Abstract is missing.
- Pruning-Based Optimization of Model Distillation Algorithm Using Explainable Machine Learning MethodsBobing Shen, Haibo Zhang. 1-5 [doi]
- Software Defect Prediction Model Based on Syntactic Semantics and Flow Information FeaturesChongyang Huang, Yi Zhu, Qiao Yu, Yi Ding, Guosheng Hao. 6-15 [doi]
- Deep Learning Model Risk Identification and Control TechnologyHaoran Zhang, Guang Yang, Hongyun Yu, Lingzhong Meng, Baolin Yan. 16-24 [doi]
- Prediction of Carbon Emissions Based on PCA and Neural Network Models under the "Dual Carbon" BackgroundLi Rui. 25-34 [doi]
- Metrics and Testing Methods for Artificial Intelligence Software Quality Models and Their Application ExamplesMengfei Guo, Dong Guo, Mo Li. 35-42 [doi]
- Retrainable Hand Gesture Recognition Model Driven by Edge AITse-Chuan Hsu, Dong-Meau Chang. 43-48 [doi]
- Generative AI for Smart Contracts in Real Estate BusinessWenqian Zhao, Lavanya Pobbathi, Srinivasan Ramprasath, Meghana Patibandla. 49-59 [doi]
- Fin-MLGAT: Line Graph Attention Network for Dialogue Emotion Recognition in Stock Market and its EvaluationsXiaobing Feng, Ling Feng, Xiujuan Xu, Jiaqi Qiao, Wenjian Zhang. 60-67 [doi]
- WVRF_CGT: WVRF Automatic Filter Based Cascading Graph Transformer for Information Diffusion in Stock Q&A PlatformXiaobing Feng, Ling Feng, Pengfei Jiao, Zhiliang Zheng, Qing Bao. 68-74 [doi]
- An Efficient Task Scheduling for Security and Stability Control System Models on Multi-Core SystemsZhi Wang, Bo Shen. 75-85 [doi]
- Interplay of Attacker Behaviors and Dependability Attributes in Industrial Control System Impact AnalysisAlvi Jawad, Jason Jaskolka. 86-95 [doi]
- Functional Safety Evaluation for Cybersecurity Measures in Low-End Automotive Control UnitsSergei Hammer Né Bauer, Peter Schartner. 96-105 [doi]
- Enhancing Dependability of Industrial Robots: Security and Safety Assessments Based on Model-Driven EngineeringEun-Young Kang 0001, Gaurav Choudhary, Miguel Campusano, Morten Kühnrich, Anders Pedersen. 106-113 [doi]
- Detection and Estimation of False Data Injection Attacks by Unmanned Surface VesselsKun Leng, Li Liu, He Zhang, Yihao Li, Pan Liu. 114-119 [doi]
- MetBench: A Numerical Expression Metamorphic Relations Benchmark Data SetYin Zhao, Meng Li, Yongcheng Su, Kailin Zi, Cong Zeng. 120-131 [doi]
- Automated Structural Test Case Generation for Human-Computer Interaction Software Based on Large Language ModelLong Kang, Jun Ai, Minyan Lu. 132-140 [doi]
- Semantic-Guided Adaptive Exploration Testing for GUI SoftwareYingxiang Huang, Minyan Lu, Xun Long. 141-149 [doi]
- Analysis on Individual Manned and Unmanned Cooperation Interoperable ComputingZhangfeng Ju, Wenxiu Ma, Yuanheng Li, Yifan Guo, Ran Ju. 142-148 [doi]
- Prioritization of Crowdsourced Test Reports Based on Defect Severity and Frequency WeightingYihao Li, Lei Xiao, Weiwei Zhuang, Xiaozhu Xie, Jiawei Zhang. 150-160 [doi]
- An Analysis and Comparison of Mutation Testing Tools for PythonKadiatou Diallo, Zizhao Chen, W. Eric Wong, Shou-Yu Lee. 161-169 [doi]
- Coverage-Guided Testing for Automatic Speech Recognition SystemsYang Xu, Tingting Yu, Rui Chen. 170-171 [doi]
- A Review of Reliability Verification Technology for Aviation Intelligent SystemsJiao Li, Wensheng Peng, Zhaoyang Zeng, Ming Xu. 172-181 [doi]
- A Hybrid Malicious Node Detection Approach Based on Fuzzy Trust Model and Bayesian Belief in Wireless Sensor NetworksHongyang Zhao, Jiawang Chen, Beishui Liu, Shuai Li. 182-188 [doi]
- Semantic-Weighted Word Error Rate Based on BERT for Evaluating Automatic Speech Recognition ModelsYutao Zhang, Jun Ai. 189-198 [doi]
- A Time-Aware Recommendation Model with Social ImpactYuheng Su, Yi Zhu, Mei Song, Weichao He, Guosheng Hao. 199-208 [doi]
- A Vulnerability Propagation Impact Analysis Approach Based on Code Semantics with LLMXun Long, Jun Ai, Jieyu Zhao, Yingxiang Huang. 209-216 [doi]
- A Survey of Mutation Based Testing Adequacy Study on Smart ContractHaoli Chen, Chunlei Zhu, Liang Zhang, Yan Zhao, Lie Wang. 217-220 [doi]
