Abstract is missing.
- Quality Assurance of Micro-Services - When to trust your micro-service test results?Theofanis Vassiliou-Gioles. 1-6 [doi]
- A Large-Scale Study on Vulnerabilities in Linux using VtopiaYanjie Shao, Yanjun Wu, Mutian Yang, Tianyue Luo, JingZheng Wu. 1-10 [doi]
- Application of Risk Assessment Method to Local Government Security ModelsRyôichi Sasaki. 1-8 [doi]
- A Robustness-Oriented Data Augmentation Method for DNNMeixi Liu, Weijiang Hong, Weiyu Pan, Chendong Feng. 1-8 [doi]
- Let's Supercharge the Workflows: An Empirical Study of GitHub ActionsTingting Chen, Yang Zhang, Shu Chen, Tao Wang 0006, Yiwen Wu. 1-10 [doi]
- ADVRET: An Adversarial Robustness Evaluating and Testing Platform for Deep Learning ModelsFei Ren, Yonghui Yang, Chi Hu, Yuyao Zhou, Siyou Ma. 9-14 [doi]
- Application-oriented Serial Interface Communication Protocols Formal Modeling MethodYuan Chen, Yu Zhao, Junjie Wang. 15-21 [doi]
- Automated Functional Testing of Search Engines using Metamorphic TestingXinyi Wang, Gaolei Yi, Yichen Wang. 22-29 [doi]
- Metamorphic Testing for Autonomous Driving Systems in Fog based on Quantitative MeasurementYa Pan, Haiyang Ao, Yong Fan. 30-37 [doi]
- Metamorphic Testing for Traffic Light Recognition in Autonomous Driving SystemsTongtong Bai, Yong Fan, Ya Pan, Mingshuang Qing. 38-44 [doi]
- MQP: Mutants Quality Prediction for Cost-Effective Mutation TestingXingya Wang, Shiyu Zhang, Fangxiao Liu, Lichao Feng, Zhihong Zhao. 45-50 [doi]
- Reports Aggregation of Crowdsourcing Test Based on Feature FusionLizhi Cai, Naiqi Wang, Mingang Chen, Jin Wang, Jilong Wang 0009, Jiayu Gong. 51-59 [doi]
- Semantic-based false alarm detection approach via machine learningMeiyuan Qian, Jun Luo, Yu Ge, Chen Sun, Xiuting Ge, Wanmin Huang. 60-66 [doi]
- Test Case Reuse Based on Software Testing Knowledge Graph and Collaborative Filtering Recommendation AlgorithmWansheng Yang, Fei Deng, Siyou Ma, Linbo Wu, Zhe Sun, Chi Hu. 67-76 [doi]
- The Effect of Combinatorial Coverage for Neurons on Fault Detection in Deep Neural NetworksZiyuan Wang, Jinwu Guo, Yanshan Chen, Feiyan She. 77-82 [doi]
- An Ontology-based Approach for Automatic Specification, Verification, and Validation of Software Security Requirements: Preliminary ResultsDimitrios Tsoukalas, Miltiadis G. Siavvas, Maria Mathioudaki, Dionisis D. Kehagias. 83-91 [doi]
- Attack-based Automation of Security Testing for IoT Applications with Genetic Algorithms and FuzzingSteffen Lüdtke, Roman Kraus, Ramon Barakat, Martin A. Schneider. 92-100 [doi]
- Research on generation algorithm of SOA-oriented integration test orderBingqing Zhang, Gaolei Yi, Yichen Wang, Qi Fei. 107-116 [doi]
- A Review of Reliability, Vulnerability and Resilience Analysis of Smart Grid Based on Complex NetworkLing-lin Gong, Yizhuo Zhang, Minghao Yang, Yujia Li, Fang Liu, Qi Yao. 117-126 [doi]
- An Automatic Analysis Framework of Detailed-level Software Fault Modes and Effects Based on Code ModelFuping Zeng, Yiran Ma, Guoqing Pan. 127-132 [doi]
- An Identification Algorithm of Attacking Programs based on Quadratic Feature Selection and Fast Decision TreeDengzhou Shi, Saihua Cai, Songling Qin, Zhenxin Wang, Qiyong Zhong, Ling Zhou. 133-140 [doi]
