Abstract is missing.
- A Taxonomy of Software Flaws Leading to Buffer OverflowsRaphaël Khoury. 1-8 [doi]
- A Comprehensive Analysis of NVD Concurrency VulnerabilitiesLili Bo, Xing Meng, Xiaobing Sun 0001, Jingli Xia, Xiaoxue Wu. 9-18 [doi]
- IntJect: Vulnerability Intent Bug SeedingBenjamin Petit, Ahmed Khanfir, Ezekiel O. Soremekun, Gilles Perrouin, Mike Papadakis. 19-30 [doi]
- Separating the Wheat from the Chaff: Using Indexing and Sub-Sequence Mining Techniques to Identify Related Crashes During Bug TriageKedrian James, Yufei Du, Sanjeev Das, Fabian Monrose. 31-42 [doi]
- Exploring Transformers for Multi-Label Classification of Java VulnerabilitiesCláudia Mamede, Eduard Pinconschi, Rui Abreu 0001, José Campos. 43-52 [doi]
- A BiLSTM-Attention Model for Detecting Smart Contract Defects More AccuratelyChen Qian, Tianyuan Hu, Bixin Li. 53-62 [doi]
- Security Countermeasure Selection for Component-Based Software-Intensive SystemsCharilaos Skandylas, Narges Khakpour, Javier Cámara. 63-72 [doi]
- A Detection Method for Scarcity Defect of Blockchain Digital Asset based on Invariant AnalysisJin-lei Sun, Song Huang, Xingya Wang, Meijuan Wang, Jinhu Du. 73-84 [doi]
- Salus: A Novel Data-Driven Monitor that Enables Real-Time Safety in Autonomous Driving SystemsBohan Zhang, Yafan Huang, Guanpeng Li. 85-94 [doi]
- Automatic Collaborative Testing of Applications Integrating Text Features and Priority Experience ReplayLizhi Cai, Jin Wang, Mingang Chen, Jilong Wang 0009. 95-104 [doi]
- Cast Away: On the Security of DLNA Deployments in the SmartTV EcosystemGuangwei Tian, Jiongyi Chen, Kailun Yan, Shishuai Yang, Wenrui Diao. 105-116 [doi]
- GAN-Based Privacy-Preserving Unsupervised Domain AdaptationDongdong Zhao 0001, Zhao Wang, Huanhuan Li 0002, Jianwen Xiang. 117-126 [doi]
- Conceptualizing the Secure Machine Learning Operations (SecMLOps) ParadigmXinrui Zhang, Jason Jaskolka. 127-138 [doi]
- Identity Authentication Strategy of Mobile Crowd Sensing based on CFLLin Wang, Fangxiao Li, Yunfei Xie, Leyi Shi. 139-146 [doi]
- AuthROS: Secure Data Sharing Among Robot Operating Systems based on EthereumShenhui Zhang, Wenkai Li, Xiaoqi Li 0015, Boyi Liu. 147-156 [doi]
- Semantic Feature Learning based on Double Sequences Structure for Software Defect Number PredictionTao Wang, Chuanqi Tao, Hongjing Guo, Lijin Tang. 157-166 [doi]
- An Empirical Study on Software Defect Prediction using Function Point AnalysisXinghan Zhao, Cong Tian. 167-176 [doi]
- An Empirical Study of the Bug Link RateChenglin Li, Yangyang Zhao, Yibiao Yang. 177-188 [doi]
- Visualization-Based Software Defect Prediction via Convolutional Neural Network with Global Self-AttentionShaojian Qiu, Shaosheng Wang, Xuhong Tian, Mengyang Huang, Qiong Huang. 189-198 [doi]
- Telemetry-Based Software Failure Prediction by Concept-Space Model CreationBahareh Afshinpour, Roland Groz, Massih-Reza Amini. 199-208 [doi]
- Towards Extending the Range of Bugs That Automated Program Repair Can HandleOmar I. Al-Bataineh, Leon Moonen. 209-220 [doi]
- Division by Zero: Threats and Effects in Spectrum-Based Fault Localization FormulasDániel Vince, Attila Szatmári, Ákos Kiss 0001, Árpád Beszédes. 221-230 [doi]
