Abstract is missing.
- Automated Pricing-based Provisioning of SDN/NFV Services in Distributed Multi-access Edge Computing using Cooperative Multi-Agent Deep Reinforcement LearningJean Jimmy Julien, Sirapop Nuannimnoi, Ching-Yao Huang. 1-12 [doi]
- DVTest: Deep Neural Network Visualization Testing FrameworkSiqi Gu, Zhaowei Zong, Fangyuan Tian, Zhenyu Chen 0001. 1-11 [doi]
- A Comprehensive Evaluation of Q-Learning Based Automatic Web GUI TestingYujia Fan, Siyi Wang, Sinan Wang, Yepang Liu 0001, Guoyao Wen, Qi Rong. 12-23 [doi]
- Adversarial Sample Detection for BERT Model Based on Sample Sensitivity CharacteristicsJing Liu, Yihao Wang, Yang Wu. 24-34 [doi]
- Study on Automatic Code Summary Generation Method based on Graph Neural NetworkChangsheng Du, Yong Li, Yue Wang, Junjie Yu. 35-41 [doi]
- Evaluating the Resilience of Software Architecture Based on Minimal PathDonglin Li, Zixuan Liu, Jiaxin Pan, Bixin Li. 42-53 [doi]
- Empirical Study on Secure Software DevelopmentAdelina Aleksieva-Petrova, Milen Petrov. 54-59 [doi]
- Patch management planning - towards one-to-one policyVeikko Markkanen, Tapio Frantti. 60-69 [doi]
- A Software Security Testing Model for Autonomous SystemsJinchang Hu, Kang Sun, Sen Yang, Zhanwei Hui, Song Huang. 70-74 [doi]
- Towards High-Quality Test Suite Generation with ML-Based Boundary Value AnalysisXiujing Guo, Hiroyuki Okamura, Tadashi Dohi. 75-85 [doi]
- A Review of Metamorphic Relation Representation FormsYin Zhao, Meng Li, Jie Liu. 86-93 [doi]
- Modelling Android applications through static analysis and systematic exploratory testingJordan Doyle, Thomas Laurent 0003, Anthony Ventresque. 94-104 [doi]
- Towards Using Structural Abstraction for Model CheckingChristoph Luckeneder, Ralph Hoch, Hermann Kaindl. 105-113 [doi]
- Towards Effective Bug Reproduction for Mobile ApplicationsXin Li, Shengcheng Yu, Lifan Sun, Yuexiao Liu, Chunrong Fang. 114-125 [doi]
- HyperFed: Free-riding Resistant Federated Learning with Performance-based Reputation Mechanism and Adaptive Aggregation using HypernetworksSirapop Nuannimnoi, Florian Delizy, Ching-Yao Huang. 126-134 [doi]
- Activity-based modeling strategy for reliable machine learning system analysis targeting GUI-based applicationsHiroshi Tanaka, Masaru Ide, Kazuki Munakata, Hironori Washizaki, Nobukazu Yoshioka. 135-143 [doi]
- Real-time Fruit Detection Method Based on RGB-D Image FusionLingjie Wang, Yunfeng Zhu, Siqi Gu, Zhenyu Chen. 156-166 [doi]
- Research on Label Distribution Dimension Reduction Algorithm Based on MLDAWenquan Tian, Shanshan Li, Chengfang Tan, Zhiwei Zhang, Lin Cui 0002. 167-172 [doi]
- An Attention Mechanism Based Approach for Multivariate Time Series Anomaly DetectionYihao Xiong, Jinbo Wang, Yuanlin Xin, Chi Zhang, Panpan Xue. 173-181 [doi]
- Anti-sea Operation Knowledge Modeling of Aircraft Carrier Formation Based on Key Knowledge and Symbiotic Relationship of ConditionsJue Wang, Yitao Wang, Dianwen Liu, Hao Long. 182-189 [doi]
- Another Look at Non-homogeneous Markovian Software Reliability ModelingNanxiang Qiu, Siqiao Li, Tadashi Dohi, Hiroyuki Okamura. 190-199 [doi]
- Dynamic Assignment of Multi-UAV Marine Search and Rescue Missions Under the Condition of Intelligence SupportXingjun Chen, Zimeng Wang, Junpeng Zhang. 200-210 [doi]
- Optimizing Named Entity Recognition for Improving Logical Formulae Abstraction from Technical Requirements DocumentsAlexander Perko, Haoran Zhao, Franz Wotawa. 211-222 [doi]