- Detection Software Content Failures using Dynamic Execution InformationShiyi Kong, Minyan Lu, Bo Sun, Jun Ai, Shuguang Wang. 141-147 [doi]
- Dirmap: Web Application Vulnerability Detection Platform Based on Script CodeChi Zhang 0046, Xinxue Lin, Jinfu Chen 0001, Ye Geng. 148-151 [doi]
- Quantitative Analysis of Software Fault-tolerance Design Modes Based on Probabilistic Model CheckingQi Shao, Weiwei Chen, Fuping Zeng, Zhijie Gao, Zhiyu Duan, Ouya Lin. 152-160 [doi]
- Research on fault diagnosis in early stage of software development based on Object-oriented Bayesian NetworksHongman Li, Peng Xu, Qilin Zhao, Yihong Liu. 161-168 [doi]
- Uplink Transmission Performance Evaluation and Prediction of Railway Balise based on AHP-WNNQingyang Xu, Jinghui Meng, Yimeng Luo, Shuzhong Yang. 169-176 [doi]
- VrFy: Verification of Formal Requirements using Generic TracesJorrit Olthuis, Rodolfo Jordão, Francesco Robino, Sina Borrami. 177-183 [doi]
- An Emotion-Oriented System for Creativity StimulationZhongxi Lu, Hongji Yang. 184-191 [doi]
- An Evaluation of the Quality of Answers to Academic Questions Relating to COVID-19 on Academic Social Q&A PlatformsLei Li, Shujun Liu, Xinran Li. 192-195 [doi]
- Evaluation of Dataset Distribution and Label Quality for Autonomous Driving SystemSijia Li, Yong Fan, Yue Ma, Ya Pan. 196-200 [doi]
- Hue-Saturation-Value (HSV) Colour Model Prediction and Incentive Mechanism Based on Okun's Law and Big Data TracingYinwei Liu, Lin Zou. 201-209 [doi]
- Parameter Estimation of Change Point Models based on the Discrete and Continuous SamplerXiaopeng Xu, Chuancai Liu, Xiaochun Zhang. 210-215 [doi]
- Quality of Data in Machine LearningAntti Kariluoto, Joni Kultanen, Jukka Soininen, Arto Pärnänen, Pekka Abrahamsson. 216-221 [doi]
- Threshold-Based Analysis of the Code Quality of High-Performance Computing Software PackagesBosco Ndemeye, Shahid Hussain, Boyana Norris. 222-228 [doi]
- Unsupervised Anomaly Detection Approach for Multivariate Time SeriesYuanlin Zhou, Yingxuan Song, Mideng Qian. 229-235 [doi]
- A Hybrid Automata Based on Event Algebra for CPS ModellingMingfu Tuo, Jian Zhao, Hongmei Zhang, Yongmei Zhao. 236-241 [doi]
- An Interactive Ranking Algorithm for Program Static AnalysisLiang Sun, Wenfeng Lin, Shaoxian Shu, Liuying Li. 242-249 [doi]
- Combinational Metamorphic Testing for Deep Learning based Target Detection CPS SystemsSiyou Ma, Chi Hu, Fei Deng, Yuyao Zhou, Xiaohu Shang, Linbo Wu, Wei Zou, Chunlei Li, Wansheng Yang, Hao Zhang, Fei Ren. 250-255 [doi]
- Extend Rchecker for Accurate Analysis of Real Embedded ProjectsRanjie Ding, Wenfeng Lin, Xiang Du, Liangze Yin. 256-261 [doi]
- Influencing Factors Analysis and Evaluation for Undergraduate Programming AbilityJing Wang, Yong Wang, Xue Wang. 262-269 [doi]
- Research on Feature Optimization Scheme Based on Data Feature EnhancementZhi Deng, Zhao Shi, Zhenxin Wang, Tao Liu. 270-278 [doi]
- Software Test Data Reuse Based on Domain Ontology ConstructionChi Hu, Siyou Ma, Wansheng Yang, Zhe Sun, Fei Deng, Yonghui Yang. 279-284 [doi]
- Study on Automated Change Impact Domain Analysis in Regression TestingJing Guo. 285-288 [doi]