- CGMBL: Combining GAN and Method Name for Bug LocalizationHao Chen, Haiyang Yang, Zilun Yan, Li Kuang, Lingyan Zhang. 231-241 [doi]
- The Use of Pretrained Model for Matching App Reviews and Bug ReportsXiaojuan Wang, Wenyu Zhang, Shanyan Lai, Chunyang Ye, Hui Zhou. 242-251 [doi]
- Context-Aware Program Simplification to Improve Information Retrieval-Based Bug LocalizationYilin Yang, Ziyuan Wang, Zhenyu Chen 0001, Baowen Xu. 252-263 [doi]
- Anomaly Detection in Encrypted Identity Resolution Traffic based on Machine LearningZhishen Zhu, Hao Zhou, Qingya Yang, Chonghua Wang, Zhen Li. 264-275 [doi]
- Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN EnvironmentsMinjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica Free-Nelson, Ryan K. L. Ko, Dan Dongseong Kim. 276-286 [doi]
- An Anomaly-Based Approach for Detecting Modularity Violations on Method PlacementKazuki Yoda, Tomoki Nakamaru, Soramichi Akiyama, Shigeru Chiba. 287-298 [doi]
- LogGD: Detecting Anomalies from System Logs with Graph Neural NetworksYongzheng Xie, Hongyu Zhang 0002, Muhammad Ali Babar. 299-310 [doi]
- An Ontological Analysis of Safety-Critical Software and Its AnomaliesHezhen Liu, Zhi Jin, Zheng Zheng, Chengqiang Huang, Xun Zhang. 311-320 [doi]
- A New Code Review Method based on Human ErrorsFuqun Huang, Bo Zhao, Henrique Madeira. 321-332 [doi]
- Contextual Operationalization of Metrics as Scores: Is My Metric Value Good?Sebastian Hönel, Morgan Ericsson, Welf Löwe, Anna Wingkvist. 333-343 [doi]
- A Collaboration-Aware Approach to Profiling Developer Expertise with Cross-Community DataXiaotao Song, Jiafei Yan, Yuexin Huang, Hailong Sun 0001, Hongyu Zhang 0002. 344-355 [doi]
- Proposing a Quality Model for Evaluating and Identifying Opportunities in Clinical Practice Guideline EnginesM. Carrero, Elena Enamorado-Díaz, J. A. García-García, María J. Escalona. 356-365 [doi]
- Emotional Dashboard: a Non-Intrusive Approach to Monitor Software Developers' Emotions and Personality TraitsLeo Silva, Marília Castro, Miriam Silva, Milena Santos, Uirá Kulesza, Margarida Lima, Henrique Madeira. 366-375 [doi]
- A Novel Approach for Bounded Model Checking Through Full ParallelismDebao Sang, Jing Liu 0012, Haiying Sun, Jin Xu, Jiexiang Kang. 376-387 [doi]
- Safety SysML: An Executable Safety-Critical Avionics Requirement Modeling LanguageHuiyu Liu, Jing Liu 0012, Wei Yin, Haiying Sun, Chenchen Yang. 388-399 [doi]
- Model Checking the Safety of Raft Leader Election AlgorithmQihao Bao, Bixin Li, Tianyuan Hu, Dongyu Cao. 400-409 [doi]
- Formal Verification of Hierarchical Ptolemy II Synchronous-Reactive Models with Bounded Model CheckingXiaozhen Zhang, Zhaoming Yang, Hui Kong, Weiqiang Kong. 410-421 [doi]
- Coverage Testing of Industrial Simulink Models using Monte-Carlo and SMT-Based MethodsDaisuke Ishii, Takashi Tomita, Toshiaki Aoki, The Quyen Ngo, Thi Bich Ngoc Do, Hideaki Takai. 422-433 [doi]
- Availability and Cost aware Multi-'omain Service Deployment OptimizationChuangchuang Zhang, Yanming Liu, Hongyong Yang, Yihao Li, Shuning Zhang. 434-441 [doi]
- Cache Optimizations for Test Case ReductionDániel Vince, Ákos Kiss 0001. 442-453 [doi]
