Abstract is missing.
- Message from the Chairs QRS 2023W. Eric Wong, T. H. Tse, Suphamit Chittayasothorn, He Jiang. [doi]
- CSP based Formal Modeling and Verification of Behavior TreesPeishan Huang, Weijiang Hong, Zhenbang Chen, Ji Wang 0001. 1-2 [doi]
- Metamorphic Testing for the Deepfake Detection ModelChenxin Pang, Ya Pan, Hanli Bai. 1-8 [doi]
- Uncertainty-aware Metamorphic Testing for Robust Object Detection ModelsJianhong Wang, Yuta Ishimoto, Masanari Kondo, Yasutaka Kamei, Naoyasu Ubayashi. 9-17 [doi]
- Requirements-Driven Logic Testing for Deep Neural NetworksYuqi Hang, Chen Liu, Lifa Hu, Xinyi Gao. 18-24 [doi]
- Metamorphic Testing for Traffic Sign Detection and RecognitionYuanyuan Long, Yong Fan, Ya Pan. 25-34 [doi]
- The Comparative Evaluation of Test Prioritization Approaches in an Industrial StudyAzeem Ahmad, Francisco Gomes de Oliveira Neto, Eduard Paul Enoiu, Kristian Sandahl, Ola Leifler. 35-44 [doi]
- Optimal Second-Order Mutants Reduction Based on MOEA/DJing Liu, Zijian Wang. 45-54 [doi]
- Test Generation for Mutation Testing by Symbolic ExecutionRui Su, Zhiyi Zhang, YuQian Zhou, Yongming Yao. 55-61 [doi]
- SC-MCC: A Stronger Code Coverage CriterionSangharatna Godboley, Monika Rani Golla, P. Radha Krishna 0001. 62-71 [doi]
- Exploring the Capability of ChatGPT in Test GenerationGaolei Yi, Zizhao Chen, Zhenyu Chen, W. Eric Wong, Nicholas Chau. 72-80 [doi]
- DeepHC: Efficient Generating Tests with High Coverage for Deep Neural NetworksJunyuan Teng, Tingting Yu, Rui Chen, Dongdong Gao, Chunpeng Jia. 81-82 [doi]
- Comparative Study of Ensemble Learning Methods in Just-in-time Software Defect PredictionWenjing Zhang, Yong Li, Ming Wen, Ruiqi He. 83-92 [doi]
- Enhancing Cross-Project Just-In-Time Defect Prediction with Active Deep LearningYue Wang, Yong Li, Yuanyuan Ren, Junjie Yu. 93-102 [doi]
- CHEMFUZZ: Large Language Models-Assisted Fuzzing for Quantum Chemistry Software Bug DetectionFeng Qiu, Pu Ji, Baojian Hua, Yang Wang. 103-112 [doi]
- METCN: A Multi-Task Enhanced TCN Model for Software Fault Detection and Correction PredictionQiuying Li, Yulin Wen, Zitong Yan, Fuping Zeng. 113-121 [doi]
- Development of a Web System for Detecting Bugs in Probabilistic ProgramsVo Dai Trinh, Yuri Nishimura, Haibo Yu. 122-130 [doi]
- Software Vulnerability Detection via Doc2vec with path representationsTong Wan, Lu Lu 0011, Hao Xu, Quanyi Zou. 131-139 [doi]
- Software Vulnerability Detection Based on Binary Intermediate SlicingQi Yang, Hui Zhang, Xuanzheng Wang. 140-147 [doi]
- PRCMHFL: A Fault Localization Technique Based on Predicate Ranking and CMH MethodSangharatna Godboley, Shubhank Kulshreshtha, Prayanshu Agarwal, B. Ranilbala. 148-156 [doi]
- Dynamic Access Control with Administrative Obligations: A Case StudyVladislav Dubrovenski, Md Nazmul Karim, Erzhuo Chen, Dianxiang Xu. 157-166 [doi]
- Familial Graph Classification of Malware based on Structured API Call SequencesYang Xu, Zhuotai Chen. 167-175 [doi]
- Natch: Detecting Attack Surface for Multi-Service Systems with Hybrid IntrospectionPavel Dovgalyuk, Maria Klimushenkova, Natalia Fursova, Ivan Vasiliev, Vladislav Stepanov. 176-185 [doi]
- A Security Compliance-by-Design Framework Utilizing Reusable Formal ModelsQuentin Rouland, Stojanche Gjorcheski, Jason Jaskolka. 186-195 [doi]
- Independent Boot Process Verification using Side-Channel Power AnalysisArthur Grisel-Davy, Sebastian Fischmeister. 196-207 [doi]