- Towards optimal resources allocation in cloud manufacturing: new task decomposition strategy and service composition modelZhou Fang, Qilin Wu, Dashuai Guan. 289-297 [doi]
- A system for Evaluating the Robustness of Embedded Intelligent Chips and ModelsChenguang Wang, Zhixiao Sun, Qing Luo, Xinyu Wang, Tao Zhang, Qianru Wei, Jing Cheng, Depeng Gao. 298-305 [doi]
- AI Extension of SQuaRE Data Quality ModelShin Nakajima 0001, Takako Nakatani. 306-313 [doi]
- Applying Cognitive Complexity to Checklist-Based Human-Machine Pair InspectionYujun Dai, Shaoying Liu. 314-318 [doi]
- Bug Characteristics in Probabilistic Programming Systems: A Comprehensive StudyLe Manh Duc, Haibo Yu, Jianjun Zhao. 319-325 [doi]
- Fault Localization and Test Oracle Generation Based on the Mutual Pattern of Discrete Path VariablesJing Chen, Chunyan Ma, Zheng Chang. 326-332 [doi]
- Formal Specification and Model Checking of an Autonomous Vehicle Merging ProtocolMinxuan Liu, Dang Duy Bui, Duong Dinh Tran, Kazuhiro Ogata 0001. 333-342 [doi]
- Investigating Trend/Cyclic/Clustering Decomposition in Software Fault DetectionXuanqing Chen, Tadashi Dohi, Hiroyuki Okamura. 343-349 [doi]
- A Cross-Project Aging-Related Bug Prediction Approach Based on Joint Probability Domain Adaptation and k-means SMOTEDimeng Li, Mengting Liang, Bin Xu, Xiao Yu, Junwei Zhou, Jianwen Xiang. 350-358 [doi]
- Component reassignment of two balanced linear consecutive k-out-of-n systemsQiyu Wang, Chenyang Ma, Jiangbin Zhao, Zhiqiang Cai. 359-364 [doi]
- Electronic Medical Record classification method based on LSTM of text word features dimensionality reductionXiaosheng Yu, Sheng Shen, Peng Chen, Zhongtu Liu. 365-371 [doi]
- Learning to rank software modules for effort-aware defect predictionJiqing Rao, Xiao Yu, Chen Zhang, Junwei Zhou, Jianwen Xiang. 372-380 [doi]
- Question Classification Method in Disease Question Answering System Based on MCDPLSTMXiaosheng Yu, Ruxin Gong, Peng Chen. 381-387 [doi]
- Text Classification Method Based On Semi-Supervised Transfer LearningXiaosheng Yu, Hehuan Zhang, Jing Li. 388-394 [doi]
- A Graph based Calligraphy Similarity Compare ModelPan Guoyang, Yi Yang, Meng Li, Xueyang Hu, Weixing Huang, Jian Wang 0029, Yun Wang. 395-400 [doi]
- A New Model for Mining Superior Uploaders on BilibiliHao Chen, Sihao Huang, Lian Zeng, Cong Luo, Wulan Huang, Pan Liu. 401-406 [doi]
- An Efficient Network Traffic Classification Method based on Combined Feature Dimensionality ReductionYe Geng, Saihua Cai, Songling Qin, Haibo Chen 0005, Shang Yin. 407-414 [doi]
- Assume, Capture, Verify, Establish: Ingredients for Scalable Software AnalysisHessamaldin Mohammadi, Wided Ghardallou, Ali Mili. 415-424 [doi]
- Exploring Exposure Bias in Recommender Systems from Causality PerspectiveYi Yang 0019, Meng Li, Xueyang Hu, Pan Guoyang, Weixing Huang, Jian Wang 0029, Yun Wang. 425-432 [doi]
- Reflect on the Application of Human-Machine Cooperation Technology in Film Art Creation in Virtual Production EraYihang Bo. 433-439 [doi]
- Spatio-Temporal Knowledge Graph for Meteorological Risk AnalysisJiahui Chen, Shaobo Zhong, Xingtong Ge, Weichao Li, Hanjiang Zhu, Ling Peng. 440-447 [doi]
