


default search action
22nd QRS 2022: Guangzhou, China - Companion
- 22nd IEEE International Conference on Software Quality, Reliability, and Security, QRS 2022 - Companion, Guangzhou, China, December 5-9, 2022. IEEE 2022, ISBN 979-8-3503-1991-0

- Qiliang Yang, Lizhi Cai, Jiayu Gong, Minlu Tang, Yi Lin:

Attribute-Based Non-Interactive Privacy-Protected Crowd-Sourcing Software Testing Engineer Selection Mechanism. 1-7 - Changming Xu, Hengfeng Ding, Xuejian Zhang, Cong Wang, Hongji Yang:

A Data-Efficient Method of Deep Reinforcement Learning for Chinese Chess. 1-8 - Arash Golibagh Mahyari:

A Hierarchical Deep Neural Network for Detecting Lines of Codes with Vulnerabilities. 1-7 - Maxime Méré, Frédéric Jouault, Loïc Pallardy, Richard Perdriau:

Modeling Trust Relationships in Blockchain Applications: The Case of Reconfigurable Systems-on-Chip. 1-8 - Wei Guo, Leyang Zhou, Jia Liu, Miaomiao Liu:

Internet Governance: Social Mentality and Public Emotion Analysis on Online Media during the COVID-19 Epidemic in Mainland China. 1-8 - Zhongge Zhao, Jiang Shao, Ming Zhang:

Multiphysics Simulation Methods for Microsystem Interconnections. 1-7 - Lisa M. DiSalvo, Gabriela Viviana Saenz, W. Eric Wong, Dongcheng Li:

Social Media Safety Practices and Flagging Sensitive Posts. 8-15 - Tomoko Kaneko:

Security Resilience - Considerations from the Application of the Functional Resonance Method (FRAM) to Information Security Incidents. 16-23 - Xiang Wang, Xing Zhang, Changda Wang:

Generalized Network Temperature for DDoS Detection through Rényi Entropy. 24-33 - Ryohei Sato

, Hidetoshi Kawaguchi, Yuichi Nakatani:
A Stochastic Model for Calculating Well-Founded Probabilities of Vulnerability Exploitation. 34-43 - Irdin Pekaric, David Arnold, Michael Felderer

:
Simulation of Sensor Spoofing Attacks on Unmanned Aerial Vehicles using the Gazebo Simulator. 44-53 - Marcos Felipe, Haiping Xu

:
A Scalable Storage Scheme for On-Chain Big Data using Historical Blockchains. 54-61 - Shinya Haga, Taisei Takahashi

, Kazumasa Omote:
Multi Pair Swap-Based Weather Derivative DeFi. 62-69 - Jingyuan Cai, Ying Zhou, Tianyuan Hu, Bixin Li:

PTLC: Protect the Identity Privacy during Cross-Chain Asset Transaction More Effectively. 70-78 - Rana Zeeshan

, Irina Tal:
Technical Usability Assessment of Security Analysis Tools for Ethereum Based Smart Contracts. 87-95 - Wenxuan Wang, Yongqiang Chen, Jiangchen Zhou, Huan Jin:

Hyperledger Fabric-Based Copyright Management System for Clothing design drawings. 96-101 - Yixin Fan

, Guozhi Hao
, Jun Wu:
Transferable Unique Copyright Across AI Model Trading: A Blockchain-Driven Non-Fungible Token Approach. 102-105 - Xiangke Mao, Chao Li, Guigang Zhang, Xin Wei, Chunxiao Xing:

Application of Blockchain in Trusted Data Provenance. 106-112 - Bo Su, Zeyuan Zhang, Yuansheng Zhang, Qingyue Yang

, Jiong Jiang:
Real-Time Control Algorithm of Intelligent Energy-Saving Lights based on IoT. 113-119 - Ryôichi Sasaki:

Trial Application of Risk Assessment Method for Metaverse. 120-128 - Takeya Horiuchi, Hiroshi Yoshiura, Yoichi Midorikawa, Hideki Yoshii, Masatsugu Ichino:

Machine Learning based Re-identification of Location Histories using Contact Information Collected from Social Networking Services. 129-136 - Eina Hashimoto, Masatsugu Ichino, Hiroshi Yoshiura:

Breaking Anonymity of Social Media by Profiling from Multimodal Information. 137-144 - Taichi Hasegawa, Taiichi Saito, Ryôichi Sasaki:

Analyzing Metadata in PDF Files Published by Police Agencies in Japan. 145-151 - Hoang Viet Nguyen, Tetsutaro Uehara:

Hierarchical Action Embedding for Effective Autonomous Penetration Testing. 152-157 - Wenhong Liu, Jinliang Gao, Qiong Xue, Dong Guo, Wei Zhang:

Evaluation of Software Testing Adequacy based on AHP and BPNN. 158-165 - Yue Liu, Lichao Feng, Xingya Wang

, Shiyu Zhang:
DeepBoundary: A Coverage Testing Method of Deep Learning Software based on Decision Boundary Representation. 166-172 - Haoran Li

, Shihai Wang, Tengfei Shi, Xinyue Fang, Jian Chen:
TSDTest: A Efficient Coverage Guided Two-Stage Testing for Deep Learning Systems. 173-178 - Chenxi He, Wenhong Liu, Shuang Zhao, Jiawei Liu, Yang Yang:

An Empirical Study towards Characterizing Neural Machine Translation Testing Methods. 179-182 - Wenhong Liu, Yong Li, Bo Huang:

Evaluation of Intelligent Information System. 183-188 - Yifei Liu, Yankun Gao, Yang Liu:

IMGA: Improved Microbial Genetic Algorithm. 189-192 - Yao Huang, Bingqing Zhang, Yichen Wang:

Automated Modeling of Web Service Composition and Testing: A UML Sequence Diagram-Based Approach. 193-200 - Alexander Poth, Olsi Rrjolli, Andreas Riel:

Integration- and System-Testing Aligned with Cloud-Native Approaches for DevOps. 201-208 - Jinfu Chen, Yemin Yin, Saihua Cai, Ye Geng, Longxia Huang:

An Improved Test Case Generation Method based on Test Requirements for Testing Software Component. 209-218 - Yaming Zhang, Lijin Wu, Xiaomei Shen, Zehua Shen, Tongli Tang:

Dependability Analysis and Verification Technology of Artificial Intelligence Software. 226-232 - Yunyun Pang, Qiang Ye, Yang Lu:

Analysis of Velocity Deviation of Satellite-Rocket Separation and Orbit Accuracy of Satellite Caused by Multiple Factors. 240-245 - Zhanyi Hou, Ling-lin Gong, Minghao Yang, Yizhuo Zhang, Shunkun Yang:

Software Bug Prediction based on Complex Network Considering Control Flow. 246-254 - Zhiyu Duan, Yujia Li, Pubo Ma, Xiaodong Gou, Shunkun Yang:

A Multi-Layer Fault Triggering Framework based on Evolutionary Strategy Guided Symbolic Execution for Automated Test Case Generation. 255-262 - Dong An, Shihai Wang, Liandie Zhu, Xunli Yang, Xiaobo Yan:

Prefilter: A Fault Localization Method using Unlabelled Test Cases based on K-Means Clustering and Similarity. 263-269 - Canwei Shi, Ling-lin Gong, Qi Shao, Qi Yao, Zhiyu Duan:

Visual-ISAM: A Visualization Method for Software Failure Analysis and Evaluation based on Knowledge Graph Utilizing Improved SALKU Model. 270-277 - Wentao Wu, Shihai Wang, Yuanxun Shao, Mingxing Zhang, Wandong Xie:

A Software Defect Prediction Classifier based on Three Minimum Support Threshold Association Rule Mining. 278-282 - Chao Xiong, Zhiyi Zhang, Yuqian Zhou, Chen Liu, Zhiqiu Huang:

IEMT: Inequality-Based Metamorphic Testing for Autonomous Driving Models. 283-287 - Samia Al Blwi, Amani Ayad, Besma Khaireddine, Imen Marsit, Ali Mili:

Quantifying the Effectiveness of Mutant Sets. 288-297 - Yu Su, Xinping Hu, Xiang Chen, Yubin Qu, Qianshuang Meng:

CIL-BSP: Bug Report Severity Prediction based on Class Imbalanced Learning. 298-306 - Fangyuan Tian, Wenhong Liu, Shuang Zhao, Jiawei Liu:

Face Recognition Fairness Assessment based on Data Augmentation: An Empirical Study. 315-318 - Wenhong Liu, Zhiyuan Peng, Shuang Zhao, Jiawei Liu:

Similarity Analysis in Data Element Matching based on Word2vec. 319-323 - Xiangyu Shi, Xiaolin Ju, Xiang Chen, Guilong Lu

, Mengqi Xu:
SemirFL: Boosting Fault Localization via Combining Semantic Information and Information Retrieval. 324-332 - Xiaowei Guo, Ning Cao, Xibing Yang:

The Real-Time General Display and Control Platform Designing Method based on Software Product Line. 333-339 - Yue Ma, Ya Pan, Yong Fan:

Metamorphic Testing for the Medical Image Classification Model. 340-346 - Boying Wu, Sigong Zhang, Weirong Tian, Hang Wang:

Application and Development Prospect of Monitoring Screen based on Three.js Unit Equipment Control System. 347-351 - Mingxing Zhang, Shihai Wang, Wentao Wu, Weiguo Qiu, Wandong Xie:

A Software Multi-Fault Clustering Ensemble Technology. 352-358 - Jiandong Li, Shaoying Liu:

Requirements-Related Fault Prevention Mechanism for SOFL Formal Specification-Based Programming. 359-367 - Xunli Yang, Bin Liu, Dong An, Wandong Xie, Wei Wu:

A Fault Localization Method Based on Similarity Weighting with Unlabeled Test Cases. 368-374 - Pingyan Wang, Shaoying Liu, Ai Liu

, Wen Jiang:
Detecting Security Vulnerabilities with Vulnerability Nets. 375-383 - Shoma Hamada, Haibo Yu, Vo Dai Trinh, Yuri Nishimura, Jianjun Zhao:

Bug Patterns in Probabilistic Programming Systems. 384-391 - Jiaxi Xu

, Jingwei Shang, Zhichang Huang:
CFIWSE: A Hybrid Preprocessing Approach for Defect Prediction on Imbalance Real-World Datasets. 392-401 - Bing Zheng, Hua Li:

Automatic Labeling of SDN Controller Defect Text based on Neural Topic Model. 402-410 - Xuanye Wang, Lu Lu, Boye Wang, Yudong Shang, Hao Yang:

Software Defect Prediction via GIN with Hybrid Graphical Features. 411-416 - Ziyang Weng, Ziyu Zhang, Yinger Liang, Biyi Dai:

Generalized Perceptual Modeling: Virtual Human Face Modeling and Expression Recognition Considering Emotion Understanding. 417-424 - Yunhao Li, Shijie Chen, Jiancheng Zhao:

Recommendation Algorithm for Graph Convolutional Networks based on Multi-Ralational Knowledge Graph. 425-430 - Xinwei Liu, Chuanqi Tao:

A Dead Code Evaluation Method based on Complex Network. 431-436 - Wenjin Zhu, Zhifeng Zheng:

A Selective Maintenance Strategy on Network-Based System with Constrained Flow. 437-438 - An Wu, Chen Zheng, Zao Hou, Feng Duan, Zhiqiang Cai:

An Excellence Level Evaluation Model of Intelligent Manufacturing Unit. 439-443 - Ning Wang:

Resilience Analysis of Urban Rail Transit Network Under Large Passenger Flow. 444-446 - Wenjia Long, Kaizhi Wang, Xuan Wang:

Reliability Analysis of a Computer-Based Interlocking System with a Double 2-out-of-2 Redundancy Structure using Algebraic Binary Decision Diagrams. 447-453 - Yuegui Feng, Guangwei Qing, Qianfei Zhou:

Elevator Maintenance Site Selection Optimization via Fine-Tuned K-Means. 454-461 - Guangwei Qing, Qianfei Zhou, Huifang Wang:

Intelligent Guidance Method for Elevator Emergency Treatment based on Automatic Recommendation and Fault Prediction. 462-468 - Yujuan Cheng:

A Learning Path Recommendation Method for Knowledge Graph of Professional Courses. 469-476 - Wenjun Wei, Junhua Wu:

Code Generation Method based on Structured Tree Input and AST Decoder Attention Augmentation. 477-484 - Xiao Chen, Junhua Wu:

Code Search Method Based on Multimodal Representation. 485-491 - Ziyang Weng, Shuhao Wang, Weixin Yan, Anna Li:

Chinese Character Creation Algorithm: Evaluation of the Effectiveness of Topological Similarity of Remote Sensing Images Considering the Description of Sparse Geographic Structure. 492-498 - Jiahao Li, Xinhao Cui

, Yichen Wang, Feng Xie:
An Empirical Study of Software Testing Quality based on Natural Experiments. 499-508 - Qian-Kun Yao, Yuqian Zhou, Ya-Qi Dong:

Quantum Random Access Codes with Mutually Unbiased Bases in Three-Dimensional Hilbert Space. 509-514 - Ya-Qi Dong, Yuqian Zhou, Qian-Kun Yao:

Characterization of Nonlocality in Chained Quantum Networks. 515-520 - Tianyu Xu, Guanglin Li, Jun Lu, Ziyuan Wang:

An Approach of Locating Minimal Failure-Causing Schema for Boolean-Specifications. 521-524 - Sen Zhang, Hongyan Wan, Yong Xiao, Ziruo Li:

IRRT: An Automated Software Requirements Traceability Tool based on Information Retrieval Model. 525-532 - Huan Jin, Hongyan Wan, Ziruo Li, Wenxuan Wang:

An Empirical Study on Software Requirements Classification Method based on Mobile App User Comments. 533-541 - Yahan Yu, Yixuan Xu, Jian Wang, Zhenxing Li, Bin Cao:

Anti-Money Laundering Risk Identification of Financial Institutions based on Aspect-Level Graph Neural Networks. 542-546 - Chao Li, Guigang Zhang, Xiangke Mao, Jian Zhang, Chunxiao Xing:

Multi-Chain Model and Cross-Chain Communication Protocol for Financial Transactions. 547-551 - Yahan Yu, Yun Wang, Guigang Zhang, Yi Yang, Jian Wang:

Question Answering Algorithm for Grid Fault Diagnosis based on Graph Neural Network. 552-557 - Wanqing Cheng, Xiujie Zhao:

Maintenance Optimization for Dependent Two-Unit Systems Considering Stochastic Degradation and Imperfect Maintenance. 558-561 - Bin Han

, Mu-Xia Sun, Lai-Kan Muk, Yanfu Li, Hans D. Schotten:
Flexible and dependable manufacturing beyond xURLLC: A novel framework for communication-control co-design. 562-568 - Hengfei Yang, Bo Shen, Gaoyang Xu, Yonghua Chen:

Modeling Method and Correctness Verification of Power Grid Safety and Stability Control Strategy System. 569-575 - Mingfu Tuo, Xiaoqiang Zhao, Bo Shen, Wenliang Wu:

Modeling and Real-Time Verification for CPS based on Time Automata. 576-579 - Raheela Chand, Saif Ur Rehman Khan

, Shahid Hussain, Wen-Li Wang:
TTAG+R: A Dataset of Google Play Store's Top Trending Android Games and User Reviews. 580-586 - Muhammad Azeem Akbar

, Arif Ali Khan, Sajjad Mahmood, Saima Rafi:
A Vision of DevOps Requirements Change Management Standardization. 587-592 - Syed Haider Ali, Anish Goel, Aditya Singirikonda, Ali Y. Khan, Ting Xiao

:
Towards a Comprehensive Dataset for Next-Day Wildfire Prediction. 593-598 - Yuanbang Li, Kai Wang, Xiaoyu Guo, Zhongyuan Hua, Yong Xiao:

Data Driven User Feature Construction and Requirement Generation in Mobile Applications. 599-607 - Xinrong Hu, Jingjing Huang, Junping Liu, Qiang Zhu, Jie Yang

:
Knowledge Graph Question Answering based on Contrastive Learning and Feature Transformation. 608-615 - Yongfeng Gu, Yuxuan Zhou, Hao Ding, Fan Jia, Shiping Wang:

Exploring the Impact of Grouping Strategies on Cooperative Co-evolutionary Algorithms for Solving the Advertising Budget Allocation Problem. 616-620 - Yongfeng Gu, Hao Ding, Kecai Gu, Xiaoguang Huang, Hua Wu:

A Comparison Analysis of Constraint-Handling Techniques on Rule Selection Problem in Credit Risk Assessment: An Industrial View. 621-625 - Zhongyuan Hua, Ke Ye:

Colonization Strategy Algorithm: A Deviation Algorithm Optimization based on Spatial Autocorrelation Theory. 626-633 - Shuhao Wang, Zhijun Lin, Zhimo Weng, Anna Li:

Mapping Method between 2D Landscape Image and 3D Spatial Data based on Adversarial Relative Depth Constraint Network. 634-642 - Ziyang Weng, Shuhao Wang, Weixin Yan, Yinger Liang:

Prototype Algorithm: Number Chain Features in Spatial Similarity Calculation of Time-Series Graph Sources. 643-650 - Haocheng Guan, Dongcheng Li, Hui Li, Man Zhao:

A Crawler-Based Vulnerability Detection Method for Cross-Site Scripting Attacks. 651-655 - Changjian Li, Dongcheng Li, Man Zhao, Hui Li:

A Light-Weight Convolutional Neural Network for Facial Expression Recognition using Mini-Xception Neural Networks. 656-661 - Jinyong Lin, Wenlong Cai, Xiangrui Fan, Wenjie Dong, Shuo Zhang:

A FANETs System for Autonomous Aerocraft Flying Formation. 662-666 - Mengao Li, Hanting Zhao, Wenxiu Zhang, Xiqiao Pang, Tao Feng:

