Abstract is missing.
- Attribute-Based Non-Interactive Privacy-Protected Crowd-Sourcing Software Testing Engineer Selection MechanismQiliang Yang, Lizhi Cai, Jiayu Gong, Minlu Tang, Yi Lin. 1-7 [doi]
- Multiphysics Simulation Methods for Microsystem InterconnectionsZhongge Zhao, Jiang Shao, Ming Zhang. 1-7 [doi]
- Modeling Trust Relationships in Blockchain Applications: The Case of Reconfigurable Systems-on-ChipMaxime Méré, Frédéric Jouault, Loïc Pallardy, Richard Perdriau. 1-8 [doi]
- A Data-Efficient Method of Deep Reinforcement Learning for Chinese ChessChangming Xu, Hengfeng Ding, XueJian Zhang, Cong Wang, Hongji Yang. 1-8 [doi]
- Internet Governance: Social Mentality and Public Emotion Analysis on Online Media during the COVID-19 Epidemic in Mainland ChinaWei Guo, Leyang Zhou, Jia Liu, Miaomiao Liu. 1-8 [doi]
- A Hierarchical Deep Neural Network for Detecting Lines of Codes with VulnerabilitiesArash Mahyari. 1-7 [doi]
- Social Media Safety Practices and Flagging Sensitive PostsLisa M. DiSalvo, Gabriela Viviana Saenz, W. Eric Wong, Dongcheng Li. 8-15 [doi]
- Security Resilience - Considerations from the Application of the Functional Resonance Method (FRAM) to Information Security IncidentsTomoko Kaneko. 16-23 [doi]
- Generalized Network Temperature for DDoS Detection through Rényi EntropyXiang Wang, Xing Zhang, Changda Wang 0001. 24-33 [doi]
- A Stochastic Model for Calculating Well-Founded Probabilities of Vulnerability ExploitationRyohei Sato, Hidetoshi Kawaguchi, Yuichi Nakatani. 34-43 [doi]
- Simulation of Sensor Spoofing Attacks on Unmanned Aerial Vehicles using the Gazebo SimulatorIrdin Pekaric, David Arnold, Michael Felderer. 44-53 [doi]
- A Scalable Storage Scheme for On-Chain Big Data using Historical BlockchainsMarcos Felipe, Haiping Xu. 54-61 [doi]
- Multi Pair Swap-Based Weather Derivative DeFiShinya Haga, Taisei Takahashi, Kazumasa Omote. 62-69 [doi]
- PTLC: Protect the Identity Privacy during Cross-Chain Asset Transaction More EffectivelyJingyuan Cai, Ying Zhou, Tianyuan Hu, Bixin Li. 70-78 [doi]
- Technical Usability Assessment of Security Analysis Tools for Ethereum Based Smart ContractsRana Zeeshan, Irina Tal. 87-95 [doi]
- Hyperledger Fabric-Based Copyright Management System for Clothing design drawingsWenxuan Wang, Yongqiang Chen, Jiangchen Zhou, Huan Jin. 96-101 [doi]
- Transferable Unique Copyright Across AI Model Trading: A Blockchain-Driven Non-Fungible Token ApproachYixin Fan, Guozhi Hao, Jun Wu. 102-105 [doi]
- Application of Blockchain in Trusted Data ProvenanceXiangke Mao, Chao Li 0012, Guigang Zhang, Xin Wei, Chunxiao Xing. 106-112 [doi]
- Real-Time Control Algorithm of Intelligent Energy-Saving Lights based on IoTBo Su, Zeyuan Zhang, Yuansheng Zhang, Qingyue Yang, Jiong Jiang. 113-119 [doi]
- Trial Application of Risk Assessment Method for MetaverseRyôichi Sasaki. 120-128 [doi]
- Machine Learning based Re-identification of Location Histories using Contact Information Collected from Social Networking ServicesTakeya Horiuchi, Hiroshi Yoshiura, Yoichi Midorikawa, Hideki Yoshii, Masatsugu Ichino. 129-136 [doi]