- Nimbus: Toward Speed Up Function Signature Recovery via Input Resizing and Multi-Task LearningYi Qian, Ligeng Chen, Yuyang Wang, Bing Mao. 454-463 [doi]
- Reuse of Test Case based on Attributes Weight OptimizationYaqing Shi, Song Huang, Jinyong Wan. 464-472 [doi]
- GOV: A Verification Method for Smart Contract Gas-OptimizationYuan Huang 0002, Rong Wang, Xiangping Chen, Xiaocong Zhou, Ziyan Wang. 473-479 [doi]
- Stateful Depletion and Scheduling of Containers on Cloud Nodes for Efficient Resource UsageAmirali Amiri, Uwe Zdun, Konstantinos Plakidas. 480-491 [doi]
- Understanding and Mitigating Label Bias in Malware Classification: An Empirical StudyJia Yan, Xiangkun Jia, Lingyun Ying, Purui Su. 492-503 [doi]
- Can PoW Consensus Protocol Resist the Whale Attack?Xueyong Sun, Qihao Bao, Bixin Li. 504-515 [doi]
- Towards Improving Multiple Authorship Attribution of Source CodePengNan Hao, Zhen Li, Cui Liu, Yu Wen, Fanming Liu. 516-526 [doi]
- CBSDI: Cross-Architecture Binary Code Similarity Detection based on Index TableLongmin Deng, Dongdong Zhao 0001, Junwei Zhou, Zhe Xia, Jianwen Xiang. 527-536 [doi]
- PDG2Vec: Identify the Binary Function Similarity with Program Dependence GraphYuntao Zhang, Yanhao Wang, Yuwei Liu, Zhengyuan Pang, Binxing Fang. 537-548 [doi]
- Uncertainty-Aware Behavior Modeling and Quantitative Safety Evaluation for Automatic Flight Control SystemsHuiyu Liu, Jing Liu 0012, Haiying Sun, Tengfei Li 0002, John Zhang. 549-560 [doi]
- ucXception: A Framework for Evaluating Dependability of Software SystemsPedro David Almeida, Frederico Cerveira, Raul Barbosa, Henrique Madeira. 561-570 [doi]
- SAS-GKE: A Secure Authenticated Scalable Group Key ExchangeAbu Faisal, Mohammad Zulkernine. 571-582 [doi]
- Assessing the Quality of Low-Code and Model-Driven Engineering Platforms for Engineering IoT SystemsFelicien Ihirwe, Davide Di Ruscio, Simone Gianfranceschi, Alfonso Pierantonio. 583-594 [doi]
- A Pattern-Based Test Platform for Families of Smart Health ProductsPedro Almeida, João Pascoal Faria, Bruno Lima. 595-605 [doi]
- cPV - Simulation and Verification for Membrane ComputingYezhou Liu, Jing Sun, Radu Nicolescu, Hai Wang. 606-615 [doi]
- Multi-Transaction Sequence Vulnerability Detection for Smart Contracts based on Inter-Path Data DependencyShuai Zhang, Meng Wang, Yi Liu, Yuhan Zhang, Bin Yu. 616-627 [doi]
- Valkyrie: Improving Fuzzing Performance Through Deterministic TechniquesYuyang Rong, Chibin Zhang, Jianzhong Liu, Hao Chen 0003. 628-639 [doi]
- Automated Grey-Box Testing of Microservice ArchitecturesLuca Giamattei, Antonio Guerriero, Roberto Pietrantuono, Stefano Russo 0001. 640-650 [doi]
- TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by FuzzingMingpei Cao, Yueze Zhang, Zhenxuan Feng, Jiahao Hu, Yuesheng Zhu. 651-662 [doi]
- Crowdsourced Testing Task Assignment based on Knowledge GraphsPeng Yang, Chao Chang, Yong Tang. 663-671 [doi]
- A Functional FMECA Approach for the Assessment of Critical Infrastructure ResilienceGonçalo Carvalho, Nádia Medeiros, Henrique Madeira, Bruno Cabral. 672-681 [doi]
- Predictive Mutation Analysis of Test Case Prioritization for Deep Neural NetworksZhengyuan Wei, Haipeng Wang 0005, Imran Ashraf, W. K. Chan 0001. 682-693 [doi]