- Knowledge Representation and Reasoning of Strong System Confrontation Process Based on Spatio-Temporal Event Evolution Information Flow and SoftwareHongquan Shi, Jinbo Gong. 223-232 [doi]
- Validity Analysis of Software Defect Prediction Model for Mis-label Correction Based on CleanLabAo Xu, Yi Zhu, Yuxiang Gao, Qiao Yu, Guosheng Hao. 233-241 [doi]
- Research on Aggregation of Federated Model for Software Defect Prediction Based on Dynamic SelectionHuiling Song, Yong Li, Wenjing Zhang, Ying Liu. 242-249 [doi]
- rd party software integrationVeikko Markkanen, Tapio Frantti. 250-259 [doi]
- Achieving Cyber-Informed Engineering Through Bayesian Belief Network and Sensitivity AnalysisChidi Agbo, Hoda Mehrpouyan. 260-271 [doi]
- Single and Combined Cyberattack Impact on Industrial Wastewater SystemsAlvi Jawad, Jason Jaskolka. 272-281 [doi]
- Employing Redundancy to Leverage Cybersecurity Protection of Safety-Critical SystemsElena Troubitsyna. 282-287 [doi]
- Data-Leashing: Towards a Characterization of The Problem and Its SolutionThowayba M. Elkaffash, Armstrong Nhlabatsi. 288-295 [doi]
- A Comprehensive and Credible Assessment Method for Model Adversarial Robustness under Modulated Signal IdentificationSonglin Yang, Zhida Bao, Yun Lin 0005. 296-301 [doi]
- Analyzing Software Supply Chain Security Risks in Industrial Control System Protocols: An OpenSSF Scorecard ApproachAwad A. Younis, Yi Hu, Ramadan Abdunabi. 302-311 [doi]
- Host Intrusion Detection Method Based on Short Sequence of System CallBangrui Wan, Yuduo He, Xin Liu, Shiyu Wang, Ying Qian. 312-322 [doi]
- An Unsupervised Deep Learning Approach for Health Assessment of Distributed SystemsYuanlin Xin, Jinbo Wang, Yihao Xiong, Ruixue Wang, Zhaohui Yao. 323-332 [doi]
- Research on Deep Learning-Based SAR Image Denoising AlgorithmShengnan Hu, Ruihan Mao, Hua Li. 333-338 [doi]
- Research and Application of Loitering Detection Based on Deep LearningYuyang Zhang, Jiangcheng Wang, Xiaobing Wang, Yingnan Wang, Sijiang Yu. 339-346 [doi]
- A Click-through Rate Prediction Method Based on Interaction Features Extraction for High-dimensional Sparse DataXin Liu, Jianping Ma, Dengjian Qiao, Chunhua Lian. 347-355 [doi]
- A Priority-based Dynamic Chain Operation Planning ModelYihong Liu, Xingjun Chen. 356-359 [doi]
- A Software Execution Data Component Identification Algorithm Based on Spectral ClusteringYahui Tang, Mengqi Rao, Qingjie Wei, Feng Chen, Xin Liu. 360-368 [doi]
- A quantitative analysis method for model uncertainty based on Verification, Validation, and Uncertainty QuantificationHui Tang, Lizhi Wang, Lingfei You, Mengfei Yao, Xiaohong Wang. 369-378 [doi]
- An Adaptive Learning Feature Model Validation Methodology Based on Formal MethodsChenyu Wang, Yi Zhu, Mei Song. 379-388 [doi]
- Move Smart Contract Vulnerability Detection based on Resource-flow AnalysisJinlei Sun, Zhanwei Hui, Xiaojuan Wang, Xu Cao, Shuang Song. 389-398 [doi]
- An Enhanced Approach for RFID Reader Deployment in Industrial IoT Systems with Collision Avoidance and Optimized CoverageChien-Fu Cheng, Bo-Yan Liao. 399-405 [doi]
- Blockchain-based Model for Privacy-enhanced Data SharingWeikang Li, Yong Li, Changqing Zheng, Ruiqi He. 406-417 [doi]
- Automatic Generation of Solidity Test for Blockchain Smart Contract using Many Objective Search and Dimensionality ReductionDongcheng Li, W. Eric Wong, Sean Pan, Liang-Seng Koh, Nicholas Chau. 418-430 [doi]
