Abstract is missing.
- Keynote Speech I The Push to Product - Strategies for Taking Your Research Into PracticeDavid Shepherd. [doi]
- Architecture of Security Protection technology for Aviation CyberspaceZhong-hua Wang, Jian-Feng Ma 0001, Wen Sheng Niu, Hui-Ya Li. 21-24 [doi]
- A Coverage-Based Effective Data Augmentation FrameworkShuting Kang, Tong Wang, PengQi Wang, Feng Wang, Qian Dong, Guang Yang, Lingzhong Meng, Yunzhi Xue. 25-30 [doi]
- A Formal Verification Method for Smart ContractXiaobing Wang, Xiaoyu Yang, Chunyi Li. 31-36 [doi]
- A Malware Identification Approach Based on Improved SVM in Network TrafficSongling Qin, Jinfu Chen, Zufa Zhang, Yisong Liu, Lingling Zhao, Bo Liu, Jingyi Chen. 37-40 [doi]
- A Middle Layer Abstraction-Based Open Platform for V2X Safety and Application StudyJin Yang, Baoling Sheen, Jua Roa. 41-46 [doi]
- A model based program comparison test methodShan-Ling Li, Zhan-wei Hui. 47-48 [doi]
- A rapid test method for autonomous ability of unmanned control strategy in dangerous situationsLingzhong Meng, Yang Bao, Shuting Kang, Dongbo Zhao, Guang Yang, Yuan Shi, PengQi Wang, Qian Dong, Yunzhi Xue. 49-57 [doi]
- A real-time Information Exchange Strategy for Big Data Volume Systems Based on Internet of ThingsLimin Zhang, Giap Weng Ng, Yu-Beng Leau. 58-63 [doi]
- A Smart Meter-Reading Framework With Secret Key Sharing and Support Vector Machine AlgorithmsZhou Yang, Jueyu Chen. 64-68 [doi]
- A Survey ofNFC Mobile Payment: Challenges and Solutions using Blockchain and CryptocurrenciesDongcheng Li, W. Eric Wong, Matthew Chau, Sean Pan, Liang-Seng Koh. 69-77 [doi]
- AdaBoost-based Refused Bequest Code Smell Detection with Synthetic InstancesHao Chen, Zhilei Ren, Lei Qiao, Zhide Zhou, Guojun Gao, Yue Ma, He Jiang 0001. 78-89 [doi]
- Aging-Related Bugs Prediction Via Convolutional Neural NetworkQinchen Liu, Jianwen Xiang, Bin Xu, Dongdong Zhao, Wenhua Hu, Jian Wang. 90-98 [doi]
- An Efficient Approach Based on Parameter Optimization for Network Traffic Classification Using Machine LearningJames Msughter Adeke, Jinfu Chen, Lei Zhang, Richard N. K. Mensah, Kun Tong. 99-107 [doi]
- An Empirical Study of Counterexample-Guided Fuzzing for Neural Networks VerificationGaolei Yi, Xinyi Wang, Yichen Wang. 108-113 [doi]
- An Empirical study of Exploring Relevant Metrics to Assess Software Product QualityZekun Song, Yichen Wang, Wentao Wang, Jing Zhang. 114-124 [doi]
- An Empirical Study of Law Articles Prediction on Transportation Legal CasesYifei Yang, Wei Yuan, Yansong Li, Desheng Wang, Jia Liu, Tieke He. 125-130 [doi]
- An Empirical Study on The Impact of The Interaction between Feature Selection and Sampling in Defect PredictionShuyue Fan, Chun Liu, Zheng Li. 131-140 [doi]
- An Evolutionary Perspective: A Study of Anubis Android Banking TrojanBaodi Ning, Guanqin Zhang, Zexin Zhong. 141-150 [doi]
- An Intelligent Combination Algorithm for Traffic Flow PredictionCheng Li, Liang Kou, Xu Zhang. 151-156 [doi]
