Abstract is missing.
- An Empirical Analysis of Rebalancing Methods for Security Issue Report IdentificationHoracio L. França, César Alexandre Teixeira, Nuno Laranjeiro. 1-12 [doi]
- SecCT: Secure and scalable count query models on encrypted genomic dataYanguo Peng, Rongqiao Liu, Xiyue Gao, Luyuan Huang, Jingjing Guo, Yaofeng Tu. 13-22 [doi]
- Simulation-based Evaluation of a Remotely Operated Road Vehicle under Transmission Delays and Denial-of-Service AttacksMateen Malik, Maytheewat Aramrattana, Mehdi Maleki, Peter Folkesson, Behrooz Sangchoolie, Johan Karlsson. 23-29 [doi]
- Efficient Adversarial Input Generation via Neural Net PatchingTooba Khan, Kumar Madhukar, Subodh Vishnu Sharma. 30-38 [doi]
- Intrusion Detection for Scalable and Elastic Microservice ApplicationsJosé Flora, Paulo Gonçalves, Nuno Antunes. 39-45 [doi]
- Attack Tree Analysis for Adversarial Evasion AttacksYuki Yamaguchi, Toshiaki Aoki. 46-52 [doi]
- A Blockchain-Based Interoperable Architecture for IoT with Selective Disclosure of InformationRahma Mukta, Shantanu Pal, Shailesh Mishra, Hye-Young Paik, Salil S. Kanhere, Michael Hitchens. 53-63 [doi]
- Discovery of Flow Splitting Ratios in ISP Networks with Measurement NoiseMorten Konggaard Schou, Ingmar Poese, Jirí Srba. 64-70 [doi]
- A Network-Agnostic Approach to Enforcing Collision-Free Time-Triggered CommunicationMohammad Ibrahim Alkoudsi, Gerhard Fohler, Marcus Völp. 71-77 [doi]
- Perceived Usability of Computer-Aided Engineering SoftwareGuangjie Li, Yan He, Yi Tang, Xiaochen Shen, Limin He. 78-80 [doi]
- Extension of STPA to Analyze Decisions and Behaviors of Human as Controlled Process in Human-Machine Coexistence EnvironmentNatsumi Watanabe, Satoshi Otsuka, Hiroyuki Yamada, Masaya Itoh, Tsunamichi Tsukidate. 81-87 [doi]
- SEmigrate: Optimizing Data Protection with VM IntrospectionShuhei Horio, Kouta Takahashi, Kenichi Kourai. 88-98 [doi]
- Development of the System Assurance Reference Model for Generating Modular Assurance CasesAndrzej Wardzinski, Aleksander Jarzebowicz. 99-110 [doi]
- PoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage SystemsCláudio Correia, Rita Prates, Miguel Correia 0001, Luís E. T. Rodrigues. 111-122 [doi]
- Lead Time Analysis for UAVs' Failure Prediction in U-spaceOmid Asghari, Naghmeh Ivaki, Henrique Madeira. 123-133 [doi]
- End-to-end Resiliency Analysis Framework for Cloud Storage ServicesArchita Ghosh, J. Lakshmi. 134-141 [doi]
- Applying metamorphic testing to reliability calculating programsTaito Asaji, Tatsuhiro Tsuchiya. 142-149 [doi]
- OMAHA: Opportunistic Message Aggregation for pHase-based AlgorithmsCélia Mahamdi, Jonathan Lejeune, Julien Sopena, Pierre Sens 0001, Mesaac Makpangou. 150-160 [doi]
- BSGAT: A Graph Attention Network for Binary Code Similarity DetectionChao Qu, Rongqian Zhou, Ke Liu, Zhuo Yan, Haipeng Qu. 161-167 [doi]
- Liveness Checking of the HotStuff Protocol FamilyJérémie Decouchant, Burcu Kulahcioglu Ozkan, Yanzhuo Zhou. 168-179 [doi]
- Scalable Performance Evaluation of Byzantine Fault-Tolerant Systems Using Network SimulationChristian Berger 0006, Sadok Ben Toumia, Hans P. Reiser. 180-190 [doi]
- Data-Flow-Based Normalization Generation Algorithm of R1CS for Zero-Knowledge ProofChenhao Shi, Hao Chen, Ruibang Liu, Guoqiang Li 0001. 191-197 [doi]
- I Can't Escape Myself: Cloud Inter-Processor Attestation and Sealing using Intel SGXDaniel Andrade, João Nuno Silva, Miguel Correia 0001. 198-208 [doi]
- AdapTV+: Enhancing Model-Based Test Adaptation for Smart TVs through Icon RecognitionMohammad Yusaf Azimi, Cemal Yilmaz. 209-216 [doi]
- A Machine Learning driven Fault Tolerance Mechanism for UAVs' Flight ControllerAnamta Khan, João R. Campos, Naghmeh Ivaki, Henrique Madeira. 217-227 [doi]
