


default search action
35th SEKE 2023: KSIR Virtual Conference Center, USA
- Shi-Kuo Chang:

The 35th International Conference on Software Engineering and Knowledge Engineering, SEKE 2023, KSIR Virtual Conference Center, USA, July 1-10, 2023. KSI Research Inc. 2023, ISBN 1-891706-56-X
Session SCE: Social Computing and Engineering
- Xinzhi Wang, Mengyue Li, Yige Yao, Zhennan Li, Yi Liu, Hui Zhang

:
Short Review of Intention Mining in Social Crisis Management through Automatic Technologies. 2-7 - Qitao Hu, Xiao Wei:

Topic and Speaker-aware Hierarchical Encoder-Decoder Model for Dialogue Generation. 8-13 - Senjun Pei, Weidong Liu:

Convolution Neural Network Based Patent Infringement Detection Method. 14-19 - Wenwen Xiao, Xinzhi Wang, Xiangfeng Luo, Shaorong Xie:

DDCL: A Dual Decision-making Continuous Reinforcement Learning Method Based on Sim2Real. 20-25 - Fayrouz Elsalmy, Nada Sherief, Walid M. Abdelmoez:

Inclusive Gamification: An Exploratory Study in Software Development Enterprises (S). 26-29
Session SEKE1: Software Engineering and Knowledge Engineering
- Ryo Soga, Hideyuki Kanuka, Takatomi Kubo, Takashi Ishio, Kenichi Matsumoto:

Will you use software development support using biosignals? A survey from software developers. 31-36 - Melody L. Hammel, Lan Lin:

Assuring Domain Software Quality through Workflow Testing and Specification. 37-44 - Ju Ma, Yiyang Sun, Peng He, Zhang-Fan Zeng:

GSAGE2defect: An Improved Approach to Software Defect Prediction based on Inductive Graph Neural Network. 45-50 - Pankaj Kamthan, Nazlie Shahmir:

Small Educational Steps Towards Improving the Status of Women in Software Engineering. 51-56 - Yuanchi Ma, Hui He, Zhendong Niu:

BDC: Using BERT and Deep Clustering to Improve Chinese Proper Noun Recognition. 57-62
Session SEKE2: Software Engineering and Knowledge Engineering
- Keita Murase, Shingo Takada:

Applying Reinforcement Learning for Automated Testing of Mobile Application Focusing on State Definition, Reward, and Learning Method. 64-69 - Carlos Eduardo Pantoja

, João Victor Guinelli, Tielle Alexandre, José Viterbo:
A Model-Driven Development Framework for Geographical and Relational Database Systems. 70-75 - Masaya Fujimoto, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya:

Expansion Mechanism for Runtime Verification of Self-adaptive Systems. 76-81 - Jing Zhou, Shan Leng, Fang Wang, Hansheng Wang:

Automatic Discovery of Controversial Legal Judgments by an Entropy-Based Measurement (S). 82-85 - Wasja Brunotte, Jakob Droste, Kurt Schneider:

Context, Content, Consent - How to Design User-Centered Privacy Explanations (S). 86-89
Session TSECQS: Theoretical and Quantum Software Engineering
- Iaakov Exman, Ariel Zvulunov:

Quantum Software Models: Quantum Modules Tomography and Recovery Theorem. 91-96 - Krishn Vishwas Kher, Ishan Joshi, Bharat Chandra Mukkavalli, Lei Zhang, M. V. Panduranga Rao:

Automatic Diagnosis of Quantum Software Bug Fix Motifs. 97-102 - Canh Minh Do, Kazuhiro Ogata:

Symbolic Model Checking Quantum Circuits in Maude. 103-108
Session SEKE3: Software Engineering and Knowledge Engineering
- Yihao Zhang, Zeming Wei, Xiyue Zhang, Meng Sun:

Using Z3 for Formal Modeling and Verification of FNN Global Robustness (S). 110-113 - Marco Fiore, Marina Mongiello, Giovanni Tricarico

