default search action
DSA 2023: Tokyo, Japan
- 10th International Conference on Dependable Systems and Their Applications, DSA 2023, Tokyo, Japan, August 10-11, 2023. IEEE 2023, ISBN 979-8-3503-0477-0
- Siqi Gu, Zhaowei Zong, Fangyuan Tian, Zhenyu Chen:
DVTest: Deep Neural Network Visualization Testing Framework. 1-11 - Jean Jimmy Julien, Sirapop Nuannimnoi, Ching-Yao Huang:
Automated Pricing-based Provisioning of SDN/NFV Services in Distributed Multi-access Edge Computing using Cooperative Multi-Agent Deep Reinforcement Learning. 1-12 - Yujia Fan, Siyi Wang, Sinan Wang, Yepang Liu, Guoyao Wen, Qi Rong:
A Comprehensive Evaluation of Q-Learning Based Automatic Web GUI Testing. 12-23 - Jing Liu, Yihao Wang, Yang Wu:
Adversarial Sample Detection for BERT Model Based on Sample Sensitivity Characteristics. 24-34 - Changsheng Du, Yong Li, Yue Wang, Junjie Yu:
Study on Automatic Code Summary Generation Method based on Graph Neural Network. 35-41 - Donglin Li, Zixuan Liu, Jiaxin Pan, Bixin Li:
Evaluating the Resilience of Software Architecture Based on Minimal Path. 42-53 - Adelina Aleksieva-Petrova, Milen Petrov:
Empirical Study on Secure Software Development. 54-59 - Veikko Markkanen, Tapio Frantti:
Patch management planning - towards one-to-one policy. 60-69 - Jinchang Hu, Kang Sun, Sen Yang, Zhanwei Hui, Song Huang:
A Software Security Testing Model for Autonomous Systems. 70-74 - Xiujing Guo, Hiroyuki Okamura, Tadashi Dohi:
Towards High-Quality Test Suite Generation with ML-Based Boundary Value Analysis. 75-85 - Yin Zhao, Meng Li, Jie Liu:
A Review of Metamorphic Relation Representation Forms. 86-93 - Jordan Doyle, Thomas Laurent, Anthony Ventresque:
Modelling Android applications through static analysis and systematic exploratory testing. 94-104 - Christoph Luckeneder, Ralph Hoch, Hermann Kaindl:
Towards Using Structural Abstraction for Model Checking. 105-113 - Xin Li, Shengcheng Yu, Lifan Sun, Yuexiao Liu, Chunrong Fang:
Towards Effective Bug Reproduction for Mobile Applications. 114-125 - Sirapop Nuannimnoi, Florian Delizy, Ching-Yao Huang:
HyperFed: Free-riding Resistant Federated Learning with Performance-based Reputation Mechanism and Adaptive Aggregation using Hypernetworks. 126-134 - Hiroshi Tanaka, Masaru Ide, Kazuki Munakata, Hironori Washizaki, Nobukazu Yoshioka:
Activity-based modeling strategy for reliable machine learning system analysis targeting GUI-based applications. 135-143 - Lingjie Wang, Yunfeng Zhu, Siqi Gu, Zhenyu Chen:
Real-time Fruit Detection Method Based on RGB-D Image Fusion. 156-166 - Wenquan Tian, Shanshan Li, Chengfang Tan, Zhiwei Zhang, Lin Cui:
Research on Label Distribution Dimension Reduction Algorithm Based on MLDA. 167-172 - Yihao Xiong, Jinbo Wang, Yuanlin Xin, Chi Zhang, Panpan Xue:
An Attention Mechanism Based Approach for Multivariate Time Series Anomaly Detection. 173-181 - Jue Wang, Yitao Wang, Dianwen Liu, Hao Long:
Anti-sea Operation Knowledge Modeling of Aircraft Carrier Formation Based on Key Knowledge and Symbiotic Relationship of Conditions. 182-189 - Nanxiang Qiu, Siqiao Li, Tadashi Dohi, Hiroyuki Okamura:
Another Look at Non-homogeneous Markovian Software Reliability Modeling. 190-199 - Xingjun Chen, Zimeng Wang, Junpeng Zhang:
Dynamic Assignment of Multi-UAV Marine Search and Rescue Missions Under the Condition of Intelligence Support. 200-210 - Alexander Perko, Haoran Zhao, Franz Wotawa:
Optimizing Named Entity Recognition for Improving Logical Formulae Abstraction from Technical Requirements Documents. 211-222 - Hongquan Shi, Jinbo Gong:
Knowledge Representation and Reasoning of Strong System Confrontation Process Based on Spatio-Temporal Event Evolution Information Flow and Software. 223-232 - Ao Xu, Yi Zhu, Yuxiang Gao, Qiao Yu, Guosheng Hao:
Validity Analysis of Software Defect Prediction Model for Mis-label Correction Based on CleanLab. 233-241 - Huiling Song, Yong Li, Wenjing Zhang, Ying Liu:
Research on Aggregation of Federated Model for Software Defect Prediction Based on Dynamic Selection. 242-249 - Veikko Markkanen, Tapio Frantti:
Secure 3rd party software integration. 250-259 - Chidi Agbo, Hoda Mehrpouyan:
Achieving Cyber-Informed Engineering Through Bayesian Belief Network and Sensitivity Analysis. 260-271 - Alvi Jawad, Jason Jaskolka:
Single and Combined Cyberattack Impact on Industrial Wastewater Systems. 272-281 - Elena Troubitsyna:
Employing Redundancy to Leverage Cybersecurity Protection of Safety-Critical Systems. 282-287 - Thowayba M. Elkaffash, Armstrong Nhlabatsi:
Data-Leashing: Towards a Characterization of The Problem and Its Solution. 288-295 - Songlin Yang, Zhida Bao, Yun Lin:
A Comprehensive and Credible Assessment Method for Model Adversarial Robustness under Modulated Signal Identification. 296-301 - Awad A. Younis, Yi Hu, Ramadan Abdunabi:
Analyzing Software Supply Chain Security Risks in Industrial Control System Protocols: An OpenSSF Scorecard Approach. 302-311 - Bangrui Wan, Yuduo He, Xin Liu, Shiyu Wang, Ying Qian:
Host Intrusion Detection Method Based on Short Sequence of System Call. 312-322 - Yuanlin Xin, Jinbo Wang, Yihao Xiong, Ruixue Wang, Zhaohui Yao:
An Unsupervised Deep Learning Approach for Health Assessment of Distributed Systems. 323-332 - Shengnan Hu, Ruihan Mao, Hua Li:
Research on Deep Learning-Based SAR Image Denoising Algorithm. 333-338 - Yuyang Zhang, Jiangcheng Wang, Xiaobing Wang, Yingnan Wang, Sijiang Yu:
Research and Application of Loitering Detection Based on Deep Learning. 339-346 - Xin Liu, Jianping Ma, Dengjian Qiao, Chunhua Lian:
A Click-through Rate Prediction Method Based on Interaction Features Extraction for High-dimensional Sparse Data. 347-355 - Yihong Liu, Xingjun Chen:
A Priority-based Dynamic Chain Operation Planning Model. 356-359 - Yahui Tang, Mengqi Rao, Qingjie Wei, Feng Chen, Xin Liu:
A Software Execution Data Component Identification Algorithm Based on Spectral Clustering. 360-368 - Hui Tang, Lizhi Wang, Lingfei You, Mengfei Yao, Xiaohong Wang:
A quantitative analysis method for model uncertainty based on Verification, Validation, and Uncertainty Quantification. 369-378 - Chenyu Wang, Yi Zhu, Mei Song:
An Adaptive Learning Feature Model Validation Methodology Based on Formal Methods. 379-388 - Jinlei Sun, Zhanwei Hui, Xiaojuan Wang, Xu Cao, Shuang Song:
Move Smart Contract Vulnerability Detection based on Resource-flow Analysis. 389-398 - Chien-Fu Cheng, Bo-Yan Liao:
An Enhanced Approach for RFID Reader Deployment in Industrial IoT Systems with Collision Avoidance and Optimized Coverage. 399-405 - Weikang Li, Yong Li, Changqing Zheng, Ruiqi He:
Blockchain-based Model for Privacy-enhanced Data Sharing. 406-417 - Dongcheng Li, W. Eric Wong, Sean Pan, Liang-Seng Koh, Nicholas Chau:
Automatic Generation of Solidity Test for Blockchain Smart Contract using Many Objective Search and Dimensionality Reduction. 418-430 - Liliana Marie Prikler, Franz Wotawa:
A Systematic Mapping Study of Digital Twins for Diagnosis in Transportation. 431-442 - Tzu-Yang Lin, Chin-Yu Huang, Chih-Chiang Fang:
Using the Deep Learning-Based Approaches for Program Debugging and Repair. 443-454 - Chan Yin, Yi Zhu, Jinyong Wang, Guosheng Hao:
Spatio-Temporal Rule Constraint Guided Safe Reinforcement Learning for CPS. 455-465 - Yingqiang He, Qi Su, Hao Long:
Task Allocation of Multi UAV Based on Genetic Algorithm. 466-467 - Minjeong Lee, Younga Kwon, Suyeong Kim, Miran Lee:
Visual Feedback Using VR Patient Avatar in Care and Nursing Training Environments. 468-469 - Wen-Tin Lee, Ping-Yi Song, Ming-Kai Tsai, Meng-Hsien Wu, Shang-Pin Ma:
A High Availability Microservices Architecture Implementation using Saga and Backup Mechanism. 470-471 - Wen-Tin Lee, Zhi-Yao Yang, Zhun-Wei Liu, Shin-Jie Lee:
Containerized Microservices Deployment Approach based on Ant Colony Optimization. 472-473 - Aibin Yan, Xuehua Li, Tianming Ni, Zhengfeng Huang, Xiaoqing Wen:
A Robust and High-Performance Flip-Flop with Complete Soft-Error Recovery. 474-476 - Scott Lupton, Lena Yu, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Assessment of Real-World Incident Detection Through a Component-Based Online Log Anomaly Detection Pipeline Framework. 477-478 - Jingjing Li, Kai Sheng, Lei Ao, Makoto Itoh, Qinghai Yang:
Image Transmission Based on Semantics Communication in Vehicle-Infrastructure Collaboration System. 479-486 - Zhixuan Wu, Nan Ma, Tao Zhi, Genbao Xu:
Spatial-Temporal Hypergraph Neural Network based on Attention Mechanism for Multi-view Data Action Recognition. 487-493 - Ramnik Singh Reen, Gaurav Dharmani, Rahul Gothwal, Eslam G. AbdAllah:
Evaluation of Wireless Deauthentication Attacks and Countermeasures on Autonomous Vehicles. 494-501 - Rahul Gothwal, Gaurav Dharmani, Ramnik Singh Reen, Eslam G. AbdAllah:
Evaluation of Man-in-the-Middle Attacks and Countermeasures on Autonomous Vehicles. 502-509 - Fumito Kuroyanagi, Eriko Uno, Kohji Ichikawa, Kohji Nagase, Hideo Inoue:
An Automatic Sensing Weakness Detection Method For Autonomous Vehicle Assessment. 510-518 - Qi Su, Feifan Liu, Hongquan Shi, Haoxiang Xia, Zhengwei Ma:
Research on Resilience of Maritime Distributed Combat Network Under Targeted Attacks. 519-526 - Junfeng Nie:
A Method for Evaluating the Effectiveness of Combat Plans Based on Matter-element Extension Model with Variable Weight. 527-531 - Lian Liu, Dongpu Sun:
Research on Multi-agent PPO Reinforcement Learning Algorithm based on Knowledge Graph. 532-536 - Zhiquan An, Junyi Huang, Guotao Jiao, Longfei Liu, Changxi Feng:
Chat-EasyEdu: An Education Field Intelligent Question-Answering System Based on Knowledge Graphs. 537-546 - Pan Liu, Li Li, Yihao Li:
A Stacking-Based Heart Disease Classification Prediction Model. 547-553 - Yudong Cao, Minping Jia, Jichao Zhuang:
Health Trend Prediction of Rolling Bearings using Transferable Autoregressive Recurrent Adaptation Approach. 554-558 - Wenchang Zhu, Peng Huang:
Performance Degradation Assessment of Rolling Bearing Based on Difference of Eigenvalues in Random Matrix Theory. 559-564 - Zhikuan Chen, Yufeng Sun, Yuqing Xue:
Reliability Analysis For Thin Film Thermocouple Thermal Oxidation Failure Based On Interlayer Diffusion. 565-574 - Zikang Tao, Rihui Sun, Jian Dong:
