default search action
24th QRS 2024: Cambridge, UK
- 24th IEEE International Conference on Software Quality, Reliability and Security, QRS 2024, Cambridge, United Kingdom, July 1-5, 2024. IEEE 2024, ISBN 979-8-3503-6563-4
- Linzhi Huang, Hanyu Pei, Yuechen Li, Beibei Yin, Kai-Yuan Cai:
A Strategy of Dynamic Random Testing with Hybrid Distance Metrics for Quantum Programs. 1-12 - Thiago Santos de Moura, Francisco Igor de Lima Mendes, Everton L. G. Alves, Ismael Raimundo da Silva Neto, Cláudio de Souza Baptista:
An Automatic Approach for Uniquely Discovering Actionable Elements for Systematic GUI Testing in Web Applications. 13-24 - Qurban Ali, Oliviero Riganelli, Leonardo Mariani:
Testing in the Evolving World of DL Systems: Insights from Python GitHub Projects. 25-35 - Huanze Meng, Zhiyi Zhang, Yuchen Ding, Shuxian Chen, Yongming Yao:
EATS: Efficient Adaptive Test Case Selection for Deep Neural Networks. 36-48 - Yinjie Xue, Zhiyi Zhang, Chen Liu, Shuxian Chen, Zhiqiu Huang:
DeepWeak: Weak Mutation Testing for Deep Learning Systems. 49-60 - Qi Yao, Yizhuo Zhang, Yujia Li, Fang Liu, Shunkun Yang:
Multimodal Multi-Objective Test Data Generation Method based on Particle Swarm Optimization. 61-71 - Jordan Doyle, Thomas Laurent, Anthony Ventresque:
PADRAIG: Precise Android Automated Input Generation. 72-83 - Huaixu Lin, Bixin Li, Liang Liu, Lulu Wang, Jianming Chang:
OTCP-ISVM: Online Test Case Prioritization Based on Incremental Support Vector Machine. 84-94 - Ao Fan, Li Liao, Lulu Wang, Bixin Li:
Test Case Generation for Access Control Based on UML Activity Diagram. 95-104 - Byron DeVries, Erik M. Fredericks:
Triggering Adaptation via Contextual Metamorphic Relations. 105-114 - Amani Ayad, Samia Al Blwi, Ali Mili:
Detecting Faults vs. Revealing Failures: Exploring the Missing Link. 115-126 - Roberto Bagnara, Abramo Bagnara, Alessandro Benedetti, Patricia M. Hill:
The ACPATH Structural Complexity Metric. 127-138 - Afef Awadid, Xavier Le Roux, Boris Robert, Morayo Adedjouma, Eric Jenn:
Ensuring the Reliability of AI Systems through Methodological Processes. 139-146 - Taehyoun Kim, Duksan Ryu, Jongmoon Baik:
Enhancing Software Reliability Growth Modeling: A Comprehensive Analysis of Historical Datasets and Optimal Model Selections. 147-158 - Chun Yen Chang-Sundin, Ninad Chaudhari, Mei-Hwa Chen:
Online Reliability Prediction for Web Applications: An Adaptive Approach with AdaRel. 159-168 - Lili Bo, Yuting He, Xiaobing Sun, Wangjie Ji, Xiaohan Wu:
A Software Bug Fixing Approach Based on Knowledge-Enhanced Large Language Models. 169-179 - Yangtao Liu, Hengyuan Liu, Zezhong Yang, Zheng Li, Yong Liu:
Empirical Evaluation of Large Language Models for Novice Program Fault Localization. 180-191 - Hanwei Qian, Tingting Xu, Ziqi Ding, Wei Liu, Shaomin Zhu:
Exploring Large Language Models for Method Name Prediction. 192-203 - Yilongfei Xu, Jincao Feng, Weikai Miao:
Learning from Failures: Translation of Natural Language Requirements into Linear Temporal Logic with Large Language Models. 204-215 - Jie Zhu, Yun Miao, Tingting Xu, Junwu Zhu, Xiaolei Sun:
On the Effectiveness of Large Language Models in Statement-level Code Summarization. 216-227 - Jiahe Xu, Jingwei Xu, Taolue Chen, Xiaoxing Ma:
Symbolic Execution with Test Cases Generated by Large Language Models. 228-237 - Alexander Perko, Franz Wotawa:
Evaluating OpenAI Large Language Models for Generating Logical Abstractions of Technical Requirements Documents. 238-249 - Murray Dunne, Kylee Schram, Sebastian Fischmeister:
Weaknesses in LLM-Generated Code for Embedded Systems Networking. 250-261 - Qizheng Wu, Sen Wang, Xingyu Han, Lu Xu, Xiang Chen:
A Traffic Domain Classification Method Based On Large Model Multiple Optimization Strategies Neural Network. 262-271 - Chengquan Zhang, Yang Feng, Yaokun Zhang, Yuxuan Dai, Baowen Xu:
Beyond Memory Safety: an Empirical Study on Bugs and Fixes of Rust Programs. 272-283 - Yaping Feng, Ziyuan Wang:
Towards Understanding Bugs in Go Programming Language. 284-295 - Sijie Yu, Ziyuan Wang:
An Empirical Study on Bugs in Rust Programming Language. 296-305 - Adil Mukhtar, Dietmar Jannach, Franz Wotawa:
Investigating Reproducibility in Deep Learning-Based Software Fault Prediction. 306-317 - Zong-Yi Chen, Chin-Yu Huang, Jing-Rong Lin, Chih-Chiang Fang, William Cheng-Chung Chu:
Employing CNN with Spatial Pyramid Pooling for Predicting Software Defects through Image Analysis. 318-327 - Qi Xue, Weiyuan Zhuang, Lei Zhao, Xiaofang Zhang:
TWAO: Time-Weight-Aware Oversampling Method for Just-in-Time Software Defect Prediction. 328-339 - Wenjie Liu, Weiqin Zou, Bingting Chen, Biyu Cai, Jingxuan Zhang:
Query Quality Prediction for Text Retrieval-based Bug Localization. 340-351 - Shwetha Gowdanakatte, Mahmoud Abdelgawad, Indrakshi Ray:
Assets Criticality Assessment of Industrial Control Systems: A Wind Farm Case Study. 352-363 - Manqing Zhang, Renliang Wu, Kang Su, Yunwei Dong, Tao Zhang:
Application Scenario Modeling and Verification for Unmanned Aerial Vehicle Swarm. 364-375 - Li Wang, Yunxiao Ma, Mingyue Li, Hua Li, Peilong Zhang:
A Method of Network Attack Named Entity Recognition based on Deep Active Learning. 376-387 - Alvi Jawad, Zoe Arnott, Jason Jaskolka:
Requirements for Applying SCIA: A Structured Cyberattack Impact Analysis Approach for ICS. 388-399 - Yunpeng Sun, Zhichao Lian, Shuangquan Zhang, Zhanfeng Wang, Tao Duan:
A Novel Explainable Method based on Grad-CAM for Network Intrusion Detection. 400-406 - Xudong He:
Designing Deep Neural Net Controller for Quadrotor Attitude Stabilization. 407-417 - Mehar Prateek Kalra, Soniya, Apurva Narayan:
cf-TDFM: A Framework for Limiting Fault Infusion Attacks on Deep Neural Networks. 418-424 - Zheng-Hong Huang, Yu-Sung Wu, Ying-Dar Lin, Chia-Mu Yu, Wei-Bin Lee:
Neural Network-based Functional Degradation for Cyber-Physical Systems. 425-434 - Junjie Yu, Yong Li, Ming Wen, QianRen Yang:
Enhanced Privacy Protection in Graph Neural Networks Using Local Differential Privacy. 435-444 - Xue Zhang, Mingjiang Wang, Xiao Zeng:
Multi-modal Feature Fistillation Emotion Recognition Method For Social Media. 445-454 - Jens Christian Toftdahl, Kamrul Islam Shahin, Thomas Hylle:
Enhancing Data Retrieval with Custom Embedding Models and ChatGPT. 455-461 - Zhenxing Zhang, Jun Ge, Qikang Sun, Qianxiang An, Yihao Li:
Portable Intelligent ECG Monitoring System Based on End-Edge-Cloud Architecture. 462-470 - Lixia Ji, Shijie Xiao, Bingzhi Xu, Han Zhang:
Transferrable DP-Adapter Tuning: A Privacy-Preserving Multimodal Parameter-Efficient Fine-Tuning Framework. 471-482 - Taehyoun Kim, Duksan Ryu, Jongmoon Baik:
Automated Machine Learning for Enhanced Software Reliability Growth Modeling: A Comparative Analysis with Traditional SRGMs. 483-493 - Yantong Chen, Yuxin Shi, Jianzhao Ren, Jiabao Li:
An Improved Adaptive Angle Weakly Supervised Learning Object Detection. 494-503 - Xinyu Jia, Yu Zhou, Yasir Hussain, Wenhua Yang:
An Empirical Study on Python Library Dependency and Conflict Issues. 504-515 - Han-Lin Lu, Zong-Yuan Wu, Chien-Hsing Wu, Guan-Zhong Wang, Shih-Kun Huang:
Fuzzing Command-line Interface by Edge Coverage Guided Combinatorial Testing and Input Clustering. 516-525 - Jiangyun Xu, Jinbo Wang, Yunyun Ma, Lu Li, Chang Jia:
RumFuzz: Coverage-guided Greybox Fuzzing with Reasonable Use of Memory. 526-535 - Fan Shi, Zhiqiu Huang, Haiyu Pan, Yuting Chang, Heng Xu:
Fuzzy Safety and Liveness Properties in Linear-time. 536-545 - Jinfu Chen, Fei Yan, Saihua Cai, Shengran Wang, Jingyi Chen:
FMUZZ: A Novel Greybox Fuzzing Approach based on Mutation Strategy Optimization with Byte Scheduling. 550-561 - Nilesh Chakraborty, Shahrear Iqbal, Mohammad Zulkernine:
Building Secure Software for Smart Aging Care Systems: An Agile Approach. 562-571 - Robab Aghazadeh Chakherlou, Lorenzo Strigini:
Impact of Prior Beliefs on Dependability Prediction for a Changed System Using Pre-change Operational Evidence. 572-583 - Rakesh Podder, Jack Sovereign, Indrajit Ray, Madhan B. Santharam, Stefano Righi:
The PIT-Cerberus Framework: Preventing Device Tampering During Transit. 584-595 - Irfan Ali Khan, Yu Luo, Weifeng Xu, Dianxiang Xu:
GNN-Based Transfer Learning and Tuning for Detecting Code Vulnerabilities across Different Programming Languages. 596-607 - Yuekai Huang, Junjie Wang, Song Wang, Rupeng Zhang, Qing Wang:
Which API is Faster: Mining Fine-grained Performance Opinion from Online Discussions. 608-619 - Jiahao Ren, Jianming Chang, Lulu Wang, Zaixing Zhang, Bixin Li:
Graph-Based Salient Class Classification in Commits. 620-631 - Wenjie Liu, Gong Chen, Xiaoyuan Xie:
FMCS: Improving Code Search by Multi-Modal Representation Fusion and Momentum Contrastive Learning. 632-638 - Bahareh Afshinpour, Massih-Reza Amini, Roland Groz:
Semantic Log Partitioning: Towards Automated Root Cause Analysis. 639-648 - Jesse Nyyssölä, Mika Mäntylä:
Event-level Anomaly Detection on Software logs: Role of Algorithm, Threshold, and Window Size. 649-656 - Jesse Nyyssölä, Mika Mäntylä:
Speed and Performance of Parserless and Unsupervised Anomaly Detection Methods on Software Logs. 657-666 - Zhun Xu, Baohua Huang, Ningjiang Chen:
Log Parsing using Semantic Filtering based Prompt Learning. 667-676 - Quentin Nivon, Gwen Salaün:
Semi-Automated Refactoring of BPMN Processes. 677-688 - Yliès Falcone, Gwen Salaün, Ahang Zuo:
Dynamic Resource Allocation for Executable BPMN Processes Leveraging Predictive Analytics. 689-700 - Matej Klima, Miroslav Bures, Martin Blaha:
Ant Colony Optimization Based Algorithm for Test Path Generation Problem with Negative Constraints. 701-712 - Changfeng Duan, Jing Liu, Jin Xu, Dongdong An, Yu Bao:
A Novel Approach for Traveling Salesman Problem Via Probe Machine. 713-723 - Alexander Müller-Lobeck, Gefei Zhang:
Model-Driven Development of Single-Page Applications Using UML State Machines and Maude. 724-732 - Miaoer Li, Yi Zhu, Yali Liu, Chan Yin:
Classification Method of Ethereum Smart Contracts Based on Statistical Model Checking. 733-744 - Zhen Yao, Jing Liu, Xiaohong Chen, Li Han, Haiying Sun:
Efficient Verification of Multi-Agent Systems Through Parallel. 745-756 - Christoph Dropmann, Daniel Schneider:
SIAF: Systematic Interference Analysis Framework for Household Microprocessor Services. 757-768 - Wenlin Cheng, Xingwei Wang, Bo Yi, Chuangchuang Zhang, Min Huang:
A Distributed Service Function Chain Orchestration Approach with VNF Reuse to Balance Latency and Resource Efficiency. 769-778
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.