- An Intrusion Detection Method for Industrial Control System against Stealthy AttackQi Ao. 157-161 [doi]
- Analysis on Adversarial Robustness of Deep Learning Model LeNet-5 Based on Data PerturbationYudi Liu, Minyan Lu, Di Peng, Jie Wang, Jun Ai. 162-167 [doi]
- Applications of LSTM Model for Aeroengine ForecastingPeng Li, Wei Niu. 168-172 [doi]
- Artemis: An Improved Smart Contract Verification Tool for Vulnerability DetectionAnqi Wang, Hao Wang, Bo Jiang, Wing Kwong Chan. 173-181 [doi]
- Correlation Analysis between Software Structure Measures and Error Execution Path DeviationShiyi Kong, Minyan Lu, Chao Tang, Shuguang Wang. 182-187 [doi]
- Data link network technology of UAV systemZhe Li, Zhijun Deng. 188-189 [doi]
- Deep Learning-Based Automatic Safety Detection System for Crack DetectionQuan Chen, Xi-Xi Zhang, Yu Chen, Wei Jiang, Guan Gui, Hikmet Sari. 190-194 [doi]
- Design and implementation of protocol processing model based on responsibility chain and reflection mechanismXiangfei Gao, Feng Gao. 195-200 [doi]
- Design of a Center of Gravity Control Law with Unbalanced Fuel in Aircraft Wing TanksYing Zhao, Zhongwei Wang, Zhenghong Li, Rui Xu, Enliang Ding. 201-205 [doi]
- Design of Multi-unmanned Platform Collaborative Demonstration EnvironmentJiang Wu, Yipeng Liu, Xin Gao, Lin Deng, Lei Guo, Xinyu Zhang. 206-212 [doi]
- Detecting Out-of-Bounds Array Access Errors in Aerospace Embedded SoftwareRui Chen, Tingting Yu, Yunsong Jiang, Chunpeng Jia, Chao Li, Dongdong Gao, Mengfei Yang. 213-218 [doi]
- Developing deep LSTM model for real-time path planning in unknown environmentsHaonan Yao, Yang Liu, Xiaoyi Zhang. 219-225 [doi]
- Distilling Knowledge in Adversarial AttackZeqian Dong, Long Tang, Cong Tian. 226-233 [doi]
- DSR: A Deep Learning Framework Towards Modulation Signal RetrievalXueli Jie, Yun Lin. 234-239 [doi]
- EFSM Test Data Generation Based on Fault Propagation and Multi-Population Genetic AlgorithmZhiqin Cao, Yichen Wang, Peng Guo, Bo Tian. 240-245 [doi]
- Embedded Virtualization Computing Platform Security Architecture Based on Trusted ComputingShuang Zhang, Xinyu Wan, Deqi Kong, Yangming Guo. 246-250 [doi]
- Evaluation of Adversarial Attacks Based on DL in Communication NetworksZhida Bao, Haojun Zhao. 251-252 [doi]
- Face Determination Based on Multi-template and ConvolutionDanmei Wang. 253-257 [doi]
- Fast Test Method of Intelligent Image Recognition System Based on Antagonistic SamplesLilei Zhang, Jinyong Yao, Kai Wang. 258-262 [doi]
- Fault Diagnosis for Open Source Software Based on Dynamic TrackingXuliang Chen, Jianhui Jiang, Wei Zhang, Xuzei Xia. 263-268 [doi]
- Fault Diagnosis Method of Equipotential Planet Map Based on Fusion FeaturesRui Wang, Jingchao Li, Bo Deng, Bin Zhang. 269-274 [doi]
- FIG-QEMU: A Fault Inject Platform Supporting Full System SimulationJianfeng An, Hongjun You, Fengqing Xie, Yuanlin Yang, Jinhua Sun. 275-278 [doi]
- FPGA Physical Automation Verification Technology Based on VCD WaveformShou-quan Xu. 279-284 [doi]
- Generating Adversarial Examples in Limited Queries with Image Encoding and Noise DecodingLong Tang, Bin Yu. 285-292 [doi]