- AI and Security - What Changes with Generative AIRyôichi Sasaki. 208-215 [doi]
- Privacy Policy Compliance Inspection of Financial AppsJiyun Shen, Yue Wang, Qingheng Wu, Yuan Zhao. 216-219 [doi]
- A Deep Learning-Based Method for Identifying User Story Semantic ConflictsTianci Wang, Chunwang Li, Chunhui Wang, Tong Li, Ye Zhai. 220-229 [doi]
- A Service-Oriented Framework for An Integrated Study of Intelligent Data Collection and ApplicationPo-Chuan Ke, Yuan-Hsun Liao, Shou-Yu Lee, Shih-Yun Huang, William Cheng-Chung Chu. 230-236 [doi]
- Input Validation for Neural Networks via Local Robustness VerificationJiangchao Liu, Liqian Chen, Antoine Miné, Hengbiao Yu, Ji Wang. 237-246 [doi]
- FCA: A Causal Inference Based Method for Analyzing the Failure Causes of Object Detection AlgorithmsYuanxin Liu, Rui Li, Yuxi Ma, Yunzhi Xue, Lingzhong Meng. 247-256 [doi]
- Modeling Stochastic Deterioration by Chloride Ion Erosion Through Sparse Identification of Nonlinear DynamicsBingchen Dong, Zhenglin Liang. 257-262 [doi]
- mpXim: A Decentralized Mixing Scheme based on a Multi-Party Discovering ProtocolXuan Wang, Li Liao, Dongyu Cao. 263-272 [doi]
- An Enhanced Software Architecture to Improve the MQTT Communications Encrypted ModelHan-Sheng Lu, Tse-Chuan Hsu. 273-279 [doi]
- A Smart Contract Vulnerability Detection Model Based on Multi-Type Features and Pre-Training TechniquesMiaomiao Feng, Wei Mi, Xiaodan Zhang, Baojian Chen, Mingming Huang. 280-289 [doi]
- Smart Contract Test Case Prioritization based on Frequency and Gas ConsumptionSangharatna Godboley, P. Radha Krishna 0001, Aditya Joshi, Ishita Gupta, Rahul Khatav. 290-299 [doi]
- Optimizing Gas Consumption in Ethereum Smart Contracts: Best Practices and TechniquesSourena Khanzadeh, Noama Fatima Samreen, Manar H. Alalfi. 300-309 [doi]
- A Smart Contract Development Framework for Maritime Transportation SystemsXufeng Zhao, Qiuyang Wei, Xue-Yang Zhu, Wenhui Zhang. 310-319 [doi]
- An Approach for Ensuring the Privacy in Smart ContractsWenqian Zhao, Meghana Patibandla, Junhua Ding. 320-329 [doi]
- Using Problem Frames Approach for Key Information Extraction from Natural Language RequirementsShangzhi Tang, Xuan Chen, Hongbin Xiao, Jiahao Wei, Zhi Li. 330-339 [doi]
- IoT Phishing Detection Using Hybrid NLP and Machine Learning Models Enhanced with Contextual EmbeddingFehmi Jaafar, Darine Ameyed, Lavin Titare, Md Nematullah. 340-349 [doi]
- Legal Events Classification in Online Social Community PostsYi-Hung Liu, Yin-Neng Feng, Sheng-Fong Chen. 350-355 [doi]
- Bias Analysis in Language Models using An Association Test and Prompt EngineeringRavi Varma Kumar Bevara, Ting Xiao, Farahnaz Hosseini, Junhua Ding. 356-363 [doi]
- ChatGPT vs. Stack Overflow: An Exploratory Comparison of Programming Assistance ToolsJinrun Liu, Xinyu Tang, Linlin Li, Panpan Chen, Yepang Liu 0001. 364-373 [doi]
- Evaluation of Hallucination and Robustness for Large Language ModelsRui Hu, Junhao Zhong, Minjie Ding, Zeyu Ma, Mingang Chen. 374-382 [doi]
- Boosting Source Code Learning with Text-Oriented Data Augmentation: An Empirical StudyZeming Dong, Qiang Hu, Yuejun Guo 0001, Zhenya Zhang, Jianjun Zhao 0001. 383-392 [doi]
- Hierarchical Semantic Graph Construction and Pooling Approach for Cross-language Code RetrievalMingyang Geng, Dezun Dong, Pingjing Lu. 393-402 [doi]
