Salus: A Novel Data-Driven Monitor that Enables Real-Time Safety in Autonomous Driving Systems (Englisch)
- Neue Suche nach: Zhang, Bohan
- Neue Suche nach: Huang, Yafan
- Neue Suche nach: Li, Guanpeng
- Neue Suche nach: Zhang, Bohan
- Neue Suche nach: Huang, Yafan
- Neue Suche nach: Li, Guanpeng
In:
2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)
;
85-94
;
2022
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Salus: A Novel Data-Driven Monitor that Enables Real-Time Safety in Autonomous Driving Systems
-
Beteiligte:
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.12.2022
-
Format / Umfang:2771019 byte
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
A Taxonomy of Software Flaws Leading to Buffer OverflowsKhoury, Raphael et al. | 2022
- 1
-
Title Page i| 2022
- 3
-
Title Page iii| 2022
- 4
-
Copyright Page| 2022
- 5
-
Table of Contents| 2022
- 9
-
A Comprehensive Analysis of NVD Concurrency VulnerabilitiesBo, Lili / Meng, Xing / Sun, Xiaobing / Xia, Jingli / Wu, Xiaoxue et al. | 2022
- 19
-
Message from the QRS 2022 Steering Committee Chairs, General Chairs, and Program Chairs| 2022
- 19
-
IntJect: Vulnerability Intent Bug SeedingPetit, Benjamin / Khanfir, Ahmed / Soremekun, Ezekiel / Perrouin, Gilles / Papadakis, Mike et al. | 2022
- 21
-
QRS 2022 Steering Committee| 2022
- 22
-
QRS 2022 Organizing Committee| 2022
- 23
-
QRS 2022 Program Committee| 2022
- 26
-
Chairs of Workshops Co-Located with QRS 2022| 2022
- 28
-
QRS 2022 Keynote Speech| 2022
- 31
-
Separating the Wheat from the Chaff: Using Indexing and Sub-Sequence Mining Techniques to Identify Related Crashes During Bug TriageJames, Kedrian / Du, Yufei / Das, Sanjeev / Monrose, Fabian et al. | 2022
- 43
-
Exploring Transformers for Multi-Label Classification of Java VulnerabilitiesMamede, Claudia / Pinconschi, Eduard / Abreu, Rui / Campos, Jose et al. | 2022
- 53
-
A BiLSTM-Attention Model for Detecting Smart Contract Defects More AccuratelyQian, Chen / Hu, Tianyuan / Li, Bixin et al. | 2022
- 63
-
Security Countermeasure Selection for Component-Based Software-Intensive SystemsSkandylas, Charilaos / Khakpour, Narges / Camara, Javier et al. | 2022
- 73
-
A Detection Method for Scarcity Defect of Blockchain Digital Asset based on Invariant AnalysisSun, Jinlei / Huang, Song / Wang, Xingya / Wang, Meijuan / Du, Jinhu et al. | 2022
- 85
-
Salus: A Novel Data-Driven Monitor that Enables Real-Time Safety in Autonomous Driving SystemsZhang, Bohan / Huang, Yafan / Li, Guanpeng et al. | 2022
- 95
-
Automatic Collaborative Testing of Applications Integrating Text Features and Priority Experience ReplayCai, Lizhi / Wang, Jin / Chen, Mingang / Wang, Jilong et al. | 2022
- 105
-
Cast Away: On the Security of DLNA Deployments in the SmartTV EcosystemTian, Guangwei / Chen, Jiongyi / Yan, Kailun / Yang, Shishuai / Diao, Wenrui et al. | 2022
- 117
-
GAN-Based Privacy-Preserving Unsupervised Domain AdaptationZhao, Dongdong / Wang, Zhao / Li, Huanhuan / Xiang, Jianwen et al. | 2022
- 127
-
