Abstract is missing.
- A Comprehensive Evaluation for Burr-Type NHPP-based Software Reliability ModelsSiqiao Li, Tadashi Dohi, Hiroyuki Okamura. 1-11 [doi]
- An Adaptive Large Neighborhood Search for Two-Dimensional Packing with Conflict PenaltyJu Zeng, Xiaopan Zhang. 12-19 [doi]
- An Empirical Study on Spectral Clustering-based Software Defect DetectionMingshuang Qing, Xiuting Ge, Zhanwei Hui, Ya Pan, Yong Fan, Xiaojuan Wang, Xu Cao. 20-29 [doi]
- ComFormer: Code Comment Generation via Transformer and Fusion Method-based Hybrid Code RepresentationGuang Yang, Xiang Chen, Jinxin Cao, Shuyuan Xu, Zhanqi Cui, Chi Yu, Ke Liu. 30-41 [doi]
- EKD-BSP: Bug Report Severity Prediction by Extracting Keywords from DescriptionYanxin Jia, Xiang Chen, Shuyuan Xu, Guang Yang, Jinxin Cao. 42-53 [doi]
- Fault Localization-Guided Test Data Generation Approach for Novice ProgramsZheng Li, Xiaotang Zhou, Deli Yu, Yonghao Wu, Yong Liu, Xiang Chen. 54-65 [doi]
- HMBFL: Higher-Order Mutation-Based Fault LocalizationZheng Li, Butian Shi, Haifeng Wang, Yong Liu, Xiang Chen. 66-77 [doi]
- Just-in-Time Defect Prediction Technology based on Interpretability TechnologyWei Zheng, Tianren Shen, Xiang Chen. 78-89 [doi]
- MFRL-CA: Microservice Fault Root Cause Location based on Correlation AnalysisYuhua Chen, Ningjiang Chen, Wenxiu Xu, Linming Lian, Huan Tu. 90-101 [doi]
- Multi-objective Evolutionary Algorithm for String SMT Solver TestingZhilei Ren, Xiaofei Fan, Xiaochen Li, Zhide Zhou, He Jiang 0001. 102-113 [doi]
- Multiscale Dense Convolutional Networks for Intelligent Fault Diagnosis of Rolling BearingYadong Xu, Beibei Sun. 114-119 [doi]
- Optimal Gateway Station Placement for Transmission Delay Minimization in Broadband LEO Satellite Communication SystemCong Xiong, Xiang Chen 0007, Fuzhou Peng, Lei Wang. 120-127 [doi]
- †Haipeng Wang, W. K. Chan. 128-139 [doi]
- †Hao Zhang, W. K. Chan. 140-151 [doi]
- Querent-centric Domain Name System Modeling and Its Application in Passive Software DiscoveryJian Qu, Xiaobo Ma, Wenmao Liu. 152-160 [doi]
- Use of Deep Learning Model with Attention Mechanism for Software Fault PredictionTing-Yan Yu, Chin-Yu Huang, Neil C. Fang. 161-171 [doi]
- A Link Flooding Attack Detection Method based on Non-Cooperative Active MeasurementXin Wang, Xiaobo Ma, Jian Qu. 172-177 [doi]
- A Method of Random Forest Classification based on Fuzzy Comprehensive EvaluationJing Zhu, Song Huang, Yaqing Shi, Kaishun Wu, Yanqiu Wang. 178-183 [doi]
- A Novel Trust-based Model for Collaborative Filtering Recommendation Systems using EntropyLei Chen, Yuyu Yuan, Hongpu Jiang, Ting Guo, Pengqian Zhao, Jinsheng Shi. 184-188 [doi]
- A Pruning Neural Network for Automatic Modulation ClassificationZherui Zhang, Ya Tu. 189-194 [doi]
- A Recommendation Method for Process Modeling based on Clustering and Graph Neural NetworkXingjun Chen, Mengjie Shan. 195-201 [doi]
- A Trusted Solution to Hyperledger Fabric Reordering ProblemQiucheng Sun, Yuyu Yuan, Ting Guo, Lei Chen. 202-207 [doi]
