Search Results - "2020 7th International Conference on Dependable Systems and Their Applications (DSA)"

Refine Results
  1. 1

    A Survey ofNFC Mobile Payment: Challenges and Solutions using Blockchain and Cryptocurrencies by Li, Dongcheng, Wong, W. Eric, Chau, Matthew, Pan, Sean, Koh, Liang Seng

    “…Near-field communication (NFC) is one of the essential technologies in the Internet of Things (IoT) that has facilitated mobile payment across different…”
    Get full text
    Conference Proceeding
  2. 2

    Artemis: An Improved Smart Contract Verification Tool for Vulnerability Detection by Wang, Anqi, Wang, Hao, Jiang, Bo, Chan, W. K.

    “…Smart contracts are programs running on top of the blockchain platform. With smart contract, users can use code to define arbitrary rules to manage their…”
    Get full text
    Conference Proceeding
  3. 3

    Heart Disease Prediction Algorithm Based on Ensemble Learning by Yuan, Ke, Yang, Longwei, Huang, Yabing, Li, Zheng

    “…Nowadays, heart disease is one of the important causes of human deaths. According to statistics, deaths caused by heart disease account for about one-third of…”
    Get full text
    Conference Proceeding
  4. 4

    Interference Signal Recognition Based on Multi-Modal Deep Learning by Zhang, Xiao, Liu, Xiaoling

    “…With the development of communication countermeasure technology, the future communication systems will face multi-source and multi-pattern interference…”
    Get full text
    Conference Proceeding
  5. 5

    Reliable and Robust Weakly Supervised Attention Networks for Surface Defect Detection by Zhang, Zijian, Lv, Chaozhang, Sun, Meijun, Wang, Zheng

    “…Automated surface-anomaly detection of industrial products using deep learning is a critical task to the digitalization and intelligence of the manufacturing…”
    Get full text
    Conference Proceeding
  6. 6

    Aging-Related Bugs Prediction Via Convolutional Neural Network by Liu, Qinchen, Xiang, Jianwen, Xu, Bin, Zhao, Dongdong, Hu, Wenhua, Wang, Jian

    “…Software aging refers to the phenomenon of system performance degradation or system crash in long-term running systems, which is mainly caused by Aging-Related…”
    Get full text
    Conference Proceeding
  7. 7

    Implementation of Mesh Flying Ad-hoc Network For Emergency Communication Systems by Zhou, Yuzhi, Zhang, Xi-Xi, Sun, Jinlong, Yang, Jie, Gui, Guan

    “…The development of unmanned aerial vehicle (UAV), combined with the prospect of air-space-ground vehicular network (ASGVN) brings a novel trend to the…”
    Get full text
    Conference Proceeding
  8. 8

    Deep Learning-Based Automatic Safety Detection System for Crack Detection by Chen, Quan, Zhang, Xi-Xi, Chen, Yu, Jiang, Wei, Gui, Guan, Sari, Hikmet

    “…This paper proposes an intelligent detection method based on deep learning to detect cracks on the surface of a large crane on a construction site. The final…”
    Get full text
    Conference Proceeding
  9. 9

    Lightweight Convolutional Neural Network-Based Method for Crane Safety Inspection by Jiang, Wei, Liu, Tianliang, Chen, Yu, Chen, Quan, Zhang, Xi-Xi, Gui, Guan

    “…In this paper, we propose an intelligent detection method based on convolutional neural network to detect the surface corrosion of the steel structure of…”
    Get full text
    Conference Proceeding
  10. 10

    Task-driven Image Preprocessing Algorithm Evaluation Strategy by Wang, PengQi, Geng, Lin, Zhao, DongBo, Kang, ShuTing, Dong, Qian, Yang, Guang, Shi, Yuan, Meng, LingZhong, Xue, YunZhi

    “…The image preprocessing algorithm can effectively improve performance of the advanced visual algorithms under complex conditions. But the evaluation of the…”
    Get full text
    Conference Proceeding
  11. 11