- Input Transformation for Pre-Trained-Model-Based Cross-Language Code SearchMingyang Geng, Dezun Dong, Pingjing Lu. 403-412 [doi]
- An Empirical Study of Lightweight JavaScript EnginesMeng Wu, Weixin Dong, Qiang Zhao, Zhizhong Pan, Baojian Hua. 413-422 [doi]
- Code Quality Evaluation in IT Communities Based on Sentiment Analysis of User CommentsHongwu Qin, Peiming Xue, Xiuqin Ma, Bin Gao. 423-429 [doi]
- SmartPerf: Automated Speed Performance Test from Visual PerspectiveLetao Li, Likai Qiu, Shuang Li, Jiaqi Wang, Hualiang Zhu. 430-436 [doi]
- Performance Prediction for Lock-based ProgramsDongwen Zhang, Tongtong Wang, Yang Zhang. 437-446 [doi]
- Improved Mechanism and Emotional Expression System of A Panda-type Emotional RobotBin Zhang 0036, Chihiro Suzuki, Zhan Chen, Hun-ok Lim. 447-450 [doi]
- MedTiny: Enhanced Mediator Modeling Language for Scalable Parallel AlgorithmsXiangyu Li, Yihao Zhang, Xiaokun Luan, Xiaoyong Xue, Meng Sun 0002. 451-460 [doi]
- Improving the Detection of Concurrent Artifact Anomalies in a Structured WorkflowMahmoud M. Abouzeid, Pei Shu Huang, Feng-Jian Wang. 461-470 [doi]
- ECIA: Elaborate Change Impact Analysis Based on Sub-Statement Level Dependency GraphZheheng Liang, Jianming Chang, Wuqiang Shen, Chaosheng Yao, Lulu Wang. 471-480 [doi]
- Solar Energy-Based Virtual Machine Placement Algorithm for Geo-Distributed DatacentersSanjaya Kumar Panda, Sahil Chopra, Slokashree Padhi. 481-490 [doi]
- Dependency Aware and Delay Guaranteed SFC Placement in Multi-domain NetworksYanming Liu, Chuangchuang Zhang, Yihao Li, Shuning Zhang, Hongyong Yang. 491-498 [doi]
- Formal Modeling and Verification of Industrial Robotic Arm - A Case StudyIlmaan Zia, Muhammad Abdul Basit Ur Rahim, Tairan Liu, Zhangying He. 499-508 [doi]
- Generating Autonomous Driving Safety Violation Scenarios Based on Multi-Objective OptimizationChunyan Xia, Song Huang, Yongming Yao, Changyou Zheng, Yutong Wang. 509-515 [doi]
- Reconsideration of Risk Communication and Risk Assessment Support Methods for SecurityRyôichi Sasaki. 516-523 [doi]
- Detecting Vulnerable OAuth 2.0 Implementations in Android ApplicationsWaris Damkham, Shingo Kunihiro, Songpon Teerakanok, Tetsutaro Uehara. 524-531 [doi]
- Enhancing Account Recovery with Location-based Dynamic QuestionsShuji Yamaguchi, Hidehito Gomi, Tetsutaro Uehara. 532-539 [doi]
- On Collecting Onion Server Fingerprints and Identification of Their OperatorsYuuki Kimura, Soramichi Akiyama, Atsuo Inomata, Tetsutaro Uehara. 540-548 [doi]
- The Study on the Blocking Time Reduction of the IDS/SON Cooperative Firewall SystemPerakorn Nimitkul, Akihiro Takai, Nariyoshi Yamai, Rei Nakagawa, Songpon Teerakanok. 549-554 [doi]
- Explainable Multimodal Fake Posts Detection Using Feature Extraction with Attention MechanismsTomoaki Ohkawa, Hiroshi Yoshiura, Takayasu Yamaguchi. 555-563 [doi]
- DNS Rebinding Attacks Against Browsers on Azure Virtual MachinesRyuga Kaneko, Taiichi Saito. 564-571 [doi]
- An Agent-Based Modeling Approach to Designing and Optimizing Bug Bounty Programs for Cybersecurity in Developing CountriesAndrew Bukangwa, Tetsutaro Uehara. 572-581 [doi]
- Savery: A Framework for the Assessment and Comparison of Mobile Development ToolsJosé Donato, Naghmeh Ivaki, Nuno Antunes. 582-592 [doi]
- Test Case Reuse Method Based on Deep Semantic MatchingSiqi Gu, Zhibiao Liu, Qiaoqing Liang, Zhimin Deng, Xiangyu Xiao. 593-599 [doi]
