


default search action
32nd ISSRE 2021: Wuhan, China
- Zhi Jin, Xuandong Li, Jianwen Xiang, Leonardo Mariani, Ting Liu, Xiao Yu, Nahgmeh Ivaki:

32nd IEEE International Symposium on Software Reliability Engineering, ISSRE 2021, Wuhan, China, October 25-28, 2021. IEEE 2021, ISBN 978-1-6654-2587-2 - Dangwei Wu, Beijun Shen, Yuting Chen, He Jiang, Lei Qiao:

Tensfa: Detecting and Repairing Tensor Shape Faults in Deep Learning Systems. 11-21 - Vesna Nowack, David Bowes, Steve Counsell, Tracy Hall

, Saemundur Haraldsson, Emily Winter
, John R. Woodward:
Expanding Fix Patterns to Enable Automatic Program Repair. 12-23 - Andrea Bombarda

, Silvia Bonfanti
, Cristiano Galbiati
, Angelo Gargantini, Patrizio Pelliccione, Elvinia Riccobene, Masayuki Wada:
Lessons Learned from the Development of a Mechanical Ventilator for COVID-19. 24-35 - Weijing Wang, Junjie Chen, Lin Yang, Hongyu Zhang, Pu Zhao, Bo Qiao, Yu Kang

, Qingwei Lin, Saravanakumar Rajmohan, Feng Gao, Zhangwei Xu, Yingnong Dang, Dongmei Zhang:
How Long Will it Take to Mitigate this Incident for Online Service Systems? 36-46 - Amir Elmishali, Bruno Sotto-Mayor

, Inbal Roshanski, Amit Sultan, Meir Kalech:
BEIRUT: Repository Mining for Defect Prediction. 47-56 - Quanyi Zou

, Lu Lu, Zhanyu Yang, Hao Xu:
Multi-source Cross Project Defect Prediction with Joint Wasserstein Distance and Ensemble Learning. 57-68 - Cheng Zeng, Chun Ying Zhou, Shengkai Lv, Peng He, Jie Huang:

GCN2defect : Graph Convolutional Networks for SMOTETomek-based Software Defect Prediction. 69-79 - Tong Jia, Yifan Wu, Chuanjia Hou, Ying Li:

LogFlash: Real-time Streaming Anomaly Detection and Diagnosis from System Logs for Large-scale Software Systems. 80-90 - Canhua Wu, Nengwen Zhao, Lixin Wang, Xiaoqin Yang, Shining Li, Ming Zhang, Xing Jin, Xidao Wen, Xiaohui Nie, Wenchi Zhang, Kaixin Sui, Dan Pei:

Identifying Root-Cause Metrics for Incident Diagnosis in Online Service Systems. 91-102 - Shenglin Zhang, Chenyu Zhao, Yicheng Sui, Ya Su, Yongqian Sun, Yuzhi Zhang, Dan Pei, Yizhe Wang:

Robust KPI Anomaly Detection for Large-Scale Software Services with Partial Labels. 103-114 - Zhaolin Luo, Ling Xu, Zhou Xu, Meng Yan

, Yan Lei, Can Li:
Contextual-Semantic-Aware Linkable Knowledge Prediction in Stack Overflow via Self-Attention. 115-126 - Abdulrahman Mahmoud, Siva Kumar Sastry Hari, Christopher W. Fletcher, Sarita V. Adve, Charbel Sakr, Naresh R. Shanbhag, Pavlo Molchanov, Michael B. Sullivan, Timothy Tsai, Stephen W. Keckler:

Optimizing Selective Protection for CNN Resilience. 127-138 - Shaokun Zhang, Yuanchun Li, Weixiang Yan, Yao Guo

, Xiangqun Chen:
Dependency-aware Form Understanding. 139-149 - Zhen Zhang, Peng Wu, Yuhang Chen