- Breaking Anonymity of Social Media by Profiling from Multimodal InformationEina Hashimoto, Masatsugu Ichino, Hiroshi Yoshiura. 137-144 [doi]
- Analyzing Metadata in PDF Files Published by Police Agencies in JapanTaichi Hasegawa, Taiichi Saito, Ryôichi Sasaki. 145-151 [doi]
- Hierarchical Action Embedding for Effective Autonomous Penetration TestingHoang Viet Nguyen, Tetsutaro Uehara. 152-157 [doi]
- Evaluation of Software Testing Adequacy based on AHP and BPNNWenhong Liu, JinLiang Gao, Qiong Xue, Dong Guo, Wei Zhang. 158-165 [doi]
- DeepBoundary: A Coverage Testing Method of Deep Learning Software based on Decision Boundary RepresentationYue Liu, Lichao Feng, Xingya Wang, Shiyu Zhang. 166-172 [doi]
- TSDTest: A Efficient Coverage Guided Two-Stage Testing for Deep Learning SystemsHaoran Li, Shihai Wang, Tengfei Shi, Xinyue Fang, Jian Chen. 173-178 [doi]
- An Empirical Study towards Characterizing Neural Machine Translation Testing MethodsChenxi He, Wenhong Liu, Shuang Zhao, Jiawei Liu, Yang Yang. 179-182 [doi]
- Evaluation of Intelligent Information SystemWenhong Liu, Yong Li, Bo Huang. 183-188 [doi]
- IMGA: Improved Microbial Genetic AlgorithmYiFei Liu, Yankun Gao, Yang Liu. 189-192 [doi]
- Automated Modeling of Web Service Composition and Testing: A UML Sequence Diagram-Based ApproachYao Huang, Bingqing Zhang, Yichen Wang. 193-200 [doi]
- Integration- and System-Testing Aligned with Cloud-Native Approaches for DevOpsAlexander Poth, Olsi Rrjolli, Andreas Riel. 201-208 [doi]
- An Improved Test Case Generation Method based on Test Requirements for Testing Software ComponentJinfu Chen 0001, Yemin Yin, Saihua Cai, Ye Geng, Longxia Huang. 209-218 [doi]
- Dependability Analysis and Verification Technology of Artificial Intelligence SoftwareYaming Zhang, Lijin Wu, Xiaomei Shen, Zehua Shen, Tongli Tang. 226-232 [doi]
- Analysis of Velocity Deviation of Satellite-Rocket Separation and Orbit Accuracy of Satellite Caused by Multiple FactorsYunyun Pang, Qiang Ye, Yang Lu. 240-245 [doi]
- Software Bug Prediction based on Complex Network Considering Control FlowZhanyi Hou, Ling-lin Gong, Minghao Yang, Yizhuo Zhang, Shunkun Yang. 246-254 [doi]
- A Multi-Layer Fault Triggering Framework based on Evolutionary Strategy Guided Symbolic Execution for Automated Test Case GenerationZhiyu Duan, Yujia Li, Pubo Ma, Xiaodong Gou, Shunkun Yang. 255-262 [doi]
- Prefilter: A Fault Localization Method using Unlabelled Test Cases based on K-Means Clustering and SimilarityDong An, Shihai Wang, Liandie Zhu, Xunli Yang, Xiaobo Yan. 263-269 [doi]
- Visual-ISAM: A Visualization Method for Software Failure Analysis and Evaluation based on Knowledge Graph Utilizing Improved SALKU ModelCanwei Shi, Ling-lin Gong, Qi Shao, Qi Yao, Zhiyu Duan. 270-277 [doi]
- A Software Defect Prediction Classifier based on Three Minimum Support Threshold Association Rule MiningWentao Wu, Shihai Wang, Yuanxun Shao, Mingxing Zhang, Wandong Xie. 278-282 [doi]
