default search action
34th ISSRE 2023: Florence, Italy - Workshops
- 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023 - Workshops, Florence, Italy, October 9-12, 2023. IEEE 2023, ISBN 979-8-3503-1956-9
- Abraham Chan:
Building Resilient ML Applications using Ensembles against Faulty Training Data. 1-4 - Tommaso Puccetti:
Early Detection of Unknown Attacks with Algorithms for Structured Data. 5-8 - Amid Golmohammadi:
Enhancing White-Box Search-Based Testing of RESTful APIs. 9-12 - Samira Silva:
Reviewing and Proposing Approaches for Self-adaptive Testing in the Field. 13-16 - Stefan Petrescu:
Revolutionizing Log Parsing for Modern Software Systems. 17-21 - Carmine Cesarano:
Security Assessment and Hardening of Fog Computing Systems. 22-25 - Cristian Augusto:
Toward an efficient End-to-End test suite execution. 26-29 - Hao Gao:
Towards human-centric software complexity metrics: a neuroscience-based approach. 30-33 - Guoyang Weng, Artur Andrzejak:
Automatic Bug Fixing via Deliberate Problem Solving with Large Language Models. 34-36 - Silvia Bonomi, Stefano Cappai, Emilio Coppa:
On the Efficacy of Smart Contract Analysis Tools. 37-38 - Marek R. Ogiela, Urszula Ogiela:
Knowledge-Based Approach for Unlocking Divided Secrets in Threshold Schemes with Privileges. 39-40 - Marc Zeller, Thomas Waschulzik, Martin Rothfelder, Cornel Klein:
Safety Assurance of a Driverless Regional Train -Insight in the safe.trAIn Project. 41-42 - Yuta Yamasaki, Nikolay Fedorov, Masateru Tsunoda, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai:
Software Defect Prediction by Online Learning Considering Defect Overlooking. 43-44 - Hezhen Liu, Jiacheng Yin, Chengqiang Huang, Hao Lan, Zhi Jin, Zheng Zheng, Xun Zhang:
A Fault Injection and Formal Verification Framework Based on UML Sequence Diagrams. 45-50 - Faezeh Siavashi, Horacio Hoyos Rodriguez, Vera Pantelic, Mark Lawford, Richard F. Paige, Monika Jaskolka, Guanrui Hou, Alessandro Verde:
Bridging the Gap Between System Architecture and Software Design using Model Transformation. 51-56 - Amin Fakhereldine, Mohammad Zulkernine, Dan Murdock:
CBTCset: A Reference Dataset for Detecting Misbehavior Attacks in CBTC Networks. 57-62 - Enyu Yu, Hui Dong, Yuxiang Ren, Minzhi Yan, Xuecang Zhang, Yi Yang, Le Yue, Zhengbin Huang:
HRCA: A Heterogeneous Graph-based Adaptive Root Cause Analysis Framework. 63-68 - Tingting Yu, Chunpeng Jia, Rui Chen, Chao Li, Boxiang Wang, Yunsong Jiang:
Precise Dynamic Data Race Prediction for Interrupt-Driven Embedded Software. 69-74 - Anne-Lise Courbis, Farid Arfi, Thomas Lambolais, François Bughin, Maurice Hayot:
Semi-formal and formal specification of a telerehabilitation system for chronic respiratory diseases: methodology and feedback. 75-80 - Sanaa Siddiqui, Ravindra Metta, Kumar Madhukar:
Towards Multi-Language Static Code Analysis. 81-82 - Renzhi Wang, Zhijie Wang, Yuheng Huang, Lei Ma:
When Simulator Meets Natural Deviation: A Study on Deviations in Simulation-based ADS Testing. 83-88 - Yixiao Lv, Jiaqi Yin, Sini Chen, Huibiao Zhu:
Formalization and Verification of the ICC Mechanism in Android System Using CSP. 89-95 - Noor Al-Gburi, Attila Klenik, Imre Kocsis:
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems. 96-102 - Wataru Zama, Xiao Xiao:
Software Reliability Prediction via Neural Network. 103-107 - Yuto Kaibe, Hiroyuki Okamura, Tadashi Dohi:
Towards Predicting Source Code Changes Based on Natural Language Processing Models: An Empirical Evaluation. 108-111 - Moumita Das Purba, Arpita Ghosh, Benjamin J. Radford, Bill Chu:
Software Vulnerability Detection using Large Language Models. 112-119 - Ke Li, Sheng Hong, Cai Fu, Yunhe Zhang, Ming Liu:
Discriminating Human-authored from ChatGPT-Generated Code Via Discernable Feature Analysis. 120-127 - Cristina Improta:
Poisoning Programs by Un-Repairing Code: Security Concerns of AI-generated Code. 128-131 - Simona De Vivo, Pietro Liguori:
Simulation Environment for the Evaluation of Lightweight Intrusion Detection Systems. 132-135 - Ivan Baheux, Oum-El-Kheir Aktouf, Mohammed El Amin Tebib, Mariem Graa, Pascal André, Yves Ledru:
DroidSecTester: Towards context-driven modelling and detection of Android application vulnerabilities. 136-141 - Prachi Chitnis, Abhaya Asthana:
Finding Needle in a Haystack: An Algorithm for Real-Time Log Anomaly Detection with Real-Time Learning. 142-147 - Raphael Schermann, Thomas Ammerer, Philipp Stelzer, Georg Macher, Christian Steger:
Risk-Aware Intrusion Detection and Prevention System for Automated UAS. 148-153 - Kiyoshi Honda, Naohiro Hashimoto, Hironori Washizaki, Yoshiaki Fukazawa, Masahiro Taga, Akira Matsuzaki, Kazuyuki Nakagawa, Yusuke Sakai:
A Bayesian Network-Based Analysis of Changing Impact of Organizational Goals on Software Development. 154-159 - Francesco Mariotti, Lorenzo Manetti, Paolo Lollini:
Modeling Moving Target Defense strategies and attacks with SAN and ADVISE. 160-161 - Francesco Mariotti, Paolo Lollini, Fátima Mattiello-Francisco:
The GOLDS satellite constellation: preparatory works for a model-based performability analysis. 162-163 - Lorenzo Sarti, Hudson Martins Silva Bruno, Tommaso Puccetti, Esther Colombini, Andrea Ceccarelli:
Towards Robust Visual Odometry Systems Against Camera Lens Failures. 164-165 - Irene Bicchierai, Enrico Araniti, Sara Nieves Matheu-García, Juan Francisco Martínez Gil:
Validating the BIECO Security Evaluation Methodology within a Smart Grid Monitoring SW. 166-173 - Peng Wang, Qingyang Xu, Siyun Yao, Xiangfei Wu, Qunli Zhang, Ruichen Lv, Shiming Liu, Yamin Li, Hui Fang, Zheng Hu:
A robust online extrinsic calibration method for GNSS-RTK and IMU system and vehicle setups. 174-179 - Wenyi Fang, Hao Zhang, Ziyu Gong, Longbin Zeng, Xuhui Lu, Biao Liu, Xiaoyu Wu, Yang Zheng, Zheng Hu, Xun Zhang:
A Survey of Metrics to Enhance Training Dependability in Large Language Models. 180-185 - Xiaolei Yu, Kai Jia, Wenhua Hu, Jing Tian, Jianwen Xiang:
Black-Box Test Case Prioritization Using Log Analysis and Test Case Diversity. 186-191 - Shiming Liu, Qunli Zhang, Wei Li, Siyun Yao, Yucheng Mu, Zheng Hu:
Runtime operational design domain monitoring of static road geometry for automated vehicles. 192-197 - Alberto Avritzer, Andrea Janes, Andrea Marin, André van Hoorn, Matteo Camilli, Catia Trubiani, Daniel S. Menasché:
Assessment of Aging and Rejuvenation for Resiliency in Heterogeneous Network Clusters. 198-205 - Wenzhi Xie, Chen Zhang, Kai Jia, Dongdong Zhao, Junwei Zhou, Jing Tian, Jianwen Xiang:
Cross-Project Aging-Related Bug Prediction Based on Feature Transfer and Class Imbalance Learning. 206-213 - Yunzhe Tian, Yike Li, Kang Chen, Endong Tong, Wenjia Niu, Jiqiang Liu, Fangyun Qin, Zheng Zheng:
Mitigating Overfitting for Deep Learning-based Aging-related Bug Prediction via Brain-inspired Regularization in Spiking Neural Networks. 214-221 - Douglas Dias, Fumio Machida, Ermeson C. Andrade:
Software Aging Analysis in a Testing Framework. 222-229
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.