- Survey on Simulation Testing of Autonomous Driving SystemChunyan Xia, Changyou Zheng, Yuchen Xia, Xiangjing Kong, Xiayi Song. 221-229 [doi]
- Enhancing the Detection of Anomalous Artifact Operations in Temporal Structured WorkflowsMahmoud M. Abouzeid, Pei Shu Huang, Feng-Jian Wang. 230-241 [doi]
- HYDBre: A Hybrid Retrieval Method for Detecting Duplicate Software Bug ReportsJiawei Zhang, Lei Xiao, Miaojun Li, Zhaorui Meng, Yihao Li. 242-251 [doi]
- Target Threat Judgement Based on Entropy-Topsis Method and Intent ClassificationYingqiang He, Xingjun Chen, Yitao Wang. 252-259 [doi]
- A Survey of Comprehensive Evaluation MethodsWentao Zhao, Guang Yang, Mengcen Jiang, Lingzhong Meng, Mengmeng Wang. 260-268 [doi]
- A Quantitative Evaluation Approach for Online Review Quality Based on the AHP-Fuzzy Comprehensive EvaluationMingwei Tang, Yihan Qin, Lu Zhang, Hongru Lu, Tingyu Zhang. 269-279 [doi]
- Robustness Aware SFC Placement in NFV-Enabled Multi-Domain Networks Under Resource Demand UncertaintyChuangchuang Zhang, Shou-Yu Lee, Pan Liu, Hongyong Yang, William Cheng-Chung Chu. 280-288 [doi]
- Planning Model of Air Defense Kill Webs Based on Genetic AlgorithmMingwei Shi, Hongquan Shi. 289-296 [doi]
- A Reliable Extrapolative Capacity Estimation Method for Complex Distributed Web ServicesHe Zhou, Rui Kang. 297-304 [doi]
- Research on Data Augmentation Methods for Small Sample Image DatasetsXiaoquan Gao, Fan Liu, Tianhao Wu, Hongxiao Liu, Yuan Zhou. 305-312 [doi]
- Research on Methods for Presenting Battlefield Situation HotspotsYifan Guo, Wenjun Xue, Wenxiu Ma, Zhangfeng Ju, Yuanheng Li. 313-319 [doi]
- Design of Individual Soldier Multimedia Command and Control System Based on Ad Hoc Wireless Mesh NetworkYuanheng Li, Zhangfeng Ju, Wenxiu Ma, Wenjun Xue, Yifan Guo. 320-323 [doi]
- A Virtual Texture Technology Realized on Low Computational Power PlatformsJinzhao Ma, Zhenyu Fang, Jiangbin Zheng, Jun Cao. 324-330 [doi]
- Virtualized TCP/IP Protocol Stack Based on VxWorksZhiping Zhang, Xin Zhao, Jiangbin Zheng. 331-335 [doi]
- Container Design Based on VxWorksXin Zhao, Zhiping Zhang, Jiangbin Zheng. 336-341 [doi]
- Infrared Object Detection Based YOLOv8s from UAV ImagesWen Ye, Xinyi Zhu, Yanjing Guo, Mingyu Huang. 349-357 [doi]
- YOLOv8s-D2: A Novel Object Defect Detection Algorithm Based on Improved YOLOv8sXinsheng Zhang, Jing Hu, Junlong Xiao. 358-364 [doi]
- YOLO-Based Component Detection System for Electrical DiagramsZixuan Zhu, Qingxia Li, Zhenyu Fang. 365-373 [doi]
- StyleEditorGAN: Transformer-Based Image Inversion and Realistic Facial EditingJing Hu, Xinsheng Zhang. 374-380 [doi]
- Research on 3D Visualization of Human Body ActionsWenxiu Ma, Yuanheng Li, Xingwei Xue, Keke Pei, Yifan Guo. 381-385 [doi]
- Introduction of a Time-Parameter for State Analysis in Affective ComputingPhillip Zhang, Hongji Yang. 386-392 [doi]
- A Computational Model for Spatial Exploration in Regional Economic Collaborative Development: A Case StudyXiaoxu Qi, Mengmeng Mao. 393-400 [doi]
- A Comparative Study of Hybrid CNN and Vision Transformer Models for Facial Emotion RecognitionZetian Shen. 401-408 [doi]
- Deep-Deploying Imagination in Creative Computer for Dependent System DesignChong Zeng 0002, Zisen Zhou, Yun Zhang, Zhongxi Lu, Hongji Yang. 409-416 [doi]
- Exploring the Healing Power of Digital Technology in Promoting Health and Well-Being: A Case Study of Smart Tourism ApplicationsLu Zhang 0041, Meiyu Shi. 417-425 [doi]
- Distributed Spectrum Sensing Structure Design Based on Distributed Deep Neural NetworkCheng Chang, Lina Feng, Yuan Li, Yangrui Kang. 426-427 [doi]
- AI-Assisted Bug Detection in Open-Source SoftwarePan Liu, Ruyi Luo, Chengwu Jiang, Tong Gao, Yihao Li. 428-429 [doi]
- Digital Transformation of Security Standards: Requirements Extraction using Large Language ModelsMiltiadis G. Siavvas, Georgia Xanthopoulou, Ilias Kalouptsoglou, Dionysios D. Kehagias, Dimitrios Tzovaras. 430-431 [doi]
- Autonomous Driving Software Testing Based on Interpretation AnalysisSongcheng Xie, Shengpeng Zhu, Qifan He, Zhanqi Cui. 432-433 [doi]