default search action
24th QRS 2024: Cambridge, UK - Companion
- 24th IEEE International Conference on Software Quality, Reliability, and Security, QRS - Companion, Cambridge, United Kingdom, July 1-5, 2024. IEEE 2024, ISBN 979-8-3503-6565-8
- Boyuan Li, Duo Li, Chao Guo, Jianghai Li, Xiaojin Huang:
Heuristics for Strongly Killing Mutants in Software Mutation Testing. 1-10 - Hajar Homayouni, Maryam Mary Pourebadi, Steven T. Nguyen, Mohammad Hashemi, Hossein Shirazi:
Comprehensive Functional ETL Testing Methodologies for Real-World Data. 11-20 - Yi Liu, Lizhi Cai, Chenchen Chai, Yuan Ma:
An Approach to Optimize Symbolic Execution in Ethereum Smart Contracts. 21-30 - Zhahao Li, Jinfu Chen, Haibo Chen, Leyang Xu, Wuhao Guo:
Detecting Bias in LLMs' Natural Language Inference Using Metamorphic Testing. 31-37 - Viraj Rohit Gala, Martin A. Schneider, Marvin Vogt:
Towards an Evaluation Methodology of ML Systems from the Perspective of Robustness and Data Quality. 38-46 - Ilias Kalouptsoglou, Miltiadis G. Siavvas, Apostolos Ampatzoglou, Dionysios D. Kehagias, Alexander Chatzigeorgiou:
Vulnerability Classification on Source Code Using Text Mining and Deep Learning Techniques. 47-56 - Ramon Barakat, Paul Weiß, Jasper Von Blanckenburg, Roman Kraus, Martin A. Schneider:
Enhancing Software Security Analysis: Targeted Test Case Generation through Constraint Solving in Interactive Application Security Testing. 57-63 - Tianyue Sun, Lina Gong, Jingxuan Zhang, Mingqiang Wei:
An Empirical Study on the Characteristics of Connected Knowledge Subgraphs on Stack Overflow. 64-73 - Haiyang Wang, Yihao Li, Yue Wang, Pan Liu, Pengxiao Li:
Navigating the Risks: A Review of Safety Issues in Large Language Models. 74-83 - Yi Yang, Manxian Liu, Kun Jia, Wenjie Dong, Jian Wang:
Towards LLM-Enhanced Digital Twins of Intelligent Computing Center. 84-89 - Jônatas A. Silva, Talles H. Medeiros, Fabrício Góes:
Large Language Models on Solving Integral Calculus Problems. 90-93 - Jingyu Yang, Hao Xu, Rongxiao Wang, Xuran Ming, Shoubin Li:
Generating Evaluation Criteria of Domain-Specific Large Language Model Using Word Vector Clustering. 94-100 - Fang Li, Yubin Qu, Chao Feng, Xianzhen Dou, Long Li:
A Fine-Grained Emotion Prediction Method Based on Large Language Models. 101-110 - Jingjing Guo, Xi Han:
Research on Intelligent Relic Interpretation System Based on a Large Language Model. 111-116 - M. Guzman, R. Bouchekir, A. Cook, J. Haindl:
On Safety Assurance of Symbolic Artificial Intelligence. 117-124 - Wenyao Xue, Qingwei Ren, Yichen Wang:
An Empirical Study on Modeling Testing Requirements for Safety-Critical Software. 125-134 - Ying Zhao, Yi Zhu, Li Zhao, Zexin Li, Chan Yin:
ADS Modeling and Safety Verification in Extreme Driving Scenarios. 135-144 - Zexin Li, Yi Zhu, Li Zhao, Ying Zhao:
Safety decision of autonomous driving behavior based on Bayesian network and its verification method. 145-153 - Yafeng Shen, Lianzhi Qi, Shiyong Li, Siyou Ma, Fei Deng:
A SSCPS safety assessment method based on mission risk. 154-162 - Tse-Chuan Hsu, Han-Sheng Lu:
Exploring the Efficacy of Dynamic Approaches in Database Encryption and Translational Security. 163-169 - Ying Gao, Ruiying Li, Rui Kang:
Capacity and Time Reliability Evaluation for Time-Varying Networks. 170-176 - Zhangjun Lu, Wei Zhang, Hao Xu, Jianhui Jiang:
A Reliability Benchmarking Method for Linux. 177-186 - Qiuying Li, Limeng Zhang, Shuo Liu:
A-TCN: Attention-Based TCN for OSS Reliability Prediction on High-Dimensional Fault Dataset. 187-195 - Fatemeh Erfan, Martine Bellaïche, Talal Halabi:
Efficient Detection of Selfish Mining Attacks on Large-Scale Blockchain Networks. 196-205 - Luyao Zhang, Yutong Quan, Jiaxun Cao, Kyrie Zhixuan Zhou, Xin Tong:
Leveraging Social Media Sentiments and Ethical Signals for NFT Valuation. 206-215 - Yutong Quan, Xintong Wu, Wanlin Deng, Luyao Zhang:
Decoding Social Sentiment in DAO: A Comparative Analysis of Blockchain Governance Communities. 216-224 - Yulin Liu, Luyao Zhang:
The Economics of Blockchain Governance: Evaluate Liquid Democracy on the Internet Computer. 225-231 - Huang Zhou, Yongqiang Chen, Jiangchen Zhou, Wenxuan Wang:
Blockchain Implementation for Visual Art Copyright Protection. 232-239 - Qi Shao, Shunkun Yang, Yijing Zhou, Dan Lu, Qi Yao:
Complex Network Theory-based Deep Neural Network Degradation Analysis in the Context of Bit Attack. 240-249 - Mert Dedekoy, Alper Sen:
DeepDTS: Diverse Test Selection Method for Deep Neural Networks. 250-259 - Yijing Zhou, Shunkun Yang, Qi Shao, Yuhao Zhang:
Bit Attacking Deep Neural Networks Based on Complex Networks Theory. 260-268 - Jiyuan Sun, Haibo Yu, Jianjun Zhao:
Generating Adversarial Examples Using Parameter-Free Penalty Method. 269-278 - Wei Huang, Yuan Gao, Xiangling Fu, Zhiyi Song:
MFTCN: A Multi-Frequency Temporal Convolutional Network for Enhancing Temperature Prediction Dependability. 279-288 - Reynaldo Joshua Salaki, Sanguk Park, Kihyeon Kwon:
Solar Panel Fault Detection: Applying Convolutional Neural Network for Advanced Fault Detection in Solar-Hydrogen System at University. 289-298 - Imen Chebbi, Sarra Abidi, Leila Ben Ayed:
Behavioral System Using SVM and CNN for Karate Injury Detection and Rehabilitation Process. 299-307 - Lu Wei, Chaojie Yang, Zhong Ma, Qin Yao:
Rapid Accuracy Loss Evaluation for Quantized Neural Networks Using Attention-Based Multifactor Modeling. 308-315 - Reynaldo Joshua Salaki, Sanguk Park, Kihyeon Kwon:
AI-Driven Green Campus: Solar Panel Fault Detection Using ResNet-50 for Solar-Hydrogen System in Universities. 316-325 - Shahzad Nayab, Franz Wotawa:
Testing and Reinforcement Learning - A Structured Literature Review. 326-335 - Shou-Yu Lee, William Cheng-Chung Chu, Yao-Hsien Tseng, You-Gang Zhang, Hung-Lung Tsai:
Explainable AI Applied in Healthcare: A Case Study of Diabetes Prediction. 336-344 - Ruiyang Li, Jing Zhu, Xiaohu Luo, Zhao Ma:
Image Tampering Detection Method Based on Multi-Feature Fusion. 345-356 - Yunlong Zhong, Zhenglin Liang:
Granger Causality Analysis Between Sensor Data Based on Deep Gaussian Process Model. 357-362 - José A. Esquivel, Bradley Aldous, Ahmed M. Abdelmoniem, Ahmad Alhilal, Linlin You:
Performance Profiling of Federated Learning Across Heterogeneous Mobile Devices. 363-372 - Chi Zhang, Jinfu Chen, Saihua Cai, Jingyi Chen, Chunlei Huang:
JFuzzer: Detecting Optimization Errors in JavaScript Just-In-Time Compilers. 373-382 - Koko Harianto, Feng-Jian Wang, Mahmoud M. Abouzeid:
Enhancing Incremental Dataflow Analysis in an IDE. 383-390 - Zixin Wu, Xiaoyun Zhou, Yi Zhu, Chenyu Wang, Guosheng Hao:
A Privacy Leakage Detection Method for Personalized Course Recommendation Based on Pi-Calculus. 391-400 - Fanjiang Xu, Zeyu Sun:
Defect-Introducing Defect Prediction Testing. 401-410 - Yuxing Liu, Jiaxi Li, Haiyang Wu, Xuchuan Zhou, Hengyuan Liu:
Using $\mu \text{Bert}$ to Improve Mutation-Based Fault Localization for Novice Programs. 411-416 - Bin Du, Jize Yang, Shumei Wu, Zhanwen Zhang, Yong Liu:
Enhancing Programming Competition Performance: A Data-Driven Approach to Personalized Training. 417-422 - Xibing Yang, Guanglu Zhou, Xiaowei Guo:
Design and Application of Ship Information System Development Platform Architecture Based on OSGi. 423-431 - Zhongxi Wang, Shen Lil, Zhong Ma, Qin Yao:
High Accurate, Low Latency Conversion of Spiking Neural Networks with BLIF Neurons. 432-440 - Zhiqiang Zhu, Shikui Wang, Chengwen Li, Wei Zheng:
Failure Modelling and Analysis of Airborne Video Transmission System Based on Data Reliability. 441-446 - Shilong Zhang, Dongcheng Li, Man Zhao, Hui Li, W. Eric Wong:
Search-Based Automated Program Repair: A Survey. 447-456 - Shiyu Liu, Dongfang Li, Guang Yang, Mingyue Su, Wei Shen:
Research of Military Cyber Operation Forensic and Analysis in Russia-Ukraine Conflict. 457-463 - Ayodeji Ogundiran, Hongmei Chi, Jie Yan, Ruth Agada:
Advancing Forensic Examination of Cyber Predator Communication Through Machine Learning. 464-473 - Oluwatoyin Akinbi, Hongmei Chi, Jie Yan, Edward L. Jones:
Deciphering Livestream Contents: OCR-Driven Thumbnail Forensic Analysis. 474-483 - Mingfu Tuo, Wenliang Wu, Hongmei Zhang, Yongmei Zhao:
Review of Key Attribute Analysis and Verification Techniques for CPS. 484-487 - Pengpeng Sun, Bohan Shao, Wenliang Wu, Hongming Zhang:
Evaluating Importance of Nodes in Interdependent Networks. 488-499 - Jiayin Qi, Kun Jia, Yuxin Zhang, Xiaobing Feng, Haiyan Yan:
Wuli-Shili-Renli-Jili System Approach and Its Application in Large Model Value Alignment. 500-506 - Qing Cai, Beibei Yin, Jing-Ao Shi:
CGFuzz: A Dynamic Test Case Generation Method for DL Framework Based on Function Coverage. 507-516 - Ruifeng Li, Yanwen Liu, Chunjia Zhu, Zenghui Zhou, Zheng Zheng:
Adaptive Metamorphic Testing for Object Detection Systems. 517-526 - Yanwen Liu, Ruifeng Li, Hao Tao, Zheng Zheng:
Test Adequacy Criteria for Metamorphic Testing. 527-534 - Boxuan Wu, Jia Song, Chaoyue Zhao, Yunlong Hu, Weize Shang:
Fault Diagnosis Using Channelized Encoder-Decoder Frame for Distributed Redundant Inertial Navigation System. 535-543 - Zhijie Feng, Yu Lin, Chuqi Guo, Jianwen Xiang:
A Human-Machine Intervention Model of Autonomous Driving Vehicle. 544-553 - Chengfang Tan, Jun Ling, Shanshan Li, Wenquan Tian:
Sentiment Analysis of Comment Texts Based on Deep Learning. 554-558 - Weichao He, Yi Zhu, Mei Song, Zixin Wu, Guosheng Hao:
A Dynamic Interest-Aware Message-Passing GCN for Recommendation. 559-568 - Mengting Sun, Jun Li, Jiang Liu, Xiaohan Yang:
MTPI: Multimodal Trajectory Prediction for Autonomous Driving via Informer. 569-576 - Shunqing Xu, Shumei Wu, Zheng Li, Luxi Fan, Yong Liu:
Predictive Mutation-Based Fault Localization: Balancing Effectiveness and Cost. 577-582 - Xi Ding, Yi Zhu, Qiao Yu, Chongyang Huang:
A Model-Agnostic Interpretability Approach Based on Enhanced Hierarchical Clustering. 583-590 - Fan Zhang, Haoran Huang, Hongwu Lv, Meijuan Jia, Juntao Liu:
Soft Actor-Critic Based Anti-Attack XSS Detection. 591-600 - Chao-Nan Song, Yi Cao, Jin Jin, Qiong-Ying Fu, Rong-Sen Li, Hai-Bo Wang:
A Visualization Method for Association Analysis and Fusion Based on Large-Scale Polymorphic Information. 601-610 - Xule Gao, Rui Wang, Zhaohui Liu, Yi Ren:
A Land-Based War-Gaming Simulation Method Based on Multi-Agent Proximal Policy Optimization. 611-618 - Changjun Li, Jingyu Yang, Xi Wu, Guangwen Yang:
Analysis of Reliable Architecture Techniques for Adaptive Adversarial Systems of System. 619-624 - Yuanyuan Zhang, Yifan Du, Yichen Wang:
Effects of $\boldsymbol{L}_{\boldsymbol{p}}$-norm Deficits in Quantization Human Perception on Attack Methods. 625-632 - Xie Dong, Hu Yang, Qin Li, Zhang Jianfeng:
Implications for Running AI Applications on Serverless Platforms. 633-642 - Zhen-Yu Ma, Xiao-Yuan He, Sui-Ke Li, Chi Wang, Chao Zhang:
Research on Simulation System Software Reliability Demonstration Testing Scheme Based on Nonparametric Method. 643-650 - Kairui Wang, Yawen Wang, Xi Wu, Shoubin Li, Qing Wang:
Do Agents Behave Aligned with Human Instructions? - An Automated Assessment Approach. 651-660 - Jinpeng Li, Shanshan Jiao, Shengming Guo, Xiangfeng Luo:
Temporal Knowledge Graph Reasoning with Dual Guiding Constraints. 661-669 - Jinfu Chen, Yucheng Wu, Haibo Chen, Jingyi Chen, Ernest Akpaku:
QAQA-SS: An Improved Fuzzing Approach with Seed Scheduling Based on the UCB Algorithm for QA Systems. 670-679 - Saif Ur Rehman Khan, Maha Younus, Javed Iqbal, Muhammad Abdul Basit Ur Rahim:
A Fuzzy AHP-based Quantitative Framework to Prioritize the Crowd-Based Requirements. 680-691 - Hongwu Qin, Kexin Tang, Xiuqin Ma, Xuli Niu, Yijin Zheng:
An IT Community Code Quality Ranking Model Based on Sentiment Analysis and Fuzzy Multi-Attribute Decision-Making. 692-698 - Yadi Hu, Jinlong Tao, Yu Liang, Zhewei Xu, Zhangtao Jia:
Research on the Impact of Tester's Technical and Cognitive Factors on Aerospace Software Test Quality. 699-703 - Yiming Gao, Xiaopeng Yang, Tong Wu, Yuqian Zhou:
Histogram Publication with Shuffled Differential Privacy. 704-708 - Yucheng Zhang, Chenqiang Shen, Xiaolin Ju, Hao Shen, Xiang Chen:
Ada4DP: Adversarial Enhanced Dual-Attentive Aggregation Learning for Defect Prediction. 709-718 - Sufan Zhang, Yuanxiang Yang, Ziuuan Wang:
Why Students Write Low-Quality Unit Testing Scripts: An Empirical Study from Software Testing Skill Competitions. 719-720 - Siwei Zhou, Xiaohong Peng, Yinghuai Yu, Yubin Qu, Ting Zeng:
Reliability Evaluation of Classroom Teaching with MCI in College Based on the DFT Model. 721-726 - Fumin Liu, Yuezhong Wu, Haiyang Huang, Xuehao Shen, Jiefu Deng:
LMSA: Lightweight Multi-Scale Attention Model for Garbage Detection Based on YOLOV5. 727-736 - Xinpan Yuan, Jiabao Li, Zhiqi Zhang, Zhigao Zeng, Qiang Liu:
Syntax-Dependency Orientation Guided Vision-and-Language Transformer for Image-Text Matching. 737-745 - Shiyu Tao, Qi Liu, Yonghong Zhang, Xiaodong Liu:
High Intensity Radar Echo Extrapolation Based on Stacked Generative Structure. 746-751 - Yucheng Zhao, Guangyu Wang, Mingxu Sun, Zhonghua Zhao, Yan Yan:
Methods for Removing Artifacts from EEG signals: A review. 752-758 - Guangyu Wang, Yucheng Zhao, Mingxu Sun, Wenhua Dong, Shiwei Zhu:
Different Control Methods for FES Cycling: Review. 759-766 - Zhihong Zeng, Dong-Meau Chang, Tse-Chuan Hsu, Zhou Liang:
The Most Important Factors Chosen in Medical Clinical Data by Using Multi-Facet Clustering Variational Autoencoders (MFCVAE). 767-771 - Ping Yang, Shiwei Zhu, Oleksandr Koval, Yanqing Zhao, Junfeng Yu:
Evolutionary Review of Research Themes in Functional Electrical Stimulation with in the Rehabilitation Medicine Field. 772-778 - Ru Ji, Qi Liu, Yonghong Zhang, Xiaodong Liu:
A New Improved Method of Recurrent Memory Perception for Radar Echo Extrapolation. 779-785 - Zhilu Wang, Haiyang Lin, Qi Liu, Yonghong Zhang, Xiaodong Liu:
FedCST: Federated Learning on Heterogeneous Resource-constrained Devices Using Clustering and Split Training. 786-792 - Xinpan Yuan, Yuan Guo, Changhong Zhang, Zhigao Zeng:
Automatic Generation of Diagnostic Reports for Nasal Endoscopy Images: A Topic-Aware Multimodal Recurrent Model. 793-802 - Yaping Zhang, Jingguo Rong, Zhiran Gao, Su Zhang, Zhuoqun Zhang:
Research on Intelligent Recognition and Analysis of Power Grid Infrastructure Construction Based on YOLO. 803-807 - Wen-Li Wang, Shahid Hussain, Nathaniel V. Rondinelli, Mei-Huei Tang, Saif Ur Rehman Khan:
Recursive Generation of Multi-Qubits Control Gate to Facilitate the Grover's Quantum Algorithm in Large Scale Database Search. 808-815 - Fengjiao He, Chi Hu, Wansheng Yang, Hao Zhang, Fei Deng:
A Fuzzing Method for Embedded Bus Based on Dynamic Mutation of Message Sequences. 816-822 - Shasha Wu, Shiyong Li, Yanhong Peng, Siyou Ma, Fei Deng:
A Data Constraint Analysis Method for Full-Digital Simulation Test. 823-829 - Shiyong Li, Fei Deng, Xinglin Guo, Zhenxiao Sun, Zhuoliang Zou:
Research on Program Change Impact Analysis Methods Based on Software Networks. 830-838 - Ke Ding, Ziyuan Wang, Weifeng Zhang:
Directed Fuzzing with Adaptive Path Guidance and Weighted Distribution. 839-848 - Wenxuan Huang, Changsheng Ma, Ziyuan Wang:
The Effect of Variable Strength Combinatorial Coverage for Neurons on Fault Detection in Deep Neural Networks. 849-855 - Haocheng Guan, Dongcheng Li, Hui Li, Man Zhao, W. Eric Wong:
A Review of the Applications of Heuristic Algorithms in Test Case Generation Problem. 856-865 - Mengdan Wu, Daoyi Li, Yishen Zhao, Lei Liu:
Hybrid Attention Based Spatiotemporal Neural Network in Lifetime Prognostics of Lithium Batteries. 866-871 - Yujia Li, Canwei Shi, Zhiyu Duan, Fang Liu, Minghao Yang:
Fine-tuning BERT for Intelligent Software System Fault Classification. 872-879 - Meng Tian, Shihai Wang, Wentao Wu, Wandong Xie:
A Novel Approach for Software Defect Prediction Through Relational Association Rules Based on Cost-Sensitive Learning. 880-886 - Yue Cheng, Zhongyu Ding, Shaoqiang Zhang:
Finite Time-Based Adaptive Terminal Sliding Mode Fault-Tolerant Control for Port Automated Guided Vehicles. 887-895 - Tengfei Shi, Shihai Wang, Haoran Li, Shudi Guo, Yu Liu:
Generating Adversarial Samples Based on the Attack Robust Training Model. 896-901 - Yingxian Guo, Shihai Wang, Dong An, Yu Luo:
StasogFL: A Fault Localization Method Based on Statement Association Graph. 902-909 - Xuan Li, Qi Shao, Yuan Zhang, Jiangnan Wang:
An Ensemble Feature Selection Method Based on Symmetrical Uncertainty and Correlation for Software Defect Prediction. 910-919 - Xiaoliang Li, Yujia Li, Fang Liu, Fuping Zeng:
Research on the Integration Method of Software Static Testing Tools Based on Machine Learning. 920-925 - Tu Sun, Fuping Zeng, Xiaoze Liu:
A Fault Analysis and Reasoning Method for Vehicle Information Systems Based on Knowledge Graphs. 926-933 - Wentao Wu, Shihai Wang, Yuanxun Shao, Wandong Xie:
Software fault localization based on eigenvector centrality in complex network theory. 934-939 - Junhao Su, Xiangyang Qi, Jiamin Deng, Wenke Chen, Hongfeng Yan:
Aircraft Pose Perception Technology Based on Tire Detection for Automatic Docking of Towbarless Aircraft Tractors. 940-945 - Nan Ma, Genbao Xu, Yiheng Han, Beining Sun:
SA-P2T: Sparse Attention-based Pyramid Pooling Transformer Network for Object Detection. 946-951 - Jiaxing Li, Yanzhao Su, Mengmeng Yang, Zonghui Li, Jin Huang, Zhihua Zhong:
Topology Design of Electronic and Electrical Architecture for Time-Sensitive Network. 952-961 - Longjie Fan, Duanling Li, Linjie Ren, Xiao Su, Jin Huang:
Constraint-Following Robust Control for Flying Car: A Model-Based Approach. 962-969 - Kunkun Hao, Wen Cui, Lu Liu, Yuxi Pan, Zijiang Yang:
Integrating Data-Driven and Knowledge-Driven Methodologies for Safety-Critical Scenario Generation in Autonomous Vehicle Validation. 970-981 - Yingjun Qiao, Xingyu Li, Mengmeng Yang, Jin Huang, Zhihua Zhong:
Enhancing Traffic Safety at Unsignalized Intersections Through Constraint-Chain Based Cooperative Control. 982-989 - Ali Shakeri:
Formalization of Operational Domain and Operational Design Domain for Automated Vehicles. 990-997 - Bo Wang, Yuerui Qi, Jin Huang, Zhihua Zhong:
Research on Parametric Generation of Automobile Styling Based on Grasshopper. 998-1003 - Zheng Fu, Yuhang Xu, Mengmeng Yang, Jin Huang, Diange Yang, Zhihua Zhong:
Immersive Traffic Interactive Simulator for Multi-Agent. 1004-1013 - Xuewei Tang, Mengmeng Yang, Kun Jiang, Jin Huang, Diange Yang:
UrbanME: A New Benchmark for HD Map Elements Extraction in Urban Traffic Scenes. 1014-1021 - Xuejun Liu, Xuerui Wang, Zhaichao Tang, Zikang Du, Zhen Chen:
An Algorithm Based on Monocular Vision for Unsafe Behavior Recognition of Human-Object Interaction in Inspection Vehicles for Hazardous Chemical Storage. 1022-1031 - Xuejun Liu, Xu Zhao, Zhongji Cui, Tianke Lei, Songbo Zhang:
Research on the Construction Method of Multimodal Dataset for Hazardous Chemicals Warehouse Applied to Inspection Vehicle. 1032-1037 - Hui Zhao, Xin Li, Cheng Xu, Bingxin Xu, Hongzhe Liu:
A Survey of Automatic Driving Environment Perception. 1038-1047 - Zhiming Zhang, Jun Zhang, Yuansheng Liu:
MRM-LOOP: A Dynamic Visual Loop Closure Detection Algorithm Based on Motion Region Matching. 1048-1055 - Yangyang Fan, Yuansheng Liu:
Pedestrian Detection Method Based on Fusion of LIDAR and Camera. 1056-1061 - Nan Ma, Shangyuan Li, Yiheng Han, Mohan Wang:
PreBEV: Leveraging Predictive Flow for Enhanced Bird's-Eye View 3D Dynamic Object Detection. 1062-1066 - Anika Anwar, Nilesh Chakraborty, Mohammad Zulkernine:
Secure OTA Software Updates for Connected Vehicles Using LoRaWAN and Blockchain. 1067-1076 - Anika Anwar, Talal Halabi, Mohammad Zulkernine:
Cooperative Defense-in-Depth in Large-Scale Autonomous Vehicle Networks. 1077-1088 - Donghwan Shin, Sanjeetha Pennada:
Towards Simplification of Failure Scenarios for Machine Learning-Enabled Autonomous Systems. 1089-1090 - Nassim Sohaee:
Public Perception Toward Tesla Fatal Accidents: Neural Network Approach. 1091-1096 - Ruchika Gupta:
The Battle of Ethics in Autonomous Vehicles. 1097-1105 - Zhaojing Wang, Li Li, Bangchao Wang, Ruiqi Luo, Luyao Ye:
The Application of the Teaching Model of "Promoting Learning Through Competition, Promoting Teaching Through Competition" in the Course of Data Analysis and Mining. 1106-1112 - Yifan Tong, Zhaojing Wang, Xiaoyun Yan, Xinrong Hu, Lijun Li:
Industrial Process Fault Detection with Multi-View Feature Fusion Attention Mechanism Assisted Autoencoder Network. 1113-1122 - Tim Sonnekalb, Celestino Madera Castro, Bernd Gruner, Clemens-Alexander Brust, Wolfram Amme:
Vulnerability Prediction and Assessment Using Software Product Metrics and Machine Learning: What Does Not Work. 1123-1127 - Zhe Li, Zuchun Li, Jia Lu, Yimiao Zhang, Peng Ye:
YOLO-TSD: A Recognition and Detection Method for Traffic Sign Based on YOLOv5. 1128-1135 - Hongyan Wan, Teng Xiong, Zhiquan An, Xinrong Hu:
SIS: A Syntactic Information-based Span-level Model for Aspect Sentiment Triplets Extraction. 1136-1142 - Zhipeng Wang, Changxi Feng, Longfei Liu, Guotao Jiao, Peng Ye:
The Application of LLMs in the Analysis and Modeling of Software Requirements. 1143-1153 - Yuanbang Li, Jing Jiang, Chi Xu:
How to Choose a Suitable Method in Image Semantic Segmentation-An Experimental Study. 1154-1159 - Jiahui Huang, Shiyan Chen, Ziyang Weng, Huixin Ding, Li Zhao:
Preset Emotional Experience: Adaptive Detection and Complexity Interpretation of Implicit Order in Facial Emotion Recognition Calculations. 1160-1168 - Ziyi Jiang, Jingwei Zhang, Shiyan Chen, Jiahui Huang, Li Zhao:
Incarnation-Mediated: Cognitive Measurement of Virtual Scenes and Analysis of Complex Active Adaptive Behaviors in Realistic Scenography. 1169-1178 - Huixin Ding, Ziyang Weng, Ziyi Jiang, Jingwei Zhang:
Construction of Urban Governance Portrait Based on Space-Air-Ground Integrated Digital Intelligence Pedestal. 1179-1187 - Shiyan Chen, Ziyang Weng, Huixin Ding, Jiahui Huang:
Experiment on the Effectiveness of Air-Space Numerical Intelligence Modeling for National Security Strategic Information Needs. 1188-1196 - Jinha Park, Chen Li, Zhuangzhuang Dai, Christian Schlette:
Towards Safe Human-Robot Interaction: A Pilot Study on a Deep Learning-Assisted Workspace Monitoring System. 1197-1202 - Lawrence Ma, Lin Zou:
A Creative Computing Approach to Forecasting Yield Shock of Winter Wheat. 1203-1212 - He-Lin Luo, Pei-Ying Lin, Tin-Kai Chen, Andry Chowanda:
Research on the Utilization of Cloud Anchors in 5G Mobile Networks for Interactive Augmented Reality Display and Sculptural Art. 1213-1222 - Tin-Kai Chen, Li-Hua Liu:
A Case Study into Collaborative Creation with Artificial Intelligence in Art Education in Taiwan. 1223-1232 - Yinwei Liu, Yuchen Jiang:
The Colour Temperature Intensity Adjusting Model for Improving Naked Eye 3D Holographic Computer Projection. 1233-1242 - Dong Ying, Bai Yijuan:
The Impact of Digital Technology Application on Tourist Enterprise Performance: The Moderating Role of Ownership Balance Degree. 1243-1250 - Chong Zeng, Yue Wu, Zisen Zhou, Yanju Yao, Hongji Yang:
Computational Imagination in Three-Dimension Scene Synthesis. 1251-1257 - Yifei Cao, Lingfeng Hao, Zhang Hua, Xingyao Kang:
Centralization or Decentralization? How Can Digital Transformation Empowers Firm Performance? 1258-1266 - Zhao Chen:
The Interweaving of Institutional Investors, Cloud Computing Technology and Sustainable Growth of Tourism Enterprises. 1267-1274 - Cao Yifei, Hao Lingfeng, Jing Hao, Li Zuoxue:
Artificial Intelligence as a New Engine for Boosting Economic Performance of Manufacturing Enterprises. 1275-1283 - Wen-Ying Chang:
Preliminary Exploration of Intelligent Virtual Avatars in the Virtual Influencer Industry. 1284-1291 - Lu Zhang, Lin Zou, Meiyu Shi:
Immersing and Perceiving in Tourism Scenarios: The Interaction Mechanism between Digital Technologies and Tourists. 1292-1301 - Yani Liu:
Reshaping and Transforming of English Teaching in Higher Education in the ChatGPT Era: An Empirical Study Based on Big Data. 1302-1311 - Daniel Addai, Sarfraz Shaikh, Eric Xu, Wenbin Zhang, Weifeng Xu:
A Graph-Based Approach for Discovering Evidence Relationships Across Multiple Devices in Group Crimes. 1312-1313 - Alexander Fischer, Ramin Tavakoli Kolagari:
Harmonization of Security Standards for Embedded Systems in a Comprehensive Metamodel: The Security Abstraction Model. 1314-1315 - Ahmad Zayed, Amro Al-Said Ahmad:
Evaluating the Performance Resilience of Serverless Applications using Chaos Engineering. 1316-1317 - Zhenyu Mao, Jialong Li, Dongming Jin, Munan Li, Kenji Tei:
Multi-Role Consensus Through LLMs Discussions for Vulnerability Detection. 1318-1319 - Roberto Bagnara, Abramo Bagnara, Federico Serafini, Nicola Vetrini:
C-Rusted: Safe and Secure Programming in Standard C. 1320-1321 - Shaomin Zhu, Haijiao Zhao, Jiaqi Huang, Ying Xing:
Survey on the Impact of Agile Development on Software Quality. 1322-1323 - Senjie Zhang, Shan Zhou, Lu Li, Chang Jia, Jinbo Wang:
Hardware Trojan Detection with Feature Fusion. 1324-1325
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.