


default search action
11th DSA 2024: Taicang, Suzhou, China
- 11th International Conference on Dependable Systems and Their Applications, DSA 2024, Taicang, Suzhou, China, November 2-3, 2024. IEEE 2024, ISBN 979-8-3315-3239-0
- Bobing Shen, Haibo Zhang:
Pruning-Based Optimization of Model Distillation Algorithm Using Explainable Machine Learning Methods. 1-5 - Chongyang Huang, Yi Zhu, Qiao Yu, Yi Ding, Guosheng Hao:
Software Defect Prediction Model Based on Syntactic Semantics and Flow Information Features. 6-15 - Haoran Zhang, Guang Yang, Hongyun Yu, Lingzhong Meng, Baolin Yan:
Deep Learning Model Risk Identification and Control Technology. 16-24 - Li Rui:
Prediction of Carbon Emissions Based on PCA and Neural Network Models under the "Dual Carbon" Background. 25-34 - Mengfei Guo, Dong Guo, Mo Li:
Metrics and Testing Methods for Artificial Intelligence Software Quality Models and Their Application Examples. 35-42 - Tse-Chuan Hsu, Dong-Meau Chang:
Retrainable Hand Gesture Recognition Model Driven by Edge AI. 43-48 - Wenqian Zhao, Lavanya Pobbathi, Srinivasan Ramprasath, Meghana Patibandla:
Generative AI for Smart Contracts in Real Estate Business. 49-59 - Xiaobing Feng, Ling Feng, Xiujuan Xu, Jiaqi Qiao, Wenjian Zhang:
Fin-MLGAT: Line Graph Attention Network for Dialogue Emotion Recognition in Stock Market and its Evaluations. 60-67 - Xiaobing Feng, Ling Feng, Pengfei Jiao, Zhiliang Zheng, Qing Bao:
WVRF_CGT: WVRF Automatic Filter Based Cascading Graph Transformer for Information Diffusion in Stock Q&A Platform. 68-74 - Zhi Wang, Bo Shen:
An Efficient Task Scheduling for Security and Stability Control System Models on Multi-Core Systems. 75-85 - Alvi Jawad, Jason Jaskolka:
Interplay of Attacker Behaviors and Dependability Attributes in Industrial Control System Impact Analysis. 86-95 - Sergei Hammer Né Bauer, Peter Schartner:
Functional Safety Evaluation for Cybersecurity Measures in Low-End Automotive Control Units. 96-105 - Eun-Young Kang
, Gaurav Choudhary
, Miguel Campusano
, Morten Kühnrich, Anders Pedersen:
Enhancing Dependability of Industrial Robots: Security and Safety Assessments Based on Model-Driven Engineering. 106-113 - Kun Leng, Li Liu, He Zhang, Yihao Li, Pan Liu:
Detection and Estimation of False Data Injection Attacks by Unmanned Surface Vessels. 114-119 - Yin Zhao, Meng Li, Yongcheng Su, Kailin Zi, Cong Zeng:
MetBench: A Numerical Expression Metamorphic Relations Benchmark Data Set. 120-131 - Long Kang, Jun Ai, Minyan Lu:
Automated Structural Test Case Generation for Human-Computer Interaction Software Based on Large Language Model. 132-140 - Yingxiang Huang, Minyan Lu, Xun Long:
Semantic-Guided Adaptive Exploration Testing for GUI Software. 141-149 - Zhangfeng Ju, Wenxiu Ma, Yuanheng Li, Yifan Guo, Ran Ju:
Analysis on Individual Manned and Unmanned Cooperation Interoperable Computing. 142-148 - Yihao Li, Lei Xiao, Weiwei Zhuang, Xiaozhu Xie, Jiawei Zhang:
Prioritization of Crowdsourced Test Reports Based on Defect Severity and Frequency Weighting. 150-160 - Kadiatou Diallo, Zizhao Chen, W. Eric Wong, Shou-Yu Lee:
An Analysis and Comparison of Mutation Testing Tools for Python. 161-169 - Yang Xu, Tingting Yu, Rui Chen:
Coverage-Guided Testing for Automatic Speech Recognition Systems. 170-171 - Jiao Li, Wensheng Peng, Zhaoyang Zeng, Ming Xu:
A Review of Reliability Verification Technology for Aviation Intelligent Systems. 172-181 - Hongyang Zhao, Jiawang Chen, Beishui Liu, Shuai Li:
A Hybrid Malicious Node Detection Approach Based on Fuzzy Trust Model and Bayesian Belief in Wireless Sensor Networks. 182-188 - Yutao Zhang, Jun Ai:
Semantic-Weighted Word Error Rate Based on BERT for Evaluating Automatic Speech Recognition Models. 189-198 - Yuheng Su, Yi Zhu, Mei Song, Weichao He, Guosheng Hao:
A Time-Aware Recommendation Model with Social Impact. 199-208 - Xun Long, Jun Ai, Jieyu Zhao, Yingxiang Huang:
A Vulnerability Propagation Impact Analysis Approach Based on Code Semantics with LLM. 209-216 - Haoli Chen, Chunlei Zhu, Liang Zhang, Yan Zhao, Lie Wang:
A Survey of Mutation Based Testing Adequacy Study on Smart Contract. 217-220 - Chunyan Xia, Changyou Zheng, Yuchen Xia, Xiangjing Kong, Xiayi Song:
Survey on Simulation Testing of Autonomous Driving System. 221-229 - Mahmoud M. Abouzeid, Pei-Shu Huang, Feng-Jian Wang:
Enhancing the Detection of Anomalous Artifact Operations in Temporal Structured Workflows. 230-241 - Jiawei Zhang, Lei Xiao, Miaojun Li, Zhaorui Meng, Yihao Li:
HYDBre: A Hybrid Retrieval Method for Detecting Duplicate Software Bug Reports. 242-251 - Yingqiang He, Xingjun Chen, Yitao Wang:
Target Threat Judgement Based on Entropy-Topsis Method and Intent Classification. 252-259 - Wentao Zhao, Guang Yang, Mengcen Jiang, Lingzhong Meng, Mengmeng Wang:
A Survey of Comprehensive Evaluation Methods. 260-268 - Mingwei Tang, Yihan Qin, Lu Zhang, Hongru Lu, Tingyu Zhang:
A Quantitative Evaluation Approach for Online Review Quality Based on the AHP-Fuzzy Comprehensive Evaluation. 269-279 - Chuangchuang Zhang, Shou-Yu Lee, Pan Liu, Hongyong Yang, William Cheng-Chung Chu:
Robustness Aware SFC Placement in NFV-Enabled Multi-Domain Networks Under Resource Demand Uncertainty. 280-288 - Mingwei Shi, Hongquan Shi:
Planning Model of Air Defense Kill Webs Based on Genetic Algorithm. 289-296 - He Zhou, Rui Kang:
A Reliable Extrapolative Capacity Estimation Method for Complex Distributed Web Services. 297-304 - Xiaoquan Gao, Fan Liu, Tianhao Wu, Hongxiao Liu, Yuan Zhou:
Research on Data Augmentation Methods for Small Sample Image Datasets. 305-312 - Yifan Guo, Wenjun Xue, Wenxiu Ma, Zhangfeng Ju, Yuanheng Li:
Research on Methods for Presenting Battlefield Situation Hotspots. 313-319 - Yuanheng Li, Zhangfeng Ju, Wenxiu Ma, Wenjun Xue, Yifan Guo:
Design of Individual Soldier Multimedia Command and Control System Based on Ad Hoc Wireless Mesh Network. 320-323 - Jinzhao Ma, Zhenyu Fang, Jiangbin Zheng, Jun Cao:
A Virtual Texture Technology Realized on Low Computational Power Platforms. 324-330 - Zhiping Zhang, Xin Zhao, Jiangbin Zheng:
Virtualized TCP/IP Protocol Stack Based on VxWorks. 331-335 - Xin Zhao, Zhiping Zhang, Jiangbin Zheng:
Container Design Based on VxWorks. 336-341 - Wen Ye, Xinyi Zhu, Yanjing Guo, Mingyu Huang:
Infrared Object Detection Based YOLOv8s from UAV Images. 349-357 - Xinsheng Zhang, Jing Hu, Junlong Xiao:
YOLOv8s-D2: A Novel Object Defect Detection Algorithm Based on Improved YOLOv8s. 358-364 - Zixuan Zhu, Qingxia Li, Zhenyu Fang:
YOLO-Based Component Detection System for Electrical Diagrams. 365-373 - Jing Hu, Xinsheng Zhang:
StyleEditorGAN: Transformer-Based Image Inversion and Realistic Facial Editing. 374-380 - Wenxiu Ma, Yuanheng Li, Xingwei Xue, Keke Pei, Yifan Guo:
Research on 3D Visualization of Human Body Actions. 381-385 - Phillip Zhang, Hongji Yang:
Introduction of a Time-Parameter for State Analysis in Affective Computing. 386-392 - Xiaoxu Qi, Mengmeng Mao:
A Computational Model for Spatial Exploration in Regional Economic Collaborative Development: A Case Study. 393-400 - Zetian Shen:
A Comparative Study of Hybrid CNN and Vision Transformer Models for Facial Emotion Recognition. 401-408 - Chong Zeng, Zisen Zhou, Yun Zhang, Zhongxi Lu, Hongji Yang:
Deep-Deploying Imagination in Creative Computer for Dependent System Design. 409-416 - Lu Zhang, Meiyu Shi:
Exploring the Healing Power of Digital Technology in Promoting Health and Well-Being: A Case Study of Smart Tourism Applications. 417-425 - Cheng Chang, Lina Feng, Yuan Li, Yangrui Kang:
Distributed Spectrum Sensing Structure Design Based on Distributed Deep Neural Network. 426-427 - Pan Liu, Ruyi Luo, Chengwu Jiang, Tong Gao, Yihao Li:
AI-Assisted Bug Detection in Open-Source Software. 428-429 - Miltiadis G. Siavvas, Georgia Xanthopoulou, Ilias Kalouptsoglou
, Dionysios D. Kehagias, Dimitrios Tzovaras:
Digital Transformation of Security Standards: Requirements Extraction using Large Language Models. 430-431 - Songcheng Xie, Shengpeng Zhu, Qifan He, Zhanqi Cui:
Autonomous Driving Software Testing Based on Interpretation Analysis. 432-433

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.