- Automated Synthesis of Quantum Circuits using Neural NetworkKentaro Murakami, Jianjun Zhao. 694-702 [doi]
- Test Reuse based on Adaptive Semantic Matching across Android Mobile ApplicationsShuqi Liu, Yu Zhou 0010, Tingting Han 0001, Taolue Chen. 703-709 [doi]
- Test Case Generation for Ethereum Smart Contract based on Data Dependency Analysis of State VariableJinhu Du, Song Huang, Xingya Wang, Changyou Zheng, Jin-lei Sun. 710-720 [doi]
- Extracting Temporal Models from Data EpisodesNour Chetouane, Franz Wotawa. 721-731 [doi]
- MC/DC Test Case Automatic Generation for Safety-Critical SystemsCong Wang, Haiying Sun, Hui Dou, Hongtao Chen, Jing Liu. 732-743 [doi]
- Generating Abstract Test Cases from User Requirements using MDSE and NLPSai Chaithra Allala, Juan P. Sotomayor, Dionny Santiago, Tariq M. King, Peter J. Clarke. 744-753 [doi]
- DeepRTest: A Vulnerability-Guided Robustness Testing and Enhancement Framework for Deep Neural NetworksMinghao Yang, Shunkun Yang, Wenda Wu. 754-762 [doi]
- An Effective Low-Dimensional Software Code Representation using BERT and ELMoSrijoni Majumdar, Ashutosh Varshney, Partha Pratim Das, Paul D. Clough, Samiran Chattopadhyay. 763-774 [doi]
- Building Safe and Stable DNN Controllers using Deep Reinforcement Learning and Deep Imitation LearningXudong He. 775-784 [doi]
- Evaluating the Robustness of Deep Reinforcement Learning for Autonomous Policies in a Multi-Agent Urban Driving EnvironmentAizaz Sharif, Dusica Marijan. 785-796 [doi]
- ParGCN: Abnormal Transaction Detection based on Graph Neural NetworksLian Yu, Qi Jing, Ruomiao Li, Zhiya Cheng, Chang Xu. 797-808 [doi]
- A Survey on Backdoor Attack and Defense in Natural Language ProcessingXuan Sheng, Zhaoyang Han, Piji Li, Xiangmao Chang. 809-820 [doi]
- Mutation Testing based Safety Testing and Improving on DNNsYuhao Wei, Song Huang, Yu Wang, Ruilin Liu, Chunyan Xia. 821-829 [doi]
- Focus on New Test Cases in Continuous Integration Testing based on Reinforcement LearningFanliang Chen, Zheng Li, Ying Shang, Yang Yang. 830-841 [doi]
- A Distance-Based Dynamic Random Testing Strategy for Natural Language Processing DNN ModelsYuechen Li, Hanyu Pei, Linzhi Huang, Beibei Yin. 842-853 [doi]
- EDDNet: An Efficient and Accurate Defect Detection Network for the Industrial Edge EnvironmentRunbing Qin, Ningjiang Chen, Yihui Huang. 854-863 [doi]
- Evaluation of the Architecture Alternatives for Real-Time Intrusion Detection Systems for VehiclesMubark Jedh, Jian Kai Lee, Lotfi Ben Othmane. 864-873 [doi]
- Strategies for Improving the Error Robustness of Convolutional Neural NetworksAntónio Morais, Raul Barbosa, Nuno Lourenço 0002, Frederico Cerveira, Michele Lombardi, Henrique Madeira. 874-883 [doi]
- Parameter Description Generation with the Code Parameter FlowQiuyuan Chen, Zezhou Yang, Zhongxin Liu, Shanping Li, Cuiyun Gao. 884-895 [doi]
- GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call SequencesCatherine Tony, Nicolás E. Díaz Ferreyra, Riccardo Scandariato. 896-906 [doi]
- Improved Methods of Pointer Mixture Network for Code CompletionCheng Wei, Zhiqiu Huang, Yaoshen Yu. 907-915 [doi]
- Automated Identification of Performance Changes at Code LevelDavid Georg Reichelt, Stefan Kühne, Wilhelm Hasselbring. 916-925 [doi]
