default search action
DSA 2021: Yinchuan, China
- 8th International Conference on Dependable Systems and Their Applications, DSA 2021, Yinchuan, China, August 5-6, 2021. IEEE 2021, ISBN 978-1-6654-4391-3
- Siqiao Li, Tadashi Dohi, Hiroyuki Okamura:
A Comprehensive Evaluation for Burr-Type NHPP-based Software Reliability Models. 1-11 - Ju Zeng, Xiaopan Zhang:
An Adaptive Large Neighborhood Search for Two-Dimensional Packing with Conflict Penalty. 12-19 - Mingshuang Qing, Xiuting Ge, Zhanwei Hui, Ya Pan, Yong Fan, Xiaojuan Wang, Xu Cao:
An Empirical Study on Spectral Clustering-based Software Defect Detection. 20-29 - Guang Yang, Xiang Chen, Jinxin Cao, Shuyuan Xu, Zhanqi Cui, Chi Yu, Ke Liu:
ComFormer: Code Comment Generation via Transformer and Fusion Method-based Hybrid Code Representation. 30-41 - Yanxin Jia, Xiang Chen, Shuyuan Xu, Guang Yang, Jinxin Cao:
EKD-BSP: Bug Report Severity Prediction by Extracting Keywords from Description. 42-53 - Zheng Li, Xiaotang Zhou, Deli Yu, Yonghao Wu, Yong Liu, Xiang Chen:
Fault Localization-Guided Test Data Generation Approach for Novice Programs. 54-65 - Zheng Li, Butian Shi, Haifeng Wang, Yong Liu, Xiang Chen:
HMBFL: Higher-Order Mutation-Based Fault Localization. 66-77 - Wei Zheng, Tianren Shen, Xiang Chen:
Just-in-Time Defect Prediction Technology based on Interpretability Technology. 78-89 - Yuhua Chen, Ningjiang Chen, Wenxiu Xu, Linming Lian, Huan Tu:
MFRL-CA: Microservice Fault Root Cause Location based on Correlation Analysis. 90-101 - Zhilei Ren, Xiaofei Fan, Xiaochen Li, Zhide Zhou, He Jiang:
Multi-objective Evolutionary Algorithm for String SMT Solver Testing. 102-113 - Yadong Xu, Beibei Sun:
Multiscale Dense Convolutional Networks for Intelligent Fault Diagnosis of Rolling Bearing. 114-119 - Cong Xiong, Xiang Chen, Fuzhou Peng, Lei Wang:
Optimal Gateway Station Placement for Transmission Delay Minimization in Broadband LEO Satellite Communication System. 120-127 - Haipeng Wang, W. K. Chan:
Orchid: Building Dynamic Test Oracles with Training Bias for Improving Deep Neural Network Models †. 128-139 - Hao Zhang, W. K. Chan:
Plum: Exploration and Prioritization of Model Repair Strategies for Fixing Deep Learning Models †. 140-151 - Jian Qu, Xiaobo Ma, Wenmao Liu:
Querent-centric Domain Name System Modeling and Its Application in Passive Software Discovery. 152-160 - Ting-Yan Yu, Chin-Yu Huang, Neil C. Fang:
Use of Deep Learning Model with Attention Mechanism for Software Fault Prediction. 161-171 - Xin Wang, Xiaobo Ma, Jian Qu:
A Link Flooding Attack Detection Method based on Non-Cooperative Active Measurement. 172-177 - Jing Zhu, Song Huang, Yaqing Shi, Kaishun Wu, Yanqiu Wang:
A Method of Random Forest Classification based on Fuzzy Comprehensive Evaluation. 178-183 - Lei Chen, Yuyu Yuan, Hongpu Jiang, Ting Guo, Pengqian Zhao, Jinsheng Shi:
A Novel Trust-based Model for Collaborative Filtering Recommendation Systems using Entropy. 184-188 - Zherui Zhang, Ya Tu:
A Pruning Neural Network for Automatic Modulation Classification. 189-194 - Xingjun Chen, Mengjie Shan:
A Recommendation Method for Process Modeling based on Clustering and Graph Neural Network. 195-201 - Qiucheng Sun, Yuyu Yuan, Ting Guo, Lei Chen:
A Trusted Solution to Hyperledger Fabric Reordering Problem. 202-207 - Dingning Liu, Yuyu Yuan, Tengfei Xue, Lei Chen:
An Efficient Batch Verification Scheme for SM2 Signatures. 208-212 - Florian Klück, Franz Wotawa, Gerhard Neubauer, Jianbo Tao, Mihai Nica:
Analysing Experimental Results Obtained when Applying Search-based Testing to Verify Automated Driving Functions. 213-219 - Yunwei Dong, Qian-wen Gou, Pei Tang:
Architecture-Level Schedulability Analysis with IO Constraint using AADL. 220-229 - Tugkan Tuglular, Deniz Egemen Coskun:
Behavior-Driven Development of Software Product Lines. 230-239 - Yangyang Zhang, Zengzhi Liu, Qiang Han, Wenyuan Zhang:
Development of System Life Cycle Processes Standardization and Future Evolution Analysis†. 240-246 - Jiping Huang, Wei Qiao, Mengfei Xu:
Distributed Countermeasure Algorithm based on Deep Reinforcement Learning. 247-250 - Shuangshuang Huang, Xiaobo Ma, Huafeng Bian:
Effectively and Efficiently Defending Shadowsocks against Website Fingerprinting Attacks. 251-256 - Xinyue Yang, Jian Zhang, Shan Zhou, Bin Wang, Ruixue Wang:
Generating Test Scenarios using SysML Activity Diagram. 257-264 - Xiao Xiao, Tadashi Dohi:
Interval Estimation for Non-Parametric NHPP-based Software Reliability Model via Simulation-based Bootstrap. 265-270 - Hongpu Jiang, Yuyu Yuan, Ting Guo, Pengqian Zhao:
Measuring Trust and Automatic Verification in Multi-Agent Systems. 271-277 - Jiaxin Lin, Zhichao Zhou, Xiangyu Wu, Changbo Hou:
MPSK Signal Modulation Recognition based on Decision Fusion. 278-283 - Huafeng Bian, Xiaobo Ma, Pengyu Pan:
On the Performance Evaluation of Congestion Control Algorithms against DDoS Attacks. 284-288 - Meijuan Wang, Song Huang, Hui Li, Jingli Han:
Ontology Dependence Closure based on Privacy Association. 289-294 - Renyan Jiang, Shihai Xiao:
Performance Comparison of Three Parameter Estimation Methods on Heavily Censored Data. 295-301 - Jiajun Ai, Lijie Hua, Jin Liu, Shunshun Chen, Yongjian Xu, Changbo Hou:
Radar Signal Separation Recognition Method based on Semantic Segmentation. 302-306 - Guoli Zhao, Chang Liu, Shaofang Li, Zenghao Tian, Xi Liu, Haifeng Li:
Radar System Testability Design and Demonstration based on Fault Modes and Software Control. 307-314 - Qingbo Ji, Lingjie Wang, Changbo Hou, Qiang Zhang, Qingquan Liu, Yue Jiang:
SAR and Optical Image Matching Eased on Phase Congruency and Template Matching. 315-320 - Xinrui Wang, Yun Lin:
Small Sample Electromagnetic Signal Recognition based on Time Series Data Augmentation. 321-326 - Yongjian Xu, Chunjie Zhang, Guowei Liu, Ziwei Wang, Zhichao Zhou, Changbo Hou:
Target Tracking Algorithm based on Electromagnetic and Image Trajectory Matching. 327-331 - Jie Li, Yue Wang:
Transient Fault Tolerance on Multicore Processor in AMP mode. 332-337 - Kunyu Gao, Jinbo Wang, Bin Wang, Ruixue Wang, Jiao Jia:
UAV Test Data Generation Method based on CycleGAN. 338-343 - Van Duc Nguyen, Ewout Zwanenburg, Steffen Limmer, Wessel Luijben, Thomas Bäck, Markus Olhofer:
A Combination of Fourier Transform and Machine Learning for Fault Detection and Diagnosis of Induction Motors. 344-351 - Gaolei Yi, Xiaoyu Yang, Pu Huang, Yichen Wang:
A Coverage-Guided Fuzzing Framework based on Genetic Algorithm for Neural Networks. 352-358 - Wei Zheng, Zheng Chen, Xiaoxue Wu, Weiqiang Fu, Bowen Sun, Jingyuan Cheng:
A Domain Knowledge-Guided Lightweight Approach for Security Bug Reports Prediction. 359-368 - Zongxiang Lin, Yongkan Sun:
A Model for Ship-Helicopter Cooperative Anti-Submarine Tracking based on Favorable Situation. 369-372 - Ye Tian, Beibei Yin, Chenglong Li:
A Model-based Test Cases Generation Method for Spacecraft Software. 373-382 - Xiaoyu Yang, Xiaobing Wang:
A Practical Method based on MSVL for Verification of Social Network. 383-389 - Siming Zheng, Hongwei Liu, Hongji Yang:
A Survey of Story-Generation Apps and Online Systems between 2017 and 2020. 390-398 - Weiyu Liu, Qian Dong, PengQi Wang, Guang Yang, Lingzhong Meng, You Song, Yuan Shi, Yunzhi Xue:
A Survey on Autonomous Driving Datasets. 399-407 - Yue Shen, Yu Li, Yuping Zhu, Yong Cai, Jun Shao:
An Airborne Requirements Verification Method based on Requirement Elements using CRF. 408-413 - Hui Guan, Guorong Cai, Chuan Zhao:
An Automatic Approach to Extracting Requirement Dependencies based on Semantic Web. 414-420 - Jiayuan Wei, Xingyu Miao, Yongqi Ge:
An Energy-Efficient Strategy based on Q-Learning for Energy Harvesting-based Wireless Sensor Network. 421-427 - Haoran Yu, Yijie Gao, Jiang Wu:
An Indoor Positioning System based on Intelligent Terminal. 428-433 - Song Huang, Zhen Yang, Changyou Zheng, Jinyong Wan:
An Intellectual Property Data Access Control Method for Crowdsourced Testing System. 434-438 - Yuxuan Yan, Xingjun Chen:
An Interactive Computer Assisted Design System: Architecture and Design. 439-443 - Tao Song, Wei Wang, Dongcheng Li, Yining Zhao:
An Optimal Resource Scheduling of Debris Monitoring using Particle Swarm Algorithm with Constriction Factor. 444-450 - Weihua Jin, Bo Sun, Zhidong Li, Lei Zhang, Shijie Zhang:
Analytical Investigation of Anomaly Detection Methods based on Time-Domain Features and Autoencoders in Satellite Power Subsystem. 451-460 - Lu Zhang, Shimiao Gao, Meiyu Shi:
Applying Animation for the Interpretation of Beijing Symbols in the Second Dimensional Space. 461-466 - Junfeng Zhao, Ke Zhao:
Applying Microservice Refactoring to Object-2riented Legacy System. 467-473 - Mingxi Li, Bei-Bei Yin:
ARB-BERT: An Automatic Aging-Related Bug Report Classification Method based on BERT. 474-483 - Lili Fan, Yong Wang, Tao Liu:
Automatic Test Path Generation and Prioritization using UML Activity Diagram. 484-490 - Yikang Shao, Jun Ai:
Code Comprehensibility Evaluation for Java Class based on LDA Topic Model. 491-498 - Pei-Shu Huang, Faisal Fahmi, Feng-Jian Wang, Hongji Yang:
Constructing A Creative Service Software with Semantic Web. 499-507 - Congran Zhang, Tao Shi, Jun Ai, Wei Tian:
Construction of GUI Elements Recognition Model for AI Testing based on Deep Learning. 508-515 - Jiang Wu, Xiaodong Fan, Kaixiang Zhang:
Decision-Making Method of UAV Maneuvering in Close-Range Confrontation based on Deep Reinforcement Learning. 516-521 - Jiankang Li, Yang Liu:
Deep Reinforcement Learning based Adaptive Real-Time Path Planning for UAV. 522-530 - Shanshan Wang, Qingnan Wu, Huifang Dong:
Design and Implementation of Serial Rabbit Ear Removal Architecture based on FPGA in Passive Detection. 531-535 - Tao Liu, Yuebo Wang, Chao Chen, Jixiu Li, Qinglu Pu:
Design and Implementation of Software Test System for Aviation Communication Radio Station. 536-540 - Yanmei Jiang, Mingsheng Liu:
Design of A Reliable Algorithmic with Deep Learning and Transfer Learning for Load Combination Recognition. 541-550 - Dongcheng Li, W. Eric Wong, Wei Wang, Yao Yao, Matthew Chau:
Detection and Mitigation of Label-Flipping Attacks in Federated Learning Systems with KPCA and K-Means. 551-559 - Liu Lian:
Dictionary Learning Algorithm based on Restricted Boltzmann Machine. 560-565 - Zhongxi Lu, Jinli Luo, Hongji Yang:
Emotions Behind Divergent Thinking. 566-571 - Jinbo Gong, Xu Zhang, Yaowu Liu, Xiaopan Zhang:
Event Graph based Warship Formation Air Defense Scheduling Model and Algorithm. 572-580 - Shaojie Ai, Weize Shang, Jia Song, Guobiao Cai:
Fault Diagnosis of the Four-Rotor Unmanned Aerial Vehicle using the Optimized Deep Forest Algorithm based on the Wavelet Packet Translation. 581-589 - Junlong Lian, Chenhui Cui, Weifeng Sun, Yiming Wu, Rubing Huang:
KD-RRT: Restricted Random Testing based on K-Dimensional Tree. 590-599 - Jie Zhang, Lin Yan, Rong Wang, Cong Tian, Zhenhua Duan:
Malware Detection using CNN via Word Embedding. 600-607 - Haoran Jia, Yuyu Yuan, Qiang Han, Pengqian Zhao, Ting Guo:
Multi-Agent Trust Evaluation Model based on Reinforcement Learning. 608-613 - Dongpu Sun:
Multi-Granularity Information Expression Application on Patent Text Clustering. 614-619 - Junpeng Zhang, Xingjun Chen:
Multi-UAV Reconnaissance Task Assignment based on Wide-Area Search Scenario. 620-625 - Junfeng Nie:
Operational Task Decomposition Method based on Extended HTN Planning. 626-630 - Yongming Yao, Yulin Wang, Weiyi Jiang, Ziyuan Wang, Song Huang:
Privacy Protocol Analysis based on Android Application. 631-638 - Youdi Gong, Yunzhi Xue, Qian Dong, Guang Yang, PengQi Wang, Yuan Shi, Lingzhong Meng:
Quality Evaluation of Image Dataset based on Label File. 639-646 - Zhidong Li, Bo Sun, Lei Zhang, Weihua Jin:
Satellite On-2rbit Anomaly Detection and Adaptive Model Updating Method. 647-655 - Ling-lin Gong, Yujia Li, Hongfu Chen, Xin Xu, Fang Liu:
Scenario-based Reliability Testing Methods for Smart Grid Dispatching and Control System. 656-663 - Xiangyu Wu, Jing Zhang, Changbo Hou, Guowei Liu, Jie Zhang, Jin Liu:
Signal Modulation Recognition based on Convolutional Autoencoder and Time-Frequency Analysis. 664-668 - Jiaxi Xu, Jun Ai, Tao Shi:
Software Defect Prediction for Specific Defect Types based on Augmented Code Graph Representation. 669-678 - Chiyang Gao, Wenbing Luo, Fei Xie:
Software Selection Test of Enterprise-Level Big Data Analysis Platform. 679-684 - Hanyuan Wu, Xiangmin Li, Zhiyu Xi:
Stability Analysis and Parameter Design for Stabilizing One Delay Point in Two-Delay Differential Equations. 685-691 - Guang Yang, Yunzhi Xue, Lingzhong Meng, PengQi Wang, Yuan Shi, Qinghong Yang, Qian Dong:
Survey on Autonomous Vehicle Simulation Platforms. 692-699 - Xiaomeng Chen, Jinbo Wang, Shan Zhou, Panpan Xue, Jiao Jia:
Test Case Reuse based on ESIM Model. 700-705 - Dongmei Dong, Wuwu Hua, Zhihao Liu, Yunyu Fang, Yue Hou:
Test Method of Flight Control Software based on Input Field Model. 706-711 - QingGuo Yan, Jun Zhao, Xianguang Cha, Wei Dai, ZeJia He, Lin Cui, LingShuang Yu:
The Evaluation of Teaching Effect based on Interpretable Machine Learning. 712-715 - Cong Li, Qiang Han, Bingbing Lei, Haide Liu, Cong Liu, Yu He:
Timing Attacks in Single-Chip Microcomputer through Workflow Verification. 716-721 - Yining Wang, Chunyi Li, Xiaobing Wang:
Verification of CTCS-3 using TMSVL. 722-729 - Huanhuan Wu, Zheng Li, Zhanqi Cui, Jiaming Zhang:
A Mutation-based Approach to Repair Deep Neural Network Models. 730-731 - Yumin Gao, Daojin Nie, Huimin Gan, Zhiyong Cao, Ning Lin, Cuicui Sun:
A Novel Building Worker Detection based on Cross Feature Pyramid Network. 732-733 - Aibin Yan, Aoran Cao, Kuikui Qian, Liang Ding, Zhihui He, Zhengzheng Fan, Xiaoqing Wen:
A Reliable and Low-Cost Flip-Flop Hardened against Double-Node-Upsets. 734-736 - Mengxia Wang, Wenqiang Fan:
An Improved Simhash Algorithm for Academic Paper Checking System. 737-738 - Yongchao Meng, Peihan Qi, Xiaoyu Zhou, Zan Li:
Capability Analysis Method for Electromagnetic Spectrum. 739-740 - Pengyu Pan, Xiaobo Ma, Huafeng Bian:
Exploiting Bitcoin Mining Pool for Stealthy and Flexible Botnet Channels. 741-742 - Shuowen Fu, Xin Zhao, Yunpeng Chen, Yaqi Xu, Xiaoli Li, Fangfang Zhou, Ying Zhao:
Heterogeneous Graph Modeling and Visualization for Cyber Asset Management. 743-744 - Shihao Wang, Haoran Zha:
Impact of Mechanism and Influencing Factors of Radio Frequency Fingerprint on Wireless Devices. 745-746 - Kuixian Li, Jibo Shi:
Modulation Recognition Algorithm based on Digital Communication Signal Time-Frequency Image. 747-748 - Zhihui Shan, Qiang Han, Meng Han:
Proof of Greatest Number Program and Find. 749-750 - Pan Liu, Jiaqi Yan, Xiaoyu Song:
Three Classifications of Big Data-based Software Testing. 751-752 - Wenjin Yin, Zhijiang Yuan, Fei Long, Ye Zhao:
Underwater Unmanned Vehicle Search Path Optimization Arithmetic. 753-755
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.