, Francesco Bozzo, Cinzia Montemurro, Alessandro Petrontino, Clemente Giambattista, Giorgio Mercuri:
Blockchain-based Food Traceability System for Apulian Marketplace: Enhancing Transparency and Accountability in the Food Supply Chain (S). 114-117 - Kazusa Takemoto, Shingo Takada:

Applying Symbolic Execution to Semantic Code Clone Detection (S). 118-122
Session ESSE: Empirical Studies and Software Engineering
- Beiqi Zhang, Peng Liang, Xiyu Zhou, Aakash Ahmad

, Muhammad Waseem
:
Practices and Challenges of Using GitHub Copilot: An Empirical Study. 124-129 - Qing Mi, Haotian Bai, Xiaozhou Wang, Wenrui Liu, Xingyue Song:

An Empirical Study of Coding Style Compliance on Stack Overflow. 130-135 - Zeshan Xu, Jie Zhu, Li Yang, Chun Zuo:

Mining the Relationship between Object-Relational Mapping Performance Anti-patterns and Code Clones. 136-141 - Haifeng Wang, Kun Yang, Xiangnan Zhao, Yuchen Cui, Weiwei Wang:

Contribution-based Test Case Reduction Strategy for Mutation-based Fault Localization (S). 142-145 - Anelis Pereira Vale

, Daniel Perovich, Sergio F. Ochoa:
Understanding the Pre-Contract Process of Small Software Projects. 146-151 - Junfeng Zhao, Wenhui Gai, Han Wu:

Fortran Code Refactoring Based on MapReduce Programming Model. 152-157 - Jiman Du, Jiaxin Zhu, Hui Liu, Wei Chen, Lijie Xu, Jie Liu, Zhifeng Chen:

A Case Study of Dependency Network for Building Packages: The Fedora Linux Distribution. 158-161 - Shuo Li, Jie Liu, Haoxiang Tian, Shuai Wang, Wei Chen, Liangyi Kang, Dan Ye:

EasyPip: Detect and Fix Dependency Problems in Python Dependency Declaration Files. 162-168 - Peiyang Li, Zixin Liu, Yuening Su, Hao Wang, Bo Jiang:

CAPS: An Efficient Whole-Program Critical Paths Search Framework for Large-Scale Software. 169-174 - Zhiyong Ren, Hui Xu:

Detect Stack Overflow Bugs in Rust via Improved Fuzzing Technique. 175-180 - Hao Zhu, Yichen Li, Jie Li, Xiaofang Zhang:

An Efficient Design Smell Detection Approach with Inter-class Relation (S). 181-186 - Tianmai Deng, Yixiao Xu, Chi Zhang, Zhengwei Qi:

Dissecting Scale-Out Applications Performance on Diverse TLB Designs (S). 187-192 - Yu Guo, Jun Guo, Mohan Shi, Aixuan Dong:

Real-time Estimation Approach to Scrum Projects Effort: Task Point and Individual Reliability (S). 193-196 - Zhiguo Li, Qin Li:

ASC4AI: A Novel Automatic Service Composition Framework for AI Systems (S). 197-202 - Omkarendra Tiwari

, Vrinda Yadav:
A Review of Methods for Identifying Extract Method Refactoring. 203-208 - Lufeng Wei, Zhi Li, Yuansong Qin:

Towards generating contextualised fault scenarios for reliability risk analysis of cyber-physical systems (P). 209-210
Session SEAI: Software Engineering and AI
- Zhenhua Zhang, Shizhan Chen, Guodong Fan, Guang Yang, Zhiyong Feng:

CCGRA: Smart Contract Code Comment Generation with Retrieval-enhanced Approach. 212-217 - Ed van Doorn, Sylvia Stuurman

:
Detecting Design Patterns As Described By An Explicit Specification (S). 218-221 - Jingjing Wang, Minhuan Huang, Yuanping Nie, Xiaohui Kuang, Xiang Li, Wenjing Zhong:

Fine-Grained Source Code Vulnerability Detection via Graph Neural Networks (S). 222-227 - Xinyan Yi, Hao Xu, Lu Lu, Quanyi Zou, Zhanyu Yang:

Software Defect Prediction via Positional Hierarchical Attention Network (S). 228-231 - Ran Mo, Yushuo Wang, Yao Zhang, Zengyang Li:

Just-in-Time Defect Severity Prediction (S). 232-237 - Jiaxin Liu, Hao Xu, Lu Lu, Quanyi Zou, Zhanyu Yang:

A Software Defect Prediction Method based on Multi-type Features and Feature Selection. 238-243 - Kirthy Kolluri, Tom Hill, Lawrence Chung:

Identifying Risks and Risk Mitigation Strategies for Collaborative Systems during Requirements Engineering: A Goal-Oriented Approach (S). 244-249 - Haochen Jin, Liwei Zheng, Zhanqi Cui:

AFL2oop: Loop Coverage Guided Greybox Fuzz Testing. 250-255 - Liang Sun, Peng Wu, Shaoxian Shu:

Research on Directed Grey-box Fuzzing Technology Based on Target (S). 256-261 - Wei Li, Zhiyi Zhang, Yifan Jian, Chen Liu, Zhiqiu Huang:

DeepRank: Test Case Prioritization for Deep Neural Networks. 262-267 - Shaojian Qiu, Shaosheng Wang, Yujun Liang, Wenchao Jiang, Fanlong Zhang:

Code Clone Detection via Software Visualization Representation Learning. 268-273 - Guang Yang

, Tiancheng Jin, Liang Dou:
Heterogeneous Directed Hypergraph Neural Network over abstract syntax tree (AST) for Code Classification. 274-279 - Shuaishuai Feng, Xi Wu, Yongxin Zhao, Yongjian Li:

Dispatching and Scheduling Dependent Tasks Based on Multi-agent Deep Reinforcement Learning. 280-285 - Qing Qi, Jian Cao:

GAT-Team: A Team Recommendation Model for Open-Source Software Projects. 286-291 - Yiheng Shen, Xiaolin Ju, Xiang Chen, Guang Yang:

An Empirical Study of Adversarial Training in Code Comment Generation. 292-297 - Jun Cheng, Honglei Su, Jari Korhonen:

No-Reference Point Cloud Quality Assessment via Weighted Patch Quality Prediction. 298-303 - Jie Li, Lixuan Li, Hao Zhu, Xiaofang Zhang:

GraphPLBART: Code Summarization Based on Graph Embedding and Pre-Trained Model. 304-309
Session KE: Knowledge Engineering
- Qia Wang, Yi Wang, Ying Wang:

An Efficient Lossless Graph Summarization Method for Large Streaming Graphs. 311-316 - Wen Sun, Yifan Li, Junfeng Yao, Qingqiang Wu, Kunhong Liu:

Combining Structure Embedding and Text Semantics for Efficient Knowledge Graph Completion. 317-322 - Li-E Wang, Huachang Zeng, Shenghan Li, Xianxian Li, Shengda Zhuo, Jiahua Xie, Bin Qu

, Zhigang Sun, Tianran Liu:
CRCC: Collaborative Relation Context Consistency on the Knowledge Graph for Recommender Systems (S). 323-328 - Yuxin Zhao, Xinjun Mao, Sun Bo, Tanghaoran Zhang

, Shuo Yang:
An Effective Method for Constructing Knowledge Graph to Search Reusable ROS Nodes (S). 329-332 - Bin Li, Jianwen Ding, Zhennan Chen, Hanpeng Jiang, Fan Lin:

Multi-Domain Feature Representation, Multi-Dimensional Feature Interaction for Person-Job Fit. 333-338 - Shizhao Huang, Yimin Wu, Jinwei Lu, Chao Deng:

Related Questions Detection Model in Stack Overflow based on Semantic Matching. 339-344 - Yifan Wang, Jibin Wang, Jing Shang, Zhuo Chen, Xuelian Ding, Heyuan Wang:

Learning Event Logic Graph Knowledge for Credit Risk Forecast. 345-350 - Junmin Zhu, Yizhao Yao, Xianwen Deng, Yaoguang Yong, Yanhao Wang, Libo Chen, Zhi Xue, Ruijie Zhao:

SAWD: Structural-Aware Webshell Detection System with Control Flow Graph. 351-356 - Tong Niu, Yicong Xu, Shengping Xiao, Lili Xiao, Yanhong Huang, Jianwen Li:

LTLf Satisfiability Checking via Formula Progression (S). 357-362 - Yifan Wang, Masaki Nakamura, Kazutoshi Sakakibara, Yuki Okura:

Formal Specification and Verification of an Autonomous Vehicle Control System by the OTS/CafeOBJ method (S). 363-366 - Magali Legast

, Axel Legay:
Assistance in the management of rule sets for rule-based expert systems (S). 367-372 - Mengyuan Wang, Tengfei Li, Jing Liu, Hui Dou, HongTao Chen, John Zhang, Lipeng Zhang:

Modeling and Verification of Autonomous Driving Systems under Stochastic Spatio-Temporal Constraints. 373-378
Session DPCC: Data Privacy and Cloud Computing
- Georg Grabner, Ali Ahmed, Nilufar Baghaei

:
Using Blockchain to Preserve Chain of Custody: Cloud Forensics Analysis (S). 380-385 - Wenxiu Xu, Ningjiang Chen, Huan Tu:

DNN Inference Task Offloading Based on Distributed Soft Actor-Critic in Mobile Edge Computing. 386-391 - Yuxin Xiang, Bing Deng, Hongyu Zhang, Randy Xu, Marc Mao, Yun Wang

, Zhengwei Qi:
Bindox: An Efficient and Secure Cross-System IPC Mechanism for Multi-Platform Containers. 392-397 - Xiguo Gu, Huiwen Yang, Shifan Liu, Zhanqi Cui:

Smart Contract Vulnerability Detection Based on Clustering Opcode Instructions. 398-403 - Yingjia Du, Yuan Fei, Sini Chen

, Huibiao Zhu:
Formalization and Verification of Data Auction Mechanism Based on Smart Contract Using CSP. 404-409
Session DMA: Data Mining and Analytics
- Gabriel Mac'Hamilton Renaux Alves, Alexandre Magno Andrade Maciel:

Survey on Data Ingestion for AutoML (S). 411-414 - Bowen Chen:

DGNN: Dynamic Graph Neural Networks for Anomaly Detection in Multivariate Time Series. 415-420 - Dolly Agarwal, Abdullah Al Imran

, Kasun S. Perera:
FOODIE: A Data-centric Sifting Framework for Social Media Analytics. 421-426 - Jie Xiong, Huiyuan Li, Qiyuan Duan, Qihan Du:

Towards Extreme Multi-label Text Classification Through Group-wise Label Ranking. 427-432 - Guangwei Zhang, Ming Jing, Yunjing Liu, Li Zhang, Anming Dong, Jiguo Yu:

Interactive Visualization of Temporal Brain Connectivity Data based-on Frequent Feature Mining (S). 433-436 - Peng Zhang, Zhaohui Zhang, Chaochao Hu, Pengwei Wang:

A Dynamic Drilling Sampling Method and Evaluation Model for Large-Scale Streaming Data. 437-442 - Bowen Chen:

ASTD: Automatic Seasonal-Trend Decomposition for Time Series. 443-448 - Lidan Zhao, Tong Li, Zhen Yang, Junrui Liu:

A novel subjective bias detection method based on multi-information fusion. 449-455 - Rongxi Guo, Wanrong Jiang, Xi Zhao, Ding Cao, Guiquan Liu:

ASMix: An Attention-based Smooth Data Augmentation Approach. 456-461 - Samuel Abedu, Solomon Mensah, Frederick Boafo, Eva Bushel, Elizabeth Akuafum:

An Optimal Spacing Approach for Sampling Small-sized Datasets. 462-467 - Wei Du

, Shifei Ding:
Heterogeneous Multi-Agent Communication Learning via Graph Information Maximization. 468-473 - Ziyi Zhang

