


default search action
14th TASE 2020: Hangzhou, China
- Toshiaki Aoki, Qin Li:

International Symposium on Theoretical Aspects of Software Engineering, TASE 2020, Hangzhou, China, December 11-13, 2020. IEEE 2020, ISBN 978-1-7281-4086-5 - Gaigai Tang, Lianxiao Meng, Huiqiang Wang, Shuangyin Ren, Qiang Wang, Lin Yang, Weipeng Cao:

A Comparative Study of Neural Network Techniques for Automatic Software Vulnerability Detection. 1-8 - Hong Lu

, Jiacheng Gui, Chengyi Wang, Hao Huang:
A Novel Data-Driven Approach for Generating Verified Loop Invariants. 9-16 - Shiming Guo, Xin Chen, Dongjin Yu:

Defect Report Severity Prediction Based on Genetic Algorithms and Convolutional Neural Network. 17-24 - Feifei Xu, Guanqun Ding, Wenkai Zhang, Shanlin Zhou

:
RKC-H: A Rich Knowledge Based Model for Multi-turn Dialogue Generation. 25-32 - Liu Yang, Zhou Chen, Yiqing Feng, Zhifang Liao, Zhigang Hu, Jun Long:

WLeidenRDF: RDF Data Query Method based on Semantic-Enhanced Graph-Clustering Algorithm. 33-40 - Wanling Xie, Huibiao Zhu, Shengchao Qin:

An Axiomatic Approach to BigrTiMo. 41-48 - André de Matos Pedro, Martin Leucker

, David Pereira, Jorge Sousa Pinto
:
Real-time MTL with durations as SMT with applications to schedulability analysis. 49-56 - Chenyang Zhu, Michael J. Butler, Corina Cîrstea:

Real-Time Trigger-Response Properties for Event-B Applied to the Pacemaker. 57-64 - Yao Li, Wenbing Tang

, Bochen Chen, Zuohua Ding:
Tracking a Ground Moving Target with UAV Based on Interval Type-2 Fuzzy Logic. 65-72 - Chunyuan Wu, Aijuan Qian, Xiaoju Dong, Yanling Zhang:

Feature-oriented Design of Visual Analytics System for Interpretable Deep Learning based Intrusion Detection. 73-80 - Kai Zhang, Yongtai Zhang, Liwei Zhang, Hongyu Gao, Rongjie Yan, Jun Yan:

Neuron Activation Frequency Based Test Case Prioritization. 81-88 - Wenjing Xul, Yongwang Zhao, Dianfu Ma, YuXin Zhang, Qian Xiao:

Rely-Guarantee Reasoning about Messaging System for Autonomous Vehicles. 89-96 - Jianlin Wang, Chao Peng, Zhenbing Zeng:

A Formal Proof of the Soundness of the Hybrid CPS Clock Theory. 97-104 - Daisuke Ishii, Saito Fujii:

Formalizing the Soundness of the Encoding Methods of SAT-based Model Checking. 105-112 - Shiraj Arora, M. V. Panduranga Rao:

The Bouquet Algorithm for Model Checking Unbounded Until Properties. 113-120 - Chenyi Zhang

, Jun Pang:
Characterising Probabilistic Alternating Simulation for Concurrent Games. 121-128 - Wenjing Chu, Marcello M. Bonsangue

:
Learning Probabilistic Languages by k-Testable Machines. 129-136 - Liu Yang, Li Wang, Zhigang Hu, Yanwen Wang, Jun Long:

Automatic Tagging for Open Source Software by Utilizing Package Dependency Information. 137-144 - Robert Husák, Filip Zavoral

, Jan Kofron
:
Optimizing Transformations of Dynamic Languages Compiled to Intermediate Representations. 145-152 - Zhiwu Xu, Xiongya Hu, Yida Tao, Shengchao Qin:

Analyzing Cryptographic API Usages for Android Applications Using HMM and N-Gram. 153-160 - Chen-Guang Mao, Hao Wang, Gao-Jie Han, Xiaofang Zhang:

Droidlens: Robust and Fine-Grained Detection for Android Code Smells. 161-168 - Chenghao Cai, Jing Sun, Gillian Dobbie:

Measuring the Quality of B Abstract Machines with ISO/IEC 25010. 169-176 - Zuohua Ding, Qingfen Zhang, Mingyue Jiang:

Metamorphic Testing of Code Search Engines. 177-184 - Chunyan Mu:

A Language-based Approach to Analysing Flow Security Properties in Virtualised Computing Systems. 185-192 - Zhen Wang, Xiaoning Han, Weiqiang Kong, Yong Piao, Gang Hou, Masahiko Watanabe, Akira Fukuda:

A Multi-Strategy Combination Framework for Android Malware Detection Based on Various Features. 193-200 - Mengmeng Jiang, Xiaohong Li, Xiaofei Xie

, Yao Zhang:
An Empirical Study in Software Verification Tools. 201-208 - Shenglin Xu, Peidai Xie, Yongjun Wang:

AT-ROP: Using static analysis and binary patch technology to defend against ROP attacks based on return instruction. 209-216 - Xiaohong Chen, Frédéric Mallet

, Xiaoshan Liu:
Formally Verifying Sequence Diagrams for Safety Critical Systems. 217-224 - Yu Zhang, Xiaohong Li:

The Scheme of Security Requirement Acquisition Based on Knowledge Graph. 225-231

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