- Visualizing Human Interactions in a Workspace Setting and Maintaining PrivacyTeemu Autto, Joni Kultanen, Joonas Uusnäkki, Mikael Ovaska, Antti Kariluoto, Joonas Himmanen, Tapio Frantti, Pekka Abrahamsson, Mikko Virtaneva, Pasi Kaitila. 448-453 [doi]
- A Research Agenda for Constructing an Environment to Help Develop a Creative SoftwareFeng-Jian Wang, Faisal Fahmi, Hongji Yang. 454-462 [doi]
- Augmentation Method of Test Data for Path Coverage based on K-means ClusteringWei Xie, Chunyan Xia, Yan Zhang, Tingting Huo, Xiao Chen. 463-469 [doi]
- Automated Repair of Java Programs with Random Search via Code SimilarityHeling Cao, Fangzheng Liu, Jianshu Shi, Yonghe Chu, Miaolei Deng. 470-477 [doi]
- The Trustworthiness Measurement Model of Component-based Software Based on the Subjective and Objective Weight Allocation MethodXiaotong Gao, Yanfang Ma, Wei Zhou. 478-486 [doi]
- Trustworthiness Derivation Tree: A Model of Evidence-Based Software TrustworthinessYuxin Deng, Zezhong Chen, Wenjie Du, Bifei Mao, Zhizhang Liang, Qiushi Lin, Jinghui Li. 487-493 [doi]
- VSBFL: Variable Value Sequence Based Fault Localization for Novice ProgramsZheng Li 0002, Jitao Shen, Yonghao Wu, Yong Liu, Zeyu Sun. 494-505 [doi]
- An Empirical Study of Reliability Analysis for Platooning System-of-SystemsSangwon Hyun, Lingjun Liu, Hansu Kim, Esther Cho, Doo-Hwan Bae. 506-515 [doi]
- Boosting Grey-box Fuzzing for Connected Autonomous Vehicle SystemsLama J. Moukahal, Mohammad Zulkernine, Martin Soukup. 516-527 [doi]
- DeepGuard: A DeepBillboard Attack Detection Technique against Connected and Autonomous VehiclesDominic Phillips, Marwa A. Elsayed, Mohammad Zulkernine. 528-535 [doi]
- Knowledge Graph-based Network Analysis on the Elements of Autonomous Transportation SystemLiMing Zhang, Shuo Jiang, Ke Huang, Yao Xiao, Linlin You, Ming Cai. 536-542 [doi]
- Object Removal for Testing Object Detection in Autonomous Vehicle SystemsXiangling Wang, Siqi Yang, Jinyang Shao, Jun Chang, Ge Gao, Ming Li, Jifeng Xuan. 543-549 [doi]
- TauAud: Test Augmentation of Image Recognition in Autonomous DrivingSongtao Zhang, Jiawei Liu, Bintong Xu, Guandi Liu. 550-554 [doi]
- Zenoh-based Dataflow Framework for Autonomous VehiclesGabriele Baldoni, Julien Loudet, Luca Cominardi, Angelo Corsaro, Yong He. 555-560 [doi]
- An Improved Local Search Algorithm with Pruning for Satellite Data Transmission Scheduling ProblemMan Zhao, Qianzhou He, Shenglong Li, Min Ren. 561-568 [doi]
- Machine Learning-based Mental Health Analysis and Early Warning for College StudentYutao Sun, Haifeng Wu, Hui Li, Yuan Fu. 569-578 [doi]
- Multi-Radar Cooperative Task Planning using NSGA-II AlgorithmXiang Liu, Chao Zhang, Yanjun Cao, Li Han, ZhiMing Wu. 579-583 [doi]
- Multi-Satellite Mission Planning based on Multi-population Cooperative Parallel Evolutionary AlgorithmHui Li, Man Zhao, Chenglu Zhang, Dengfeng Mo. 584-588 [doi]
- Satellite Imaging Task Planning using Particle Swarm Optimization and Tabu SearchQianzhou He, Yuan Tian, Dongcheng Li, Wenfeng Liu, Mingyong Jian. 589-595 [doi]
- Static routing-based delay analysis for low-orbiting satellite networksShiying Xu, Zhao Chen, Xueze Zhang, Jikai Bian, Ruo Zhai. 596-601 [doi]
