Abstract is missing.
- A Novel Method to Prevent Multiple Withdraw Attack on ERC20 TokensJin-lei Sun, Song Huang, Changyou Zheng, Meijuan Wang, Zhanwei Hui, Yixian Ding. 1-7 [doi]
- Analyzing Structural Security Posture to Evaluate System Design DecisionsJoe Samuel, Jason Jaskolka, George O. M. Yee. 8-17 [doi]
- Cryptography Vulnerabilities on HackerOneMohammadreza Hazhirpasand, Mohammad Ghafari. 18-27 [doi]
- CTSCOPY: Hunting Cyber Threats within Enterprise via Provenance Graph-based AnalysisRui Mei, Han-Bing Yan, Zhihui Han, Jian-Chun Jiang. 28-39 [doi]
- DeepDetect: A Practical On-device Android Malware DetectorSaurabh Kumar, Debadatta Mishra, Biswabandan Panda, Sandeep Kumar Shukla. 40-51 [doi]
- Dynamic Interval-based Watermarking for Tracking down Network AttacksLian Yu, Lei Zhang, Yuanyuan Zhang, Weiping Wen, Xuetao Du, Fei Cao. 52-61 [doi]
- EcoAndroid: An Android Studio Plugin for Developing Energy-Efficient Java Mobile ApplicationsAna Ribeiro, João F. Ferreira, Alexandra Mendes. 62-69 [doi]
- Explainable APT Attribution for Malware Using NLP TechniquesQinqin Wang, Hanbing Yan, Zhihui Han. 70-80 [doi]
- Impact of datasets on machine learning based methods in Android malware detection: an empirical studyXiuting Ge, Yifan Huang, Zhanwei Hui, Xiaojuan Wang, Xu Cao. 81-92 [doi]
- Security Header Fields in HTTP ClientsPascal Gadient, Oscar Nierstrasz, Mohammad Ghafari. 93-101 [doi]
- Security-Aware Multi-User Architecture for IoTMarcus Birgersson, Cyrille Artho, Musard Balliu. 102-113 [doi]
- Sound Predictive Atomicity Violation Detection§Xiaoxue Ma, Imran Ashraf, W. K. Chan 0001. 114-125 [doi]
- Strategies for Reducing Traffic Volume and Security on Smart GridChih-Wei Hsu, Sun-Yuan Hsieh. 126-131 [doi]
- The Security Risk of Lacking Compiler Protection in WebAssemblyQuentin Stiévenart, Coen De Roover, Mohammad Ghafari. 132-139 [doi]
- A Framework for Progressive Regression Testing PLC ProgramsZeyu Lu, Zhanquan Guo. 140-148 [doi]
- A Tool to Support Vibration Testing Method for Automatic Test Case Generation and Test Result AnalysisKenya Saiki, Shaoying Liu, Hiroyuki Okamura, Tadashi Dohi. 149-156 [doi]
- An Empirical Study on Test Case Prioritization Metrics for Deep Neural NetworksYing Shi, Beibei Yin, Zheng Zheng 0001, Tiancheng Li. 157-166 [doi]
- Analysis of Road Representations in Search-Based Testing of Autonomous Driving SystemsEzequiel Castellano, Ahmet Cetinkaya, Paolo Arcaini. 167-178 [doi]
- Application of Combinatorial Testing to Quantum ProgramsXinyi Wang, Paolo Arcaini, Tao Yue 0002, Shaukat Ali 0001. 179-188 [doi]
- Automated Testing of Android Applications Integrating Residual Network and Deep Reinforcement LearningLizhi Cai, Jilong Wang, Mingang Cheng, Jin Wang. 189-196 [doi]
- DroidGamer: Android Game Testing with Operable Widget Recognition by Deep LearningBo Jiang 0001, Wenlin Wei, Li Yi, W. K. Chan 0001. 197-206 [doi]
- Evaluating and Improving Static Analysis Tools Via Differential Mutation AnalysisAlex Groce, Iftekhar Ahmed 0001, Josselin Feist, Gustavo Grieco, Jiri Gesi, Mehran Meidani, Qihong Chen. 207-218 [doi]