- A Systematic Mapping Study of Digital Twins for Diagnosis in TransportationLiliana Marie Prikler, Franz Wotawa. 431-442 [doi]
- Using the Deep Learning-Based Approaches for Program Debugging and RepairTzu-Yang Lin, Chin-Yu Huang, Chih-Chiang Fang. 443-454 [doi]
- Spatio-Temporal Rule Constraint Guided Safe Reinforcement Learning for CPSChan Yin, Yi Zhu, Jinyong Wang, Guosheng Hao. 455-465 [doi]
- Task Allocation of Multi UAV Based on Genetic AlgorithmYingqiang He, Qi Su, Hao Long. 466-467 [doi]
- Visual Feedback Using VR Patient Avatar in Care and Nursing Training EnvironmentsMinjeong Lee, Younga Kwon, Suyeong Kim, Miran Lee. 468-469 [doi]
- A High Availability Microservices Architecture Implementation using Saga and Backup MechanismWen-Tin Lee, Ping-Yi Song, Ming-Kai Tsai, Meng-Hsien Wu, Shang-Pin Ma. 470-471 [doi]
- Containerized Microservices Deployment Approach based on Ant Colony OptimizationWen-Tin Lee, Zhi-Yao Yang, Zhun-Wei Liu, Shin-Jie Lee. 472-473 [doi]
- A Robust and High-Performance Flip-Flop with Complete Soft-Error RecoveryAibin Yan, Xuehua Li, Tianming Ni, Zhengfeng Huang, Xiaoqing Wen. 474-476 [doi]
- Assessment of Real-World Incident Detection Through a Component-Based Online Log Anomaly Detection Pipeline FrameworkScott Lupton, Lena Yu, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa. 477-478 [doi]
- Image Transmission Based on Semantics Communication in Vehicle-Infrastructure Collaboration SystemJingjing Li, Kai Sheng, Lei Ao, Makoto Itoh, Qinghai Yang. 479-486 [doi]
- Spatial-Temporal Hypergraph Neural Network based on Attention Mechanism for Multi-view Data Action RecognitionZhixuan Wu, Nan Ma, Tao Zhi, Genbao Xu. 487-493 [doi]
- Evaluation of Wireless Deauthentication Attacks and Countermeasures on Autonomous VehiclesRamnik Singh Reen, Gaurav Dharmani, Rahul Gothwal, Eslam G. AbdAllah. 494-501 [doi]
- Evaluation of Man-in-the-Middle Attacks and Countermeasures on Autonomous VehiclesRahul Gothwal, Gaurav Dharmani, Ramnik Singh Reen, Eslam G. AbdAllah. 502-509 [doi]
- An Automatic Sensing Weakness Detection Method For Autonomous Vehicle AssessmentFumito Kuroyanagi, Eriko Uno, Kohji Ichikawa, Kohji Nagase, Hideo Inoue. 510-518 [doi]
- Research on Resilience of Maritime Distributed Combat Network Under Targeted AttacksQi Su, Feifan Liu, Hongquan Shi, Haoxiang Xia, Zhengwei Ma. 519-526 [doi]
- A Method for Evaluating the Effectiveness of Combat Plans Based on Matter-element Extension Model with Variable WeightJunfeng Nie. 527-531 [doi]
- Research on Multi-agent PPO Reinforcement Learning Algorithm based on Knowledge GraphLian Liu, Dongpu Sun. 532-536 [doi]
- Chat-EasyEdu: An Education Field Intelligent Question-Answering System Based on Knowledge GraphsZhiquan An, Junyi Huang, Guotao Jiao, Longfei Liu, Changxi Feng. 537-546 [doi]
- A Stacking-Based Heart Disease Classification Prediction ModelPan Liu, Li Li, Yihao Li. 547-553 [doi]
- Health Trend Prediction of Rolling Bearings using Transferable Autoregressive Recurrent Adaptation ApproachYudong Cao, Minping Jia, Jichao Zhuang. 554-558 [doi]
- Performance Degradation Assessment of Rolling Bearing Based on Difference of Eigenvalues in Random Matrix TheoryWenchang Zhu, Peng Huang. 559-564 [doi]
- Reliability Analysis For Thin Film Thermocouple Thermal Oxidation Failure Based On Interlayer DiffusionZhikuan Chen, Yufeng Sun, Yuqing Xue. 565-574 [doi]