Conceptualizing the Secure Machine Learning Operations (SecMLOps) ParadigmZhang, Xinrui / Jaskolka, Jason et al. | 2022
- 139
-
Identity Authentication Strategy of Mobile Crowd Sensing based on CFLWang, Lin / Li, Fangxiao / Xie, Yunfei / Shi, Leyi et al. | 2022
- 147
-
AuthROS: Secure Data Sharing Among Robot Operating Systems based on EthereumZhang, Shenhui / Li, Wenkai / Li, Xiaoqi / Liu, Boyi et al. | 2022
- 157
-
Semantic Feature Learning based on Double Sequences Structure for Software Defect Number PredictionWang, Tao / Tao, Chuanqi / Guo, Hongjing / Tang, Lijin et al. | 2022
- 167
-
An Empirical Study on Software Defect Prediction using Function Point AnalysisZhao, Xinghan / Tian, Cong et al. | 2022
- 177
-
An Empirical Study of the Bug Link RateLi, Chenglin / Zhao, Yangyang / Yang, Yibiao et al. | 2022
- 189
-
Visualization-Based Software Defect Prediction via Convolutional Neural Network with Global Self-AttentionQiu, Shaojian / Wang, Shaosheng / Tian, Xuhong / Huang, Mengyang / Huang, Qiong et al. | 2022
- 199
-
Telemetry-Based Software Failure Prediction by Concept-Space Model CreationAfshinpour, Bahareh / Groz, Roland / Amini, Massih-Reza et al. | 2022
- 209
-
Towards Extending the Range of Bugs That Automated Program Repair Can HandleAl-Bataineh, Omar I. / Moonen, Leon et al. | 2022
- 221
-
Division by Zero: Threats and Effects in Spectrum-Based Fault Localization FormulasVince, Daniel / Szatmari, Attila / Kiss, Akos / Beszedes, Arpad et al. | 2022
- 231
-
CGMBL: Combining GAN and Method Name for Bug LocalizationChen, Hao / Yang, Haiyang / Yan, Zilun / Kuang, Li / Zhang, Lingyan et al. | 2022
- 242
-
The Use of Pretrained Model for Matching App Reviews and Bug ReportsWang, Xiaojuan / Zhang, Wenyu / Lai, Shanyan / Ye, Chunyang / Zhou, Hui et al. | 2022
- 252
-
Context-Aware Program Simplification to Improve Information Retrieval-Based Bug LocalizationYang, Yilin / Wang, Ziyuan / Chen, Zhenyu / Xu, Baowen et al. | 2022
- 264
-
Anomaly Detection in Encrypted Identity Resolution Traffic based on Machine LearningZhu, Zhishen / Zhou, Hao / Yang, Qingya / Wang, Chonghua / Li, Zhen et al. | 2022
- 276
-
Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN EnvironmentsKim, Minjune / Cho, Jin-Hee / Lim, Hyuk / Moore, Terrence J. / Nelson, Frederica F. / Ko, Ryan K. L. / Dongseong Kim, Dan et al. | 2022
- 287
-
An Anomaly-Based Approach for Detecting Modularity Violations on Method PlacementYoda, Kazuki / Nakamaru, Tomoki / Akiyama, Soramichi / Chiba, Shigeru et al. | 2022
- 299
-
LogGD: Detecting Anomalies from System Logs with Graph Neural NetworksXie, Yongzheng / Zhang, Hongyu / Babar, Muhammad Ali et al. | 2022
- 311
-
An Ontological Analysis of Safety-Critical Software and Its AnomaliesLiu, Hezhen / Jin, Zhi / Zheng, Zheng / Huang, Chengqiang / Zhang, Xun et al. | 2022
- 321
-
A New Code Review Method based on Human ErrorsHuang, Fuqun / Zhao, Bo / Madeira, Henrique et al. | 2022
- 333
-
Contextual Operationalization of Metrics as Scores: Is My Metric Value Good?Honel, Sebastian / Ericsson, Morgan / Lowe, Welf / Wingkvist, Anna et al. | 2022