- HARS: Heuristic-Enhanced Adaptive Randomized Scheduling for Concurrency TestingYanzhou Mu, Zan Wang, Shuang Liu 0007, Jun Sun 0001, Junjie Chen 0003, Xiang Chen 0005. 219-230 [doi]
- Historical Information Stability based Reward for Reinforcement Learning in Continuous Integration TestingTiange Cao, Zheng Li, Ruilian Zhao, Yang Yang. 231-242 [doi]
- Increasing Fuzz Testing Coverage for Smart Contracts with Dynamic Taint AnalysisSongyan Ji, Jian Dong, Junfu Qiu, Bowen Gu, Ye Wang, Tongqi Wang. 243-247 [doi]
- MMFC-ART: a Fixed-size-Candidate-set Adaptive Random Testing approach based on the modified Metric-Memory treeJinfu Chen 0001, Yiming Wu, Chengying Mao, Tsong Yueh Chen, Haibo Chen 0005. 248-259 [doi]
- On Assessing The Safety of Reinforcement Learning algorithms Using Formal MethodsPaulina Stevia Nouwou Mindom, Amin Nikanjam, Foutse Khomh, John Mullins. 260-269 [doi]
- *Stephan Valentan, Franz Wotawa. 270-278 [doi]
- OPE: Transforming Programs with Clean and Precise Separation of Tested Intraprocedural Program Paths with Path ProfilingChunbai Yang, Imran Ashraf, Xiaoxue Ma, Hao Zhang 0085, W. K. Chan 0001. 279-290 [doi]
- REST API Fuzzing by Coverage Level Guided Blackbox TestingChung-Hsuan Tsai, Shi-Chun Tsai, Shih-Kun Huang. 291-300 [doi]
- SQDroid: A Semantic-Driven Testing for Android Apps via Q-learningHui Guo, Xiaoqiang Liu, Baiyan Li, Lizhi Cai, Yun Hu, Jing Cao. 301-310 [doi]
- TAF: a Tool for Diverse and Constrained Test Case GenerationClément Robert, Jérémie Guiochet, Hélène Waeselynck, Luca Vittorio Sartori. 311-321 [doi]
- Target Code-coverage and Efficiency in APP Automatic Compatibility Testing Based on Code AnalysisSen Yang, Yifan Huang, Song Huang, Zhanwei Hui, Changyou Zheng. 322-327 [doi]
- Test Benchmarks: Which One Now and in Future?Cyrille Artho, Adam Benali, Rudolf Ramler. 328-336 [doi]
- Unit Crowdsourcing Software Testing of Go ProgramRun Luo, Song Huang, Meijuan Wang, Jinchang Hu, Jinhu Du. 337-346 [doi]
- A Simulation based Intelligent Analysis Framework of Aircraft Reliability, Resilience and VulnerabilityQi Yao, Fuping Zeng, Yizhuo Zhang, Minghao Yang, Zhiyu Duan, Shunkun Yang. 347-356 [doi]
- Dynamic Detection of AsyncTask Related DefectsQing Liu, Linjie Pan 0001, Baoquan Cui, Jun Yan 0009, Jian Zhang 0001. 357-366 [doi]
- Heterogeneous Defect Prediction through Joint Metric Selection and MatchingHaowen Chen, Xiao-Yuan Jing, Baowen Xu. 367-377 [doi]
- Multiple Error Types Software Belief Reliability Growth Model Based on Uncertain Differential EquationZhe Liu, Rui Kang. 378-387 [doi]
- Platform Software Reliability for Cloud Service Continuity - Challenges and OpportunitiesNing Luo, Yue Xiong. 388-393 [doi]
- Reliability-redundancy allocation problem considering imperfect fault coverageZixiang Wang, Siwei Zhou, Dongdong Zhao 0001, Jianwen Xiang. 394-403 [doi]
- A Deep Method Renaming Prediction and Refinement Approach for Java ProjectsJiahui Liang, Weiqin Zou, Jingxuan Zhang, Zhiqiu Huang, Chenxing Sun. 404-413 [doi]
- An Online Model Integration Framework for Server Resource Workload PredictionTong Xu, Hua Li, Yunfei Bai. 414-421 [doi]
- Automated Cause Analysis of Latency Outliers Using System-Level Dependency GraphsSneh Patel, Brendan Park, Naser Ezzati Jivan, Quentin Fournier. 422-433 [doi]