- IEMT: Inequality-Based Metamorphic Testing for Autonomous Driving ModelsChao Xiong, Zhiyi Zhang 0004, YuQian Zhou, Chen Liu, Zhiqiu Huang. 283-287 [doi]
- Quantifying the Effectiveness of Mutant SetsSamia Al Blwi, Amani Ayad, Besma Khaireddine, Imen Marsit, Ali Mili. 288-297 [doi]
- CIL-BSP: Bug Report Severity Prediction based on Class Imbalanced LearningYu Su, Xinping Hu, Xiang Chen, Yubin Qu, Qianshuang Meng. 298-306 [doi]
- Face Recognition Fairness Assessment based on Data Augmentation: An Empirical StudyFangyuan Tian, Wenhong Liu, Shuang Zhao, Jiawei Liu. 315-318 [doi]
- Similarity Analysis in Data Element Matching based on Word2vecWenhong Liu, Zhiyuan Peng, Shuang Zhao, Jiawei Liu. 319-323 [doi]
- SemirFL: Boosting Fault Localization via Combining Semantic Information and Information RetrievalXiangyu Shi, Xiaolin Ju, Xiang Chen 0005, Guilong Lu, Mengqi Xu. 324-332 [doi]
- The Real-Time General Display and Control Platform Designing Method based on Software Product LineXiaowei Guo, Ning Cao, Xibing Yang. 333-339 [doi]
- Metamorphic Testing for the Medical Image Classification ModelYue Ma, Ya Pan, Yong Fan. 340-346 [doi]
- Application and Development Prospect of Monitoring Screen based on Three.js Unit Equipment Control SystemBoying Wu, Sigong Zhang, Weirong Tian, Hang Wang. 347-351 [doi]
- A Software Multi-Fault Clustering Ensemble TechnologyMingxing Zhang, Shihai Wang, Wentao Wu, Weiguo Qiu, Wandong Xie. 352-358 [doi]
- Requirements-Related Fault Prevention Mechanism for SOFL Formal Specification-Based ProgrammingJiandong Li, Shaoying Liu. 359-367 [doi]
- A Fault Localization Method Based on Similarity Weighting with Unlabeled Test CasesXunli Yang, Bin Liu, Dong An, Wandong Xie, Wei Wu. 368-374 [doi]
- Detecting Security Vulnerabilities with Vulnerability NetsPingyan Wang, Shaoying Liu, ai Liu, Wen Jiang. 375-383 [doi]
- Bug Patterns in Probabilistic Programming SystemsShoma Hamada, Haibo Yu, Vo Dai Trinh, Yuri Nishimura, Jianjun Zhao. 384-391 [doi]
- CFIWSE: A Hybrid Preprocessing Approach for Defect Prediction on Imbalance Real-World DatasetsJiaxi Xu, Jingwei Shang, Zhichang Huang. 392-401 [doi]
- Automatic Labeling of SDN Controller Defect Text based on Neural Topic ModelBing Zheng, Hua Li. 402-410 [doi]
- Software Defect Prediction via GIN with Hybrid Graphical FeaturesXuanye Wang, Lu Lu, Boye Wang, Yudong Shang, Hao Yang. 411-416 [doi]
- Generalized Perceptual Modeling: Virtual Human Face Modeling and Expression Recognition Considering Emotion UnderstandingZiyang Weng, Ziyu Zhang, Yinger Liang, Biyi Dai. 417-424 [doi]
- Recommendation Algorithm for Graph Convolutional Networks based on Multi-Ralational Knowledge GraphYunhao Li, Shijie Chen, Jiancheng Zhao. 425-430 [doi]
- A Dead Code Evaluation Method based on Complex NetworkXinwei Liu, Chuanqi Tao. 431-436 [doi]
- A Selective Maintenance Strategy on Network-Based System with Constrained FlowWenjin Zhu, Zhifeng Zheng. 437-438 [doi]
- An Excellence Level Evaluation Model of Intelligent Manufacturing Unitan Wu, Chen Zheng, Zao Hou, Feng Duan, Zhiqiang Cai 0003. 439-443 [doi]