- Stopping Criteria for Satellite Imaging based on Improved Differential Evolution AlgorithmChong Chen, Dongcheng Li, Hui Li, Jie Zhang, ZhiMing Wu. 602-609 [doi]
- Study On The Connection Rate Of LEO Communication SatelliteShan Zhang, Zhao Chen, Wendi Sun, Xiaolu Xiao, Yi Ke. 610-614 [doi]
- Can Solana's high throughput be an enabler for IoT?Fintan Duffy, Malika Bendechache, Irina Tal. 615-621 [doi]
- CERCoin: Carbon tracking enabling Blockchain system for Electric VehiclesLiam Waters, Irina Tal. 622-629 [doi]
- Curious SDN for network attack mitigationMikhail Zolotukhin, Timo Hämäläinen 0002, Riku Immonen. 630-635 [doi]
- Design and Specification of a Blockchain-based P2P Energy Trading PlatformDenis Rangelov, Budankailu Sameer Kumar Subudhi, Philipp Lämmel, Michell Boerger, Nikolay Tcholtchev, Jaffer Khan. 636-643 [doi]
- Hierarchical Cloud-Based Consortium Blockchains for Healthcare Data StorageAlvin Thamrin, Haiping Xu. 644-651 [doi]
- Machine-learning Approach using Solidity Bytecode for Smart-contract Honeypot Detection in the EthereumKazuki Hara, Takeshi Takahashi 0001, Motoya Ishimaki, Kazumasa Omote. 652-659 [doi]
- Modeling and Verification of CKB Consensus Protocol in CoqXiaokun Luan, Meng Sun. 660-667 [doi]
- Security Risk Assessment Methodologies in The Internet of Things: Survey and TaxonomyImad Yassine, Talal Halabi, Martine Bellaïche. 668-675 [doi]
- Support for the safety of EVM bytecode via function-call interceptorJisoo Kim, Eun-Sun Cho. 676-684 [doi]
- A machine learning-based static analysis warning prioritizationMingshuang Qing, Xiang Feng, Jun Luo, Wanmin Huang, Jingui Zhang, Ping Wang, Yong Fan, Xiuting Ge, Ya Pan. 685-690 [doi]
- A Quantitative Evaluation Method of Software Usability Based on Improved GOMS ModelKunlong Wang, Kanjing Li, Jinhua Gao, Bing Liu, Zhi Fang, Wenjun Ke. 691-697 [doi]
- An Empirical Study of Solidity Language FeaturesZiyan Wang, Xiangping Chen, Xiaocong Zhou, Yuan Huang 0002, Zibin Zheng, Jiajing Wu. 698-707 [doi]
- Android privacy protocol and permission consistency testingYongming Yao, Zhongju Yang, Ruizhi Qi, Chen Liu. 708-711 [doi]
- DeepMnist: A method of white box testing based on hierarchyYunjian Xu, Zhiyi Zhang, YuQian Zhou, Ziyuan Wang, Zhiqiu Huang. 712-717 [doi]
- Evolving the Edge and the Cloud: A hybrid computing paradigmJin Wang. 718-721 [doi]
- Importing Eye Tracking Regarding with Human Aspects in Software QualityHaochen Wang, Jasulan Shokyshalov. 722-726 [doi]
- Improving Blocking Bug Pair Prediction via Hybrid Deep LearningZhihua Chen, Xiaolin Ju, Yiheng Shen, Xiang Chen 0005. 727-732 [doi]
- Mixed Granularity and Variable Mapping based Automatic Software RepairHeling Cao, Zhiying Cui, Yangxia Meng, Yonghe Chu, Lei Li. 733-738 [doi]
- A Clustering-based Framework for Highly Imbalanced Fault Detection with the Applications on High-Speed TrainsMin Qian, Yan-fu Li. 739-744 [doi]
- A Gaussian Process Approach for Predictive MaintenanceJunqi Zeng, Zhenglin Liang, Chunhui Guo, Minyuan Song, Zongqi Xue. 745-750 [doi]
- A predictive Hidden semi-Markov Model for bridges subject to chloride-induced deteriorationChunhui Guo, Zhenglin Liang, Junqi Zeng, Minyuan Song, Zongqi Xue. 751-756 [doi]