- Automatic Adaptation of Reliability and Performance Trade-Offs in Service- and Cloud-Based Dynamic Routing ArchitecturesAmirali Amiri, Uwe Zdun, André van Hoorn, Schahram Dustdar. 434-445 [doi]
- Automatic Identification of High Impact Bug Report by Test Smells of Textual Similar Bug ReportsJianshu Ding, Guisheng Fan, Huiqun Yu, Zijie Huang 0001. 446-457 [doi]
- ConLAR: Learning to Allocate Resources to Docker Containers under Time-Varying WorkloadsDiwei Chen, Beijun Shen, Yuting Chen. 458-469 [doi]
- eCPDP: Early Cross-Project Defect PredictionSunjae Kwon, Duksan Ryu, Jongmoon Baik. 470-481 [doi]
- EPR: a Neural Network for Automatic Feature Learning from Code for Defect PredictionDingbang Fang, Shaoying Liu, ai Liu. 482-492 [doi]
- Estimating the Attack Surface from Residual Vulnerabilities in Open Source Software Supply ChainDapeng Yan, Yuqing Niu, Kui Liu 0001, Zhe Liu 0001, Zhiming Liu, Tegawendé F. Bissyandé. 493-502 [doi]
- Heterogeneous Defect Prediction through Correlation-Based Selection of Multiple Source Projects and Ensemble LearningEunseob Kim, Jongmoon Baik, Duksan Ryu. 503-513 [doi]
- Identification of Compromised IoT Devices: Combined Approach Based on Energy Consumption and Network Traffic AnalysisFehmi Jaafar, Darine Ameyed, Amine Barrak, Mohamed Cheriet. 514-523 [doi]
- Predictors of Software Metric Correlation: A Non-parametric AnalysisDaniel Afriyie, Yvan Labiche. 524-533 [doi]
- Reliability of Centralized vs. Parallel Software Models for Composable Storage SystemsMario Blaum, Paul Muench. 534-542 [doi]
- Software Defect Prediction via Multi-Channel Convolutional Neural NetworkChen Lang, Jidong Li, Takashi Kobayashi. 543-554 [doi]
- The bidirectional safety analysis & validation framework of system and software with its techniques and applicationsHaifeng Li, Chang Liu, Huancheng Su. 555-563 [doi]
- W-SRAT: Wavelet-based Software Reliability Assessment ToolJingchi Wu, Tadashi Dohi, Hiroyuki Okamura. 564-573 [doi]
- A Possibilistic Evolutionary Approach to Handle the Uncertainty of Software Metrics Thresholds in Code Smells DetectionSofien Boutaib, Maha Elarbi, Slim Bechikh, Fabio Palomba, Lamjed Ben Said. 574-585 [doi]
- Confuzzion: A Java Virtual Machine Fuzzer for Type Confusion VulnerabilitiesWilliam Bonnaventure, Ahmed Khanfir, Alexandre Bartel, Mike Papadakis, Yves Le Traon. 586-597 [doi]
- Exception-Driven Fault Localization for Automated Program RepairDavide Ginelli, Oliviero Riganelli, Daniela Micucci, Leonardo Mariani. 598-607 [doi]
- ‡Zhengyuan Wei, W. K. Chan 0001. 608-619 [doi]
- Practical Online Debugging of Spark-like ApplicationsMatteo Marra, Guillermo Polito, Elisa Gonzalez Boix. 620-631 [doi]
- SSpinJa: Facilitating Schedulers in Model CheckingNhat-Hoa Tran, Toshiaki Aoki. 632-641 [doi]
- Time-Traveling Debugging Queries: Faster Program ExplorationMaximilian Willembrinck, Steven Costiou, Anne Etien, Stéphane Ducasse. 642-653 [doi]
- Towards More Reliable Automated Program Repair by Integrating Static Analysis TechniquesOmar I. Al-Bataineh, Anastasiia Grishina, Leon Moonen. 654-663 [doi]
- Vulnerability Analysis of Similar CodeAzin Piran, Che-Pin Chang, Amin Milani Fard. 664-671 [doi]