    Applications of LSTM Model for Aeroengine Forecasting by Li, Peng, Niu, Wei

    “…As an important core technology of PHM, prediction is also the most difficult and most challenging comprehensive technology. It aims to predict the occurrence…”
    Get full text
    Conference Proceeding
  12. 12

    An Evolutionary Perspective: A Study of Anubis Android Banking Trojan by Ning, Baodi, Zhang, Guanqin, Zhong, Zexin

    “…Anubis Android banking trojan has been widespread worldwide which caused millions of economy loss while it has been evolving both numerically and swiftly. To…”
    Get full text
    Conference Proceeding
  13. 13

    Nonon-Convex Low-Rank Minimization for Sparse-View CT Reconstruction via Nonlocal-Group Dictionary Learning by Liu, Li, Yang, Peipei, Zhou, Tian, Li, Yunyi, Li, Wenmei, Gui, Guan

    “…Recently, low-rank minimization has demonstrated its success in sparse-view CT reconstruction. However, traditional nuclear norm minimization (NNM) methods…”
    Get full text
    Conference Proceeding
  14. 14

    Performance optimisation Method of PBFT Consensus for Supply Chain Integration SVM by Du, Na, Liang, Zhihong, Huang, Yuxiang, Guo, Zhichang, Yang, Hongji, Wang, SaSa

    “…The Hyperledge Fabric permissioned consortium chain based on the Practical Byzantine Fault Tolerance (PBFT), the interference of the dishonest node as the…”
    Get full text
    Conference Proceeding
  15. 15

    Developing deep LSTM model for real-time path planning in unknown environments by Yao, Haonan, Liu, Yang, Zhang, Xiaoyi

    “…This paper proposed a real-time path planning approach based on deep LSTM model, in which the model was constructed by Long Short-Term Memory (LSTM). By…”
    Get full text
    Conference Proceeding
  16. 16

    Design of a Center of Gravity Control Law with Unbalanced Fuel in Aircraft Wing Tanks by Ying, Zhao, Zhongwei, Wang, Zhenghong, Li, Rui, Xu, Enliang, Ding

    “…Aircraft center of gravity (CG) control is important for effectively reducing trim drag and offering potential economic performance benefits. CG control is…”
    Get full text
    Conference Proceeding
  17. 17

    Testing DNN-Based Path Planning Algorithms by Metamorphic Testing by Lv, Shuxiao, Yin, Beibei

    “…Deep Neural Networks (DNNs) are increasingly applied to solve path planning problems in recent years. However, unexpected or incorrect behaviors of DNNs…”
    Get full text
    Conference Proceeding
  18. 18

    Software Defect Classification Approach Based on the Modified Latent Dirichlet Allocation Topic Model Considering the Domain Characters by Junruo, Sun, Huancheng, Su, Haifeng, Li, chang, Liu, Jiabin, Chen, Xi, Liu

    “…The existing defect classification approaches do not consider the domain characters of software defects, such as aeronautics domain, astronautics domain and so…”
    Get full text
    Conference Proceeding
  19. 19

    A rapid test method for autonomous ability of unmanned control strategy in dangerous situations by Meng, LingZhong, Bao, Yang, Kang, ShuTing, Zhao, DongBo, Yang, Guang, Shi, Yuan, Wang, PengQi, Dong, Qian, Xue, YunZhi

    “…The autonomous ability of autonomous control strategy is the core of unmanned vehicle. At present, the autonomous ability test is mainly carried out through…”
    Get full text
    Conference Proceeding
  20. 20

    Architecture of Security Protection technology for Aviation Cyberspace by Zhong-hua, Wang, Jian-feng, Ma, Wen-sheng, Niu, Ya-hui, Li

    “…Under the systematic combat mode, aviation cyberspace is a complicated, dynamic and confrontational information space. How to evaluate network security…”
    Get full text
    Conference Proceeding