


default search action
DSA 2023: Tokyo, Japan
- 10th International Conference on Dependable Systems and Their Applications, DSA 2023, Tokyo, Japan, August 10-11, 2023. IEEE 2023, ISBN 979-8-3503-0477-0

- Siqi Gu, Zhaowei Zong, Fangyuan Tian, Zhenyu Chen:

DVTest: Deep Neural Network Visualization Testing Framework. 1-11 - Jean Jimmy Julien, Sirapop Nuannimnoi, Ching-Yao Huang:

Automated Pricing-based Provisioning of SDN/NFV Services in Distributed Multi-access Edge Computing using Cooperative Multi-Agent Deep Reinforcement Learning. 1-12 - Yujia Fan, Siyi Wang, Sinan Wang, Yepang Liu, Guoyao Wen, Qi Rong:

A Comprehensive Evaluation of Q-Learning Based Automatic Web GUI Testing. 12-23 - Jing Liu, Yihao Wang, Yang Wu:

Adversarial Sample Detection for BERT Model Based on Sample Sensitivity Characteristics. 24-34 - Changsheng Du, Yong Li, Yue Wang, Junjie Yu:

Study on Automatic Code Summary Generation Method based on Graph Neural Network. 35-41 - Donglin Li, Zixuan Liu, Jiaxin Pan, Bixin Li:

Evaluating the Resilience of Software Architecture Based on Minimal Path. 42-53 - Adelina Aleksieva-Petrova, Milen Petrov:

Empirical Study on Secure Software Development. 54-59 - Veikko Markkanen, Tapio Frantti:

Patch management planning - towards one-to-one policy. 60-69 - Jinchang Hu

, Kang Sun, Sen Yang, Zhanwei Hui, Song Huang:
A Software Security Testing Model for Autonomous Systems. 70-74 - Xiujing Guo, Hiroyuki Okamura, Tadashi Dohi:

Towards High-Quality Test Suite Generation with ML-Based Boundary Value Analysis. 75-85 - Yin Zhao, Meng Li, Jie Liu:

A Review of Metamorphic Relation Representation Forms. 86-93 - Jordan Doyle

, Thomas Laurent, Anthony Ventresque:
Modelling Android applications through static analysis and systematic exploratory testing. 94-104 - Christoph Luckeneder, Ralph Hoch, Hermann Kaindl

:
Towards Using Structural Abstraction for Model Checking. 105-113 - Xin Li, Shengcheng Yu, Lifan Sun, Yuexiao Liu, Chunrong Fang:

Towards Effective Bug Reproduction for Mobile Applications. 114-125 - Sirapop Nuannimnoi, Florian Delizy, Ching-Yao Huang:

HyperFed: Free-riding Resistant Federated Learning with Performance-based Reputation Mechanism and Adaptive Aggregation using Hypernetworks. 126-134 - Hiroshi Tanaka

, Masaru Ide, Kazuki Munakata, Hironori Washizaki, Nobukazu Yoshioka:
Activity-based modeling strategy for reliable machine learning system analysis targeting GUI-based applications. 135-143 - Lingjie Wang, Yunfeng Zhu, Siqi Gu, Zhenyu Chen:

Real-time Fruit Detection Method Based on RGB-D Image Fusion. 156-166 - Wenquan Tian, Shanshan Li, Chengfang Tan, Zhiwei Zhang

, Lin Cui:
Research on Label Distribution Dimension Reduction Algorithm Based on MLDA. 167-172 - Yihao Xiong, Jinbo Wang, Yuanlin Xin, Chi Zhang, Panpan Xue:

An Attention Mechanism Based Approach for Multivariate Time Series Anomaly Detection. 173-181 - Jue Wang, Yitao Wang, Dianwen Liu, Hao Long:

Anti-sea Operation Knowledge Modeling of Aircraft Carrier Formation Based on Key Knowledge and Symbiotic Relationship of Conditions. 182-189 - Nanxiang Qiu, Siqiao Li, Tadashi Dohi, Hiroyuki Okamura:

Another Look at Non-homogeneous Markovian Software Reliability Modeling. 190-199 - Xingjun Chen, Zimeng Wang, Junpeng Zhang:

Dynamic Assignment of Multi-UAV Marine Search and Rescue Missions Under the Condition of Intelligence Support. 200-210 - Alexander Perko