- AGFL: A Graph Convolutional Neural Network-Based Method for Fault LocalizationJie Qian, Xiaolin Ju, Xiang Chen 0005, Hao Shen, Yiheng Shen. 672-680 [doi]
- CBFL: Improving Software Fault Localization by Analyzing Statement ComplexityHaoren Wang, Haochen Jin, Zhanqi Cui, Rongcun Wang. 681-690 [doi]
- Improving Quality of Counterexamples in Model Checking via Automated PlanningXu Lu, Cong Tian, Bin Yu, Zhenhua Duan. 691-701 [doi]
- Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow TrackingXiao Kan, Cong Sun 0001, Shen Liu 0002, Yongzhe Huang, Gang Tan, Siqi Ma, Yumei Zhang. 702-713 [doi]
- Towards Repairing Neural Networks CorrectlyGuoliang Dong, Jun Sun 0001, Xingen Wang, Xinyu Wang 0001, Ting Dai. 714-725 [doi]
- A Novel API Recommendation Approach By Using Graph Attention NetworkZijie Chen, Tao Zhang 0001, Xiao Peng. 726-737 [doi]
- A Novel Tree-based Neural Network for Android Code Smells DetectionJing Yu, Chenguang Mao, Xiaojun Ye. 738-748 [doi]
- A Protocol-based Intrusion Detection System using Dual AutoencodersYu-Lun Huang, Ching Yu Hung, Hsiao-Te Hu. 749-758 [doi]
- ACLM: Software Aging Prediction of Virtual Machine Monitor Based on Attention Mechanism of CNN-LSTM ModelXueyong Tan, Jing Liu. 759-767 [doi]
- An Efficient Network Intrusion Detection Model Based on Temporal Convolutional NetworksJinfu Chen 0001, Shang Yin, Saihua Cai, Chi Zhang 0046, Yemin Yin, Ling Zhou. 768-775 [doi]
- Applying a Deep-Learning Approach to Predict the Quality of Web ServicesSiao-Fang Lin, Chin-Yu Huang, Neil C. Fang. 776-785 [doi]
- DG-Trans: Automatic Code Summarization via Dynamic Graph Attention-based TransformerJianwei Zeng, Tao Zhang 0001, Zhou Xu 0003. 786-795 [doi]
- Event stream classification with limited labeled data for e-commerce monitoringAlexander Zimin, Igor Mishchenko, Rebecca Steinert. 796-806 [doi]
- Generating Adversarial Examples of Source Code Classification Models via Q-Learning-Based Markov Decision ProcessJunfeng Tian, Chenxin Wang, Zhen Li, Yu Wen. 807-818 [doi]
- GrasP: Graph-to-Sequence Learning for Automated Program RepairBen Tang, Bin Li 0006, Lili Bo, Xiaoxue Wu, Sicong Cao, Xiaobing Sun 0001. 819-828 [doi]
- Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble NetworkShiyi Yang, Hui Guo, Nour Moustafa. 829-840 [doi]
- MINTS: Unsupervised Temporal Specifications MinerPradeep K. Mahato, Apurva Narayan. 841-851 [doi]
- Multilevel Traceability Links Establishments Between SOFL Formal Specifications and Java Codes Using Multi-dimensional Similarity MeasuresJiandong Li, Shaoying Liu, ai Liu, Runhe Huang. 852-863 [doi]
- On the Effects of Data Sampling for Deep Learning on Highly Imbalanced Data from SCADA Power Grid Substation Networks for Intrusion DetectionFranz Wotawa, Herbert Mühlburger. 864-872 [doi]
- Recovering Semantic Traceability between Requirements and Source Code Using Feature Representation TechniquesMeng Zhang, Chuanqi Tao, Hongjing Guo, Zhiqiu Huang. 873-882 [doi]
- A K-means Improved CTGAN Oversampling Method for Data Imbalance ProblemChunsheng An, Jingtong Sun, Yifeng Wang, Qingjie Wei. 883-887 [doi]