- Resilience Analysis of Urban Rail Transit Network Under Large Passenger FlowNing Wang. 444-446 [doi]
- Reliability Analysis of a Computer-Based Interlocking System with a Double 2-out-of-2 Redundancy Structure using Algebraic Binary Decision DiagramsWenjia Long, Kaizhi Wang, Xuan Wang. 447-453 [doi]
- Elevator Maintenance Site Selection Optimization via Fine-Tuned K-MeansYuegui Feng, Guangwei Qing, Qianfei Zhou. 454-461 [doi]
- Intelligent Guidance Method for Elevator Emergency Treatment based on Automatic Recommendation and Fault PredictionGuangwei Qing, Qianfei Zhou, Huifang Wang. 462-468 [doi]
- A Learning Path Recommendation Method for Knowledge Graph of Professional CoursesYujuan Cheng. 469-476 [doi]
- Code Generation Method based on Structured Tree Input and AST Decoder Attention AugmentationWenjun Wei, Junhua Wu. 477-484 [doi]
- Code Search Method Based on Multimodal RepresentationXiao Chen, Junhua Wu. 485-491 [doi]
- Chinese Character Creation Algorithm: Evaluation of the Effectiveness of Topological Similarity of Remote Sensing Images Considering the Description of Sparse Geographic StructureZiyang Weng, Shuhao Wang, Weixin Yan, Anna Li. 492-498 [doi]
- An Empirical Study of Software Testing Quality based on Natural ExperimentsJiahao Li, Xinhao Cui, Yichen Wang, Feng Xie. 499-508 [doi]
- Quantum Random Access Codes with Mutually Unbiased Bases in Three-Dimensional Hilbert SpaceQian-Kun Yao, Yu-qian Zhou, Ya-Qi Dong. 509-514 [doi]
- Characterization of Nonlocality in Chained Quantum NetworksYa-Qi Dong, Yu-qian Zhou, Qian-Kun Yao. 515-520 [doi]
- An Approach of Locating Minimal Failure-Causing Schema for Boolean-SpecificationsTianyu Xu, Guanglin Li, Jun Lu, Ziyuan Wang. 521-524 [doi]
- IRRT: An Automated Software Requirements Traceability Tool based on Information Retrieval ModelSen Zhang, Hongyan Wan, Yong Xiao, Ziruo Li. 525-532 [doi]
- An Empirical Study on Software Requirements Classification Method based on Mobile App User CommentsHuan Jin, Hongyan Wan, Ziruo Li, Wenxuan Wang. 533-541 [doi]
- Anti-Money Laundering Risk Identification of Financial Institutions based on Aspect-Level Graph Neural NetworksYahan Yu, Yixuan Xu, Jian Wang, Zhenxing Li, Bin Cao. 542-546 [doi]
- Multi-Chain Model and Cross-Chain Communication Protocol for Financial TransactionsChao Li 0012, Guigang Zhang, Xiangke Mao, Jian Zhang, Chunxiao Xing. 547-551 [doi]
- Question Answering Algorithm for Grid Fault Diagnosis based on Graph Neural NetworkYahan Yu, Yun Wang, Guigang Zhang, Yi Yang, Jian Wang. 552-557 [doi]
- Maintenance Optimization for Dependent Two-Unit Systems Considering Stochastic Degradation and Imperfect MaintenanceWanqing Cheng, Xiujie Zhao. 558-561 [doi]
- Flexible and dependable manufacturing beyond xURLLC: A novel framework for communication-control co-designBin Han, Mu-Xia Sun, Lai-Kan Muk, Yanfu Li, Hans D. Schotten. 562-568 [doi]
- Modeling Method and Correctness Verification of Power Grid Safety and Stability Control Strategy SystemHengfei Yang, Bo Shen, Gaoyang Xu, Yonghua Chen. 569-575 [doi]