- 344
-
A Collaboration-Aware Approach to Profiling Developer Expertise with Cross-Community DataSong, Xiaotao / Yan, Jiafei / Huang, Yuexin / Sun, Hailong / Zhang, Hongyu et al. | 2022
- 356
-
Proposing a Quality Model for Evaluating and Identifying Opportunities in Clinical Practice Guideline EnginesCarrero, M. / Enamorado-Diaz, E. / Garcia-Garcia, J.A. / Escalona, Mj et al. | 2022
- 366
-
Emotional Dashboard: a Non-Intrusive Approach to Monitor Software Developers' Emotions and Personality TraitsSilva, Leo / Castro, Marilia / Silva, Miriam / Santos, Milena / Kulesza, Uira / Lima, Margarida / Madeira, Henrique et al. | 2022
- 376
-
A Novel Approach for Bounded Model Checking Through Full ParallelismSang, Debao / Liu, Jing / Sun, Haiying / Xu, Jin / Kang, Jiexiang et al. | 2022
- 388
-
Safety SysML: An Executable Safety-Critical Avionics Requirement Modeling LanguageLiu, Huiyu / Liu, Jing / Yin, Wei / Sun, Haiying / Yang, Chenchen et al. | 2022
- 400
-
Model Checking the Safety of Raft Leader Election AlgorithmBao, Qihao / Li, Bixin / Hu, Tianyuan / Cao, Dongyu et al. | 2022
- 410
-
Formal Verification of Hierarchical Ptolemy II Synchronous-Reactive Models with Bounded Model CheckingZhang, Xiaozhen / Yang, Zhaoming / Kong, Hui / Kong, Weiqiang et al. | 2022
- 422
-
Coverage Testing of Industrial Simulink Models using Monte-Carlo and SMT-Based MethodsIshii, Daisuke / Tomita, Takashi / Aoki, Toshiaki / Ngo, The Quyen / Do, Thi Bich Ngoc / Takai, Hideaki et al. | 2022
- 434
-
Availability and Cost aware Multi-'omain Service Deployment OptimizationZhang, Chuangchuang / Liu, Yanming / Yang, Hongyong / Li, Yihao / Zhang, Shuning et al. | 2022
- 442
-
Cache Optimizations for Test Case ReductionVince, Daniel / Kiss, Akos et al. | 2022
- 454
-
Nimbus: Toward Speed Up Function Signature Recovery via Input Resizing and Multi-Task LearningQian, Yi / Chen, Ligeng / Wang, Yuyang / Mao, Bing et al. | 2022
- 464
-
Reuse of Test Case based on Attributes Weight OptimizationShi, Yaqing / Huang, Song / Wan, Jinyong et al. | 2022
- 473
-
GOV: A Verification Method for Smart Contract Gas-OptimizationHuang, Yuan / Wang, Rong / Chen, Xiangping / Zhou, Xiaocong / Wang, Ziyan et al. | 2022
- 480
-
Stateful Depletion and Scheduling of Containers on Cloud Nodes for Efficient Resource UsageAmiri, Amirali / Zdun, Uwe / Plakidas, Konstantinos et al. | 2022
- 492
-
Understanding and Mitigating Label Bias in Malware Classification: An Empirical StudyYan, Jia / Jia, Xiangkun / Ying, Lingyun / Su, Purui et al. | 2022
- 504
-
Can PoW Consensus Protocol Resist the Whale Attack?Sun, Xueyong / Bao, Qihao / Li, Bixin et al. | 2022
- 516
-
Towards Improving Multiple Authorship Attribution of Source CodeHao, Pengnan / Li, Zhen / Liu, Cui / Wen, Yu / Liu, Fanming et al. | 2022
- 527
-
CBSDI: Cross-Architecture Binary Code Similarity Detection based on Index TableDeng, Longmin / Zhao, Dongdong / Zhou, Junwei / Xia, Zhe / Xiang, Jianwen et al. | 2022
- 537
-