- Software Countermeasures against DVFS fault Attack for AESZikang Tao, Rihui Sun, Jian Dong. 575-582 [doi]
- Robust Model for Adversarial Attack Protection through Weak Features RemovalPratomo Adinegoro, Chin-Chun Chang, Deron Liang. 583-584 [doi]
- A Multiple-Criteria Ensemble Weight Strategy to Increase the Effectiveness of Deep Learning-based Fault LocalizationChih-Chiang Fang, Chin-Yu Huang. 585-586 [doi]
- An Empirical Evaluation of the Effectiveness of Spider and Proxy Modes for Web Security TestingKuan-Wei Chiu, Shih-Sheng Yang, Shin-Jie Lee, Wen-Tin Lee. 587-588 [doi]
- Automatic Detection of Abstract-Concrete Relationships between Attack Patterns of ATT&CK and CAPEC with Fine-tuned BERTTakuma Tsuchida, Rikuho Miyata, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa. 589-590 [doi]
- UTEMS: A Unit Testing Scheme for Event-driven MicroservicesShang-Pin Ma, Yu-Yung Yang, Shin-Jie Lee, Hang-Wei Yeh. 591-592 [doi]
- Towards Integrated Model-Based Machine Learning Experimentation FrameworkJomphon Runpakprakun, Jati H. Husen, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa. 593-594 [doi]
- The Impact of ChatGPT on Software Engineering Education: A Quick PeekYihao Li, Jialong Xu, Yinghua Zhu, Huashuo Liu, Pan Liu. 595-596 [doi]
- An Easy-portable Displacement-offset-based Trajectory Prediction Method for Autonomous VehiclesCheng Wei, Fei Hui, Xiangmo Zhao, Shanke Li, Jie Wei. 597-605 [doi]
- Prediction of Autonomous Vehicle Trajectories in Turnaround ScenariosGeorge Daoud, Mohamed El-Darieby, Khalid Elgazzar. 606-613 [doi]
- Towards a Benchmark for Trajectory Prediction of Autonomous VehiclesGeorge Daoud, Mohamed El-Darieby. 614-622 [doi]
- BIR-AHC: Balanced Iterative Reducing and Agglomerative Hierarchical Clustering for Stair DetectionChuansheng Xiao, Nan Ma, Kongjian Qin, Genbao Xu, Mohan Wang. 623-627 [doi]
- Employing Deep Unsupervised Learning Method to Identify Testing Scenarios for Automated VehiclesShuai Liu, Fan Ren, Guo Yang, Dingchang He, Yonggang Liu. 628-635 [doi]
- Automated Labelling of Traffic Police Data Based on Weak SupervisionYing Zheng, Hailang Zhang, Jialu Du, Chiangyu Hu, Hong Bao. 636-644 [doi]
- Research on Decision Assistant Software for Ship Aircraft Collaborative Search and RescueWei Qi, Hongjin Zhou, Tianpei Wang, Jiawei Hu. 645-646 [doi]
- An Improved H∞ Filtering based on Information Attack over Discrete Linear SystemsYinggang Zhang, Li Liu 0001, Jinming Liu, Yihao Li, Pan Liu. 647-651 [doi]
- QA4C: An Intelligent Question and Answering System for the C Programming Language Based on Knowledge GraphYujuan Cheng. 652-657 [doi]
- A Research on the Factors Influencing Cyberchondria from the Perspective of Online Health Information SeekingZiyang Weng, Han Zheng, Ming Yang. 658-667 [doi]
- Software Reliability Modeling Based on Zero-truncated and/or Zero-inflated Compound DistributionsJingchi Wu, Tadashi Dohi, Hiroyuki Okamura. 668-679 [doi]
- Maintainability Assessment for SOFL Formal SpecificationsYu Du, Shaoying Liu. 680-687 [doi]
- Application of mathematical quantification theory class III in software effort predictionKosuke Ito, Keita Tanaami, Xiao Xiao. 688-697 [doi]
- Analysing Residual Risks when Introducing Monitoring and Diagnosis into SystemsThomas Hirsch, Franz Wotawa. 698-709 [doi]
- Availability modeling and evaluation of switches and data centersShakthivelu Janardhanan, Carmen Mas Machuca. 710-721 [doi]