- An Efficient Batch Verification Scheme for SM2 SignaturesDingning Liu, Yuyu Yuan, Tengfei Xue, Lei Chen. 208-212 [doi]
- Analysing Experimental Results Obtained when Applying Search-based Testing to Verify Automated Driving FunctionsFlorian Klück, Franz Wotawa, Gerhard Neubauer, Jianbo Tao, Mihai Nica. 213-219 [doi]
- Architecture-Level Schedulability Analysis with IO Constraint using AADLYunwei Dong, Qian-wen Gou, Pei Tang. 220-229 [doi]
- Behavior-Driven Development of Software Product LinesTugkan Tuglular, Deniz Egemen Coskun. 230-239 [doi]
- †Yangyang Zhang, Zengzhi Liu, Qiang Han, Wenyuan Zhang. 240-246 [doi]
- Distributed Countermeasure Algorithm based on Deep Reinforcement LearningJiping Huang, Wei Qiao, Mengfei Xu. 247-250 [doi]
- Effectively and Efficiently Defending Shadowsocks against Website Fingerprinting AttacksShuangshuang Huang, Xiaobo Ma, Huafeng Bian. 251-256 [doi]
- Generating Test Scenarios using SysML Activity DiagramXinyue Yang, Jian Zhang, Shan Zhou, Bin Wang, Ruixue Wang. 257-264 [doi]
- Interval Estimation for Non-Parametric NHPP-based Software Reliability Model via Simulation-based BootstrapXiao Xiao 0002, Tadashi Dohi. 265-270 [doi]
- Measuring Trust and Automatic Verification in Multi-Agent SystemsHongpu Jiang, Yuyu Yuan, Ting Guo, Pengqian Zhao. 271-277 [doi]
- MPSK Signal Modulation Recognition based on Decision FusionJiaxin Lin, Zhichao Zhou, Xiangyu Wu, Changbo Hou. 278-283 [doi]
- On the Performance Evaluation of Congestion Control Algorithms against DDoS AttacksHuafeng Bian, Xiaobo Ma, Pengyu Pan. 284-288 [doi]
- Ontology Dependence Closure based on Privacy AssociationMeijuan Wang, Song Huang, Hui Li, Jingli Han. 289-294 [doi]
- Performance Comparison of Three Parameter Estimation Methods on Heavily Censored DataRenyan Jiang, Shihai Xiao. 295-301 [doi]
- Radar Signal Separation Recognition Method based on Semantic SegmentationJiajun Ai, Lijie Hua, Jin Liu, Shunshun Chen, Yongjian Xu, Changbo Hou. 302-306 [doi]
- Radar System Testability Design and Demonstration based on Fault Modes and Software ControlGuoli Zhao, Chang Liu, Shaofang Li, Zenghao Tian, Xi Liu, Haifeng Li. 307-314 [doi]
- SAR and Optical Image Matching Eased on Phase Congruency and Template MatchingQingbo Ji, Lingjie Wang, Changbo Hou, Qiang Zhang, Qingquan Liu, Yue Jiang. 315-320 [doi]
- Small Sample Electromagnetic Signal Recognition based on Time Series Data AugmentationXinrui Wang, Yun Lin. 321-326 [doi]
- Target Tracking Algorithm based on Electromagnetic and Image Trajectory MatchingYongjian Xu, Chunjie Zhang, Guowei Liu, Ziwei Wang, Zhichao Zhou, Changbo Hou. 327-331 [doi]
- Transient Fault Tolerance on Multicore Processor in AMP modeJie Li, Yue Wang. 332-337 [doi]
- UAV Test Data Generation Method based on CycleGANKunyu Gao, Jinbo Wang, Bin Wang, Ruixue Wang, Jiao Jia. 338-343 [doi]