- Reducing Label Errors for Actionable Warning IdentificationHaoli Chen, Xiaocheng Chen, Xiaolei Sun, Qirui Zheng, Xiuting Ge. 600-604 [doi]
- Test Case Priority Ranking Method Based on Greedy AlgorithmBo Zhang, Yu Li, Yichen Wang. 605-613 [doi]
- An Input Space Modeling Method for Software Testing Considering TimingBo Zhang, Jiahao Li, Zeyu Fan, Yichen Wang. 614-621 [doi]
- Enhancement of Robustness for Graph Neural Networks in AI SystemsDongyuan Zhang, Chuanjiang Yu, Shijun Xu, Xinyi Gao. 622-625 [doi]
- Research on Improved Algorithm of UAV Swarm Target Search Strategy Based on Freshness and Target DensityYuMin Wang, Jinhao Xie, Wenqi Zhang, Yuan Yao, Gang Yang. 626-632 [doi]
- Modelling and Verification of Cooperative Vehicle Infrastructure System at Intersections Based on Timed AutomataXinhai Chen, Wei Liu, Chang Rao, Yu Zhang, Wanling Du. 633-642 [doi]
- Safety Verification Technology of CPS Based on Theorem ProvingMingfu Tuo, Xiaoqiang Zhao, Wenliang Wu, Bo Shen. 643-645 [doi]
- Modeling and Discovering Data Race with Concurrent Code Property GraphsYang Cao, Yunwei Dong. 646-653 [doi]
- Research on FCS Design Technology of Electric Tilting Quadrotor UAVXiaoming Xie, Jinfa Xu, Suiyuan Shen, Wei Cao, Guigang Zhang. 654-661 [doi]
- Fitting and Peak Searching of Spectrum for Fourier Transform Infrared SpectrometerWanjie Ren, Guojun Wang, Qi Liu, Xia Li, Rui Tuo. 662-667 [doi]
- Enhancing Grid-Connected PV System Performance: Loss Analysis and Efficiency Improvement StrategiesOscar Famous Darteh, Guojun Wang, Qi Liu, Xiaodong Liu 0002, Amevi Acakpovi. 668-674 [doi]
- A Computational Brain Colour Response Model for AchromatopsiaYinwei Liu. 675-681 [doi]
- A Creative Computing Approach to Analysis of Speaker Intention Using the DIKCW ModelLin Zou, Hongji Yang, Jintao Lin. 682-692 [doi]
- Intelligent Question Answering System Based on Cognitive Graph: A Case Study of Textile FabricsXinyu He, Mengyao Cui, Yufan Chen, Longfei Liu, Bangchao Wang. 693-702 [doi]
- Research on the Construction of a Multimodal Cognitive Graph of Textile and ClothingPeng Ye, Xinyi Lan, Yufan Chen, Zhipeng Wang, Wei Ye. 703-712 [doi]
- The Hidden Order Framework: From Evidence-Based Prediction in Scenario Spaces to Prompt Learning in Image Production ProcessesZiyang Weng, Shuhao Wang, Jingwei Zhang. 713-723 [doi]
- The Man-Land Coupling Algorithm: A Priori Experiment with Remote Sensing Data to Facilitate the Revitalization of Great Sites Based on Complex CognitionZiyang Weng, Shuhao Wang, Jingwei Zhang. 724-732 [doi]
- Outfit Compatibility Model with Multi-Modal Semantic Interaction LearningRuiqi Luo, Zhenglong Li, Yinhua Xiang, Zhaojing Wang, Luyao Ye. 733-741 [doi]
- Research on Active Detection Methods for Video Anomaly Events Based on Concept SemanticsRuiqi Luo, Wenjie Zhang, Xiaoxiao Li, Zhaojing Wang, Luyao Ye. 742-751 [doi]
- A Novel Framework for High-category Coverage Clothing Recommendation System Based on Sentiment AnalysisHongyan Wan, Zan Wang, Zhiquan An, Guotao Jiao, Xinnan Zhang. 752-758 [doi]
- Cognitive Graph Empowered Textile and Clothing Intelligent Service PlatformZhiyuan Zou, Zhipeng Wang, Longfei Liu, Changxi Feng, Bangchao Wang. 759-768 [doi]
- Identifying Influential Nodes in Complex System from Multiscale Complex Network PerspectiveXiaodong Gou, Peng Zhou, Haitao Yang, Zhaomingyue Zheng, Ao Zhang. 769-774 [doi]