, Haoran Zhao, Franz Wotawa
:
Optimizing Named Entity Recognition for Improving Logical Formulae Abstraction from Technical Requirements Documents. 211-222 - Hongquan Shi, Jinbo Gong:

Knowledge Representation and Reasoning of Strong System Confrontation Process Based on Spatio-Temporal Event Evolution Information Flow and Software. 223-232 - Ao Xu, Yi Zhu, Yuxiang Gao, Qiao Yu, Guosheng Hao:

Validity Analysis of Software Defect Prediction Model for Mis-label Correction Based on CleanLab. 233-241 - Huiling Song, Yong Li, Wenjing Zhang, Ying Liu:

Research on Aggregation of Federated Model for Software Defect Prediction Based on Dynamic Selection. 242-249 - Veikko Markkanen, Tapio Frantti:

Secure 3rd party software integration. 250-259 - Chidi Agbo, Hoda Mehrpouyan:

Achieving Cyber-Informed Engineering Through Bayesian Belief Network and Sensitivity Analysis. 260-271 - Alvi Jawad, Jason Jaskolka:

Single and Combined Cyberattack Impact on Industrial Wastewater Systems. 272-281 - Elena Troubitsyna:

Employing Redundancy to Leverage Cybersecurity Protection of Safety-Critical Systems. 282-287 - Thowayba M. Elkaffash

, Armstrong Nhlabatsi:
Data-Leashing: Towards a Characterization of The Problem and Its Solution. 288-295 - Songlin Yang, Zhida Bao, Yun Lin:

A Comprehensive and Credible Assessment Method for Model Adversarial Robustness under Modulated Signal Identification. 296-301 - Awad A. Younis, Yi Hu, Ramadan Abdunabi:

Analyzing Software Supply Chain Security Risks in Industrial Control System Protocols: An OpenSSF Scorecard Approach. 302-311 - Bangrui Wan, Yuduo He, Xin Liu, Shiyu Wang, Ying Qian:

Host Intrusion Detection Method Based on Short Sequence of System Call. 312-322 - Yuanlin Xin, Jinbo Wang, Yihao Xiong, Ruixue Wang, Zhaohui Yao:

An Unsupervised Deep Learning Approach for Health Assessment of Distributed Systems. 323-332 - Shengnan Hu, Ruihan Mao, Hua Li:

Research on Deep Learning-Based SAR Image Denoising Algorithm. 333-338 - Yuyang Zhang, Jiangcheng Wang, Xiaobing Wang, Yingnan Wang, Sijiang Yu:

Research and Application of Loitering Detection Based on Deep Learning. 339-346 - Xin Liu, Jianping Ma, Dengjian Qiao, Chunhua Lian:

A Click-through Rate Prediction Method Based on Interaction Features Extraction for High-dimensional Sparse Data. 347-355 - Yihong Liu, Xingjun Chen:

A Priority-based Dynamic Chain Operation Planning Model. 356-359 - Yahui Tang, Mengqi Rao, Qingjie Wei, Feng Chen, Xin Liu:

A Software Execution Data Component Identification Algorithm Based on Spectral Clustering. 360-368 - Hui Tang, Lizhi Wang, Lingfei You, Mengfei Yao, Xiaohong Wang:

A quantitative analysis method for model uncertainty based on Verification, Validation, and Uncertainty Quantification. 369-378 - Chenyu Wang, Yi Zhu, Mei Song:

An Adaptive Learning Feature Model Validation Methodology Based on Formal Methods. 379-388 - Jinlei Sun, Zhanwei Hui, Xiaojuan Wang, Xu Cao, Shuang Song:

Move Smart Contract Vulnerability Detection based on Resource-flow Analysis. 389-398 - Chien-Fu Cheng, Bo-Yan Liao:

An Enhanced Approach for RFID Reader Deployment in Industrial IoT Systems with Collision Avoidance and Optimized Coverage. 399-405 - Weikang Li, Yong Li, Changqing Zheng, Ruiqi He:

Blockchain-based Model for Privacy-enhanced Data Sharing. 406-417 - Dongcheng Li, W. Eric Wong, Sean Pan, Liang-Seng Koh, Nicholas Chau:

Automatic Generation of Solidity Test for Blockchain Smart Contract using Many Objective Search and Dimensionality Reduction. 418-430 - Liliana Marie Prikler, Franz Wotawa

:
A Systematic Mapping Study of Digital Twins for Diagnosis in Transportation. 431-442 - Tzu-Yang Lin, Chin-Yu Huang, Chih-Chiang Fang:

Using the Deep Learning-Based Approaches for Program Debugging and Repair. 443-454 - Chan Yin, Yi Zhu, Jinyong Wang, Guosheng Hao:

Spatio-Temporal Rule Constraint Guided Safe Reinforcement Learning for CPS. 455-465 - Yingqiang He, Qi Su, Hao Long:

Task Allocation of Multi UAV Based on Genetic Algorithm. 466-467 - Minjeong Lee, Younga Kwon, Suyeong Kim, Miran Lee:

Visual Feedback Using VR Patient Avatar in Care and Nursing Training Environments. 468-469 - Wen-Tin Lee, Ping-Yi Song, Ming-Kai Tsai, Meng-Hsien Wu, Shang-Pin Ma:

A High Availability Microservices Architecture Implementation using Saga and Backup Mechanism. 470-471 - Wen-Tin Lee, Zhi-Yao Yang, Zhun-Wei Liu, Shin-Jie Lee:

Containerized Microservices Deployment Approach based on Ant Colony Optimization. 472-473 - Aibin Yan, Xuehua Li, Tianming Ni, Zhengfeng Huang, Xiaoqing Wen:

A Robust and High-Performance Flip-Flop with Complete Soft-Error Recovery. 474-476 - Scott Lupton, Lena Yu, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:

Assessment of Real-World Incident Detection Through a Component-Based Online Log Anomaly Detection Pipeline Framework. 477-478 - Jingjing Li, Kai Sheng, Lei Ao, Makoto Itoh, Qinghai Yang:

Image Transmission Based on Semantics Communication in Vehicle-Infrastructure Collaboration System. 479-486 - Zhixuan Wu, Nan Ma, Tao Zhi, Genbao Xu:

Spatial-Temporal Hypergraph Neural Network based on Attention Mechanism for Multi-view Data Action Recognition. 487-493 - Ramnik Singh Reen, Gaurav Dharmani, Rahul Gothwal, Eslam G. AbdAllah:

Evaluation of Wireless Deauthentication Attacks and Countermeasures on Autonomous Vehicles. 494-501 - Rahul Gothwal, Gaurav Dharmani, Ramnik Singh Reen, Eslam G. AbdAllah:

Evaluation of Man-in-the-Middle Attacks and Countermeasures on Autonomous Vehicles. 502-509 - Fumito Kuroyanagi, Eriko Uno, Kohji Ichikawa, Kohji Nagase, Hideo Inoue:

An Automatic Sensing Weakness Detection Method For Autonomous Vehicle Assessment. 510-518 - Qi Su, Feifan Liu, Hongquan Shi, Haoxiang Xia, Zhengwei Ma:

Research on Resilience of Maritime Distributed Combat Network Under Targeted Attacks. 519-526 - Junfeng Nie:

A Method for Evaluating the Effectiveness of Combat Plans Based on Matter-element Extension Model with Variable Weight. 527-531 - Lian Liu, Dongpu Sun:

Research on Multi-agent PPO Reinforcement Learning Algorithm based on Knowledge Graph. 532-536 - Zhiquan An, Junyi Huang, Guotao Jiao, Longfei Liu, Changxi Feng:

Chat-EasyEdu: An Education Field Intelligent Question-Answering System Based on Knowledge Graphs. 537-546 - Pan Liu, Li Li, Yihao Li:

A Stacking-Based Heart Disease Classification Prediction Model. 547-553 - Yudong Cao, Minping Jia, Jichao Zhuang:

Health Trend Prediction of Rolling Bearings using Transferable Autoregressive Recurrent Adaptation Approach. 554-558 - Wenchang Zhu, Peng Huang:

Performance Degradation Assessment of Rolling Bearing Based on Difference of Eigenvalues in Random Matrix Theory. 559-564 - Zhikuan Chen, Yufeng Sun, Yuqing Xue:

Reliability Analysis For Thin Film Thermocouple Thermal Oxidation Failure Based On Interlayer Diffusion. 565-574 - Zikang Tao, Rihui Sun, Jian Dong:

Software Countermeasures against DVFS fault Attack for AES. 575-582 - Pratomo Adinegoro, Chin-Chun Chang, Deron Liang:

Robust Model for Adversarial Attack Protection through Weak Features Removal. 583-584 - Chih-Chiang Fang, Chin-Yu Huang:

A Multiple-Criteria Ensemble Weight Strategy to Increase the Effectiveness of Deep Learning-based Fault Localization. 585-586 - Kuan-Wei Chiu, Shih-Sheng Yang, Shin-Jie Lee, Wen-Tin Lee:

An Empirical Evaluation of the Effectiveness of Spider and Proxy Modes for Web Security Testing. 587-588 - Takuma Tsuchida, Rikuho Miyata, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:

Automatic Detection of Abstract-Concrete Relationships between Attack Patterns of ATT&CK and CAPEC with Fine-tuned BERT. 589-590 - Shang-Pin Ma, Yu-Yung Yang, Shin-Jie Lee, Hang-Wei Yeh:

UTEMS: A Unit Testing Scheme for Event-driven Microservices. 591-592 - Jomphon Runpakprakun, Jati H. Husen

, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Towards Integrated Model-Based Machine Learning Experimentation Framework. 593-594 - Yihao Li, Jialong Xu, Yinghua Zhu, Huashuo Liu, Pan Liu:

The Impact of ChatGPT on Software Engineering Education: A Quick Peek. 595-596 - Cheng Wei, Fei Hui, Xiangmo Zhao, Shanke Li, Jie Wei:

An Easy-portable Displacement-offset-based Trajectory Prediction Method for Autonomous Vehicles. 597-605 - George Daoud, Mohamed El-Darieby, Khalid Elgazzar:

Prediction of Autonomous Vehicle Trajectories in Turnaround Scenarios. 606-613 - George Daoud, Mohamed El-Darieby:

Towards a Benchmark for Trajectory Prediction of Autonomous Vehicles. 614-622 - Chuansheng Xiao, Nan Ma, Kongjian Qin, Genbao Xu, Mohan Wang:

BIR-AHC: Balanced Iterative Reducing and Agglomerative Hierarchical Clustering for Stair Detection. 623-627 - Shuai Liu, Fan Ren, Guo Yang, Dingchang He

, Yonggang Liu:
Employing Deep Unsupervised Learning Method to Identify Testing Scenarios for Automated Vehicles. 628-635 - Ying Zheng, Hailang Zhang

, Jialu Du, Chiangyu Hu, Hong Bao:
Automated Labelling of Traffic Police Data Based on Weak Supervision. 636-644 - Wei Qi, Hongjin Zhou, Tianpei Wang, Jiawei Hu:

Research on Decision Assistant Software for Ship Aircraft Collaborative Search and Rescue. 645-646 - Yinggang Zhang, Li Liu, Jinming Liu, Yihao Li, Pan Liu:

An Improved H∞ Filtering based on Information Attack over Discrete Linear Systems. 647-651 - Yujuan Cheng:

QA4C: An Intelligent Question and Answering System for the C Programming Language Based on Knowledge Graph. 652-657 - Ziyang Weng, Han Zheng, Ming Yang:

A Research on the Factors Influencing Cyberchondria from the Perspective of Online Health Information Seeking. 658-667 - Jingchi Wu

, Tadashi Dohi, Hiroyuki Okamura:
Software Reliability Modeling Based on Zero-truncated and/or Zero-inflated Compound Distributions. 668-679 - Yu Du

, Shaoying Liu:
Maintainability Assessment for SOFL Formal Specifications. 680-687 - Kosuke Ito, Keita Tanaami, Xiao Xiao:

Application of mathematical quantification theory class III in software effort prediction. 688-697 - Thomas Hirsch, Franz Wotawa

:
Analysing Residual Risks when Introducing Monitoring and Diagnosis into Systems. 698-709 - Shakthivelu Janardhanan

, Carmen Mas Machuca:
Availability modeling and evaluation of switches and data centers. 710-721 - Chen Li