PDG2Vec: Identify the Binary Function Similarity with Program Dependence GraphZhang, Yuntao / Wang, Yanhao / Liu, Yuwei / Pang, Zhengyuan / Fang, Binxing et al. | 2022
- 549
-
Uncertainty-Aware Behavior Modeling and Quantitative Safety Evaluation for Automatic Flight Control SystemsLiu, Huiyu / Liu, Jing / Sun, Haiying / Li, Tengfei / Zhang, John et al. | 2022
- 561
-
ucXception: A Framework for Evaluating Dependability of Software SystemsDavid Almeida, Pedro / Cerveira, Frederico / Barbosa, Raul / Madeira, Henrique et al. | 2022
- 571
-
SAS-GKE: A Secure Authenticated Scalable Group Key ExchangeFaisal, Abu / Zulkernine, Mohammad et al. | 2022
- 583
-
Assessing the Quality of Low-Code and Model-Driven Engineering Platforms for Engineering IoT SystemsIhirwe, Felicien / Di Ruscio, Davide / Gianfranceschi, Simone / Pierantonio, Alfonso et al. | 2022
- 595
-
A Pattern-Based Test Platform for Families of Smart Health ProductsAlmeida, Pedro / Faria, Joao Pascoal / Lima, Bruno et al. | 2022
- 606
-
cPV – Simulation and Verification for Membrane ComputingLiu, Yezhou / Sun, Jing / Nicolescu, Radu / Wang, Hai et al. | 2022
- 616
-
Multi-Transaction Sequence Vulnerability Detection for Smart Contracts based on Inter-Path Data DependencyZhang, Shuai / Wang, Meng / Liu, Yi / Zhang, Yuhan / Yu, Bin et al. | 2022
- 628
-
Valkyrie: Improving Fuzzing Performance Through Deterministic TechniquesRong, Yuyang / Zhang, Chibin / Liu, Jianzhong / Chen, Hao et al. | 2022
- 640
-
Automated Grey-Box Testing of Microservice ArchitecturesGiamattei, L. / Guerriero, A. / Pietrantuono, R. / Russo, S. et al. | 2022
- 651
-
TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by FuzzingCao, Mingpei / Zhang, Yueze / Feng, Zhenxuan / Hu, Jiahao / Zhu, Yuesheng et al. | 2022
- 663
-
Crowdsourced Testing Task Assignment based on Knowledge GraphsYang, Peng / Chang, Chao / Tang, Yong et al. | 2022
- 672
-
A Functional FMECA Approach for the Assessment of Critical Infrastructure ResilienceCarvalho, Goncalo / Medeiros, Nadia / Madeira, Henrique / Cabral, Bruno et al. | 2022
- 682
-
Predictive Mutation Analysis of Test Case Prioritization for Deep Neural NetworksWei, Zhengyuan / Wang, Haipeng / Ashraf, Imran / Chan, W.K. et al. | 2022
- 694
-
Automated Synthesis of Quantum Circuits using Neural NetworkMurakami, Kentaro / Zhao, Jianjun et al. | 2022
- 703
-
Test Reuse based on Adaptive Semantic Matching across Android Mobile ApplicationsLiu, Shuqi / Zhou, Yu / Han, Tingting / Chen, Taolue et al. | 2022
- 710
-
Test Case Generation for Ethereum Smart Contract based on Data Dependency Analysis of State VariableDu, Jinhu / Huang, Song / Wang, Xingya / Zheng, Changyou / Sun, Jinlei et al. | 2022
- 721
-
Extracting Temporal Models from Data EpisodesChetouane, Nour / Wotawa, Franz et al. | 2022
- 732
-
MC/DC Test Case Automatic Generation for Safety-Critical SystemsWang, Cong / Sun, Haiying / Dou, Hui / Chen, Hongtao / Liu, Jing et al. | 2022
- 744
-