Software Technology Status Management under the Trend of Ship Informatization. 667-672 - Chen Li

, Dimitrios Chrysostomou
, Hongji Yang:
A Natural Language-enabled Virtual Assistant for Human-Robot Interaction in Industrial Environments. 673-678 - Lin Zhu, Luyi Bai, Xuesong Hao, Hongji Yang:

A General Characterization of Representing Spatiotemporal Knowledge Graph based on OWL. 679-686 - Qinyun Liu, Xiaopeng Xu:

Script Based Pattern Recognition for a Portrait Tracking System on Broadcast Online Scenes. 694-699 - Chen Li

, Xiaochun Zhang, Chengyuan Yu, Xin Shu, Xiaopeng Xu:
LLCF: A Load- and Location-Aware Collaborative Filtering Algorithm to Predict QoS of Web Service. 700-707 - Lingfei Ma, Liming Nie, Chenxi Mao, Yaowen Zheng, Yang Liu:

An Empirical Study of the Impact of COVID-19 on OSS Development. 708-717 - Tse-Chuan Hsu, William Cheng-Chung Chu, Shyh-Wei Chen:

The IoT Service Agent Model based on Federated Learning to Improve Service Quality. 718-722 - Yue Wu, Xiang Li, Jiafeng Zhou:

A Creative Computing Approach to Optimising Citizens' Fashion Education based on Design Thinking for Responding to Micro-Level Needs of Smart City Development. 723-731 - Yinwei Liu

:
Visual Sensitivity Controlling Colour Model in Creative Computing. 732-739 - Qinyun Liu, William Cheng-Chung Chu, Xiaochun Zhang, Shou-Yu Lee, Wei Mo:

A Quantum Information and Cybernetics Based Algorithm for Creativity Applying in Cultural Heritage Products Design. 740-745 - Chuan Zhao, Huilei Cao:

Risk Evaluation of the Destination Port Logistics based on Self-Organizing Map Computing. 746-751 - Kai-Yuan Cai:

Towards Research on Information Gravitation. 752-753 - Haoran Sun, Xiaolong Zhu, Conghua Zhou:

Deep Reinforcement Learning for Video Summarization with Semantic Reward. 754-755 - Rubia Fatima, Affan Yasin, Lin Liu, Jianmin Wang:

What Should Abeeha do? an Activity for Phishing Awareness. 756-757 - Hugo Bourreau

, Emeric Guichet, Amine Barrak
, Benoît Simon, Fehmi Jaafar:
On Securing the Communication in IoT Infrastructure using Elliptic Curve Cryptography. 758-759 - Xiangjun Han, Baojian Hua, Yang Wang, Ziyao Zhang:

RUSTY: Effective C to Rust Conversion via Unstructured Control Specialization. 760-761 - Xuedong Ou, Jing Liu:

Log Anomaly Detection Method based on Hybrid Transformer-BiLSTM Models. 762-763 - Hao Yin, Dongyu Cao, Ying Zhou:

RandomMix: An Effective Framework to Protect User Privacy Information on Ethereum. 764-765 - Jiahao He, Dongyu Cao, Ying Zhou:

TrustAuction: A TEE based Privacy Protection Framework for Auction Contracts. 766-767 - Changtian He, Qing Sun, Ji Wu, Haiyan Yang, Tao Yue:

Feature Difference based Misclassified Sample Detection for CNN Models Deployed in Online Environment. 768-769 - Xue Geng, Sheng-rong Zou, Ju-yi Yao:

Systematic Transformation Method from UML to Event-B. 770-771 - Haotian Yu, Xiaoguang Li, Yuefeng Du:

Deep Learning Fuzz Testing Methods for Unstructured Case. 772-773 - Linhan Li, Qianying Zhang, Shijun Zhao, Zhi-Ping Shi, Yong Guan:

Design and Implementation of OOM Module based on Rust. 774-775 - Quanzhou Li, Zhenguo Liu, Ning Hu, Shuqi Zhong, Keqiang Cheng:

A New Method for Quality Analysis of Multi-Process Manufacture. 776-777 - Zongqi Xue, Zhenglin Liang:

Resilience Analysis under the Impact of Cell Failures in the Practical Telecommunication base Station Networks. 778-779 - Shengran Wang, Jinfu Chen, Saihua Cai, Chi Zhang, Haibo Chen:

A Novel Coverage-Guided Greybox Fuzzing Method based on Grammar-Aware with Particle Swarm Optimization. 780-781 - Renjie Huang, Banghu Yin, Liqian Chen:

Using Fuzzing to Help Abstract Interpretation Based Program Verification. 782-783

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