- Research on Micro Vibration Control of Satellite Flexible Structure Using Piezoelectric Variable Stiffness ActuatorZhaomingyue Zheng, Wei Cheng, Xiaodong Gou, Guangyuan Wang. 775-781 [doi]
- Dynamic Comprehensive Risk Assessment of Coal Mill Based on CNN-LSTM and Analytic Hierarchy ProcessXiang Zhu, Wencai Wang, Zhizhi Cang, Yaguang Dang, Donghui Zhao. 782-788 [doi]
- Voltage Prediction and Fault Detection by using Model Fusion Strategy for Lithium-ion BatteriesYijing Zhou, Mengdan Wu, Qi Yao, Zhiyu Duan, Shunkun Yang. 789-796 [doi]
- Fault Localization of Software: A Literature ReviewZeyu Wang, Fuping Zeng. 797-806 [doi]
- Multi-Population Genetic Algorithm Based EFSM Regression Test Data GenerationJiahao Li, Bo Zhang, Zeyu Fan, Yichen Wang. 807-815 [doi]
- A Blockchain-Based Requirement Management Framework for Distributed Software Development EnvironmentMuhammad Azeem, Saif ur Rehman Khan, Naseem Ibrahim, Abdullah Yousafzai, Wen-Li Wang, Asif Kareem. 816-825 [doi]
- AI Ethics in Healthcare - A SurveyBhavraaj Singh, Muhammad Abdul Basit Ur Rahim, Shahid Hussain, Muhammad Abid Rizwan, Jie Zhao. 826-833 [doi]
- Using Deep Reinforcement Learning And Formal Verification in Safety Critical Systems: Strategies and ChallengesSatyam Sharma, Muhammad Abdul Basit Ur Rahim, Shahid Hussain, Muhammad Rizwan Abid, Tairan Liu. 834-842 [doi]
- Uncertainty-Wise Model Evolution with Genetic ProgrammingMan Zhang 0001, Shaukat Ali 0001, Tao Yue 0002. 843-844 [doi]
- Assume(), Capture(), Verify(), Establish(): A Vocabulary for Static Program AnalysisHessamaldin Mohammadi, Wided Ghardallou, Elijah Brick, Ali Mili 0001. 845-846 [doi]
- Genetic Algorithm Based EFSM Regression Test Sequence GenerationJiahao Li, Chengru Yang, Yichen Wang. 847-848 [doi]
- OpenMP Program Verification Based on Bounded Model CheckingLiang Sun, Bailin Lu, Liangze Yin, Zhe Bu, Wenjing Jin. 849-850 [doi]
- VPIA-FMEA: A Method for Visual Perception Intelligent Algorithm FMEANishan Xie, Rui Li, Yuxi Ma, Qian Dong, Lingzhong Meng. 851-852 [doi]
- Effectiveness Evaluation of UAVs Search in Urban EnvironmentsYue Zhao, Wenliang Wu, Xingshe Zhou. 853-858 [doi]
- Research on Object Categorization and Grabbing for a Cleaning RobotBin Zhang 0036, Ayumu Mori, Hun-ok Lim. 859-860 [doi]
- Mining Potential Defect Patterns in Unmanned Systems from A Large Amount of Open Source CodePeng Lin, Ping Chen, Jingwei Shang, Qiaochun Qiu, Zhichang Huang. 861-862 [doi]
- An Ontology-Based Framework for Medical IoT Forensic EvidenceJigang Liu, Ryôichi Sasaki, Tetsutaro Uehara. 863-864 [doi]
- BayesFLo: Bayesian Fault Localization for Software TestingYi Ji, Ryan Lekivetz, Simon Mak, Joseph Morgan. 865-866 [doi]
- WASMDYPA: Effectively Detecting WebAssembly Bugs via Dynamic Program AnalysisWenlong Zheng, Baojian Hua, Zhuochen Jiang. 867-868 [doi]
- Rustcheck: Safety Enhancement of Unsafe Rust via Dynamic Program AnalysisLei Xia, Yufei Wu 0011, Baojian Hua. 871-872 [doi]
- Natural Language Coding (NLC) for Autonomous Stock Trading: A New Dimension in No-Code/Low-Code (NCLC) AIYulia Kumar, Wenxiao Li, Kuan Huang, Michael Thompson, Brendan Hannon. 873-874 [doi]
- Love the Way You Lie: Unmasking the Deceptions of LLMsYulia Kumar, Zachary Gordon, Patricia Morreale, J. Jenny Li, Brendan Hannon. 875-876 [doi]
- Optimizing Media Streaming in Edge-Cloud Systems: Leveraging Geography and User BehaviorQuankun Luo, Jiawen Deng, Liang Luo. 877-878 [doi]