- Cross Platform API Mappings based on API Documentation GraphsYanjie Shao, Tianyue Luo, Xiang Ling 0001, Limin Wang, Senwen Zheng. 926-935 [doi]
- CodeBERT-nt: Code Naturalness via CodeBERTAhmed Khanfir, Matthieu Jimenez, Mike Papadakis, Yves Le Traon. 936-947 [doi]
- RetCom: Information Retrieval-Enhanced Automatic Source-Code SummarizationYubo Zhang, Yanfang Liu, Xinxin Fan, Yunfeng Lu. 948-957 [doi]
- API Misuse Detection Method Based on TransformerJingbo Yang, Jian Ren, Wenjun Wu 0001. 958-969 [doi]
- CRUST: Towards a Unified Cross-Language Program Analysis Framework for RustShuang Hu, Baojian Hua, Lei Xia, Yang Wang. 970-981 [doi]
- Comprehensiveness, Automation and Lifecycle: A New Perspective for Rust SecurityShuang Hu, Baojian Hua, Yang Wang. 982-991 [doi]
- A Proactive Self-Adaptation Approach for Software Systems based on Environment-Aware Model Predictive ControlZhengyin Chen, Wenpin Jiao. 992-1003 [doi]
- MetaA: Multi-Dimensional Evaluation of Testing Ability via Adversarial Examples in Deep LearningSiqi Gu, Jiawei Liu, Zhanwei Hui, Wenhong Liu, Zhenyu Chen 0001. 1004-1013 [doi]
- MiSim: A Simulator for Resilience Assessment of Microservice-Based ArchitecturesSebastian Frank 0001, Lion Wagner, M. Alireza Hakamian, Martin Straesser, André van Hoorn. 1014-1025 [doi]
- Quantity-Simulation-Analysis Method based Novel RSA Timing Attack Algorithm for Single-Chip Microcomputer PlatformCong Li, Qiang Han, Tao Zhang 0001, Bingbing Lei, Yu He. 1026-1035 [doi]
- Continuous Usability Requirements Evaluation based on Runtime User Behavior MiningTong Li, Tianai Zhang. 1036-1045 [doi]
- Adopting Misclassification Detection and Outlier Modification to Fault Correction in Deep Learning-Based SystemsChuan-Min Chu, Chin-Yu Huang, Neil C. Fang. 1046-1056 [doi]
- Quantitative Analysis of Sparsely Synchronized Fail-Safe ProcessorsJun Inoue 0001, Hideaki Nishihara, Akira Mori. 1057-1068 [doi]
- An Empirical Study on Source Code Feature Extraction in Preprocessing of IR-Based Requirements TraceabilityBangchao Wang, Yang Deng, Ruiqi Luo, Huan Jin. 1069-1078 [doi]
- Pain Pickle: Bypassing Python Restricted Unpickler for Automatic Exploit GenerationNan-Jung Huang, Chih-Jen Huang, Shih-Kun Huang. 1079-1090 [doi]
- An Empirical Study on Software Aging of Long-Running Object Detection AlgorithmsRoberto Pietrantuono, Domenico Cotroneo, Ermeson C. Andrade, Fumio Machida. 1091-1102 [doi]
- Scriptless GUI Testing on Mobile ApplicationsThorn Jansen, Fernando Pastor Ricós, Yaping Luo, Kevin van der Vlist, Robbert van Dalen, Pekka Aho, Tanja E. J. Vos. 1103-1112 [doi]
- An Exploratory Study for GUI Posts on Stack OverflowJing Ding, Liming Nie, Yang Liu, Zuohua Ding, Jifeng Xuan. 1113-1124 [doi]
- Fine-Tuning Pre-Trained Model to Extract Undesired Behaviors from App ReviewsWenyu Zhang, Xiaojuan Wang, Shanyan Lai, Chunyang Ye, Hui Zhou. 1125-1134 [doi]
- A Framework for Scanning Privacy Information based on Static AnalysisYuan Zhao, Gaolei Yi, Fan Liu, Zhanwei Hui, Jianhua Zhao. 1135-1145 [doi]
- EWDLL: Software Aging State Identification based on LightGBM-LR Hybrid ModelXueyong Tan, Jing Liu. 1146-1158 [doi]