- Modeling and Real-Time Verification for CPS based on Time AutomataMingfu Tuo, Xiaoqiang Zhao, Bo Shen, Wenliang Wu. 576-579 [doi]
- TTAG+R: A Dataset of Google Play Store's Top Trending Android Games and User ReviewsRaheela Chand, Saif ur Rehman Khan, Shahid Hussain, Wen-Li Wang. 580-586 [doi]
- A Vision of DevOps Requirements Change Management StandardizationMuhammad Azeem Akbar, Arif Ali Khan, Sajjad Mahmood, Saima Rafi. 587-592 [doi]
- Towards a Comprehensive Dataset for Next-Day Wildfire PredictionSyed Haider Ali, Anish Goel, Aditya Singirikonda, Ali Y. Khan, Ting Xiao. 593-598 [doi]
- Data Driven User Feature Construction and Requirement Generation in Mobile ApplicationsYuanbang Li, Kai Wang, Xiaoyu Guo, Zhongyuan Hua, Yong Xiao. 599-607 [doi]
- Knowledge Graph Question Answering based on Contrastive Learning and Feature TransformationXinrong Hu, Jingjing Huang, Junping Liu, Qiang Zhu, Jie Yang. 608-615 [doi]
- Exploring the Impact of Grouping Strategies on Cooperative Co-evolutionary Algorithms for Solving the Advertising Budget Allocation ProblemYongfeng Gu, Yuxuan Zhou, Hao Ding, Fan Jia, Shiping Wang. 616-620 [doi]
- A Comparison Analysis of Constraint-Handling Techniques on Rule Selection Problem in Credit Risk Assessment: An Industrial ViewYongfeng Gu, Hao Ding, Kecai Gu, Xiaoguang Huang, Hua Wu. 621-625 [doi]
- Colonization Strategy Algorithm: A Deviation Algorithm Optimization based on Spatial Autocorrelation TheoryZhongyuan Hua, Ke Ye. 626-633 [doi]
- Mapping Method between 2D Landscape Image and 3D Spatial Data based on Adversarial Relative Depth Constraint NetworkShuhao Wang, Zhijun Lin, Zhimo Weng, Anna Li. 634-642 [doi]
- Prototype Algorithm: Number Chain Features in Spatial Similarity Calculation of Time-Series Graph SourcesZiyang Weng, Shuhao Wang, Weixin Yan, Yinger Liang. 643-650 [doi]
- A Crawler-Based Vulnerability Detection Method for Cross-Site Scripting AttacksHaocheng Guan, Dongcheng Li, Hui Li, Man Zhao. 651-655 [doi]
- A Light-Weight Convolutional Neural Network for Facial Expression Recognition using Mini-Xception Neural NetworksChangjian Li, Dongcheng Li, Man Zhao, Hui Li. 656-661 [doi]
- A FANETs System for Autonomous Aerocraft Flying FormationJinyong Lin, Wenlong Cai, Xiangrui Fan, Wenjie Dong, Shuo Zhang. 662-666 [doi]
- Software Technology Status Management under the Trend of Ship InformatizationMengao Li, Hanting Zhao, Wenxiu Zhang, Xiqiao Pang, Tao Feng. 667-672 [doi]
- A Natural Language-enabled Virtual Assistant for Human-Robot Interaction in Industrial EnvironmentsChen Li 0009, Dimitrios Chrysostomou, Hongji Yang. 673-678 [doi]
- A General Characterization of Representing Spatiotemporal Knowledge Graph based on OWLLin Zhu, Luyi Bai, Xuesong Hao, Hongji Yang. 679-686 [doi]
- Script Based Pattern Recognition for a Portrait Tracking System on Broadcast Online ScenesQinyun Liu, Xiaopeng Xu. 694-699 [doi]
- LLCF: A Load- and Location-Aware Collaborative Filtering Algorithm to Predict QoS of Web ServiceChen Li, Xiaochun Zhang, Chengyuan Yu, Xin Shu, Xiaopeng Xu. 700-707 [doi]