- Entropy-based Selective Homomorphic Encryption for Smart Metering SystemsWeiyan Xu, Yinghao Zhang, Rachel Cardell-Oliver, Ajmal Mian, Jin B. Hong. 228-235 [doi]
- Formal Verification of Concurrent Algorithms: Case Studies on Mutual ExclusionNaoki Nishiguchi, Tatsuhiro Tsuchiya. 236-238 [doi]
- Safeguarding Learning-based Control for Smart Energy Systems with Sampling SpecificationsChih-Hong Cheng, Venkatesh Prasad Venkataramanan, Pragya Kirti Gupta, Yun-Fei Hsu, Simon Burton 0001. 239-241 [doi]
- How to Attract and Retain Users for Native Newborn Version Control Systems?Guangjie Li, Yi Tang, Yan He, Biyi Yi, Weihao Li, Qilei Zhang. 242-243 [doi]
- Poster: Faster Quorums with FlashConsensusChristian Berger 0006, Lívio Rodrigues, Hans P. Reiser, Vinicius Vielmo Cogo, Alysson Bessani. 244-246 [doi]
- Utilizing Similarity for Improved Intrusion Detection: Autonomous Community Formation for Practical Heterogeneity ManagementPhilipp Eichhammer, Hans P. Reiser. 247-249 [doi]
- Visilience: An Interactive Visualization Framework for Resilience Analysis using Control-Flow GraphHailong Jiang, Shaolun Ruan, Bo Fang, Yong Wang 0021, Qiang Guan. 250-256 [doi]
- Using Multi-dimensional Quorums for Optimal Resilience in Multi-resource BlockchainsYucheng Sun, Ruomu Hou, Haifeng Yu. 257-267 [doi]
- Hierarchical Dependability Modeling with Multi-State SystemsJunjun Zheng, Hiroyuki Okamura, Tadashi Dohi. 268-277 [doi]
- Reliability and Performance Evaluation of Two-input Machine Learning SystemsKazuya Wakigami, Fumio Machida, Tuan Phung-Duc. 278-286 [doi]
- Evaluating of Football Player 1v1 Abilities based on the Glicko-2 with ModificationsAndrei Shelopugin, Alexander Sirotkin 0001. 287-291 [doi]
- Perspectives of Pakistani Cricketers and Coaches Regarding Coaching Competence in Relation to Performance EfficacyVicar Solomon, Farah Malik. 292-298 [doi]
- Officiating Cricket Bowling Using An Event-Based Computer Vision SystemMasoumeh Izadi, Ehsan Goodarzi, Milad Farzalizadeh, Masoud Masoumi Moghadam, Aleksey Izmailov. 299-303 [doi]
- Sports Injury Prediction in Professional TennisZhaoyu Liu, Kan Jiang, Jin Song Dong. 304-308 [doi]
- Effects of Wrist Guard Microcurrent Stimulation Therapy on Pain, Range of Motion, and Muscle Strength in Physically Active Older Women with Carpal Tunnel SyndromeRobert Seungbok Lee, Sungheum Um. 309-313 [doi]
- A Dynamic Online Dashboard for Tracking the Performance of Division 1 Basketball Athletic PerformanceErica Juliano, Chelsea Thakkar, Christopher Taber, Mehul S. Raval, Tolga Kaya, Samah Senbel. 314-318 [doi]
- Shifting the Weight: Applications of AI in Olympic WeightliftingDaniel Bolarinwa, Nadeem Qazi, Mustansar Ali Ghazanfar. 319-326 [doi]
- A Framework for Biomechanical Analysis of Jump Landings for Injury Risk AssessmentSrishti Sharma, Srikrishnan Divakaran, Tolga Kaya, Christopher Taber, Mehul S. Raval. 327-331 [doi]
- Probabilistic Model Checking of Handball Action SequencesLuke Wildman. 332-336 [doi]
- Recognizing a Sequence of Events from Tennis Video Clips: Addressing Timestep Identification and Subtle Class DifferencesZhaoyu Liu, Jingyu Guo, Mo Wang, Ruicong Wang, Kan Jiang, Jin Song Dong. 337-341 [doi]
- Court Detection Using Masked Perspective Fields NetworkKan Jiang, Jiayu Li, Zhaoyu Liu, Chen Dong. 342-345 [doi]
- Early Childhood Action Monitoring and Analytics System (ECAMS)Isuru Supasan Naotunna Andarage, Dileepa Fernando, Buddhi Avishka Lokuarachchi, Malithi Gimhani Athuluwage, Pavithra Wijewickrama. 346-351 [doi]
- RaceLens: A Machine Intelligence-Based Application for Racing Photo AnalysisAndrei Boiarov, Dmitry Bleklov, Pavlo Bredikhin, Nikita Koritsky, Sergey Ulasen. 352-355 [doi]
- Key considerations in the week-to-week forecasting of individual match actions in footballQixiang He, John Komar, Ying Hwa Kee. 356-360 [doi]