- An Effective Crowdsourced Test Report Clustering Model Based on Sentence EmbeddingHao Chen, Song Huang, Yuchan Liu, Run Luo, Yifei Xie. 888-899 [doi]
- An Incomplete Unsatisfiable Cores Extracting Algorithm to Promote RoutingJianmin Zhang, Tiejun Li, Siqing Fu. 900-905 [doi]
- Hybrid Collaborative Filtering-Based API RecommendationYongchao Wang, Yu Zhou 0010, Taolue Chen, Jingxuan Zhang, Wenhua Yang 0001, Zhiqiu Huang. 906-914 [doi]
- ReDefender: A Tool for Detecting Reentrancy Vulnerabilities in Smart Contracts EffectivelyZhenyu Pan, Tianyuan Hu, Chen Qian, Bixin Li. 915-925 [doi]
- WANA: Symbolic Execution of Wasm Bytecode for Extensible Smart Contract Vulnerability DetectionBo Jiang 0001, Yifei Chen, Dong Wang, Imran Ashraf, W. K. Chan 0001. 926-937 [doi]
- A preliminary investigation of developer profiles based on their activities and code quality: Who does what?Cristina Aguilera González, Laia Albors Zumel, Jesús Antoñanzas Acero, Valentina Lenarduzzi, Silverio Martíncz-Fernández, Sonia Rabanaque Rodríguez. 938-945 [doi]
- Accept or Not? An Empirical Study on Analyzing the Factors that Affect the Outcomes of Modern Code Review?Dandan Wang, Qing Wang 0001, Junjie Wang 0001, Lin Shi 0006. 946-955 [doi]
- Analyzing Software Security-related Size and its Relationship with Vulnerabilities in OSSElaine Venson, Ting Fung Lam, Bradford Clark, Barry W. Boehm. 956-965 [doi]
- Analyzing the Impact of Cyberattacks on Industrial Control Systems using Timed AutomataAlvi Jawad, Jason Jaskolka. 966-977 [doi]
- Are the Scala Checks Effective? Evaluating Checks with Real-world ProjectsXin Zhang, Jiwei Yan, Baoquan Cui, Jun Yan 0009, Jian Zhang 0001. 978-989 [doi]
- Evaluating Code Summarization with Improved Correlation with Human AssessmentJuanjuan Shen, Yu Zhou 0010, Yongchao Wang, Xiang Chen, Tingting Han 0001, Taolue Chen. 990-1001 [doi]
- Log severity levels matter: A multivocal mappingEduardo Mendes, Fábio Petrillo. 1002-1013 [doi]
- Mapping breakpoint types: an exploratory studyEduardo Andreetta Fontana, Fábio Petrillo. 1014-1023 [doi]
- Multi-Agent Automata and Its Application to LDLK Satisfiability CheckingYa Gao, Wenhui Zhang, Xue-Yang Zhu. 1024-1035 [doi]
- On Understanding Contextual Changes of FailuresFrancisco Ribeiro, Rui Abreu 0001, João Saraiva. 1036-1047 [doi]
- Phish What You WishPascal Gadient, Pascal Gerig, Oscar Nierstrasz, Mohammad Ghafari. 1048-1059 [doi]
- Research on Mining of Government Data Based on Enhanced-Object Exchange ModelKeiin Sa, Yu Bai 0011, Chenggang Wang. 1060-1068 [doi]
- SRTEF: Automatic Test Function Recommendation with Scenarios for Implementing Stepwise Test CaseKaiqi Liu, Ji Wu, Haiyan Yang, Qing Sun 0004, Ruiyuan Wan. 1069-1078 [doi]
- The Challenge of Reproducible ML: An Empirical Study on The Impact of BugsEmilio Rivera-Landos, Foutse Khomh, Amin Nikanjam. 1079-1088 [doi]
- The Relation between Bug Fix Change Patterns and Change Impact AnalysisEkincan Ufuktepe, Tugkan Tuglular, Kannappan Palaniappan. 1089-1099 [doi]
- Understanding the Resilience of Neural Network Ensembles against Faulty Training DataAbraham Chan, Niranjhana Narayanan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan. 1100-1111 [doi]