default search action
21st QRS 2021: Hainan, China
- 21st IEEE International Conference on Software Quality, Reliability and Security, QRS 2021, Hainan, China, December 6-10, 2021. IEEE 2021, ISBN 978-1-6654-5813-9
- Jin-lei Sun, Song Huang, Changyou Zheng, Meijuan Wang, Zhanwei Hui, Yixian Ding:
A Novel Method to Prevent Multiple Withdraw Attack on ERC20 Tokens. 1-7 - Joe Samuel, Jason Jaskolka, George O. M. Yee:
Analyzing Structural Security Posture to Evaluate System Design Decisions. 8-17 - Mohammadreza Hazhirpasand, Mohammad Ghafari:
Cryptography Vulnerabilities on HackerOne. 18-27 - Rui Mei, Han-Bing Yan, Zhihui Han, Jian-Chun Jiang:
CTSCOPY: Hunting Cyber Threats within Enterprise via Provenance Graph-based Analysis. 28-39 - Saurabh Kumar, Debadatta Mishra, Biswabandan Panda, Sandeep Kumar Shukla:
DeepDetect: A Practical On-device Android Malware Detector. 40-51 - Lian Yu, Lei Zhang, Yuanyuan Zhang, Weiping Wen, Xuetao Du, Fei Cao:
Dynamic Interval-based Watermarking for Tracking down Network Attacks. 52-61 - Ana Ribeiro, João F. Ferreira, Alexandra Mendes:
EcoAndroid: An Android Studio Plugin for Developing Energy-Efficient Java Mobile Applications. 62-69 - Qinqin Wang, Hanbing Yan, Zhihui Han:
Explainable APT Attribution for Malware Using NLP Techniques. 70-80 - Xiuting Ge, Yifan Huang, Zhanwei Hui, Xiaojuan Wang, Xu Cao:
Impact of datasets on machine learning based methods in Android malware detection: an empirical study. 81-92 - Pascal Gadient, Oscar Nierstrasz, Mohammad Ghafari:
Security Header Fields in HTTP Clients. 93-101 - Marcus Birgersson, Cyrille Artho, Musard Balliu:
Security-Aware Multi-User Architecture for IoT. 102-113 - Xiaoxue Ma, Imran Ashraf, W. K. Chan:
Sound Predictive Atomicity Violation Detection§. 114-125 - Chih-Wei Hsu, Sun-Yuan Hsieh:
Strategies for Reducing Traffic Volume and Security on Smart Grid. 126-131 - Quentin Stiévenart, Coen De Roover, Mohammad Ghafari:
The Security Risk of Lacking Compiler Protection in WebAssembly. 132-139 - Zeyu Lu, Zhanquan Guo:
A Framework for Progressive Regression Testing PLC Programs. 140-148 - Kenya Saiki, Shaoying Liu, Hiroyuki Okamura, Tadashi Dohi:
A Tool to Support Vibration Testing Method for Automatic Test Case Generation and Test Result Analysis. 149-156 - Ying Shi, Beibei Yin, Zheng Zheng, Tiancheng Li:
An Empirical Study on Test Case Prioritization Metrics for Deep Neural Networks. 157-166 - Ezequiel Castellano, Ahmet Cetinkaya, Paolo Arcaini:
Analysis of Road Representations in Search-Based Testing of Autonomous Driving Systems. 167-178 - Xinyi Wang, Paolo Arcaini, Tao Yue, Shaukat Ali:
Application of Combinatorial Testing to Quantum Programs. 179-188 - Lizhi Cai, Jilong Wang, Mingang Cheng, Jin Wang:
Automated Testing of Android Applications Integrating Residual Network and Deep Reinforcement Learning. 189-196 - Bo Jiang, Wenlin Wei, Li Yi, W. K. Chan:
DroidGamer: Android Game Testing with Operable Widget Recognition by Deep Learning. 197-206 - Alex Groce, Iftekhar Ahmed, Josselin Feist, Gustavo Grieco, Jiri Gesi, Mehran Meidani, Qihong Chen:
Evaluating and Improving Static Analysis Tools Via Differential Mutation Analysis. 207-218 - Yanzhou Mu, Zan Wang, Shuang Liu, Jun Sun, Junjie Chen, Xiang Chen:
HARS: Heuristic-Enhanced Adaptive Randomized Scheduling for Concurrency Testing. 219-230 - Tiange Cao, Zheng Li, Ruilian Zhao, Yang Yang:
Historical Information Stability based Reward for Reinforcement Learning in Continuous Integration Testing. 231-242 - Songyan Ji, Jian Dong, Junfu Qiu, Bowen Gu, Ye Wang, Tongqi Wang:
Increasing Fuzz Testing Coverage for Smart Contracts with Dynamic Taint Analysis. 243-247 - Jinfu Chen, Yiming Wu, Chengying Mao, Tsong Yueh Chen, Haibo Chen:
MMFC-ART: a Fixed-size-Candidate-set Adaptive Random Testing approach based on the modified Metric-Memory tree. 248-259 - Paulina Stevia Nouwou Mindom, Amin Nikanjam, Foutse Khomh, John Mullins:
On Assessing The Safety of Reinforcement Learning algorithms Using Formal Methods. 260-269 - Stephan Valentan, Franz Wotawa:
On the Automation of Audio Plugin Testing*. 270-278 - Chunbai Yang, Imran Ashraf, Xiaoxue Ma, Hao Zhang, W. K. Chan:
OPE: Transforming Programs with Clean and Precise Separation of Tested Intraprocedural Program Paths with Path Profiling. 279-290 - Chung-Hsuan Tsai, Shi-Chun Tsai, Shih-Kun Huang:
REST API Fuzzing by Coverage Level Guided Blackbox Testing. 291-300 - Hui Guo, Xiaoqiang Liu, Baiyan Li, Lizhi Cai, Yun Hu, Jing Cao:
SQDroid: A Semantic-Driven Testing for Android Apps via Q-learning. 301-310 - Clément Robert, Jérémie Guiochet, Hélène Waeselynck, Luca Vittorio Sartori:
TAF: a Tool for Diverse and Constrained Test Case Generation. 311-321 - Sen Yang, Yifan Huang, Song Huang, Zhanwei Hui, Changyou Zheng:
Target Code-coverage and Efficiency in APP Automatic Compatibility Testing Based on Code Analysis. 322-327 - Cyrille Artho, Adam Benali, Rudolf Ramler:
Test Benchmarks: Which One Now and in Future? 328-336 - Run Luo, Song Huang, Meijuan Wang, Jinchang Hu, Jinhu Du:
Unit Crowdsourcing Software Testing of Go Program. 337-346 - Qi Yao, Fuping Zeng, Yizhuo Zhang, Minghao Yang, Zhiyu Duan, Shunkun Yang:
A Simulation based Intelligent Analysis Framework of Aircraft Reliability, Resilience and Vulnerability. 347-356 - Qing Liu, Linjie Pan, Baoquan Cui, Jun Yan, Jian Zhang:
Dynamic Detection of AsyncTask Related Defects. 357-366 - Haowen Chen, Xiao-Yuan Jing, Baowen Xu:
Heterogeneous Defect Prediction through Joint Metric Selection and Matching. 367-377 - Zhe Liu, Rui Kang:
Multiple Error Types Software Belief Reliability Growth Model Based on Uncertain Differential Equation. 378-387 - Ning Luo, Yue Xiong:
Platform Software Reliability for Cloud Service Continuity - Challenges and Opportunities. 388-393 - Zixiang Wang, Siwei Zhou, Dongdong Zhao, Jianwen Xiang:
Reliability-redundancy allocation problem considering imperfect fault coverage. 394-403 - Jiahui Liang, Weiqin Zou, Jingxuan Zhang, Zhiqiu Huang, Chenxing Sun:
A Deep Method Renaming Prediction and Refinement Approach for Java Projects. 404-413 - Tong Xu, Hua Li, Yunfei Bai:
An Online Model Integration Framework for Server Resource Workload Prediction. 414-421 - Sneh Patel, Brendan Park, Naser Ezzati-Jivan, Quentin Fournier:
Automated Cause Analysis of Latency Outliers Using System-Level Dependency Graphs. 422-433 - Amirali Amiri, Uwe Zdun, André van Hoorn, Schahram Dustdar:
Automatic Adaptation of Reliability and Performance Trade-Offs in Service- and Cloud-Based Dynamic Routing Architectures. 434-445 - Jianshu Ding, Guisheng Fan, Huiqun Yu, Zijie Huang:
Automatic Identification of High Impact Bug Report by Test Smells of Textual Similar Bug Reports. 446-457 - Diwei Chen, Beijun Shen, Yuting Chen:
ConLAR: Learning to Allocate Resources to Docker Containers under Time-Varying Workloads. 458-469 - Sunjae Kwon, Duksan Ryu, Jongmoon Baik:
eCPDP: Early Cross-Project Defect Prediction. 470-481 - Dingbang Fang, Shaoying Liu, Ai Liu:
EPR: a Neural Network for Automatic Feature Learning from Code for Defect Prediction. 482-492 - Dapeng Yan, Yuqing Niu, Kui Liu, Zhe Liu, Zhiming Liu, Tegawendé F. Bissyandé:
Estimating the Attack Surface from Residual Vulnerabilities in Open Source Software Supply Chain. 493-502 - Eunseob Kim, Jongmoon Baik, Duksan Ryu:
Heterogeneous Defect Prediction through Correlation-Based Selection of Multiple Source Projects and Ensemble Learning. 503-513 - Fehmi Jaafar, Darine Ameyed, Amine Barrak, Mohamed Cheriet:
Identification of Compromised IoT Devices: Combined Approach Based on Energy Consumption and Network Traffic Analysis. 514-523 - Daniel Afriyie, Yvan Labiche:
Predictors of Software Metric Correlation: A Non-parametric Analysis. 524-533 - Mario Blaum, Paul Muench:
Reliability of Centralized vs. Parallel Software Models for Composable Storage Systems. 534-542 - Chen Lang, Jidong Li, Takashi Kobayashi:
Software Defect Prediction via Multi-Channel Convolutional Neural Network. 543-554 - Haifeng Li, Chang Liu, Huancheng Su:
The bidirectional safety analysis & validation framework of system and software with its techniques and applications. 555-563 - Jingchi Wu, Tadashi Dohi, Hiroyuki Okamura:
W-SRAT: Wavelet-based Software Reliability Assessment Tool. 564-573 - Sofien Boutaib, Maha Elarbi, Slim Bechikh, Fabio Palomba, Lamjed Ben Said:
A Possibilistic Evolutionary Approach to Handle the Uncertainty of Software Metrics Thresholds in Code Smells Detection. 574-585 - Davide Ginelli, Oliviero Riganelli, Daniela Micucci, Leonardo Mariani:
Exception-Driven Fault Localization for Automated Program Repair. 598-607 - Zhengyuan Wei, W. K. Chan:
Fuzzing Deep Learning Models against Natural Robustness with Filter Coverage‡. 608-619 - Matteo Marra, Guillermo Polito, Elisa Gonzalez Boix:
Practical Online Debugging of Spark-like Applications. 620-631 - Nhat-Hoa Tran, Toshiaki Aoki:
SSpinJa: Facilitating Schedulers in Model Checking. 632-641 - Maximilian Willembrinck, Steven Costiou, Anne Etien, Stéphane Ducasse:
Time-Traveling Debugging Queries: Faster Program Exploration. 642-653 - Omar I. Al-Bataineh, Anastasiia Grishina, Leon Moonen:
Towards More Reliable Automated Program Repair by Integrating Static Analysis Techniques. 654-663 - Azin Piran, Che-Pin Chang, Amin Milani Fard:
Vulnerability Analysis of Similar Code. 664-671 - Jie Qian, Xiaolin Ju, Xiang Chen, Hao Shen, Yiheng Shen:
AGFL: A Graph Convolutional Neural Network-Based Method for Fault Localization. 672-680 - Haoren Wang, Haochen Jin, Zhanqi Cui, Rongcun Wang:
CBFL: Improving Software Fault Localization by Analyzing Statement Complexity. 681-690 - Xu Lu, Cong Tian, Bin Yu, Zhenhua Duan:
Improving Quality of Counterexamples in Model Checking via Automated Planning. 691-701 - Xiao Kan, Cong Sun, Shen Liu, Yongzhe Huang, Gang Tan, Siqi Ma, Yumei Zhang:
Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking. 702-713 - Guoliang Dong, Jun Sun, Xingen Wang, Xinyu Wang, Ting Dai:
Towards Repairing Neural Networks Correctly. 714-725 - Zijie Chen, Tao Zhang, Xiao Peng:
A Novel API Recommendation Approach By Using Graph Attention Network. 726-737 - Jing Yu, Chenguang Mao, Xiaojun Ye:
A Novel Tree-based Neural Network for Android Code Smells Detection. 738-748 - Yu-Lun Huang, Ching-Yu Hung, Hsiao-Te Hu:
A Protocol-based Intrusion Detection System using Dual Autoencoders. 749-758 - Xueyong Tan, Jing Liu:
ACLM: Software Aging Prediction of Virtual Machine Monitor Based on Attention Mechanism of CNN-LSTM Model. 759-767 - Jinfu Chen, Shang Yin, Saihua Cai, Chi Zhang, Yemin Yin, Ling Zhou:
An Efficient Network Intrusion Detection Model Based on Temporal Convolutional Networks. 768-775 - Siao-Fang Lin, Chin-Yu Huang, Neil C. Fang:
Applying a Deep-Learning Approach to Predict the Quality of Web Services. 776-785 - Jianwei Zeng, Tao Zhang, Zhou Xu:
DG-Trans: Automatic Code Summarization via Dynamic Graph Attention-based Transformer. 786-795 - Alexander Zimin, Igor Mishchenko, Rebecca Steinert:
Event stream classification with limited labeled data for e-commerce monitoring. 796-806 - Junfeng Tian, Chenxin Wang, Zhen Li, Yu Wen:
Generating Adversarial Examples of Source Code Classification Models via Q-Learning-Based Markov Decision Process. 807-818 - Ben Tang, Bin Li, Lili Bo, Xiaoxue Wu, Sicong Cao, Xiaobing Sun:
GrasP: Graph-to-Sequence Learning for Automated Program Repair. 819-828 - Shiyi Yang, Hui Guo, Nour Moustafa:
Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network. 829-840 - Pradeep K. Mahato, Apurva Narayan:
MINTS: Unsupervised Temporal Specifications Miner. 841-851 - Jiandong Li, Shaoying Liu, Ai Liu, Runhe Huang:
Multilevel Traceability Links Establishments Between SOFL Formal Specifications and Java Codes Using Multi-dimensional Similarity Measures. 852-863 - Franz Wotawa, Herbert Mühlburger:
On the Effects of Data Sampling for Deep Learning on Highly Imbalanced Data from SCADA Power Grid Substation Networks for Intrusion Detection. 864-872 - Meng Zhang, Chuanqi Tao, Hongjing Guo, Zhiqiu Huang:
Recovering Semantic Traceability between Requirements and Source Code Using Feature Representation Techniques. 873-882 - Chunsheng An, Jingtong Sun, Yifeng Wang, Qingjie Wei:
A K-means Improved CTGAN Oversampling Method for Data Imbalance Problem. 883-887 - Hao Chen, Song Huang, Yuchan Liu, Run Luo, Yifei Xie:
An Effective Crowdsourced Test Report Clustering Model Based on Sentence Embedding. 888-899 - Jianmin Zhang, Tiejun Li, Siqing Fu:
An Incomplete Unsatisfiable Cores Extracting Algorithm to Promote Routing. 900-905 - Yongchao Wang, Yu Zhou, Taolue Chen, Jingxuan Zhang, Wenhua Yang, Zhiqiu Huang:
Hybrid Collaborative Filtering-Based API Recommendation. 906-914 - Zhenyu Pan, Tianyuan Hu, Chen Qian, Bixin Li:
ReDefender: A Tool for Detecting Reentrancy Vulnerabilities in Smart Contracts Effectively. 915-925 - Bo Jiang, Yifei Chen, Dong Wang, Imran Ashraf, W. K. Chan:
WANA: Symbolic Execution of Wasm Bytecode for Extensible Smart Contract Vulnerability Detection. 926-937 - Cristina Aguilera González, Laia Albors Zumel, Jesús Antoñanzas Acero, Valentina Lenarduzzi, Silverio Martínez-Fernández, Sonia Rabanaque Rodríguez:
A preliminary investigation of developer profiles based on their activities and code quality: Who does what? 938-945 - Dandan Wang, Qing Wang, Junjie Wang, Lin Shi:
Accept or Not? An Empirical Study on Analyzing the Factors that Affect the Outcomes of Modern Code Review? 946-955 - Elaine Venson, Ting Fung Lam, Bradford K. Clark, Barry W. Boehm:
Analyzing Software Security-related Size and its Relationship with Vulnerabilities in OSS. 956-965 - Alvi Jawad, Jason Jaskolka:
Analyzing the Impact of Cyberattacks on Industrial Control Systems using Timed Automata. 966-977 - Xin Zhang, Jiwei Yan, Baoquan Cui, Jun Yan, Jian Zhang:
Are the Scala Checks Effective? Evaluating Checks with Real-world Projects. 978-989 - Juanjuan Shen, Yu Zhou, Yongchao Wang, Xiang Chen, Tingting Han, Taolue Chen:
Evaluating Code Summarization with Improved Correlation with Human Assessment. 990-1001 - Eduardo Mendes, Fábio Petrillo:
Log severity levels matter: A multivocal mapping. 1002-1013 - Eduardo Andreetta Fontana, Fábio Petrillo:
Mapping breakpoint types: an exploratory study. 1014-1023 - Ya Gao, Wenhui Zhang, Xue-Yang Zhu:
Multi-Agent Automata and Its Application to LDLK Satisfiability Checking. 1024-1035 - Francisco Ribeiro, Rui Abreu, João Saraiva:
On Understanding Contextual Changes of Failures. 1036-1047 - Pascal Gadient, Pascal Gerig, Oscar Nierstrasz, Mohammad Ghafari:
Phish What You Wish. 1048-1059 - Keiin Sa, Yu Bai, Chenggang Wang:
Research on Mining of Government Data Based on Enhanced-Object Exchange Model. 1060-1068 - Kaiqi Liu, Ji Wu, Haiyan Yang, Qing Sun, Ruiyuan Wan:
SRTEF: Automatic Test Function Recommendation with Scenarios for Implementing Stepwise Test Case. 1069-1078 - Emilio Rivera-Landos, Foutse Khomh, Amin Nikanjam:
The Challenge of Reproducible ML: An Empirical Study on The Impact of Bugs. 1079-1088 - Ekincan Ufuktepe, Tugkan Tuglular, Kannappan Palaniappan:
The Relation between Bug Fix Change Patterns and Change Impact Analysis. 1089-1099 - Abraham Chan, Niranjhana Narayanan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan:
Understanding the Resilience of Neural Network Ensembles against Faulty Training Data. 1100-1111
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.