- A Combination of Fourier Transform and Machine Learning for Fault Detection and Diagnosis of Induction MotorsVan-Duc Nguyen, Ewout Zwanenburg, Steffen Limmer, Wessel Luijben, Thomas Bäck, Markus Olhofer. 344-351 [doi]
- A Coverage-Guided Fuzzing Framework based on Genetic Algorithm for Neural NetworksGaolei Yi, Xiaoyu Yang, Pu Huang, Yichen Wang. 352-358 [doi]
- A Domain Knowledge-Guided Lightweight Approach for Security Bug Reports PredictionWei Zheng, Zheng Chen, Xiaoxue Wu, Weiqiang Fu, Bowen Sun, Jingyuan Cheng. 359-368 [doi]
- A Model for Ship-Helicopter Cooperative Anti-Submarine Tracking based on Favorable SituationZongxiang Lin, Yongkan Sun. 369-372 [doi]
- A Model-based Test Cases Generation Method for Spacecraft SoftwareYe Tian, Beibei Yin, Chenglong Li. 373-382 [doi]
- A Practical Method based on MSVL for Verification of Social NetworkXiaoyu Yang, Xiaobing Wang. 383-389 [doi]
- A Survey of Story-Generation Apps and Online Systems between 2017 and 2020Siming Zheng, Hongwei Liu, Hongji Yang. 390-398 [doi]
- A Survey on Autonomous Driving DatasetsWeiyu Liu, Qian Dong, PengQi Wang, Guang Yang, Lingzhong Meng, You Song, Yuan Shi, Yunzhi Xue. 399-407 [doi]
- An Airborne Requirements Verification Method based on Requirement Elements using CRFYue Shen, Yu Li, Yuping Zhu, Yong Cai, Jun Shao. 408-413 [doi]
- An Automatic Approach to Extracting Requirement Dependencies based on Semantic WebHui Guan, Guorong Cai, Chuan Zhao. 414-420 [doi]
- An Energy-Efficient Strategy based on Q-Learning for Energy Harvesting-based Wireless Sensor NetworkJiayuan Wei, Xingyu Miao, Yongqi Ge. 421-427 [doi]
- An Indoor Positioning System based on Intelligent TerminalHaoran Yu, Yijie Gao, Jiang Wu. 428-433 [doi]
- An Intellectual Property Data Access Control Method for Crowdsourced Testing SystemSong Huang, Zhen Yang, Changyou Zheng, Jinyong Wan. 434-438 [doi]
- An Interactive Computer Assisted Design System: Architecture and DesignYuxuan Yan, Xingjun Chen. 439-443 [doi]
- An Optimal Resource Scheduling of Debris Monitoring using Particle Swarm Algorithm with Constriction FactorTao Song, Wei Wang, Dongcheng Li, Yining Zhao. 444-450 [doi]
- Analytical Investigation of Anomaly Detection Methods based on Time-Domain Features and Autoencoders in Satellite Power SubsystemWeihua Jin, Bo Sun, Zhidong Li, Lei Zhang, Shijie Zhang. 451-460 [doi]
- Applying Animation for the Interpretation of Beijing Symbols in the Second Dimensional SpaceLu Zhang, Shimiao Gao, Meiyu Shi. 461-466 [doi]
- Applying Microservice Refactoring to Object-2riented Legacy SystemJunfeng Zhao, Ke Zhao. 467-473 [doi]
- ARB-BERT: An Automatic Aging-Related Bug Report Classification Method based on BERTMingxi Li, Bei-Bei Yin. 474-483 [doi]
- Automatic Test Path Generation and Prioritization using UML Activity DiagramLili Fan, Yong Wang, Tao Liu. 484-490 [doi]
- Code Comprehensibility Evaluation for Java Class based on LDA Topic ModelYikang Shao, Jun Ai. 491-498 [doi]
- Constructing A Creative Service Software with Semantic WebPei Shu Huang, Faisal Fahmi, Feng-Jian Wang, Hongji Yang. 499-507 [doi]
