Search Results - "2022 9th International Conference on Dependable Systems and Their Applications (DSA)"

Refine Results
  1. 1

    Generating Autonomous Driving Test Scenarios based on OpenSCENARIO by Chen, He, Ren, Hongpinng, Li, Rui, Yang, Guang, Ma, Shanshan

    “…At present, with the rapid development of autonomous driving technology, simulation test has become an important means of autonomous driving technology…”
    Get full text
    Conference Proceeding
  2. 2

    Prototypical Network for Few-Shot Signal Recognition by Wang, Hanhong, Qi, Lin, Han, Yu, Lin, Yun

    “…With the rapid development of 5G and IoT technologies, Wireless Physical Layer Identification (WPLI) is essential for securing wireless communication…”
    Get full text
    Conference Proceeding
  3. 3

    Improving Search-based Test Case Generation with Local Search using Adaptive Simulated Annealing and Dynamic Symbolic Execution by Li, Dongcheng, Wong, W. Eric, Li, Shenglong, Chau, Matthew

    “…DynaMOSA is an effective search-based test case generation algorithm. However, it uses an alternating variable method for local search. This method follows a…”
    Get full text
    Conference Proceeding
  4. 4

    Spectrum Completion Based on HaLRTC by Sun, Lu, Lin, Yun

    “…With the development of communication technology, the number of communication devices has exploded. In order to utilize spectrum resources rationally, it is…”
    Get full text
    Conference Proceeding
  5. 5

    A General Dataset Generator for Industrial Internet of Things Using Multi-sensor Information Fusion by Wang, Mian, Sun, Jinlong, Lu, Zhiyi, Wang, Yu, Zhang, Yifan, Zhang, Jie, Zhang, Zhe, Gui, Guan

    “…The development of the fifth-generation (5G) communication technology is promoting the overall improvement of the Industrial Internet of Things (IIoT), and is…”
    Get full text
    Conference Proceeding
  6. 6

    A Novel Unsupervised Malware Detection Method based on Adversarial Auto-encoder and Deep Clustering by Zhang, Lanping, Yin, Jie, Ning, Jinhui, Wang, Yu, Adebisi, Bamidele, Yang, Jie

    “…Malware detection (MD) is considered as one of the key techniques to solve the problem of network intrusion in the field of cyber security. Exiting MD methods…”
    Get full text
    Conference Proceeding
  7. 7

    Quantitative Analysis of Information Leakage Hardware Trojans in IP Cores by Zhang, Senjie, Wang, Shuai, Wang, Jinbo, Zhou, Shan, Yao, Zhaohui

    “…Computing hardware has attracted the attention of malicious attackers due to the globalization of hardware designs and supply chains and the integration of…”
    Get full text
    Conference Proceeding
  8. 8

    Intelligent Urban Street Lighting System based on IoT Cloud Platform by Wang, Yujie, Deng, Zhi, Tao, Kai, Liu, Tao, Bao, Xianglin, Cheng, Bin

    “…Urban street lighting is an important basic part of all urban facilities construction, which can not only provide practical convenience for the daily life of…”
    Get full text
    Conference Proceeding
  9. 9

    Chinese Psychological QA Database and its Research Problems by Chen, Youren, Li, Yang, Wen, Ming

    “…In the past, with the development of the psychological industry in China, a large number of psychological databases have emerged. This paper surveys the…”
    Get full text
    Conference Proceeding
  10. 10

    Network Intrusion Detection based on RBF Neural Networks and Fuzzy Cluster by Liu, Zhiyu, Luo, Meishu, Ma, Baoying

    “…Network Intrusion detection is a key research topic in the field of information security. In view of the shortcomings of high data dimension and low detection…”
    Get full text
    Conference Proceeding
  11. 11

    Named Entity Recognition in Chinese E-commerce Domain Based on Multi-Head Attention by Mao, Hongliang, Yusup, Azragul, Ge, Yifei, Chen, Degang

    “…At present, the demand for entity recognition for product query and product recommendation systems of e-commerce domain is growing. Traditional methods that…”
    Get full text
    Conference Proceeding
  12. 12

    Efficient Malicious Traffic Classification Methods based on Semi-supervised Learning by Hu, Xiaoyi, Ning, Jinhui, Yin, Jie, Yang, Jie, Adebisi, Bamidele, Gacanin, Haris

    “…The proliferation of mobile communication systems, arrival of high-speed broadband networks and more complex network topologies have exacerbated cyber-threats…”
    Get full text
    Conference Proceeding
  13. 13

    Test Case Prioritization for Deep Neural Networks by Pan, Zhonghao, Zhou, Shan, Wang, Jianmin, Wang, Jinbo, Jia, Jiao, Feng, Yang

    “…A variety of neural network-based models are increasingly being applied to real life, including face recognition, autonomous driving, etc. However, neural…”
    Get full text
    Conference Proceeding
  14. 14

    Student Expression Recognition in Smart Education Environment based on Convolutional Neural Network by Yang, Hao, Peng, Cheng, Sun, Ruirui, Zhou, Yujun, Cui, Xiaobo

    “…With the rapid construction of smart education and the continuous development of artificial intelligence technology, the advantages of assessment based on…”
    Get full text
    Conference Proceeding
  15. 15

    A Quantitative Study of Impact of Incentive to Quality of Software Reviews by Tang, Mingwei, Xu, Zhiwei, Qin, Yuhao, Su, Cui, Zhu, Yi, Tao, Feifei, Ding, Junhua

    “…Online reviews like product reviews are important references for a potential user to learn the basic information of a product. However, some reviewers were…”
    Get full text
    Conference Proceeding
  16. 16

    A Quantitative Measurement Method of Code Quality Evaluation Indicators based on Data Mining by Shao, Yikang, Liu, Wu, Ai, Jun, Yang, Chunhui

    “…Software Code Quality Measurement is a systematic subject with a long history and rich theory. Since the 1960s, a large number of academic research on software…”
    Get full text
    Conference Proceeding
  17. 17

    Autonomous Evaluation of Unmanned Vehicles: A Survey by Li, Rui, Dai, Feifan, Meng, Lingzhong, Dong, Qian

    “…With the continuous improvement of the technical intelligence level of unmanned vehicle, the autonomy of unmanned vehicle has become one of the important…”
    Get full text
    Conference Proceeding
  18. 18

    Prioritization Method of Test Data for Intelligent Software based on Multi-objective Optimization by Xia, Chunyan, Huang, Yifan, Huang, Song, Zheng, Changyou, Wang, Yutong, Wang, Yu

    “…With the rapid development of the information industry, intelligent software testing has become one of the hot research. This paper studies how to extract…”
    Get full text
    Conference Proceeding
  19. 19

    A Software Defect Location Method based on Static Analysis Results by Shi, Haoxiang, Liu, Wu, Liu, Jingyu, Ai, Jun, Yang, Chunhui

    “…Code-graph based software defect prediction methods have become a research focus in SDP field. Among them, Code Property Graph is used as a form of data…”
    Get full text
    Conference Proceeding
  20. 20

    Precise Epidemic Control based on GeoHash by Huang, Youwei, Lu, Feng, Sang, Xiaolong, Hu, Bin, Tao, Jiachun

    “…Coronavirus Disease 2019 (COVID-19) is a highly transmissible and pathogenic coronavirus that emerged in late 2019 and has caused a pandemic of acute…”
    Get full text
    Conference Proceeding