- Adversarial attack for deep-learning-based fault diagnosis modelsYipei Ge, Huan Wang 0015, Zhiliang Liu. 757-761 [doi]
- An Economic Evaluation Model of Predictive Maintenance Technology for Lithium-Ion BatteriesXuan Liu, Huixing Meng. 762-766 [doi]
- Base station network alarm streams modeling and prediction based on Cox proportional hazard model and copulaZongqi Xue, Zhenglin Liang, Minyuan Song, Chunhui Guo, Junqi Zeng. 767-772 [doi]
- Remaining Useful Life Prediction for Multi-state Stochastic Deterioration Assets Based on Phase-type DistributionsMinyuan Song, Zhenglin Liang, Zongqi Xue, Chunhui Guo, Junqi Zeng. 773-777 [doi]
- (Semi) automatic Assertion Generation from Controlled Chinese Natural Language: A Practice in Aerospace IndustryShiyu Liu, Dongfang Li, Yasha Chen, Guang Yang. 778-782 [doi]
- An Approach to Detecting Tourists Satisfaction based on Physical Data and Internet DataChi Zhang, Qinyun Liu. 783-788 [doi]
- Application Research of Formal Verification in Aerospace FPGAShiyu Liu, Dongfang Li, Wei Shen, ZhiHao Wang, Guang Yang, Xiaojing Song. 797-805 [doi]
- Cyber-Security Incident Analysis by Causal Analysis using System Theory (CAST)Tomoko Kaneko, Nobukazu Yoshioka, Ryôichi Sasaki. 806-815 [doi]
- Formalising UPTANE in CSP for Security TestingRhys Kirk, Hoang Nga Nguyen, Jeremy W. Bryans, Siraj A. Shaikh, David Evans, David Price. 816-824 [doi]
- Implementation of an extended FIDO2 authenticator using Attribute-Based SignaturesYuto Okawa, Shuji Yamaguchi, Hidehito Gomi, Tetsutaro Uehara. 825-832 [doi]
- Modeling and Simulation of Social E-commerce User Behavior based on Social E-commerce SimulatorJunjie Lv, Linyu Li, Qiuchen Wu, Chuan Zhao. 833-840 [doi]
- Reliability-Disguised Attacks on Social Network to Accelerate Fake News DisseminationKento Yoshikawa, Takumi Awa, Risa Kusano, Masatsugu Ichino, Hiroshi Yoshiura. 841-848 [doi]
- A Novel View: Edge is Operimetric Methods and Reliability Evaluation of Several kinds of Conditional Edge-connectivity of Interconnection NetworksMingzu Zhang, Zhaoxia Tian, Lianzhu Zhang. 849-860 [doi]
- Applications of Cucumber on Automated Functional Simulation TestingYan Wang, Lijuan Jia, Hongjian Cao, Ziqi Jing, Huan Huang. 861-862 [doi]
- Automatic Testing Methods for Response Time of Information SystemsXiuyang Zhu, Fei Xie, Wenyu Du, Huan Huang. 863-864 [doi]
- Extra (component) connectivity and diagnosability of bubble sort networksHong Zhang, Shuming Zhou, Zhenqin Yu, Xiaoqing Liu. 865-871 [doi]
- Fast Reliable Routing Selection for Sparse Task Allocation in Mobile Crowdsourcing SystemsYugui Wang, Hao Wang, Zhenjiang Dong, Weibei Fan, Yuanzheng Zhang. 872-878 [doi]
- SecVerifier: A Practical Memory-Security VerifierLu Zhao, Lingyun Xu, Guojing Luo, Xiang Long, Jinhai Gong, Xiaobo Sang. 879-880 [doi]
- Shortest routing algorithm of the Exchanged Crossed Cube based on adjacent subcube groupXinyang Wang, Hu Renshun, Qiao Sun. 881-889 [doi]
- Subgraph reliability of the cactus-based networksXiaoqing Liu, Shuming Zhou, Jiafei Liu, Zhengqin Yu. 890-896 [doi]
- The Rg-conditional connectivity and diagnosablility of generalized exchanged X-cubesYufang Zhang, Ximeng Liu, Xiaoyan Li, Wanling Lin, Hongbin Zhuang. 897-904 [doi]