Software Countermeasures against DVFS fault Attack for AES. 575-582 - Pratomo Adinegoro, Chin-Chun Chang, Deron Liang:
Robust Model for Adversarial Attack Protection through Weak Features Removal. 583-584 - Chih-Chiang Fang, Chin-Yu Huang:
A Multiple-Criteria Ensemble Weight Strategy to Increase the Effectiveness of Deep Learning-based Fault Localization. 585-586 - Kuan-Wei Chiu, Shih-Sheng Yang, Shin-Jie Lee, Wen-Tin Lee:
An Empirical Evaluation of the Effectiveness of Spider and Proxy Modes for Web Security Testing. 587-588 - Takuma Tsuchida, Rikuho Miyata, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Automatic Detection of Abstract-Concrete Relationships between Attack Patterns of ATT&CK and CAPEC with Fine-tuned BERT. 589-590 - Shang-Pin Ma, Yu-Yung Yang, Shin-Jie Lee, Hang-Wei Yeh:
UTEMS: A Unit Testing Scheme for Event-driven Microservices. 591-592 - Jomphon Runpakprakun, Jati H. Husen, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Towards Integrated Model-Based Machine Learning Experimentation Framework. 593-594 - Yihao Li, Jialong Xu, Yinghua Zhu, Huashuo Liu, Pan Liu:
The Impact of ChatGPT on Software Engineering Education: A Quick Peek. 595-596 - Cheng Wei, Fei Hui, Xiangmo Zhao, Shanke Li, Jie Wei:
An Easy-portable Displacement-offset-based Trajectory Prediction Method for Autonomous Vehicles. 597-605 - George Daoud, Mohamed El-Darieby, Khalid Elgazzar:
Prediction of Autonomous Vehicle Trajectories in Turnaround Scenarios. 606-613 - George Daoud, Mohamed El-Darieby:
Towards a Benchmark for Trajectory Prediction of Autonomous Vehicles. 614-622 - Chuansheng Xiao, Nan Ma, Kongjian Qin, Genbao Xu, Mohan Wang:
BIR-AHC: Balanced Iterative Reducing and Agglomerative Hierarchical Clustering for Stair Detection. 623-627 - Shuai Liu, Fan Ren, Guo Yang, Dingchang He, Yonggang Liu:
Employing Deep Unsupervised Learning Method to Identify Testing Scenarios for Automated Vehicles. 628-635 - Ying Zheng, Hailang Zhang, Jialu Du, Chiangyu Hu, Hong Bao:
Automated Labelling of Traffic Police Data Based on Weak Supervision. 636-644 - Wei Qi, Hongjin Zhou, Tianpei Wang, Jiawei Hu:
Research on Decision Assistant Software for Ship Aircraft Collaborative Search and Rescue. 645-646 - Yinggang Zhang, Li Liu, Jinming Liu, Yihao Li, Pan Liu:
An Improved H∞ Filtering based on Information Attack over Discrete Linear Systems. 647-651 - Yujuan Cheng:
QA4C: An Intelligent Question and Answering System for the C Programming Language Based on Knowledge Graph. 652-657 - Ziyang Weng, Han Zheng, Ming Yang:
A Research on the Factors Influencing Cyberchondria from the Perspective of Online Health Information Seeking. 658-667 - Jingchi Wu, Tadashi Dohi, Hiroyuki Okamura:
Software Reliability Modeling Based on Zero-truncated and/or Zero-inflated Compound Distributions. 668-679 - Yu Du, Shaoying Liu:
Maintainability Assessment for SOFL Formal Specifications. 680-687 - Kosuke Ito, Keita Tanaami, Xiao Xiao:
Application of mathematical quantification theory class III in software effort prediction. 688-697 - Thomas Hirsch, Franz Wotawa:
Analysing Residual Risks when Introducing Monitoring and Diagnosis into Systems. 698-709 - Shakthivelu Janardhanan, Carmen Mas Machuca:
Availability modeling and evaluation of switches and data centers. 710-721 - Chen Li, Junjun Zheng, Peng Ju, Yasuhiko Morimoto:
Senti-EGCN: An Aspect-Based Sentiment Analysis System Using Edge-Enhanced Graph Convolutional Networks. 722-729 - Hisashi Kanda, Hiroyuki Okamura, Tadashi Dohi:
A Note on Optimal Retraining Strategy for ML Systems. 730-733 - Mingyue Zhang, Xiao-Yi Zhang, Paolo Arcaini, Fuyuki Ishikawa:
An Investigation of the Behaviours of Machine Learning Agents Used in the Game of Go. 734-742 - Tao Zheng, Shijun Zhao, Kun Qiu, Pak-Lok Poon, Lanlin Yu:
Using Complex Network Communities to Evaluate the Correctness of Object Detection. 743-750 - Kun Qiu, Shuo Wang, Pak-Lok Poon:
An Empirical Study of Fault Detection Effectiveness of Metamorphic Testing for Object Detectors. 751-758 - Xingzhe Wu, Qiang Zhou:
A Visualization-aware Loss for Point Cloud Comparison. 759-769 - Dominic Phillips, Talal Halabi, Mohammad Zulkernine:
Autonomous and Security-Aware Dynamic Vehicular Platoon Formation. 770-781 - Yang Zou, Shaoyi Du, Hongcheng Han, Yuying Liu, Zhiqiang Tian:
Two-Stream (2+1)D CNN Based on Frame Difference Attention for Driver Behavior Recognition. 782-788 - Tianqi Qie, Weida Wang, Chao Yang, Ying Li:
Lane-Changing Decision-Making Method for Autonomous Vehicles Considering Multi-Vehicle Interactions. 789-793 - Xiaomin Chen, Xi Han, Yuansheng Liu:
Research on Intelligent Monitoring Method of Medicine Delivery Vehicle Based on Internet of Things Technology. 794-799 - Wei Wei, Yongjie Shu, Zhifang Ke, Kangdi Fan, Linwei Dong:
Study on Roll Oscillation Phenomenon and Controller Design of Deflection-based Flying Vehicles. 800-809 - Bei Liu, Wan Tao, Sanming Liu:
Prototypical Networks with Dual Attention and Regularization for Few-Shot Relation Classification. 810-815 - Jing Wang, Ganyi Tang, Yong Wang:
Application in Student Performance Prediction Using Graph Regularization Nonnegative Matrix Factorization. 816-820 - Yunyun Yi, Jing Wang:
A RFID-Based Smart Socket Design. 821-824 - Li Li, Chen Li, Jiaqin Han, Yong Wang:
Data-intelligence Empowering Libraries: Research on Discipline-Specific Precision Services. 825-830 - Haoran Su, Jun Ai, Dan Yu, Hong Zhang:
An Evaluation Method for Large Language Models' Code Generation Capability. 831-838 - Dan Yu, Jun Ai, Haorao Su, Hong Zhang:
Assessing ChatGPT's Comprehension of Perturbed Text through Text Linguistic Features. 839-850 - Jianfu Liang, Jun Ai:
Improving Accuracy of Small Object Detection in Screen based on YOLOv7. 851-859 - Junda Zhu, Jun Ai, Tao Shi, Congran Zhang, Xinyue Wu:
An Intelligent Labeling and Dataset Generating Method for Desktop Application Element Object Detection. 860-869 - Jingchi Wu, Tadashi Dohi, Hiroyuki Okamura:
Tool Development of Daubechies Wavelet Estimation for Stochastic Counting Processes. 870-879 - Zeming Dong, Qiang Hu, Zhenya Zhang, Jianjun Zhao:
On the Effectiveness of Graph Data Augmentation for Source Code Learning. 880-889 - Zhaoming Wang, Siqian Gong, Yang Liu:
Convolutional Neural Network based Digital Twin of Rolling Bearings for CNC Machine Tools in Cloud Computing. 890-895 - Jia Song, Weize Shang, Boxuan Wu, Shaojie Ai:
Fault location and separation method of Distributed Inertial Measurement Units based on IAC. 896-904 - Jin Zhou, Dexin Li, Tongping Liu:
Profile Dynamic Memory Allocation in Autonomous Driving Software. 905-914 - Yuanzhe Jin, Maorong Wang:
ChatGPT Integration in AVS: Opportunities and Challenges. 915-916
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.