Abstract is missing.
- Analysis and Remodeling of the DirtyCOW Vulnerability by Debugging and AbstractionYanjun Wen, Ji Wang. 3-12 [doi]
- A Formal Technique for Concurrent Generation of Software's Functional and Security Requirements in SOFL SpecificationsBusalire Onesmus Emeka, Shaoying Liu. 13-28 [doi]
- Distortion and Faults in Machine Learning SoftwareShin Nakajima. 29-41 [doi]
- A Divide & Conquer Approach to Testing Concurrent Java Programs with JPF and MaudeCanh Minh Do, Kazuhiro Ogata 0001. 42-58 [doi]
- An Approach to Modeling and Verifying Multi-level Interrupt Systems with TMSVLJin Cui, Xu Lu, Buwen Liang. 61-72 [doi]
- Towards Formal Verification of Neural Networks: A Temporal Logic Based FrameworkXiaobing Wang, Kun Yang, Yanmei Wang, Liang Zhao, Xinfeng Shu. 73-87 [doi]
- UMC4M: A Verification Tool via Program ExecutionMeng Wang 0001, Junfeng Tian, Hong Zhang. 88-98 [doi]
- Parallel Runtime Verification Approach for Alternate Execution of Multiple ThreadsBin Yu, Jinhui Liu, Ming Lei, Yong Yu 0002, Hao Chen. 99-109 [doi]
- A Planning Approach Based on APTLHaiyang Wang, Yao Liu. 113-122 [doi]
- Solving Constraint Optimization Problems Based on Mathematica and AbstractionGuoteng Pan, Mengjun Li, Guodong Ou. 123-140 [doi]
- A Forward Chaining Heuristic Search with Spatio-Temporal Control KnowledgeXu Lu, Jin Cui, Yansong Dong, Wensheng Wang, Runzhe Ma, Yifeng Li, Qing Feng. 141-154 [doi]
- Formal Development and Verification of Reusable Component in PAR PlatformQimin Hu, Jinyun Xue, Zhen You, Zhuo Cheng, Zhengkang Zuo. 155-166 [doi]
- A New Mutant Generation Algorithm Based on Basic Path Coverage for Mutant ReductionXu Qin, Shaoying Liu, Zhang Tao. 167-186 [doi]
- Formal Specification and Model Checking of a Ride-sharing System in MaudeEiichi Muramoto, Kazuhiro Ogata 0001, Yoichi Shinoda. 187-204 [doi]
- Model Checking Python Programs with MSVLXinfeng Shu, Fengyun Gao, Weiran Gao, Lili Zhang, Xiaobing Wang, Liang Zhao. 205-224 [doi]
- Prediction of Function Removal Propagation in Linux EvolutionLei Wang, Guoxiong Chen, Liang Li. 227-242 [doi]
- Regression Models for Performance Ranking of Configurable Systems: A Comparative StudyYuntianyi Chen, Yongfeng Gu, Lulu He, Jifeng Xuan. 243-258 [doi]
- Combining Model Learning and Model Checking to Analyze Java LibrariesShahbaz Ali, Hailong Sun 0001, Yongwang Zhao. 259-278 [doi]
- Data Provenance Based System for Classification and Linear Regression in Distributed Machine LearningMuhammad Jahanzeb Khan, Ruoyu Wang 0004, Daniel Sun, Guoqiang Li. 279-295 [doi]
- Metamorphic Testing in Fault Localization of Model TransformationsKeke Du, Mingyue Jiang, Zuohua Ding, Hongyun Huang, Ting Shu. 299-314 [doi]
- A Fault Localization Method Based on Dynamic Failed Execution BlocksBaoyi Pan, Ting Shu, Jinsong Xia, Zuohua Ding, Mingyue Jiang. 315-327 [doi]
- Adaptive Random Testing by Bisection and Comprehensive DistanceChengying Mao, Mengting Quan, Zhilei Chen, Tsong Yueh Chen. 328-344 [doi]
- CMM: A Combination-Based Mutation Method for SQL InjectionJing Zhao, Tianran Dong, Yang Cheng, Yanbin Wang. 345-361 [doi]