![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
9th SETTA 2023: Nanjing, China
- Holger Hermanns
, Jun Sun
, Lei Bu
:
Dependable Software Engineering. Theories, Tools, and Applications - 9th International Symposium, SETTA 2023, Nanjing, China, November 27-29, 2023, Proceedings. Lecture Notes in Computer Science 14464, Springer 2024, ISBN 978-981-99-8663-7 - Denghang Hu
, Zhilin Wu
:
String Constraints with Regex-Counting and String-Length Solved More Efficiently. 1-20 - Jia Geng, Ruiqi Hu, Kairong Liu, Zhihui Li, Zhikun She:
Reachability Based Uniform Controllability to Target Set with Evolution Function. 21-37 - Shaocong Han
, Yi Zhang
:
Enhancing Branch and Bound for Robustness Verification of Neural Networks via an Effective Branching Strategy. 38-54 - Zhangyue He, Yanni Tang, Kaiqi Zhao, Jiamou Liu, Wu Chen:
Graph-Based Log Anomaly Detection via Adversarial Training. 55-71 - Weijiang Hong, Zhenbang Chen
, Minglong Li, Yuhan Li, Peishan Huang, Ji Wang
:
Formal Verification Based Synthesis for Behavior Trees. 72-91 - Jintao Huang, Gaosheng Wang, Zhiqiang Shi, Fei Lv, Weidong Zhang, Shichao Lv:
SeHBPL: Behavioral Semantics-Based Patch Presence Test for Binaries. 92-111 - Zekun Ji, Shuling Wang, Xiong Xu:
Session Types with Multiple Senders Single Receiver. 112-131 - Huiyu Liu, Qichao Kong, Jue Wang, Ting Su, Haiying Sun:
Understanding the Reproducibility Issues of Monkey for GUI Testing. 132-151 - Zhiming Liu
, Jiadong Teng, Bo Liu
:
Multi-dimensional Abstraction and Decomposition for Separation of Concerns. 152-170 - Xinpeng Ni
, Yulun Wu
, Bican Xia
:
Solving SMT over Non-linear Real Arithmetic via Numerical Sampling and Symbolic Verification. 171-188 - Lingzhi Ouyang
, Yu Huang, Binyu Huang, Xiaoxing Ma:
Leveraging TLA+ Specifications to Improve the Reliability of the ZooKeeperCoordination Service. 189-205 - Weihao Su, Haiming Chen, Rongchen Li, Zixuan Chen:
Modeling Regex Operators for Solving Regex Crossword Puzzles. 206-225 - Hao Sun, Zhe Bu, Yang Xiao, Chengsheng Zhou, Zhiyu Hao, Hongsong Zhu:
Software Vulnerability Detection Using an Enhanced Generalization Strategy. 226-242 - Weidi Sun, Yuteng Lu, Xiaokun Luan, Meng Sun:
HeatC: A Variable-Grained Coverage Criterion for Deep Learning Systems. 243-261 - Xinyi Wan, Qinxiang Cao:
Formalization of Lambda Calculus with Explicit Names as a Nominal Reasoning Framework. 262-278 - Weiwei Wang
, Zidong Li, Feng You, Ruilian Zhao
:
Vulnerability Report Analysis and Vulnerability Reproduction for Web Applications. 279-297 - Yingmin Xiao, Zhibin Yang, Yong Zhou, Zhiqiu Huang:
Run-Time Assured Reinforcement Learning for Safe Spacecraft Rendezvous with Obstacle Avoidance. 298-313 - Han Xu, Liqian Chen, Guangsheng Fan, Banghu Yin, Ji Wang:
An Abstract Domain of Linear Templates with Disjunctive Right-Hand-Side Intervals. 314-330 - Yixuan Yan, Weihao Su, Lixiao Zheng, Mengxi Wang, Haiming Chen, Chengyao Peng, Rongchen Li, Zixuan Chen:
Deducing Matching Strings for Real-World Regular Expressions. 331-350 - Yixiao Yang, Chen Gao, Zhiqi Li, Yifan Wang, Rui Wang:
Binary Level Concolic Execution on Windows with Rich Instrumentation Based Taint Analysis. 351-367 - Qian Yao
, Xinli Xiong
, Yongjie Wang:
Cheat-FlipIt: An Approach to Modeling and Perception of a Deceptive Opponent. 368-384 - Shenghao Yuan
, Benjamin Lion, Frédéric Besson
, Jean-Pierre Talpin
:
Making an eBPF Virtual Machine Faster on Microcontrollers: Verified Optimization and Proof Simplification. 385-401 - Chunxi Zhang, Shuyan Zhang, Ting Chen, Rong Zhang, Kai Liu:
An Optimized Solution for Highly Contended Transactional Workloads. 402-418 - Jin Zhu, Chuanqi Tao, Hongjing Guo, Yue Ju:
DeepTD: Diversity-Guided Deep Neural Network Test Generation. 419-433
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.