Generating Abstract Test Cases from User Requirements using MDSE and NLPAllala, Sai Chaithra / Sotomayor, Juan P. / Santiago, Dionny / King, Tariq M. / Clarke, Peter J. et al. | 2022
- 754
-
DeepRTest: A Vulnerability-Guided Robustness Testing and Enhancement Framework for Deep Neural NetworksYang, Minghao / Yang, Shunkun / Wu, Wenda et al. | 2022
- 763
-
An Effective Low-Dimensional Software Code Representation using BERT and ELMoMajumdar, Srijoni / Varshney, Ashutosh / Pratim Das, Partha / Clough, Paul D / Chattopadhyay, Samiran et al. | 2022
- 775
-
Building Safe and Stable DNN Controllers using Deep Reinforcement Learning and Deep Imitation LearningHe, Xudong et al. | 2022
- 785
-
Evaluating the Robustness of Deep Reinforcement Learning for Autonomous Policies in a Multi-Agent Urban Driving EnvironmentSharif, Aizaz / Marijan, Dusica et al. | 2022
- 797
-
ParGCN: Abnormal Transaction Detection based on Graph Neural NetworksYu, Lian / Jing, Qi / Li, Ruomiao / Cheng, Zhiya / Xu, Chang et al. | 2022
- 809
-
A Survey on Backdoor Attack and Defense in Natural Language ProcessingSheng, Xuan / Han, Zhaoyang / Li, Piji / Chang, Xiangmao et al. | 2022
- 821
-
Mutation Testing based Safety Testing and Improving on DNNsWei, Yuhao / Huang, Song / Wang, Yu / Liu, Ruilin / Xia, Chunyan et al. | 2022
- 830
-
Focus on New Test Cases in Continuous Integration Testing based on Reinforcement LearningChen, Fanliang / Li, Zheng / Shang, Ying / Yang, Yang et al. | 2022
- 842
-
A Distance-Based Dynamic Random Testing Strategy for Natural Language Processing DNN ModelsLi, Yuechen / Pei, Hanyu / Huang, Linzhi / Yin, Beibei et al. | 2022
- 854
-
EDDNet: An Efficient and Accurate Defect Detection Network for the Industrial Edge EnvironmentQin, Runbing / Chen, Ningjiang / Huang, Yihui et al. | 2022
- 864
-
Evaluation of the Architecture Alternatives for Real-Time Intrusion Detection Systems for VehiclesJedh, Mubark / Lee, Jian Kai / Othmane, Lot i Ben et al. | 2022
- 874
-
Strategies for Improving the Error Robustness of Convolutional Neural NetworksMorais, Antonio / Barbosa, Raul / Lourenco, Nuno / Cerveira, Frederico / Lombardi, Michele / Madeira, Henrique et al. | 2022
- 884
-
Parameter Description Generation with the Code Parameter FlowChen, Qiuyuan / Yang, Zezhou / Liu, Zhongxin / Li, Shanping / Gao, Cuiyun et al. | 2022
- 896
-
GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call SequencesTony, Catherine / Diaz Ferreyra, Nicolas E. / Scandariato, Riccardo et al. | 2022
- 907
-
Improved Methods of Pointer Mixture Network for Code CompletionWei, Cheng / Huang, Zhiqiu / Yu, Yaoshen et al. | 2022
- 916
-
Automated Identification of Performance Changes at Code LevelReichelt, David Georg / Kuhne, Stefan / Hasselbring, Wilhelm et al. | 2022
- 926
-
Cross Platform API Mappings based on API Documentation GraphsShao, Yanjie / Luo, Tianyue / Ling, Xiang / Wang, Limin / Zheng, Senwen et al. | 2022
- 936
-
CodeBERT-nt: Code Naturalness via CodeBERTKhanfir, Ahmed / Jimenez, Matthieu / Papadakis, Mike / Traon, Yves Le et al. | 2022
- 948
-