- Senti-EGCN: An Aspect-Based Sentiment Analysis System Using Edge-Enhanced Graph Convolutional NetworksChen Li, Junjun Zheng, Peng Ju, Yasuhiko Morimoto. 722-729 [doi]
- A Note on Optimal Retraining Strategy for ML SystemsHisashi Kanda, Hiroyuki Okamura, Tadashi Dohi. 730-733 [doi]
- An Investigation of the Behaviours of Machine Learning Agents Used in the Game of GoMingyue Zhang, Xiao-Yi Zhang, Paolo Arcaini, Fuyuki Ishikawa. 734-742 [doi]
- Using Complex Network Communities to Evaluate the Correctness of Object DetectionTao Zheng, Shijun Zhao, Kun Qiu, Pak-Lok Poon, Lanlin Yu. 743-750 [doi]
- An Empirical Study of Fault Detection Effectiveness of Metamorphic Testing for Object DetectorsKun Qiu, Shuo Wang, Pak-Lok Poon. 751-758 [doi]
- A Visualization-aware Loss for Point Cloud ComparisonXingzhe Wu, Qiang Zhou. 759-769 [doi]
- Autonomous and Security-Aware Dynamic Vehicular Platoon FormationDominic Phillips, Talal Halabi, Mohammad Zulkernine. 770-781 [doi]
- Two-Stream (2+1)D CNN Based on Frame Difference Attention for Driver Behavior RecognitionYang Zou, Shaoyi Du, Hongcheng Han, Yuying Liu, Zhiqiang Tian. 782-788 [doi]
- Lane-Changing Decision-Making Method for Autonomous Vehicles Considering Multi-Vehicle InteractionsTianqi Qie, Weida Wang, Chao Yang 0006, Ying Li. 789-793 [doi]
- Research on Intelligent Monitoring Method of Medicine Delivery Vehicle Based on Internet of Things TechnologyXiaomin Chen, Xi Han, Yuansheng Liu. 794-799 [doi]
- Study on Roll Oscillation Phenomenon and Controller Design of Deflection-based Flying VehiclesWei Wei, Yongjie Shu, Zhifang Ke, Kangdi Fan, Linwei Dong. 800-809 [doi]
- Prototypical Networks with Dual Attention and Regularization for Few-Shot Relation ClassificationBei Liu, Wan Tao, Sanming Liu. 810-815 [doi]
- Application in Student Performance Prediction Using Graph Regularization Nonnegative Matrix FactorizationJing Wang, Ganyi Tang, Yong Wang. 816-820 [doi]
- A RFID-Based Smart Socket DesignYunyun Yi, Jing Wang. 821-824 [doi]
- Data-intelligence Empowering Libraries: Research on Discipline-Specific Precision ServicesLi Li, Chen Li, Jiaqin Han, Yong Wang. 825-830 [doi]
- An Evaluation Method for Large Language Models' Code Generation CapabilityHaoran Su, Jun Ai, Dan Yu, Hong Zhang. 831-838 [doi]
- Assessing ChatGPT's Comprehension of Perturbed Text through Text Linguistic FeaturesDan Yu, Jun Ai, Haorao Su, Hong Zhang. 839-850 [doi]
- Improving Accuracy of Small Object Detection in Screen based on YOLOv7Jianfu Liang, Jun Ai. 851-859 [doi]
- An Intelligent Labeling and Dataset Generating Method for Desktop Application Element Object DetectionJunda Zhu, Jun Ai, Tao Shi, Congran Zhang, Xinyue Wu. 860-869 [doi]
- Tool Development of Daubechies Wavelet Estimation for Stochastic Counting ProcessesJingchi Wu, Tadashi Dohi, Hiroyuki Okamura. 870-879 [doi]
- On the Effectiveness of Graph Data Augmentation for Source Code LearningZeming Dong, Qiang Hu, Zhenya Zhang, Jianjun Zhao 0001. 880-889 [doi]
- Convolutional Neural Network based Digital Twin of Rolling Bearings for CNC Machine Tools in Cloud ComputingZhaoming Wang, Siqian Gong, Yang Liu. 890-895 [doi]
- Fault location and separation method of Distributed Inertial Measurement Units based on IACJia Song, Weize Shang, Boxuan Wu, Shaojie Ai. 896-904 [doi]
- Profile Dynamic Memory Allocation in Autonomous Driving SoftwareJin Zhou, Dexin Li, Tongping Liu. 905-914 [doi]
- ChatGPT Integration in AVS: Opportunities and ChallengesYuanzhe Jin, Maorong Wang. 915-916 [doi]