


default search action
23rd QRS 2023: Chiang Mai, Thailand - Companion
- 23rd IEEE International Conference on Software Quality, Reliability, and Security, QRS 2023 Companion, Chiang Mai, Thailand, October 22-26, 2023. IEEE 2023, ISBN 979-8-3503-5939-8

- W. Eric Wong, T. H. Tse, Suphamit Chittayasothorn, He Jiang:

Message from the Chairs QRS 2023. xx-xxi - Peishan Huang, Weijiang Hong, Zhenbang Chen, Ji Wang:

CSP based Formal Modeling and Verification of Behavior Trees. 1-2 - ChenXin Pang, Ya Pan, Hanli Bai:

Metamorphic Testing for the Deepfake Detection Model. 1-8 - Jianhong Wang, Yuta Ishimoto

, Masanari Kondo, Yasutaka Kamei, Naoyasu Ubayashi:
Uncertainty-aware Metamorphic Testing for Robust Object Detection Models. 9-17 - Yuqi Hang, Chen Liu, Lifa Hu, Xinyi Gao:

Requirements-Driven Logic Testing for Deep Neural Networks. 18-24 - Yuanyuan Long, Yong Fan, Ya Pan:

Metamorphic Testing for Traffic Sign Detection and Recognition. 25-34 - Azeem Ahmad, Francisco Gomes de Oliveira Neto, Eduard Paul Enoiu, Kristian Sandahl, Ola Leifler:

The Comparative Evaluation of Test Prioritization Approaches in an Industrial Study. 35-44 - Jing Liu, Zijian Wang:

Optimal Second-Order Mutants Reduction Based on MOEA/D. 45-54 - Rui Su, Zhiyi Zhang, Yuqian Zhou, Yongming Yao:

Test Generation for Mutation Testing by Symbolic Execution. 55-61 - Sangharatna Godboley, Monika Rani Golla, P. Radha Krishna:

SC-MCC: A Stronger Code Coverage Criterion. 62-71 - Gaolei Yi, Zizhao Chen, Zhenyu Chen, W. Eric Wong, Nicholas Chau:

Exploring the Capability of ChatGPT in Test Generation. 72-80 - Junyuan Teng, Tingting Yu, Rui Chen, Dongdong Gao, Chunpeng Jia:

DeepHC: Efficient Generating Tests with High Coverage for Deep Neural Networks. 81-82 - Wenjing Zhang, Yong Li, Ming Wen, Ruiqi He:

Comparative Study of Ensemble Learning Methods in Just-in-time Software Defect Prediction. 83-92 - Yue Wang, Yong Li, Yuanyuan Ren, Junjie Yu:

Enhancing Cross-Project Just-In-Time Defect Prediction with Active Deep Learning. 93-102 - Feng Qiu, Pu Ji, Baojian Hua, Yang Wang:

CHEMFUZZ: Large Language Models-Assisted Fuzzing for Quantum Chemistry Software Bug Detection. 103-112 - Qiuying Li, Yulin Wen, Zitong Yan, Fuping Zeng:

METCN: A Multi-Task Enhanced TCN Model for Software Fault Detection and Correction Prediction. 113-121 - Vo Dai Trinh, Yuri Nishimura, Haibo Yu:

Development of a Web System for Detecting Bugs in Probabilistic Programs. 122-130 - Tong Wan, Lu Lu, Hao Xu, Quanyi Zou:

Software Vulnerability Detection via Doc2vec with path representations. 131-139 - Qi Yang, Hui Zhang, Xuanzheng Wang:

Software Vulnerability Detection Based on Binary Intermediate Slicing. 140-147 - Sangharatna Godboley, Shubhank Kulshreshtha, Prayanshu Agarwal, B. Ranilbala:

PRCMHFL: A Fault Localization Technique Based on Predicate Ranking and CMH Method. 148-156 - Vladislav Dubrovenski, Md Nazmul Karim, Erzhuo Chen, Dianxiang Xu:

Dynamic Access Control with Administrative Obligations: A Case Study. 157-166 - Yang Xu, Zhuotai Chen:

Familial Graph Classification of Malware based on Structured API Call Sequences. 167-175 - Pavel Dovgalyuk, Maria Klimushenkova, Natalia Fursova, Ivan Vasiliev, Vladislav Stepanov:

Natch: Detecting Attack Surface for Multi-Service Systems with Hybrid Introspection. 176-185 - Quentin Rouland, Stojanche Gjorcheski, Jason Jaskolka:

A Security Compliance-by-Design Framework Utilizing Reusable Formal Models. 186-195 - Arthur Grisel-Davy

, Sebastian Fischmeister:
Independent Boot Process Verification using Side-Channel Power Analysis. 196-207 - Ryôichi Sasaki:

AI and Security - What Changes with Generative AI. 208-215 - Jiyun Shen, Yue Wang, Qingheng Wu, Yuan Zhao:

Privacy Policy Compliance Inspection of Financial Apps. 216-219 - Tianci Wang, Chunwang Li, Chunhui Wang, Tong Li, Ye Zhai:

A Deep Learning-Based Method for Identifying User Story Semantic Conflicts. 220-229 - Po-Chuan Ke, Yuan-Hsun Liao, Shou-Yu Lee, Shih-Yun Huang, William Cheng-Chung Chu:

A Service-Oriented Framework for An Integrated Study of Intelligent Data Collection and Application. 230-236 - Jiangchao Liu, Liqian Chen, Antoine Miné, Hengbiao Yu, Ji Wang:

Input Validation for Neural Networks via Local Robustness Verification. 237-246 - Yuanxin Liu, Rui Li, Yuxi Ma, Yunzhi Xue, Lingzhong Meng:

FCA: A Causal Inference Based Method for Analyzing the Failure Causes of Object Detection Algorithms. 247-256 - Bingchen Dong, Zhenglin Liang:

Modeling Stochastic Deterioration by Chloride Ion Erosion Through Sparse Identification of Nonlinear Dynamics. 257-262 - Xuan Wang, Li Liao, Dongyu Cao:

mpXim: A Decentralized Mixing Scheme based on a Multi-Party Discovering Protocol. 263-272 - Han-Sheng Lu, Tse-Chuan Hsu:

An Enhanced Software Architecture to Improve the MQTT Communications Encrypted Model. 273-279 - Miaomiao Feng, Wei Mi, Xiaodan Zhang, Baojian Chen, Mingming Huang:

A Smart Contract Vulnerability Detection Model Based on Multi-Type Features and Pre-Training Techniques. 280-289 - Sangharatna Godboley, P. Radha Krishna, Aditya Joshi, Ishita Gupta, Rahul Khatav:

Smart Contract Test Case Prioritization based on Frequency and Gas Consumption. 290-299 - Sourena Khanzadeh, Noama Fatima Samreen, Manar H. Alalfi:

Optimizing Gas Consumption in Ethereum Smart Contracts: Best Practices and Techniques. 300-309 - Xufeng Zhao, Qiuyang Wei, Xue-Yang Zhu, Wenhui Zhang:

A Smart Contract Development Framework for Maritime Transportation Systems. 310-319 - Wenqian Zhao, Meghana Patibandla, Junhua Ding:

An Approach for Ensuring the Privacy in Smart Contracts. 320-329 - Shangzhi Tang, Xuan Chen, Hongbin Xiao

, Jiahao Wei, Zhi Li:
Using Problem Frames Approach for Key Information Extraction from Natural Language Requirements. 330-339 - Fehmi Jaafar, Darine Ameyed, Lavin Titare, Md Nematullah:

IoT Phishing Detection Using Hybrid NLP and Machine Learning Models Enhanced with Contextual Embedding. 340-349 - Yi-Hung Liu, Yin-Neng Feng, Sheng-Fong Chen:

Legal Events Classification in Online Social Community Posts. 350-355 - Ravi Varma Kumar Bevara

, Ting Xiao
, Farahnaz Hosseini, Junhua Ding:
Bias Analysis in Language Models using An Association Test and Prompt Engineering. 356-363 - Jinrun Liu, Xinyu Tang, Linlin Li, Panpan Chen, Yepang Liu:

ChatGPT vs. Stack Overflow: An Exploratory Comparison of Programming Assistance Tools. 364-373 - Rui Hu, Junhao Zhong, Minjie Ding, Zeyu Ma, Mingang Chen:

Evaluation of Hallucination and Robustness for Large Language Models. 374-382 - Zeming Dong, Qiang Hu, Yuejun Guo, Zhenya Zhang, Jianjun Zhao:

Boosting Source Code Learning with Text-Oriented Data Augmentation: An Empirical Study. 383-392 - Mingyang Geng, Dezun Dong, Pingjing Lu:

Hierarchical Semantic Graph Construction and Pooling Approach for Cross-language Code Retrieval. 393-402 - Mingyang Geng, Dezun Dong, Pingjing Lu:

Input Transformation for Pre-Trained-Model-Based Cross-Language Code Search. 403-412 - Meng Wu, Weixin Dong, Qiang Zhao, Zhizhong Pan, Baojian Hua:

An Empirical Study of Lightweight JavaScript Engines. 413-422 - Hongwu Qin, Peiming Xue, Xiuqin Ma, Bin Gao:

Code Quality Evaluation in IT Communities Based on Sentiment Analysis of User Comments. 423-429 - Letao Li, Likai Qiu, Shuang Li, Jiaqi Wang, Hualiang Zhu:

SmartPerf: Automated Speed Performance Test from Visual Perspective. 430-436 - Dongwen Zhang, Tongtong Wang, Yang Zhang:

Performance Prediction for Lock-based Programs. 437-446 - Bin Zhang, Chihiro Suzuki, Zhan Chen, Hun-ok Lim:

Improved Mechanism and Emotional Expression System of A Panda-type Emotional Robot. 447-450 - Xiangyu Li, Yihao Zhang, Xiaokun Luan, Xiaoyong Xue, Meng Sun:

MedTiny: Enhanced Mediator Modeling Language for Scalable Parallel Algorithms. 451-460 - Mahmoud M. Abouzeid, Pei-Shu Huang, Feng-Jian Wang:

Improving the Detection of Concurrent Artifact Anomalies in a Structured Workflow. 461-470 - Zheheng Liang, Jianming Chang, Wuqiang Shen, Chaosheng Yao, Lulu Wang:

ECIA: Elaborate Change Impact Analysis Based on Sub-Statement Level Dependency Graph. 471-480 - Sanjaya Kumar Panda, Sahil Chopra, Slokashree Padhi:

Solar Energy-Based Virtual Machine Placement Algorithm for Geo-Distributed Datacenters. 481-490 - Yanming Liu, Chuangchuang Zhang, Yihao Li, Shuning Zhang, Hongyong Yang:

Dependency Aware and Delay Guaranteed SFC Placement in Multi-domain Networks. 491-498 - Ilmaan Zia, Muhammad Abdul Basit Ur Rahim, Tairan Liu, Zhangying He:

Formal Modeling and Verification of Industrial Robotic Arm - A Case Study. 499-508 - Chunyan Xia, Song Huang, Yongming Yao, Changyou Zheng, Yutong Wang:

Generating Autonomous Driving Safety Violation Scenarios Based on Multi-Objective Optimization. 509-515 - Ryôichi Sasaki:

Reconsideration of Risk Communication and Risk Assessment Support Methods for Security. 516-523 - Waris Damkham, Shingo Kunihiro, Songpon Teerakanok, Tetsutaro Uehara:

Detecting Vulnerable OAuth 2.0 Implementations in Android Applications. 524-531 - Shuji Yamaguchi, Hidehito Gomi, Tetsutaro Uehara:

Enhancing Account Recovery with Location-based Dynamic Questions. 532-539 - Yuuki Kimura, Soramichi Akiyama, Atsuo Inomata, Tetsutaro Uehara:

On Collecting Onion Server Fingerprints and Identification of Their Operators. 540-548 - Perakorn Nimitkul, Akihiro Takai, Nariyoshi Yamai, Rei Nakagawa, Songpon Teerakanok:

The Study on the Blocking Time Reduction of the IDS/SON Cooperative Firewall System. 549-554 - Tomoaki Ohkawa, Hiroshi Yoshiura, Takayasu Yamaguchi:

Explainable Multimodal Fake Posts Detection Using Feature Extraction with Attention Mechanisms. 555-563 - Ryuga Kaneko, Taiichi Saito:

DNS Rebinding Attacks Against Browsers on Azure Virtual Machines. 564-571 - Andrew Bukangwa, Tetsutaro Uehara:

An Agent-Based Modeling Approach to Designing and Optimizing Bug Bounty Programs for Cybersecurity in Developing Countries. 572-581 - José Donato, Naghmeh Ivaki, Nuno Antunes:

Savery: A Framework for the Assessment and Comparison of Mobile Development Tools. 582-592 - Siqi Gu, Zhibiao Liu, Qiaoqing Liang, Zhimin Deng, Xiangyu Xiao:

Test Case Reuse Method Based on Deep Semantic Matching. 593-599 - Haoli Chen, Xiaocheng Chen, Xiaolei Sun, Qirui Zheng, Xiuting Ge:

Reducing Label Errors for Actionable Warning Identification. 600-604 - Bo Zhang, Yu Li, Yichen Wang:

Test Case Priority Ranking Method Based on Greedy Algorithm. 605-613 - Bo Zhang, Jiahao Li, Zeyu Fan, Yichen Wang:

An Input Space Modeling Method for Software Testing Considering Timing. 614-621 - Dongyuan Zhang, Chuanjiang Yu, ShiJun Xu, Xinyi Gao:

Enhancement of Robustness for Graph Neural Networks in AI Systems. 622-625 - Yumin Wang, Jinhao Xie, Wenqi Zhang, Yuan Yao, Gang Yang:

Research on Improved Algorithm of UAV Swarm Target Search Strategy Based on Freshness and Target Density. 626-632 - Xinhai Chen, Wei Liu, Chang Rao, Yu Zhang, Wanling Du:

Modelling and Verification of Cooperative Vehicle Infrastructure System at Intersections Based on Timed Automata. 633-642 - Mingfu Tuo, Xiaoqiang Zhao, Wenliang Wu, Bo Shen:

Safety Verification Technology of CPS Based on Theorem Proving. 643-645 - Yang Cao

, Yunwei Dong:
Modeling and Discovering Data Race with Concurrent Code Property Graphs. 646-653 - Xiaoming Xie, Jinfa Xu, Suiyuan Shen, Wei Cao, Guigang Zhang:

Research on FCS Design Technology of Electric Tilting Quadrotor UAV. 654-661 - Wanjie Ren, Guojun Wang, Qi Liu, Xia Li, Rui Tuo:

Fitting and Peak Searching of Spectrum for Fourier Transform Infrared Spectrometer. 662-667 - Oscar Famous Darteh, Guojun Wang, Qi Liu, Xiaodong Liu, Amevi Acakpovi:

Enhancing Grid-Connected PV System Performance: Loss Analysis and Efficiency Improvement Strategies. 668-674 - Yinwei Liu

:
A Computational Brain Colour Response Model for Achromatopsia. 675-681 - Lin Zou

, Hongji Yang, Jintao Lin:
A Creative Computing Approach to Analysis of Speaker Intention Using the DIKCW Model. 682-692 - Xinyu He, Mengyao Cui, Yufan Chen, Longfei Liu, Bangchao Wang:

Intelligent Question Answering System Based on Cognitive Graph: A Case Study of Textile Fabrics. 693-702 - Peng Ye, Xinyi Lan, Yufan Chen, Zhipeng Wang, Wei Ye:

Research on the Construction of a Multimodal Cognitive Graph of Textile and Clothing. 703-712 - Ziyang Weng, Shuhao Wang, Jingwei Zhang:

The Hidden Order Framework: From Evidence-Based Prediction in Scenario Spaces to Prompt Learning in Image Production Processes. 713-723 - Ziyang Weng, Shuhao Wang, Jingwei Zhang:

The Man-Land Coupling Algorithm: A Priori Experiment with Remote Sensing Data to Facilitate the Revitalization of Great Sites Based on Complex Cognition. 724-732 - Ruiqi Luo, Zhenglong Li, Yinhua Xiang, Zhaojing Wang, Luyao Ye:

Outfit Compatibility Model with Multi-Modal Semantic Interaction Learning. 733-741 - Ruiqi Luo, Wenjie Zhang, Xiaoxiao Li, Zhaojing Wang, Luyao Ye:

Research on Active Detection Methods for Video Anomaly Events Based on Concept Semantics. 742-751 - Hongyan Wan, Zan Wang, Zhiquan An, Guotao Jiao, Xinnan Zhang:

A Novel Framework for High-category Coverage Clothing Recommendation System Based on Sentiment Analysis. 752-758 - Zhiyuan Zou

, Zhipeng Wang, Longfei Liu, Changxi Feng, Bangchao Wang:
Cognitive Graph Empowered Textile and Clothing Intelligent Service Platform. 759-768 - Xiaodong Gou, Peng Zhou, Haitao Yang, Zhaomingyue Zheng, Ao Zhang:

Identifying Influential Nodes in Complex System from Multiscale Complex Network Perspective. 769-774 - Zhaomingyue Zheng, Wei Cheng, Xiaodong Gou, Guangyuan Wang:

Research on Micro Vibration Control of Satellite Flexible Structure Using Piezoelectric Variable Stiffness Actuator. 775-781 - Xiang Zhu, Wencai Wang, Zhizhi Cang, Yaguang Dang, Donghui Zhao:

Dynamic Comprehensive Risk Assessment of Coal Mill Based on CNN-LSTM and Analytic Hierarchy Process. 782-788 - Yijing Zhou, Mengdan Wu, Qi Yao, Zhiyu Duan, Shunkun Yang:

Voltage Prediction and Fault Detection by using Model Fusion Strategy for Lithium-ion Batteries. 789-796 - Zeyu Wang, Fuping Zeng:

Fault Localization of Software: A Literature Review. 797-806 - Jiahao Li, Bo Zhang, Zeyu Fan, Yichen Wang:

Multi-Population Genetic Algorithm Based EFSM Regression Test Data Generation. 807-815 - Muhammad Azeem, Saif Ur Rehman Khan, Naseem Ibrahim, Abdullah Yousafzai

, Wen-Li Wang, Asif Kareem:
A Blockchain-Based Requirement Management Framework for Distributed Software Development Environment. 816-825 - Bhavraaj Singh, Muhammad Abdul Basit Ur Rahim, Shahid Hussain, Muhammad Rizwan Abid, Jie Zhao:

AI Ethics in Healthcare - A Survey. 826-833 - Satyam Sharma, Muhammad Abdul Basit Ur Rahim, Shahid Hussain, Muhammad Rizwan Abid, Tairan Liu:

Using Deep Reinforcement Learning And Formal Verification in Safety Critical Systems: Strategies and Challenges. 834-842 - Man Zhang, Shaukat Ali, Tao Yue:

Uncertainty-Wise Model Evolution with Genetic Programming. 843-844 - Hessamaldin Mohammadi, Wided Ghardallou, Elijah Brick, Ali Mili:

Assume(), Capture(), Verify(), Establish(): A Vocabulary for Static Program Analysis. 845-846 - Jiahao Li, Chengru Yang, Yichen Wang:

Genetic Algorithm Based EFSM Regression Test Sequence Generation. 847-848 - Liang Sun, Bailin Lu, Liangze Yin, Zhe Bu, Wenjing Jin:

OpenMP Program Verification Based on Bounded Model Checking. 849-850 - Nishan Xie, Rui Li, Yuxi Ma, Qian Dong, Lingzhong Meng:

VPIA-FMEA: A Method for Visual Perception Intelligent Algorithm FMEA. 851-852 - Yue Zhao, Wenliang Wu, Xingshe Zhou:

Effectiveness Evaluation of UAVs Search in Urban Environments. 853-858 - Bin Zhang, Ayumu Mori, Hun-Ok Lim:

Research on Object Categorization and Grabbing for a Cleaning Robot. 859-860 - Peng Lin, Ping Chen, Jingwei Shang, Qiaochun Qiu, Zhichang Huang:

Mining Potential Defect Patterns in Unmanned Systems from A Large Amount of Open Source Code. 861-862 - Jigang Liu, Ryôichi Sasaki, Tetsutaro Uehara:

An Ontology-Based Framework for Medical IoT Forensic Evidence. 863-864 - Yi Ji, Ryan Lekivetz, Simon Mak, Joseph Morgan:

BayesFLo: Bayesian Fault Localization for Software Testing. 865-866 - Wenlong Zheng, Baojian Hua, Zhuochen Jiang:

WASMDYPA: Effectively Detecting WebAssembly Bugs via Dynamic Program Analysis. 867-868 - Lei Xia, Yufei Wu

, Baojian Hua:
Rustcheck: Safety Enhancement of Unsafe Rust via Dynamic Program Analysis. 871-872 - Yulia Kumar

, Wenxiao Li, Kuan Huang, Michael Thompson, Brendan Hannon:
Natural Language Coding (NLC) for Autonomous Stock Trading: A New Dimension in No-Code/Low-Code (NCLC) AI. 873-874 - Yulia Kumar

, Zachary Gordon, Patricia Morreale, J. Jenny Li, Brendan Hannon:
Love the Way You Lie: Unmasking the Deceptions of LLMs. 875-876 - Quankun Luo, Jiawen Deng, Liang Luo:

Optimizing Media Streaming in Edge-Cloud Systems: Leveraging Geography and User Behavior. 877-878

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