, Jing Su:
Out-of-Distribution Detection through Relative Activation-Deactivation Abstractions. 150-161 - Xuan-Bach Dinh Le, Quang Loc Le:

ReFixar: Multi-version Reasoning for Automated Repair of Regression Errors. 162-172 - Thanh Le-Cong

, Xuan-Bach Dinh Le, Huynh Quyet Thang, Phi Le Nguyen
:
Usability and Aesthetics: Better Together for Automated Repair of Web Pages. 173-183 - Xiaoting Du, Zheng Zheng, Lei Ma, Jianjun Zhao:

An Empirical Study on Common Bugs in Deep Learning Compilers. 184-195 - Eduard Pinconschi, Rui Abreu

, Pedro Adão
:
A Comparative Study of Automatic Program Repair Techniques for Security Vulnerabilities. 196-207 - Amirfarhad Nilizadeh, Marlon Calvo, Gary T. Leavens, Xuan-Bach Dinh Le:

More Reliable Test Suites for Dynamic APR by using Counterexamples. 208-219 - Mingyue Jiang, Houzhen Bao, Kaiyi Tu, Xiao-Yi Zhang, Zuohua Ding:

Evaluating Natural Language Inference Models: A Metamorphic Testing Approach. 220-230 - Alberto Martin-Lopez

, Andrea Arcuri, Sergio Segura, Antonio Ruiz-Cortés
:
Black-Box and White-Box Test Case Generation for RESTful APIs: Enemies or Allies? 231-241 - Luyao Ye

, Erqing Li, Dongdong Zhao, Shengwu Xiong, Siwei Zhou
, Jianwen Xiang:
An Efficient Approximation for Quantitative Analysis of Dynamic Fault Trees. 242-252 - Jinhan Kim, Gabin An, Robert Feldt, Shin Yoo:

Ahead of Time Mutation Based Fault Localisation using Statistical Inference. 253-263 - Matias Duran

, Xiao-Yi Zhang, Paolo Arcaini
, Fuyuki Ishikawa:
What to Blame? On the Granularity of Fault Localization for Deep Neural Networks. 264-275 - Misoo Kim

, Youngkyoung Kim
, Eunseok Lee
:
A Novel Automatic Query Expansion with Word Embedding for IR-based Bug Localization. 276-287 - Yuekang Li

, Guozhu Meng, Jun Xu, Cen Zhang, Hongxu Chen, Xiaofei Xie
, Haijun Wang, Yang Liu
:
Vall-nut: Principled Anti-Grey box - Fuzzing. 288-299 - Akhila Chowdary Kolla, Alex Groce, Toby Dylan Hocking:

Fuzz Testing the Compiled Code in R Packages. 300-308 - Taejoon Byun, Sanjai Rayadurgam, Mats P. E. Heimdahl:

Black-Box Testing of Deep Neural Networks. 309-320 - Pietro Liguori

, Erfan Al-Hossami, Vittorio Orbinato
, Roberto Natella, Samira Shaikh, Domenico Cotroneo, Bojan Cukic:
EVIL: Exploiting Software via Natural Language. 321-332 - Wei Zheng, Manqing Zhang, Hui Tang, Yuanfang Cai, Xiang Chen, Xiaoxue Wu, Abubakar Omari Abdallah Semasaba:

Automatically Identifying Bug Reports with Tactical Vulnerabilities by Deep Feature Learning. 333-344 - Xingwu Guo, Wenjie Wan, Zhaodi Zhang, Min Zhang

, Fu Song, Xuejun Wen:
Eager Falsification for Accelerating Robustness Verification of Deep Neural Networks. 345-356 - Matheus Torquato

, Paulo Maciel, Marco Vieira
:
PyMTDEvaluator: A Tool for Time-Based Moving Target Defense Evaluation: Tool description paper. 357-366 - Shize Zhang, Yunfeng Zhao, Jianyuan Lu, Biao Lyu, Shunmin Zhu, Zhiliang Wang, Jiahai Yang, Lin He, Jianping Wu:

CloudPin: A Root Cause Localization Framework of Shared Bandwidth Package Traffic Anomalies in Public Cloud Networks. 367-377 - Hongjun Wu, Zhuo Zhang, Shangwen Wang

, Yan Lei, Bo Lin, Yihao Qin, Haoyu Zhang, Xiaoguang Mao
:
Peculiar: Smart Contract Vulnerability Detection Based on Crucial Data Flow Graph and Pre-training Techniques. 378-389 - Guangsheng Fan, Taoqing Chen, Banghu Yin, Liqian Chen, Tengbin Wang, Ji Wang:

Static Bound Analysis of Dynamically Allocated Resources for C Programs. 390-400 - Xiang Du, Liangze Yin, Wei Dong:

Simplify Array Processing Loops for Efficient Program Verification. 401-411 - Nicolas Harrand, Thomas Durieux

, David Broman, Benoit Baudry:
The Behavioral Diversity of Java JSON Libraries. 412-422 - Mingzhe Hu

, Yu Zhang, Wenchao Huang, Yan Xiong:
Static Type Inference for Foreign Functions of Python. 423-433 - Hengyu Zhao, Siva Kumar Sastry Hari, Timothy Tsai, Michael B. Sullivan, Stephen W. Keckler, Jishen Zhao:

Suraksha: A Framework to Analyze the Safety Implications of Perception Design Choices in AVs. 434-445 - Yang Shi, Mianhong Li, Wujing Wei, Yangyang Liu, Xiapu Luo:

Secure and Efficient White-box Encryption Scheme for Data Protection against Shared Cache Attacks in Cloud Computing. 446-456 - Weining Zheng, Yuan Jiang

, Xiaohong Su:
Vu1SPG: Vulnerability detection based on slice property graph representation learning. 457-467 - Chengman Jiang, Baojian Hua, Wanrong Ouyang, Qiliang Fan, Zhizhong Pan:

PyGuard: Finding and Understanding Vulnerabilities in Python Virtual Machines. 468-475 - Haytham Hijazi, José Cruz, João Castelhano

, Ricardo Couceiro, Miguel Castelo-Branco
, Paulo de Carvalho, Henrique Madeira:
iReview: an Intelligent Code Review Evaluation Tool using Biofeedback. 476-485 - Yuxing Hu, Meng Yan

, Zhongxin Liu, Qiuyuan Chen, Bei Wang:
Improving Code Summarization Through Automated Quality Assurance. 486-497 - Xiaoyu Sun

, Xiao Chen, Kui Liu
, Sheng Wen, Li Li, John Grundy:
Characterizing Sensor Leaks in Android Apps. 498-509 - Zhengyi Qiu, Shudi Shao, Qi Zhao, Guoliang Jin:

A Characteristic Study of Deadlocks in Database-Backed Web Applications. 510-521 - Jingwen Liu

, Wuxia Jin, Qiong Feng, Xinyu Zhang, Yitong Dai:
One Step Further: Investigating Problematic Files of Architecture Anti-patterns. 522-533 - Song Wang, Nachiappan Nagappan:

Characterizing and Understanding Software Developer Networks in Security Development. 534-545 - Anushri Jana, Ankita Khadsare, Bharti Chimdyalwar, Shrawan Kumar, Vaidehi Ghime, R. Venkatesh:

Fast Change-Based Alarm Reporting for Evolving Software Systems. 546-556 - Guanping Xiao

, Jun Liu, Zheng Zheng, Yulei Sui:
Nondeterministic Impact of CPU Multithreading on Training Deep Learning Systems. 557-568 - Allison Sullivan

:
HawkEye: User-Guided Enumeration of Scenarios. 569-578 - Sen Chen, Lingling Fan, Cuiyun Gao, Fu Song, Yang Liu

:
Peeking into the Gray Area of Mobile World: An Empirical Study of Unlabeled Android Apps. 579-590

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














