Lu, Xiaohui Kuang, Yuanping Nie, Zhechao Lin:

A Hybrid Interface Recovery Method for Android Kernels Fuzzing. 335-346 - Jiang Wu, Jianjun Xu, Xiankai Meng, Zhuo Zhang, Nan Zhang, Haoyu Zhang:

High-Reliability Compilation Optimization Sequence Generation Framework Based ANN. 347-355 - Lorenz Klampfl, Nour Chetouane, Franz Wotawa

:
Mutation Testing for Artificial Neural Networks: An Empirical Evaluation. 356-365 - Xuan Zhou, Lu Lu:

Defect Prediction via LSTM Based on Sequence and Tree Structure. 366-373 - Satya Pradhan, Venky Nanniyur, Pavan K. Vissapragada:

On the Defect Prediction for Large Scale Software Systems - From Defect Density to Machine Learning. 374-381 - Bingzhuo Li, Chunyang Ye, Shouyang Guan, Hui Zhou:

Semantic Code Clone Detection Via Event Embedding Tree and GAT Network. 382-393 - Jinjin Han, Zheng Li, Junxia Guo, Ruilian Zhao:

Convergence based Evaluation Strategies for Learning Agent of Hyper-heuristic Framework for Test Case Prioritization. 394-405 - Zijie Li, Long Zhang

, Jun Yan, Jian Zhang, Zhenyu Zhang, T. H. Tse
:
PEACEPACT: Prioritizing Examples to Accelerate Perturbation-Based Adversary Generation for DNN Classification Testing. 406-413 - Yaning Han, Yunyun Ma, Jinbo Wang, Jianmin Wang:

Research on ensemble model of anomaly detection based on autoencoder. 414-417 - Jincheng He, Sitao Min

, Kelechi Ogudu, Michael Shoga, Alex Polak, Iordanis Fostiropoulos, Barry W. Boehm, Pooyan Behnamghader:
The Characteristics and Impact of Uncompilable Code Changes on Software Quality Evolution. 418-429 - Song Huang, Hao Chen, Zhanwei Hui, Yuchan Liu:

A Survey of the Use of Test Report in Crowdsourced Testing. 430-441 - Shoma Kokuryo, Masanari Kondo, Osamu Mizuno

:
An Empirical Study of Utilization of Imperative Modules in Ansible. 442-449 - Runfeng Mao, He Zhang, Qiming Dai, Huang Huang

, Guoping Rong, Haifeng Shen, Lianping Chen, Kaixiang Lu:
Preliminary Findings about DevSecOps from Grey Literature. 450-457 - Kai Yamamoto, Masanari Kondo, Kinari Nishiura, Osamu Mizuno

:
Which Metrics Should Researchers Use to Collect Repositories: An Empirical Study. 458-466 - Ryujiro Nishinaka, Naoyasu Ubayashi, Yasutaka Kamei, Ryosuke Sato

:
How Fast and Effectively Can Code Change History Enrich Stack Overflow? 467-478 - Huidan Li, Rensong Xie, Xianglong Kong

, Lulu Wang, Bixin Li:
An Analysis of Utility for API Recommendation: Do the Matched Results Have the Same Efforts? 479-488 - Wenjun Ke, Chao Wu, Xiufeng Fu, Chen Gao, Yinyi Song:

Interpretable Test Case Recommendation based on Knowledge Graph. 489-496 - Yuanzhe Hu, Junjie Wang, Jie Hou, Shoubin Li, Qing Wang:

Is There A "Golden" Rule for Code Reviewer Recommendation? : - An Experimental Evaluation. 497-508 - Manel Grichi, Mouna Abidi, Fehmi Jaafar, Ellis E. Eghan, Bram Adams:

On the Impact of Inter-language Dependencies in Multi-language Systems. 509 - Miroslav Gavrilov, Kyle Dewey

, Alex Groce, Davina Zamanzadeh, Ben Hardekopf
:
A Practical, Principled Measure of Fuzzer Appeal: A Preliminary Study. 510-517 - Xu Xu, Yangyu Hu, Qian Guo, Ren He, Li Li

, Guoai Xu, Zhihui Han, Haoyu Wang:
Dissecting Mobile Offerwall Advertisements: An Explorative Study. 518-526

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