- Construction of GUI Elements Recognition Model for AI Testing based on Deep LearningCongran Zhang, Tao Shi, Jun Ai, Wei Tian. 508-515 [doi]
- Decision-Making Method of UAV Maneuvering in Close-Range Confrontation based on Deep Reinforcement LearningJiang Wu, Xiaodong Fan, Kaixiang Zhang. 516-521 [doi]
- Deep Reinforcement Learning based Adaptive Real-Time Path Planning for UAVJiankang Li, Yang Liu. 522-530 [doi]
- Design and Implementation of Serial Rabbit Ear Removal Architecture based on FPGA in Passive DetectionShanshan Wang, Qingnan Wu, Huifang Dong. 531-535 [doi]
- Design and Implementation of Software Test System for Aviation Communication Radio StationTao Liu, Yuebo Wang, Chao Chen, Jixiu Li, Qinglu Pu. 536-540 [doi]
- Design of A Reliable Algorithmic with Deep Learning and Transfer Learning for Load Combination RecognitionYanmei Jiang, Mingsheng Liu. 541-550 [doi]
- Detection and Mitigation of Label-Flipping Attacks in Federated Learning Systems with KPCA and K-MeansDongcheng Li, W. Eric Wong, Wei Wang, Yao Yao, Matthew Chau. 551-559 [doi]
- Dictionary Learning Algorithm based on Restricted Boltzmann MachineLiu Lian. 560-565 [doi]
- Emotions Behind Divergent ThinkingZhongxi Lu, Jinli Luo, Hongji Yang. 566-571 [doi]
- Event Graph based Warship Formation Air Defense Scheduling Model and AlgorithmJinbo Gong, Xu Zhang, Yaowu Liu, Xiaopan Zhang. 572-580 [doi]
- Fault Diagnosis of the Four-Rotor Unmanned Aerial Vehicle using the Optimized Deep Forest Algorithm based on the Wavelet Packet TranslationShaojie Ai, Weize Shang, Jia Song, Guobiao Cai. 581-589 [doi]
- KD-RRT: Restricted Random Testing based on K-Dimensional TreeJunlong Lian, Chenhui Cui, Weifeng Sun, Yiming Wu, Rubing Huang. 590-599 [doi]
- Malware Detection using CNN via Word EmbeddingJie Zhang, Lin Yan, Rong Wang, Cong Tian, Zhenhua Duan. 600-607 [doi]
- Multi-Agent Trust Evaluation Model based on Reinforcement LearningHaoran Jia, Yuyu Yuan, Qiang Han, Pengqian Zhao, Ting Guo. 608-613 [doi]
- Multi-Granularity Information Expression Application on Patent Text ClusteringDongpu Sun. 614-619 [doi]
- Multi-UAV Reconnaissance Task Assignment based on Wide-Area Search ScenarioJunpeng Zhang, Xingjun Chen. 620-625 [doi]
- Operational Task Decomposition Method based on Extended HTN PlanningNie Junfeng. 626-630 [doi]
- Privacy Protocol Analysis based on Android ApplicationYongming Yao, Yulin Wang, Weiyi Jiang, Ziyuan Wang, Song Huang. 631-638 [doi]
- Quality Evaluation of Image Dataset based on Label FileYoudi Gong, Yunzhi Xue, Qian Dong, Guang Yang, PengQi Wang, Yuan Shi, Lingzhong Meng. 639-646 [doi]
- Satellite On-2rbit Anomaly Detection and Adaptive Model Updating MethodZhidong Li, Bo Sun, Lei Zhang, Weihua Jin. 647-655 [doi]
- Scenario-based Reliability Testing Methods for Smart Grid Dispatching and Control SystemLing-lin Gong, Yujia Li, Hongfu Chen, Xin Xu, Fang Liu. 656-663 [doi]