- Heart Disease Prediction Algorithm Based on Ensemble LearningKe Yuan, Longwei Yang, Yabing Huang, Zheng Li. 293-298 [doi]
- Implementation of Mesh Flying Ad-hoc Network For Emergency Communication SystemsYuzhi Zhou, Xi-Xi Zhang, Jinlong Sun, Jie Yang, Guan Gui. 299-304 [doi]
- Intelligent Detumbling Control for a Micro-Satellite with Bounded InputsYucheng Cui, Zhiyu Xi. 305-310 [doi]
- Interference Signal Recognition Based on Multi-Modal Deep LearningXiao Zhang, Xiaoling Liu. 311-312 [doi]
- KBAA: An adversarial example generation method for KBQA taskShudi Guo, Shihai Wang, Bin Liu 0032, Tengfei Shi. 313-318 [doi]
- Knowledge-based Defect Prediction and Test Case Generation for Radar Software Fault PreventionChengfeng Li, Xi Liu, Hui Wu, Haifeng Li. 319-323 [doi]
- Lightweight Convolutional Neural Network-Based Method for Crane Safety InspectionWei Jiang, Tianliang Liu, Yu Chen, Quan Chen, Xi-Xi Zhang, Guan Gui. 324-329 [doi]
- Load Balancing Evaluation of Multi-core Processors based on BMP ArchitectureYueyao Niu, Wei Han, Xiaodi Dai. 330 [doi]
- Metamorphic Robustness Testing for Recommender Systems: A Case StudyChengying Mao, Xiaorong Yi, Tsong Yueh Chen. 331-336 [doi]
- Multimodal Feature Fusion Recognition of Modulated Signals Based on Image and Waveform DomainChangbo Hou, Guowei Liu, Lijie Hua, Yun Lin. 337-342 [doi]
- Nonon-Convex Low-Rank Minimization for Sparse-View CT Reconstruction via Nonlocal-Group Dictionary LearningLi Liu, Peipei Yang, Tian Zhou, Yunyi Li, Wenmei Li, Guan Gui. 343-348 [doi]
- On Test Sequcence Generation of Time-Triggered Ethernet Using Genetic AlgorithmYongfeng Yin, Xuefeng Wang, Qingran Su. 349-354 [doi]
- On Vulnerability Analysis of Nodes against Cross-domain Cascading Failures Propagation in Active Distribution Network Cyber-physical SystemPengpeng Sun, Yunwei Dong. 355-363 [doi]
- Parametric Software Defect Patterns Based on Test PerspectiveGu Bin-Bing, Li Yin, Jiang Ting-Ting. 364-370 [doi]
- Performance optimisation Method of PBFT Consensus for Supply Chain Integration SVMNa Du, Zhihong Liang, Yuxiang Huang, Zhichang Guo, Hongji Yang, Sasa Wang. 371-377 [doi]
- Problem Kit System for Expression Ability EvaluationDesheng Wang, Yubo Qian, Yu Xing, Yansong Li, Yifei Yang, Qing Wu, Tieke He. 378-384 [doi]
- Radar Signal Separation and Recognition based on Semantic SegmentationChangbo Hou, Lijie Hua, Guowei Liu, Yun Lin. 385-390 [doi]
- Reasearch on Similar Flight Numbers of LD AlgorithmChaoHui Feng, Zhe Cui, Guangxiang Yang, ZhiSen Wang, XianXi Yang. 391-397 [doi]
- Reconstruction of Smart Learning Space Based on Digital Twin (DT) TechnologyLei Song, Zhongxi Lu, Sirirat Petsangsri. 398-406 [doi]
- Reliable and Robust Weakly Supervised Attention Networks for Surface Defect DetectionZijian Zhang, Chaozhang Lv, Meijun Sun, Zheng Wang. 407-414 [doi]
- Reliable Multiview Learning for Spectral ClusteringJiajia Chen, Ying Wang, Ao Li, KeZheng Lin. 415-422 [doi]