- A Tobit traceless Kalman filter technique TUKF: handle truncated dataBo Su, Qingyue Yang, Bo Bai, Zeshan Yan, Lei Zhu, Shanliangkun He. 905-911 [doi]
- Algorithm Analysis of Sparse Matrix MultiplicationHui Ren, Hongwei Ma, Jian Kang, Yang Liu, Lu Wang, Xiaogang Zheng. 912-917 [doi]
- An electric power forecasting method based on dual time series attention mechanism neural network structureXianghao Zhan, Lifeng Lei, Liang Kou. 918-925 [doi]
- An Improved Mean Shift Clustering Algorithm for LFA DetectionWenyue Sun, Changda Wang 0001. 926-934 [doi]
- An Ontology Based Resource Description Model for Blockchain-IoTXing Wu, Fengxia Han, Hao Deng. 935-940 [doi]
- GST-Net: A GIS-based Hybrid Prediction Model for Shared Bike Traffic FlowWeicheng Zheng, Hao Deng, Fengxia Han. 941-946 [doi]
- Joint Vehicle Scheduling and Power Allocation for V2X CommunicationsJuzhen Wang. 947-950 [doi]
- Local filter-based sequential and distributed fusion state estimation for nonlinear multi-sensor systems with asynchronously correlated noisesKun Yang, Yao Zhang, Yang Liu, Jun-Tao Liu, Kai Zhao. 951-960 [doi]
- LoRa-based Fire Monitoring SystemBin Wang, Ziyan Jiang, Yang Liu, Yuzhi Zhang, Ke Xu, Zhuang Yuan. 961-967 [doi]
- Prediction of Overlying Rock Deformation based on LSTM in Optical Fiber Sensor MonitoringZhong Tian, Wenli Ji, Liutao Xi, Ding-Ding Zhang. 968-974 [doi]
- PSO-LSSVM model-based waypoint traffic prediction studyHongbo Zhang, Chenghao Huang, Ying Yang, ZhiSen Wang, Zhe Cui, Lianghuang He. 975-979 [doi]
- Research on airspace security risk assessment technology based on knowledge GraphYing Yang, Chenghao Huang, Hongbo Zhang, ChaoHui Feng, ZhiSen Wang, Zhe Cui. 980-986 [doi]
- Research on fast generation and simulation technology of air traffic flow in control sectorChenghao Huang, Hongbo Zhang, Ying Yang, Lianghuang He, Qiuqing Luo. 987-993 [doi]
- Research on Mainstream DataBase Security Analysis Technology of Big Data PlatformKangkang Dou, Yong Wang, Qixuan Yang, Yaxin Han, Zhao Yang. 994-998 [doi]
- Research on Privacy Protection Technology for Data PublishingLianwei Qu, Jing Yang, Xueyun Yan, Lixin Ma, Qixuan Yang, Yaxin Han. 999-1005 [doi]
- Resource Allocation for UAV-Assisted MIMO-NOMA Wireless Caching NetworksYue Yin, Miao Liu 0002, Guan Gui, Hikmet Sari. 1006-1010 [doi]
- Side Information-Aided Handover Strategy for Air-Ground Integrated Vehicular NetworksYuzhi Zhou, Jinlong Sun, Jie Yang 0027, Guan Gui, Haris Gacanin, Fumiyuki Adachi. 1011-1016 [doi]
- Summary of Fault Diagnosis Technology in Smart GridYingxin Wang, Chuankun Li, Liang Kou. 1017-1020 [doi]
- Traffic Matrix Estimation Based on Incomplete Network Link Loads MeasurementQian Chen, Changda Wang 0001. 1021-1026 [doi]
- A code clone detection algorithm based on graph convolution network with AST tree edgeZhicheng Lu, Ruochen Li, Huamiao Hu, Wen'an Zhou. 1027-1032 [doi]
- Automatic Bug Triage Using Hierarchical Attention NetworksHuoliang He, Shunkun Yang. 1043-1049 [doi]
- Blockchain Based Model for Consent Management and Data Transparency AssuranceDarine Ameyed, Fehmi Jaafar, Francis Charette Migneault, Mohamed Cheriet. 1050-1059 [doi]