- Signal Modulation Recognition based on Convolutional Autoencoder and Time-Frequency AnalysisXiangyu Wu, Jing Zhang, Changbo Hou, Guowei Liu, Jie Zhang, Jin Liu. 664-668 [doi]
- Software Defect Prediction for Specific Defect Types based on Augmented Code Graph RepresentationJiaxi Xu, Jun Ai, Tao Shi. 669-678 [doi]
- Software Selection Test of Enterprise-Level Big Data Analysis PlatformChiyang Gao, Wenbing Luo, Fei Xie. 679-684 [doi]
- Stability Analysis and Parameter Design for Stabilizing One Delay Point in Two-Delay Differential EquationsHanyuan Wu, Xiangmin Li, Zhiyu Xi. 685-691 [doi]
- Survey on Autonomous Vehicle Simulation PlatformsGuang Yang, Yunzhi Xue, Lingzhong Meng, PengQi Wang, Yuan Shi, Qinghong Yang, Qian Dong. 692-699 [doi]
- Test Case Reuse based on ESIM ModelXiaomeng Chen, Jinbo Wang, Shan Zhou, Panpan Xue, Jiao Jia. 700-705 [doi]
- Test Method of Flight Control Software based on Input Field ModelDongmei Dong, Wuwu Hua, Zhihao Liu, Yunyu Fang, Yue Hou. 706-711 [doi]
- The Evaluation of Teaching Effect based on Interpretable Machine LearningQingguo Yan, Jun Zhao, XianGuang Cha, Wei Dai, Zejia He, Lin Cui, Lingshuang Yu. 712-715 [doi]
- Timing Attacks in Single-Chip Microcomputer through Workflow VerificationCong Li, Qiang Han, Bingbing Lei, Haide Liu, Cong Liu, Yu He. 716-721 [doi]
- Verification of CTCS-3 using TMSVLYining Wang, Chunyi Li, Xiaobing Wang. 722-729 [doi]
- A Mutation-based Approach to Repair Deep Neural Network ModelsHuanhuan Wu, Zheng Li, Zhanqi Cui, Jiaming Zhang. 730-731 [doi]
- A Novel Building Worker Detection based on Cross Feature Pyramid NetworkYumin Gao, Daojin Nie, Huimin Gan, Zhiyong Cao, Ning Lin, Cuicui Sun. 732-733 [doi]
- A Reliable and Low-Cost Flip-Flop Hardened against Double-Node-UpsetsAibin Yan, Aoran Cao, Kuikui Qian, Liang Ding, Zhihui He, Zhengzheng Fan, Xiaoqing Wen. 734-736 [doi]
- An Improved Simhash Algorithm for Academic Paper Checking SystemMengxia Wang, Wenqiang Fan 0002. 737-738 [doi]
- Capability Analysis Method for Electromagnetic SpectrumYongchao Meng, Peihan Qi, Xiaoyu Zhou, Zan Li. 739-740 [doi]
- Exploiting Bitcoin Mining Pool for Stealthy and Flexible Botnet ChannelsPengyu Pan, Xiaobo Ma, Huafeng Bian. 741-742 [doi]
- Heterogeneous Graph Modeling and Visualization for Cyber Asset ManagementShuowen Fu, Xin Zhao, Yunpeng Chen, Yaqi Xu, Xiaoli Li, Fangfang Zhou, Ying Zhao 0001. 743-744 [doi]
- Impact of Mechanism and Influencing Factors of Radio Frequency Fingerprint on Wireless DevicesShihao Wang, Haoran Zha. 745-746 [doi]
- Modulation Recognition Algorithm based on Digital Communication Signal Time-Frequency ImageKuixian Li, Jibo Shi. 747-748 [doi]
- Proof of Greatest Number Program and FindZhihui Shan, Qiang Han, Meng Han. 749-750 [doi]
- Three Classifications of Big Data-based Software TestingPan Liu, Jiaqi Yan, Xiaoyu Song. 751-752 [doi]
- Underwater Unmanned Vehicle Search Path Optimization ArithmeticWenjin Yin, Zhijiang Yuan, Fei Long, Ye Zhao. 753-755 [doi]