, Junjun Zheng, Peng Ju, Yasuhiko Morimoto:
Senti-EGCN: An Aspect-Based Sentiment Analysis System Using Edge-Enhanced Graph Convolutional Networks. 722-729 - Hisashi Kanda, Hiroyuki Okamura, Tadashi Dohi:

A Note on Optimal Retraining Strategy for ML Systems. 730-733 - Mingyue Zhang, Xiao-Yi Zhang, Paolo Arcaini

, Fuyuki Ishikawa:
An Investigation of the Behaviours of Machine Learning Agents Used in the Game of Go. 734-742 - Tao Zheng, Shijun Zhao, Kun Qiu, Pak-Lok Poon, Lanlin Yu:

Using Complex Network Communities to Evaluate the Correctness of Object Detection. 743-750 - Kun Qiu, Shuo Wang, Pak-Lok Poon:

An Empirical Study of Fault Detection Effectiveness of Metamorphic Testing for Object Detectors. 751-758 - Xingzhe Wu, Qiang Zhou:

A Visualization-aware Loss for Point Cloud Comparison. 759-769 - Dominic Phillips, Talal Halabi, Mohammad Zulkernine:

Autonomous and Security-Aware Dynamic Vehicular Platoon Formation. 770-781 - Yang Zou, Shaoyi Du, Hongcheng Han, Yuying Liu, Zhiqiang Tian:

Two-Stream (2+1)D CNN Based on Frame Difference Attention for Driver Behavior Recognition. 782-788 - Tianqi Qie, Weida Wang, Chao Yang, Ying Li:

Lane-Changing Decision-Making Method for Autonomous Vehicles Considering Multi-Vehicle Interactions. 789-793 - Xiaomin Chen, Xi Han, Yuansheng Liu:

Research on Intelligent Monitoring Method of Medicine Delivery Vehicle Based on Internet of Things Technology. 794-799 - Wei Wei, Yongjie Shu, Zhifang Ke, Kangdi Fan, Linwei Dong:

Study on Roll Oscillation Phenomenon and Controller Design of Deflection-based Flying Vehicles. 800-809 - Bei Liu

, Wan Tao, Sanming Liu:
Prototypical Networks with Dual Attention and Regularization for Few-Shot Relation Classification. 810-815 - Jing Wang, Ganyi Tang, Yong Wang:

Application in Student Performance Prediction Using Graph Regularization Nonnegative Matrix Factorization. 816-820 - Yunyun Yi, Jing Wang:

A RFID-Based Smart Socket Design. 821-824 - Li Li, Chen Li, Jiaqin Han, Yong Wang:

Data-intelligence Empowering Libraries: Research on Discipline-Specific Precision Services. 825-830 - Haoran Su, Jun Ai, Dan Yu, Hong Zhang:

An Evaluation Method for Large Language Models' Code Generation Capability. 831-838 - Dan Yu, Jun Ai, Haorao Su, Hong Zhang:

Assessing ChatGPT's Comprehension of Perturbed Text through Text Linguistic Features. 839-850 - Jianfu Liang, Jun Ai:

Improving Accuracy of Small Object Detection in Screen based on YOLOv7. 851-859 - Junda Zhu, Jun Ai, Tao Shi, Congran Zhang, Xinyue Wu:

An Intelligent Labeling and Dataset Generating Method for Desktop Application Element Object Detection. 860-869 - Jingchi Wu

, Tadashi Dohi, Hiroyuki Okamura:
Tool Development of Daubechies Wavelet Estimation for Stochastic Counting Processes. 870-879 - Zeming Dong, Qiang Hu, Zhenya Zhang, Jianjun Zhao:

On the Effectiveness of Graph Data Augmentation for Source Code Learning. 880-889 - Zhaoming Wang, Siqian Gong, Yang Liu:

Convolutional Neural Network based Digital Twin of Rolling Bearings for CNC Machine Tools in Cloud Computing. 890-895 - Jia Song, Weize Shang, Boxuan Wu, Shaojie Ai:

Fault location and separation method of Distributed Inertial Measurement Units based on IAC. 896-904 - Jin Zhou, Dexin Li, Tongping Liu:

Profile Dynamic Memory Allocation in Autonomous Driving Software. 905-914 - Yuanzhe Jin, Maorong Wang:

ChatGPT Integration in AVS: Opportunities and Challenges. 915-916

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














