default search action
23rd QRS 2023: Chiang Mai, Thailand
- 23rd IEEE International Conference on Software Quality, Reliability, and Security, QRS 2023, Chiang Mai, Thailand, October 22-26, 2023. IEEE 2023, ISBN 979-8-3503-1958-3
- Gou Tan, Pengfei Chen, Min Li:
Online Data Drift Detection for Anomaly Detection Services based on Deep Learning towards Multivariate Time Series. 1-11 - Nadun Wijesinghe, Hadi Hemmati:
Log-based Anomaly Detection of Enterprise Software: An Empirical Study. 12-23 - Tommaso Zoppi, Giovanni Merlino, Andrea Ceccarelli, Antonio Puliafito, Andrea Bondavalli:
Anomaly Detectors for Self-Aware Edge and IoT Devices. 24-35 - Jialong Liu, Yanni Tang, Jiamou Liu, Kaiqi Zhao, Wu Chen:
LGLog: Semi-supervised Graph Representation Learning for Anomaly Detection based on System Logs. 36-47 - Ting Zhang, Xin Huang, Wen Zhao, Guozhao Mo, Shaohuang Bian:
LogContrast: A Weakly Supervised Anomaly Detection Method Leveraging Contrastive Learning. 48-59 - Jiapeng Dai, Xiaoxing Yang, Bingding Huang, Xiaofen Lu:
A Framework based on Deep Neural Network for Ranking-oriented Software Defect Prediction. 60-71 - Jiaxi Xu, Ping Chen, Banghu Yin, Zhichang Huang, Qiaochun Qiu:
FINDGATE: Fine-grained Defect Prediction Based on a Heterogeneous Discrete Code Graph-guided Attention Transformer. 72-82 - Jianzhong Zhu, Yuan Huang, Xiangping Chen, Ruomei Wang, Zibin Zheng:
SyntaxLineDP: a Line-level Software Defect Prediction Model based on Extended Syntax Information. 83-94 - Mohammed A. Shehab, Abdelwahab Hamou-Lhadj, Venkata Sai Gunda:
JITBoost: Boosting Just-In-Time Defect Prediction using Boolean Combination of Classifiers. 95-104 - Yuxiang Guo, Xiaopeng Gao, Zhenyu Zhang, Wing Kwong Chan, Bo Jiang:
A study on the impact of pre-trained model on Just-In-Time defect prediction. 105-116 - Qianyue Wu, Sijie Yu, Ziyuan Wang, Nannan Wang, Yaping Feng:
Toward Understanding Bugs in Swift Programming Language. 117-127 - Arpita Dutta:
Enhancing Fault Localization by incorporating Statement Frequency and Test Case Contribution. 128-137 - Xinmeng Xia, Yang Feng, Qingkai Shi:
Understanding Bugs in Rust Compilers. 138-149 - Meng Wang, Ziheng Wang, Bin Yu, Kai Zhang:
WASAIUP: A Demand-driven Concolic Fuzzer for EOSIO Smart Contracts. 150-161 - Chung Yup Kim, Bryan C. K. Ng, Jyoti Sahni, Normalia Samian, Winston K. G. Seah:
Blockchain Network Platform for IoT Data Integrity and Scalability. 162-171 - Xin Gu, Xingya Wang, Yu Ma, Zhenyu Chen, Song Huang:
Performance Optimization for Information Sharing Process of BlockIoV Based on Multi-Objective Particle Swarm. 172-183 - Weisong Sun, Yuling Hu, Yingfei Xu, Yuchen Chen, Chunrong Fang:
Integrating Extractive and Abstractive Models for Code Comment Generation. 184-195 - Khadija Hanifi, Orçun Çetin, Cemal Yilmaz:
On ChatGPT: Perspectives from Software Engineering Students. 196-205 - Shengcheng Yu, Chunrong Fang, Yuchen Ling, Chentian Wu, Zhenyu Chen:
LLM for Test Script Generation and Migration: Challenges, Capabilities, and Opportunities. 206-217 - Haonan Jin, Yu Zhou, Yasir Hussain:
Enhancing Code Completion with Implicit Feedback. 218-227 - Chaochao Shen, Wenhua Yang, Minxue Pan, Yu Zhou:
Git Merge Conflict Resolution Leveraging Strategy Classification and LLM. 228-239 - Shunhang Li, Gang Zhou, Zhibo Li, Ji-Cang Lu, Ningbo Huang:
The Causal Reasoning Ability of Open Large Language Model: A Comprehensive and Exemplary Functional Testing. 240-249 - Junhua Ding, Haihua Chen, Sai Kolapudi, Lavanya Pobbathi, Huyen Nguyen:
Quality Evaluation of Summarization Models for Patent Documents. 250-259 - Nour Chetouane, Franz Wotawa:
Using Data Abstraction for Clustering in the Context of Test Case Generation. 260-271 - Lele Sun, Song Huang, Changyou Zheng, Tongtong Bai, Zhe Hu:
Test Case Generation for Autonomous Driving Based on Improved Genetic Algorithm. 272-278 - Emad Jabbar, Hadi Hemmati, Robert Feldt:
Investigating Execution Trace Embedding for Test Case Prioritization. 279-290 - Matús Ferech, Pavel Tvrdík:
Efficient fuzz testing of web services. 291-300 - Wei Luo, Yemao Luo, Yao Li, Tao Zhang:
StructureTester: Automatic Machine Translation Testing Based on Variation Feature Vector. 301-312 - Huangli Cai, Zhiyi Zhang, Yifan Jian, Dan Li, Zhiqiu Huang:
BDGSE: A Symbolic Execution Technique for High MC/DC. 313-324 - Xinmeng Xia, Yang Feng:
DyFuzz: Skeleton-based Fuzzing for Python Libraries. 325-336 - Azeem Ahmad, Francisco Gomes de Oliveira Neto, Eduard Paul Enoiu, Kristian Sandahl, Ola Leifler:
An Industrial Study on the Challenges and Effects of Diversity-Based Testing in Continuous Integration. 337-347 - Chun Li, Yifan Xiong, Zhong Li, Wenhua Yang, Minxue Pan:
Mobile Test Script Generation from Natural Language Descriptions. 348-359 - Rong Qu, Jiangang Huang, Long Zhang, Tianlu Qiao, Jian Zhang:
Scope-based Compiler Differential Testing. 360-369 - Haipeng Wang, Zhengyuan Wei, Qilin Zhou, Bo Jiang, Wing Kwong Chan:
Aster: Encoding Data Augmentation Relations into Seed Test Suites for Robustness Assessment and Fuzzing of Data-Augmented Deep Learning Models. 370-381 - Maria Laura Brzezinski Meyer, Hélène Waeselynck, Fernand Cuesta:
A Case Study on the "Jungle" Search for Industry-Relevant Regression Testing. 382-393 - Guoliang Zhao, Gexiang Fang, Dongdong Du, Qing Gao, Minghui Zhang:
Leveraging Conditional Statement to Generate Acceptance Tests Automatically via Traceable Sequence Generation. 394-405 - Anh-Duy Tran, Koen Yskout, Wouter Joosen:
AndrAS: Automated Attack Surface Extraction for Android Applications. 406-417 - Jiacheng Li, Kerui Huang, Sinan Wang, Yepang Liu:
Towards the Adoption and Adaptation of the AndroidX Library: An Empirical Study. 418-427 - Yulei Chen, Yuge Nie, Beibei Yin, Zheng Zheng, Huayao Wu:
An Empirical Study to Identify Software Aging Indicators for Android OS. 428-439 - Yuying Li, Yang Feng, Rui Hao, Zhenyu Chen:
Human-Machine Collaborative Testing for Android Applications. 440-451 - Yongyue Yang, Liting Huang, Chunyang Ye, Fenghang Li, Hui Zhou:
Enhancing Code Prediction Transformer with AST Structural Matrix. 452-463 - Hanwei Qian, Wei Liu, Ziqi Ding, Weisong Sun, Chunrong Fang:
Abstract Syntax Tree for Method Name Prediction: How Far Are We? 464-475 - Zaixing Zhang, Liang Liu, Jianming Chang, Lulu Wang, Li Liao:
Commit Classification via Diff-Code GCN based on System Dependency Graph. 476-487 - Siyuan Jin, Ziyuan Li, Bichao Chen, Bing Zhu, Yong Xia:
Software Code Quality Measurement: Implications from Metric Distributions. 488-496 - Luca Ardito, Marco Ballario, Michele Valsesia:
Research, Implementation and Analysis of Source Code Metrics in Rust-Code-Analysis. 497-506 - Dongdong Zhao, Hucheng Liao, Songsong Liao, Huanhuan Li, Jianwen Xiang:
Cancelable Iris Biometrics Based on Transformation Network. 507-516 - Yufei Wu, Baojian Hua:
RUSPATCH: Towards Timely and Effectively Patching Rust Applications. 517-528 - Axel Boström, Franz Wotawa:
Wireless Threats Against V2X Communication. 529-540 - Saihua Cai, Wenjun Zhao, Han Tang, Jinfu Chen, Wuhao Guo:
CGSA-RNN: Abnormal Network Traffic Detection Model Based on CycleGAN and Self-Attention Mechanism. 541-549 - Xiongpeng Hu, Jing Liu, Hui Dou, HongTao Chen, Yuhong Zhang:
Automatic Generation of Component Fault Trees from AADL Models for Design Failure Modes and Effects Analysis. 550-561 - Chao Li, Zhixuan Wang, Rui Chen, Mengfei Yang:
intCV: Automatically Inferring Correlated Variables in Interrrupt-Driven Program. 562-568 - Jiaying Li, Guangdong Bai, Long H. Pham, Jun Sun:
Towards an Effective and Interpretable Refinement Approach for DNN Verification. 569-580 - Zhuangyu Zhang, Zhiyi Zhang, Ziyuan Wang, Fang Chen, Zhiqiu Huang:
BTM: Black-Box Testing for DNN Based on Meta-Learning. 581-592 - Chuangwei Wang, Yifan Wu, Xiaofang Zhang:
Mucha: Multi-channel based Code Change Representation Learning for Commit Message Generation. 593-603 - Qifan He, Ruilin Xie, Li Li, Zhanqi Cui:
DeepIA: An Interpretability Analysis based Test Data Generation Method for DNN. 604-615 - Kuiliang Lin, Xiangpu Song, Yingpei Zeng, Shanqing Guo:
DeepDiffer: Find Deep Learning Compiler Bugs via Priority-guided Differential Fuzzing. 616-627 - Xin-Wei Yao, Qi-Chao Lu, Qiang Li, Lin-Lang Liu, Zhi-Chao Zhu:
MicroKGCL: A Knowledge Graph for Root Cause Localization of Feedback Issues in Microservices. 628-637 - Xudong He:
An Approach to Build and Verify Stable Neural Network Controllers for Cyber Physical Systems with Non-Linear Dynamics. 638-649 - Amine Barrak, Mayssa Jaziri, Ranim Trabelsi, Fehmi Jaafar, Fábio Petrillo:
SPIRT: A Fault-Tolerant and Reliable Peer-to-Peer Serverless ML Training Architecture. 650-661 - Ziyao Zhang, Wenlong Zheng, Baojian Hua, Qiliang Fan, Zhizhong Pan:
VMCanary: Effective Memory Protection for WebAssembly via Virtual Machine-assisted Approach. 662-671 - Yetao Jia, Yangyang Meng, Honglin Zhuang:
IMCSCL: Image-Based Malware Classification using Self-Supervised and Contrastive Learning. 672-683 - Arthur Grisel-Davy, Sebastian Fischmeister:
MAD: One-Shot Machine Activity Detector for Physics-Based Cyber Security. 684-695 - Tsung-Han Yang, Chin-Yu Huang:
Improving Software Modularization Quality Through the Use of Multi-Pattern Modularity Clustering Algorithm. 696-706 - Zhenting Guo, Meng Yan, Hongyan Li, Zhezhe Chen, Weifeng Sun:
Just-In-Time Method Name Updating With Heuristics and Neural Model. 707-718 - Wei Zhang, Hao Xu, Zhangjun Lu, Jianhui Jiang:
On Error Representativeness of Function Call Interfaces for C/C++ Program. 719-728 - Wei Zhang, Yuxi Hu, Bolong Tan, Xiaohai Shi, Jianhui Jiang:
Adaptive Tracing and Fault Injection based Fault Diagnosis for Open Source Server Software. 729-740 - Song Han, Zhengyi Guan, Sihui Li, Jin Wang, Xiaobing Zhou:
Knowledge Graph Completing with Dual Confrontation Learning Model based on Variational Information Bottleneck Method. 741-750 - Hui Dong, Zhenyu Liu, Hua Li, Xianrong Wang:
Evaluating the Availability of Service Function Chain under Different Elasticity Strategies Based on Colored Petri Net. 751-760 - Francesco Terrosi, Francesco Mariotti, Paolo Lollini, Andrea Bondavalli:
Modeling of GPGPU architectures for performance analysis of CUDA programs. 761-771 - Sanjaya Kumar Panda, Shidhanta Sen:
SRRA: A Novel Skewness-Based Algorithm for Cloudlet Scheduling. 772-781
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.