RetCom: Information Retrieval-Enhanced Automatic Source-Code SummarizationZhang, Yubo / Liu, Yanfang / Fan, Xinxin / Lu, Yunfeng et al. | 2022
- 958
-
API Misuse Detection Method Based on TransformerYang, Jingbo / Ren, Jian / Wu, Wenjun et al. | 2022
- 970
-
CRUST: Towards a Unified Cross-Language Program Analysis Framework for RustHu, Shuang / Hua, Baojian / Xia, Lei / Wang, Yang et al. | 2022
- 982
-
Comprehensiveness, Automation and Lifecycle: A New Perspective for Rust SecurityHu, Shuang / Hua, Baojian / Wang, Yang et al. | 2022
- 992
-
A Proactive Self-Adaptation Approach for Software Systems based on Environment-Aware Model Predictive ControlChen, Zhengyin / Jiao, Wenpin et al. | 2022
- 1004
-
MetaA: Multi-Dimensional Evaluation of Testing Ability via Adversarial Examples in Deep LearningGu, Siqi / Liu, Jiawei / Hui, Zhanwei / Liu, Wenhong / Chen, Zhenyu et al. | 2022
- 1014
-
MiSim: A Simulator for Resilience Assessment of Microservice-Based ArchitecturesFrank, Sebastian / Wagner, Lion / Hakamian, Alireza / Straesser, Martin / van Hoorn, Andre et al. | 2022
- 1026
-
Quantity-Simulation-Analysis Method based Novel RSA Timing Attack Algorithm for Single-Chip Microcomputer PlatformLi, Cong / Han, Qiang / Zhang, Tao / Lei, Bingbing / He, Yu et al. | 2022
- 1036
-
Continuous Usability Requirements Evaluation based on Runtime User Behavior MiningLi, Tong / Zhang, Tianai et al. | 2022
- 1046
-
Adopting Misclassification Detection and Outlier Modification to Fault Correction in Deep Learning-Based SystemsChu, Chuan-Min / Huang, Chin-Yu / Fang, Neil C. et al. | 2022
- 1057
-
Quantitative Analysis of Sparsely Synchronized Fail-Safe ProcessorsInoue, Jun / Nishihara, Hideaki / Mori, Akira et al. | 2022
- 1069
-
An Empirical Study on Source Code Feature Extraction in Preprocessing of IR-Based Requirements TraceabilityWang, Bangchao / Deng, Yang / Luo, Ruiqi / Jin, Huan et al. | 2022
- 1079
-
Pain Pickle: Bypassing Python Restricted Unpickler for Automatic Exploit GenerationHuang, Nan-Jung / Huang, Chih-Jen / Huang, Shih-Kun et al. | 2022
- 1091
-
An Empirical Study on Software Aging of Long-Running Object Detection AlgorithmsPietrantuono, Roberto / Cotroneo, Domenico / Andrade, Ermeson / Machida, Fumio et al. | 2022
- 1103
-
Scriptless GUI Testing on Mobile ApplicationsJansen, Thorn / Ricos, Fernando Pastor / Luo, Yaping / van der Vlist, Kevin / van Dalen, Robbert / Aho, Pekka / Vos, Tanja E. J. et al. | 2022
- 1113
-
An Exploratory Study for GUI Posts on Stack OverflowDing, Jing / Nie, Liming / Liu, Yang / Ding, Zuohua / Xuan, Jifeng et al. | 2022
- 1125
-
Fine-Tuning Pre-Trained Model to Extract Undesired Behaviors from App ReviewsZhang, Wenyu / Wang, Xiaojuan / Lai, Shanyan / Ye, Chunyang / Zhou, Hui et al. | 2022
- 1135
-
A Framework for Scanning Privacy Information based on Static AnalysisZhao, Yuan / Yi, Gaolei / Liu, Fan / Hui, Zhanwei / Zhao, Jianhua et al. | 2022
- 1146
-
EWDLL: Software Aging State Identification based on LightGBM-LR Hybrid ModelTan, Xueyong / Liu, Jing et al. | 2022
- 1159
-
Author Index| 2022