- Research and implementation of an automatic simulation toolLiu Tang, You Li, Hongwei Wang, Huan Zhao, Luze Ma, Yuming Sun. 423-428 [doi]
- Research on Characteristics of Aircraft Traffic Flow in Airport SurfaceZhe Cui, XianXi Yang, ChaoHui Feng, Guangxiang Yang. 429-440 [doi]
- Research on Fault Diagnosis of Rolling Bearings Based on Fractal DimensionZhe Shen, Jingchao Li, Jialan Shen, Bin Zhang. 441-446 [doi]
- Software Refactoring Scheme Based on NSGA-II AlgorithmDefei Hou, Yongfeng Yin, Qingran Su, Lijun Liu. 447-452 [doi]
- Research on the Knowledge Ontology Model of Attribute-oriented Airworthiness Review Compliance ActivitiesYu-Ping Zhu, Jun Shao, Yong Cai, Yue Shen. 453-458 [doi]
- Safety Argument Pattern Language of Safety-Critical SoftwareShuanqi Wang, Zhibo Li, Xin He, Ke Sheng, Jingxuan Zhou, Wei Wu. 459-467 [doi]
- Security Testing of Unmanned Flight SystemXiao-Ting Meng, Li-Li Yu. 468-471 [doi]
- Simulation Verification Technology of Virtual-Real-Integration Avionics SystemXining Cui, Yukai Hao, Xiaodi Dai. 472-477 [doi]
- Software Defect Classification Approach Based on the Modified Latent Dirichlet Allocation Topic Model Considering the Domain CharactersJunruo Sun, Huancheng Su, Haifeng Li, Chang Liu, Jiabin Chen, Xi Liu. 478-482 [doi]
- Software Quality Measurement Combining Autonomy Evaluation for Intelligent Early-warning Information SystemXinlei Zheng, Xi Liu. 483-488 [doi]
- Sonar Cross Section Recovery Method Based on Pole Features of Underwater TargetZiqi Zhou, Yang Li, Bowang Jiang, Kaiyang Liu, Yingzi Wu, Yanni Wu. 489-490 [doi]
- Summary of Tools in FPGA Static Timing AnalysisXubing Wang, Jing You. 491-492 [doi]
- System Vulnerability Oriented to StrategiesYu Xin, Xiaohong Bao. 493-499 [doi]
- Task-driven Image Preprocessing Algorithm Evaluation StrategyPengQi Wang, Lin Geng, Dongbo Zhao, Shuting Kang, Qian Dong, Guang Yang, Yuan Shi, Lingzhong Meng, Yunzhi Xue. 500-508 [doi]
- Test Suite Generation for Software Reliability Testing Based on Hybrid Musa and Markov MethodLi Yin. 509-514 [doi]
- Testing DNN-Based Path Planning Algorithms by Metamorphic TestingShuxiao Lv, Beibei Yin. 515-526 [doi]
- The Airborne Information Processing System Development ResearchJianchun Xie, YaHui Li, Zhonghua Wang, Linting Bai. 527-531 [doi]
- The Design and Implementation of Test System for Expression Ability EvaluationYansong Li, Yu Xing, Yubo Qian, Desheng Wang, Yifei Yang, Qing Wu, Tieke He. 532-537 [doi]
- The Evaluation Method of Speech Interference Effect Based on Deep LearningHengfeng Fu, Sen Wang. 538-542 [doi]
- The Quantitative Relationship between Adversarial Training and Robustness of CNN ModelJie Wang, Minyan Lu, Jun Ai, Xueyuan Sun. 543-549 [doi]
- The test process date based quality defect detection strategy for spacecraft componentsTaichun Qin, Shouwen Liu, Shouqing Huang, Yuege Zhou. 550-554 [doi]
- VSFBS: Vulnerability Search in Firmware Based on StringZhibin Zhang, Dian Zhou, Jiqing Rao, Dongdong Zhao, Wenhua Hu, Jianwen Xiang, Zhongjin Liu, Yanzhen Xing. 555-563 [doi]