Abstract is missing.
- A Comparative Study of Neural Network Techniques for Automatic Software Vulnerability DetectionGaigai Tang, Lianxiao Meng, Huiqiang Wang, Shuangyin Ren, Qiang Wang, Lin Yang, Weipeng Cao. 1-8 [doi]
- A Novel Data-Driven Approach for Generating Verified Loop InvariantsHong Lu, Jiacheng Gui, Chengyi Wang, Hao Huang. 9-16 [doi]
- Defect Report Severity Prediction Based on Genetic Algorithms and Convolutional Neural NetworkShiming Guo, Xin Chen 0032, Dongjin Yu. 17-24 [doi]
- RKC-H: A Rich Knowledge Based Model for Multi-turn Dialogue GenerationFeifei Xu, Guanqun Ding, Wenkai Zhang, Audrey. 25-32 [doi]
- WLeidenRDF: RDF Data Query Method based on Semantic-Enhanced Graph-Clustering AlgorithmLiu Yang, Zhou Chen, Yiqing Feng, Zhifang Liao, Zhigang Hu, Jun Long. 33-40 [doi]
- An Axiomatic Approach to BigrTiMoWanling Xie, Huibiao Zhu, Shengchao Qin. 41-48 [doi]
- Real-time MTL with durations as SMT with applications to schedulability analysisAndré de Matos Pedro, Martin Leucker, David Pereira, Jorge Sousa Pinto. 49-56 [doi]
- Real-Time Trigger-Response Properties for Event-B Applied to the PacemakerChenyang Zhu 0001, Michael J. Butler, Corina Cîrstea. 57-64 [doi]
- Tracking a Ground Moving Target with UAV Based on Interval Type-2 Fuzzy LogicYao LiWenbing Tang, Bochen Chen, Zuohua Ding. 65-72 [doi]
- Feature-oriented Design of Visual Analytics System for Interpretable Deep Learning based Intrusion DetectionChunyuan Wu, Aijuan Qian, Xiaoju Dong, Yanling Zhang. 73-80 [doi]
- Neuron Activation Frequency Based Test Case PrioritizationKai Zhang, Yongtai Zhang, Liwei Zhang, Hongyu Gao, Rongjie Yan, Jun Yan 0009. 81-88 [doi]
- Rely-Guarantee Reasoning about Messaging System for Autonomous VehiclesWenjing Xul, Yongwang Zhao, Dianfu Ma, Yuxin Zhang, Qian Xiao. 89-96 [doi]
- A Formal Proof of the Soundness of the Hybrid CPS Clock TheoryJianlin Wang, Chao Peng, Zhenbing Zeng. 97-104 [doi]
- Formalizing the Soundness of the Encoding Methods of SAT-based Model CheckingDaisuke Ishii, Saito Fujii. 105-112 [doi]
- The Bouquet Algorithm for Model Checking Unbounded Until PropertiesShiraj Arora, M. V. Panduranga Rao. 113-120 [doi]
- Characterising Probabilistic Alternating Simulation for Concurrent GamesChenyi Zhang, Jun Pang 0001. 121-128 [doi]
- Learning Probabilistic Languages by k-Testable MachinesWenjing Chu, Marcello M. Bonsangue. 129-136 [doi]
- Automatic Tagging for Open Source Software by Utilizing Package Dependency InformationLiu Yang, Li Wang, Zhigang Hu, Yanwen Wang, Jun Long. 137-144 [doi]
- Optimizing Transformations of Dynamic Languages Compiled to Intermediate RepresentationsRobert Husák, Filip Zavoral, Jan Kofron. 145-152 [doi]
- Analyzing Cryptographic API Usages for Android Applications Using HMM and N-GramZhiwu Xu 0001, Xiongya Hu, Yida Tao, Shengchao Qin. 153-160 [doi]
- Droidlens: Robust and Fine-Grained Detection for Android Code SmellsChen-Guang Mao, Hao Wang, Gao-Jie Han, Xiaofang Zhang. 161-168 [doi]
- Measuring the Quality of B Abstract Machines with ISO/IEC 25010Chenghao Cai, Jing Sun 0002, Gillian Dobbie. 169-176 [doi]
- Metamorphic Testing of Code Search EnginesZuohua Ding, Qingfen Zhang, Mingyue Jiang. 177-184 [doi]
- A Language-based Approach to Analysing Flow Security Properties in Virtualised Computing SystemsChunyan Mu. 185-192 [doi]
- A Multi-Strategy Combination Framework for Android Malware Detection Based on Various FeaturesZhen Wang, Xiaoning Han, Weiqiang Kong, Yong Piao, Gang Hou, Masahiko Watanabe, Akira Fukuda. 193-200 [doi]
- An Empirical Study in Software Verification ToolsMengmeng Jiang, Xiaohong Li 0001, Xiaofei Xie, Yao Zhang. 201-208 [doi]
- AT-ROP: Using static analysis and binary patch technology to defend against ROP attacks based on return instructionShenglin Xu, Peidai Xie, Yongjun Wang. 209-216 [doi]
- Formally Verifying Sequence Diagrams for Safety Critical SystemsXiaohong Chen 0007, Frédéric Mallet, Xiaoshan Liu. 217-224 [doi]
- The Scheme of Security Requirement Acquisition Based on Knowledge GraphYu Zhang, Xiaohong Li. 225-231 [doi]