, Rong Yan, Wei Yuan:
Identifying Influential Spreaders in Complex Networks Using Neighborhood Network Structure. 474-479
Session OAEP: Optimization Approaches for Enhanced Performances
- Bishshoy Das, Milton Mondal, Brejesh Lall, Shiv Dutt Joshi, Sumantra Dutta Roy:

Altering Backward Pass Gradients to Improve Convergence (S). 481-486 - Wei Liang, Wanghua Shi, Zhengyu Liao, Shiyou Qian, Zhonglong Zheng, Jian Cao, Guangtao Xue:

BOP: A Bitset-based Optimization Paradigm for Content-based Event Matching Algorithms (S). 487-492 - Yu Zhang, Ningjiang Chen, Siyu Yu:

Transient Data Caching Based on Maximum Entropy Actor-Critic in Internet-of-Things Networks. 493-498 - Yulong Wang

, Kai Deng, Fanzhi Meng, Zhi Chen, Mingyong Yin, Run Yang:
Branchy-TEE: Deep Learning Security Inference Acceleration Using Trusted Execution Environment. 499-504 - Yaodanjun Ren, Chen Chen

, Zhengwei Qi:
HaeNAS: Hardware-Aware Efficient Neural Architecture Search via Zero-Cost Proxy. 505-510 - Rong Wu:

L*-Based Learning of Probabilistic Timed Automata with One Clock (S). 511-516
Session MLDLA: Machine Learning and Deep Learning Applications
- Shunwen Shen, Lvqing Yang, Sien Chen, Wensheng Dong, Bo Yu, Qingkai Wang:

DeepMultiple: A Deep Learning Model for RFID-based Multi-object Activity Recognition. 518-523 - Shuai Li, Bing Shi, Yaping Deng:

A Dynamic Matching Time Strategy Based on Multi-Agent Reinforcement Learning in Ride-Hailing. 524-529 - Zhennan Chen, Zhicheng Zhang, Pengfei Li, Lingyue Wei, Shibo Feng, Fan Lin:

mTrader: A Multi-Scale Signal Optimization Deep Reinforcement Learning Framework for Financial Trading (S). 530-535 - Lei Mao, Jianxia Chen, Shi Dong, Liang Xiao, Haoying Si, Xinyun Wu:

Aspect-level Sentiment Analysis Based on Convolutional Network with Dependency Tree. 536-541 - Georg Stettinger, Franz Wotawa

:
Smart Monitoring for Safety-Assurance in Autonomous Driving (S). 542-547 - Xingchen Ding, Chong Teng, Donghong Ji:

Fake News Detection with Context Awareness of the Publisher. 548-553 - Bakhta Haouari, Rania Mzid

, Olfa Mosbahi:
PSRL: A New Method for Real-Time Task Placement and Scheduling Using Reinforcement Learning. 554-559 - Rui Xu, Cheng Zeng, Yujin Liu, Peng He, Min Chen:

A Triplet Network Approach for Chinese Confusing Text Classification. 560-565 - Xingfu Li

, Bangchao Wang, Hongyan Wan, Yang Deng, Zihan Wang:
Applications of Machine Learning in Requirements Traceability: A Systematic Mapping Study (S). 566-571 - Chen Qian, Hui Xiong, Jiyun Li:

FeDeFo: A Personalized Federated Deep Forest Framework for Alzheimer's Disease Diagnosis. 572-577 - Kang Zhong, Wu Guo, Bin Gu, Weitai Zhang, Chao Lin:

A Detection-based Attention Alignment Method for Document-level Neural Machine Translation. 578-583 - Gaoyi Lin, Zhihua Zhang, Zhanqi Cui:

Widget Hierarchy Graph Guided Crash Reproduction Method for Android Applications (S). 584-587 - Xing Zhang, Tinglong Tang, Yirong Wu, Tingwei Quan:

Construction Site Fence Recognition Method Based on Multi-Scale Attention Fusion ENet Segmentation Network (S). 588-593 - Jingxia Zeng, Mianfan Chen, Jianing Liu, Yuncheng Jiang:

SLPKT: A Novel Simulated Learning Process Model for Knowledge Tracing. 594-599 - Chen Qian, Boyin Yang, Jiyun Li:

SARNet: A Self-Attention Embedded Residual Network for Multiclass Classification of Chronic Wounds (S). 600-603 - Yimin Peng, Rong Hu, Yiping Wen:

AT-NCF: An Attention-based Time-aware Neural Collaborative Filtering Approach for Personalized Recommendation (S). 604-607 - Cairong Yan, Xiaopeng Guan, Haixia Han, Zhaohui Zhang:

MB-DP: A Multi-behavior Recommendation Model Integrating Dynamic Preferences. 608-613
Session LMQA: Language Models and Question Answering
- Aoxing Wang, Pengfei Duan, Yongbing Li, Wenyan Hu, Shengwu Xiong:

LMGFuse: Language Models and Graph reasoning Fuse deeply for question answering. 615-620 - Zuotong Xie, Kai Ouyang, Xiangjin Xie, Hai-Tao Zheng, Wenqiang Liu, Dongxiao Huang, Bei Wu:

KLAPrompt: Infusing Semantic Knowledge into Pre-trained Language Models by Long-answer Prompt Learning. 621-626 - Xingang Wang, Xiaomin Li, Xiaoyu Liu:

Reinforced Multi-modal Circulant Fusion based Transformers for Rumor Detection (S). 627-631 - Qian Wang, Cheng Zeng, Yujin Liu, Peng He:

A Medical Question Classification Approach Based on Prompt Tuning and Contrastive Learning (S). 632-635 - Xiaoyan Gao, Ji Chen, Xiangqian Ding, Shuo Shi, Junhua Jia, Xiaowei Xin:

An intelligent question answering system based on RoBERTa-WWM under home appliance knowledge graph (S). 636-641 - Yingshuai Kou, Neng Gao, Yifei Zhang:

Variational Autoencoder with Stochastic Masks to Solve Exposure Bias in Recommendation (S). 642-645 - Fengyong Peng, Xi Wu, Yongxin Zhao, Yongjian Li:

Anaphora Ambiguity Detection Method Based on Cross-domain Pronoun Substitution (S). 646-649 - Zhe Wen, Yatao Qi, Huan Liu, Zheng Lin, Weiping Wang

:
Multi-source Machine Reading Comprehension with Meta-Learning and Adaptive Adversarial Training. 650-655 - Tong Zhang, Ailing Tang, Rong Yan:

Enhanced BERT with Graph and Topic Information for Short Text Classification (S). 656-659 - Xi Tao, Hao Wang, Xiangfeng Luo, Pinpin Zhu:

Few-Shot Link Prediction using Variational Heterogeneous Attention Networks. 660-665 - Xingchen Ding, Chong Teng, Donghong Ji, Fei Li:

HGAPT: Heterogeneous Graph Augmented Prompt Tuning for Low-Resource Fake News Detection. 666-671 - Yunlai Luo:

Token-level Input Grammar Synthesis (P). 672-673
Session CVA: Computer Vision and Applications
- Puhui Qu, Keyu Chen, En Cheng:

YOLOv7-marine: An Improved YOLOv7 Model for Object Detection in Marine Environments (S). 675-678 - Yuheng He, Wenbin Yang, Xiangfeng Luo, Liyan Ma, Shaorong Xie:

Object-Level Contrast Learning for 3D Sparse Object Detection in Ocean Scene. 679-684 - Qiaoning Lei, Yinsai Guo

, Liyan Ma, Xiangfeng Luo:
Few-Shot Object Detection via Instance-wise and Prototypical Contrastive Learning. 685-690 - Jiyun Li, Sheng Yang, Qian Chen:

SWS-NET: An Image Segmentation Framework For Chronic Wounds Based On Self-Supervised Learning. 691-696 - Shouhong Wan, Rui Wang, Peiquan Jin, Xuebin Yang:

BDC-FR: Faster R-CNN with Balanced Domain Classifier for Cross-Domain Object Detection (S). 697-700 - Yang Luo, Rongheng Lin:

MBR-MDA: Multi-person Behavior Recognition Method Based on Multi Descriptors Aggregations. 701-706

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