- Contextual Profiling of Stack Overflow Java Code Security Vulnerabilities Initial Insights from a Pilot StudySherlock A. Licorish, Thushika Nishatharan. 1060-1068 [doi]
- Exploring students' sensemaking of test case design. An initial studyNiels Doorn, Tanja E. J. Vos, Beatriz Marín, Harrie Passier, Lex Bijlsma, Silvio Cacace. 1069-1078 [doi]
- Heterogeneous Modeling and Testing of Software Product LinesFevzi Belli, Tugkan Tuglular, Ekincan Ufuktepe. 1079-1088 [doi]
- Modeling Cyber Physical Systems with Learning Enabled Components using Hybrid Predicate Transition NetsXudong He. 1099-1108 [doi]
- Multiscale Empirical Analysis of Software Network EvolutionXiaodong Gou, Long Fan, Li Zhao, Qi Shao, Chong Bian, Shunkun Yang. 1109-1118 [doi]
- Stock Prediction with Stacked-LSTM Neural NetworksXiaochun Zhang, Chen Li 0009, Kuan-Lin Chen, Dimitrios Chrysostomou, Hongji Yang. 1119-1125 [doi]
- Systemization of Vulnerability Information by Ontology for Impact AnalysisTakumi Tsutsui, Yoshiaki Shiraishi, Masakatu Morii. 1126-1134 [doi]
- The Energy Footprint of Blockchain Consensus Mechanisms Beyond Proof-of-WorkMoritz Platt, Johannes Sedlmeir, Daniel Platt, Jiahua Xu, Paolo Tasca, Nikhil Vadgama, Juan Ignacio Ibañez. 1135-1144 [doi]
- The Influence of Handwriting and Word-Processing on Creativity in the Fiction Production: A Case Study of Fay Weldon's FictionsHongji Yang, Tian Liu. 1145-1152 [doi]
- A Proposal for Model-Based Reliability-Oriented System Design in IndustryJose Luis de la Vara, Juan Manuel Morote. 1153-1154 [doi]
- A Testing Method for Object-oriented Program based on Adaptive Random Testing with Variable ProbabilityTianxiang Lv, Qihao Bao, Haibo Chen, Chi Zhang. 1155-1156 [doi]
- An Adaptive Random Test Method based on Variable Probability Density Function with Particle Swarm OptimizationShengran Wang, Jinfu Chen 0001, Jiaxiang Xi, Haibo Chen 0005, Jingyi Chen. 1157-1158 [doi]
- An Empirical Study on Vulnerability Detection for Source Code Software based on Deep LearningWei Lin, Saihua Cai. 1159-1160 [doi]
- Detecting Attack Surface With Full-System Taint AnalysisNatalia Fursova, Pavel Dovgalyuk, Ivan Vasiliev, Maria Klimushenkova, Danila Egorov. 1161-1162 [doi]
- Introducing a Multi-layered Model-based Design Approach towards Safety-Security Co-engineeringMegha Quamara, Gabriel Pedroza, Brahim Hamid. 1163-1164 [doi]
- MDD4CER: Efficient Complex Event Recognition with Multiple-value Decision DiagramRuiqi Luo, Bangchao Wang, Xian Zhong. 1165-1166 [doi]
- Mining Event Logic Graph from Open Q&A Site for Automated Program RepairChuanjia Hou, Xiaotong Liu, Hao Yu, Tong Jia, Ying Li. 1167-1168 [doi]
- Selective Symbolization Based Efficient Symbolic ExecutionYang Liu, Guofeng Zhang 0005, Zhenbang Chen, Ziqi Shuai. 1169-1170 [doi]
- Testing Autonomous Driving System based on ScenicZheng Li, Zhanqi Cui, Huanhuan Wu, Yating Zheng. 1171-1172 [doi]
- Towards Better Coverage of Dataset with Software Product Line EngineeringLei Shi, Masanari Kondo, Naoyasu Ubayashi, Yasutaka Kamei. 1173-1174 [doi]
- Transformer for High-Speed Train Wheel Wear Prediction with Multiplex Local-Global Temporal FusionHuan Wang, Tianli Men, Yan-fu Li. 1175-1176 [doi]