- An Empirical Study of the Impact of COVID-19 on OSS DevelopmentLingfei Ma, Liming Nie, Chenxi Mao, Yaowen Zheng, Yang Liu. 708-717 [doi]
- The IoT Service Agent Model based on Federated Learning to Improve Service QualityTse-Chuan Hsu, William Cheng-Chung Chu, Shyh-Wei Chen. 718-722 [doi]
- A Creative Computing Approach to Optimising Citizens' Fashion Education based on Design Thinking for Responding to Micro-Level Needs of Smart City DevelopmentYue Wu, Xiang Li, Jiafeng Zhou. 723-731 [doi]
- Visual Sensitivity Controlling Colour Model in Creative ComputingYinwei Liu. 732-739 [doi]
- A Quantum Information and Cybernetics Based Algorithm for Creativity Applying in Cultural Heritage Products DesignQinyun Liu, William Cheng-Chung Chu, Xiaochun Zhang, Shou-Yu Lee, Wei Mo. 740-745 [doi]
- Risk Evaluation of the Destination Port Logistics based on Self-Organizing Map ComputingChuan Zhao, Huilei Cao. 746-751 [doi]
- Towards Research on Information GravitationKai-Yuan Cai. 752-753 [doi]
- Deep Reinforcement Learning for Video Summarization with Semantic RewardHaoran Sun, Xiaolong Zhu, Conghua Zhou. 754-755 [doi]
- What Should Abeeha do? an Activity for Phishing AwarenessRubia Fatima, Affan Yasin, Lin Liu 0001, Jianmin Wang 0001. 756-757 [doi]
- On Securing the Communication in IoT Infrastructure using Elliptic Curve CryptographyHugo Bourreau, Emeric Guichet, Amine Barrak, Benoît Simon, Fehmi Jaafar. 758-759 [doi]
- RUSTY: Effective C to Rust Conversion via Unstructured Control SpecializationXiangjun Han, Baojian Hua, Yang Wang, Ziyao Zhang. 760-761 [doi]
- Log Anomaly Detection Method based on Hybrid Transformer-BiLSTM ModelsXuedong Ou, Jing Liu. 762-763 [doi]
- RandomMix: An Effective Framework to Protect User Privacy Information on EthereumHao Yin, Dongyu Cao, Ying Zhou. 764-765 [doi]
- TrustAuction: A TEE based Privacy Protection Framework for Auction ContractsJiahao He, Dongyu Cao, Ying Zhou. 766-767 [doi]
- Feature Difference based Misclassified Sample Detection for CNN Models Deployed in Online EnvironmentChangtian He, Qing Sun, Ji Wu 0003, Haiyan Yang, Tao Yue. 768-769 [doi]
- Systematic Transformation Method from UML to Event-BXue Geng, Sheng-rong Zou, Ju-yi Yao. 770-771 [doi]
- Deep Learning Fuzz Testing Methods for Unstructured CaseHaotian Yu, Xiaoguang Li, Yuefeng Du 0004. 772-773 [doi]
- Design and Implementation of OOM Module based on RustLinhan Li, Qianying Zhang, Shijun Zhao, Zhi-Ping Shi 0002, Yong Liang Guan 0001. 774-775 [doi]
- A New Method for Quality Analysis of Multi-Process ManufactureQuanzhou Li, Zhenguo Liu, Ning Hu, Shuqi Zhong, Keqiang Cheng. 776-777 [doi]
- Resilience Analysis under the Impact of Cell Failures in the Practical Telecommunication base Station NetworksZongqi Xue, Zhenglin Liang. 778-779 [doi]
- A Novel Coverage-Guided Greybox Fuzzing Method based on Grammar-Aware with Particle Swarm OptimizationShengran Wang, Jinfu Chen 0001, Saihua Cai, Chi Zhang 0046, Haibo Chen 0005. 780-781 [doi]
- Using Fuzzing to Help Abstract Interpretation Based Program VerificationRenjie Huang, Banghu Yin, Liqian Chen. 782-783 [doi]