default search action
33rd ISSRE 2022: Charlotte, NC, USA
- IEEE 33rd International Symposium on Software Reliability Engineering, ISSRE 2022, Charlotte, NC, USA, October 31 - Nov. 3, 2022. IEEE 2022, ISBN 978-1-6654-5132-1
- Katerina Goseva-Popstojanova, Bojan Cukic:
Message from the General Co-Chairs: ISSRE 2022. xiii - Fabrizio Pastore, Lingming Zhang:
Message from the Program Co-Chairs: ISSRE 2022. xiv - Wei Lin, Lu Zhang, Haotian Zhang, Kailai Shao, Mingming Zhang, Tao Xie:
TaintSQL: Dynamically Tracking Fine-Grained Implicit Flows for SQL Statements. 1-12 - Chuyang Chen, Huiyan Wang, Lingyu Zhang, Chang Xu, Ping Yu:
Minimizing Link Generation in Constraint Checking for Context Inconsistency Detection. 13-24 - Zilong He, Pengfei Chen, Tao Huang:
Share or Not Share? Towards the Practicability of Deep Models for Unsupervised Anomaly Detection in Modern Online Systems. 25-35 - Tabea Schmidt, Alexander Pretschner:
StellaUAV: A Tool for Testing the Safe Behavior of UAVs with Scenario-Based Testing (Tools and Artifact Track). 37-48 - Boyue Caroline Hu, Lina Marsso, Krzysztof Czarnecki, Marsha Chechik:
What to Check: Systematic Selection of Transformations for Analyzing Reliability of Machine Vision Components. 49-60 - Ayoosh Bansal, Hunmin Kim, Simon Yu, Bo Li, Naira Hovakimyan, Marco Caccamo, Lui Sha:
Verifiable Obstacle Detection. 61-72 - Kevin Leach, Christopher Steven Timperley, Kevin Angstadt, Anh Nguyen-Tuong, Jason Hiser, Aaron Paulos, Partha P. Pal, Patrick Hurley, Carl Thomas, Jack W. Davidson, Stephanie Forrest, Claire Le Goues, Westley Weimer:
START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report). 73-84 - Yiming Gan, Paul N. Whatmough, Jingwen Leng, Bo Yu, Shaoshan Liu, Yuhao Zhu:
Braum: Analyzing and Protecting Autonomous Machine Software Stack. 85-96 - Peter Bishop, Andrey Povyakalo, Lorenzo Strigini:
Bootstrapping confidence in future safety from past safe operation. 97-108 - Takumi Iguchi, Hiroshi Yamada:
Graceful ECC-uncorrectable Error Handling in the Operating System Kernel. 109-120 - Xiaoyun Li, Guangba Yu, Pengfei Chen, Hongyang Chen, Zhekang Chen:
Going through the Life Cycle of Faults in Clouds: Guidelines on Fault Handling. 121-132 - Jeongju Sohn, Mike Papadakis:
CEMENT: On the Use of Evolutionary Coupling Between Tests and Code Units. A Case Study on Fault Localization. 133-144 - Ezio Bartocci, Leonardo Mariani, Dejan Nickovic, Drishti Yadav:
Search-based Testing for Accurate Fault Localization in CPS. 145-156 - Julia Sorrentino, Priscila Silva, Gaspard Baye, Gökhan Kul, Lance Fiondella:
Covariate Software Vulnerability Discovery Model to Support Cybersecurity Test & Evaluation (Practical Experience Report). 157-168 - Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu:
Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well? 169-180 - Vittorio Orbinato, Mariarosaria Barbaraci, Roberto Natella, Domenico Cotroneo:
Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study: (Practical Experience Report). 181-192 - Han Wu, Zilong Zhao, Lydia Y. Chen, Aad van Moorsel:
Federated Learning for Tabular Data: Exploring Potential Risk to Privacy. 193-204 - Matheus Torquato, Paulo Romero Martins Maciel, Marco Vieira:
Software Rejuvenation Meets Moving Target Defense: Modeling of Time-Based Virtual Machine Migration Approach. 205-216 - Zihe Song, Yingfeng Chen, Lei Ma, Shangjie Lu, Honglei Lin, Changjie Fan, Wei Yang:
An Empirical Analysis of Compatibility Issues for Industrial Mobile Games (Practical Experience Report). 217-228 - Ana Jovanovic, Allison Sullivan:
REACH: Refining Alloy Scenarios by Size (Tools and Artifact Track). 229-238 - Ke Zhang, Chenxi Zhang, Xin Peng, Chaofeng Sha:
PUTraceAD: Trace Anomaly Detection with Partial Labels based on GNN and PU Learning. 239-250 - Miaomiao Wang, Baoquan Cui, Jiwei Yan, Jun Yan, Jian Zhang:
String Test Data Generation for Java Programs. 251-262 - Mi Ding, Kaipeng Lin, Wang Lin, Zuohua Ding:
A Novel Counterexample-Guided Inductive Synthesis Framework for Barrier Certificate Generation. 263-273 - Yiqun Chen, Oliver Schwahn, Roberto Natella, Matthew Bradbury, Neeraj Suri:
SlowCoach: Mutating Code to Simulate Performance Bugs. 274-285 - Udit Kumar Agarwal, Abraham Chan, Karthik Pattabiraman:
LLTFI: Framework Agnostic Fault Injection for Machine Learning Applications (Tools and Artifact Track). 286-296 - Tingzhu Bi, Yicheng Pan, Xinrui Jiang, Meng Ma, Ping Wang:
VECROsim: A Versatile Metric-oriented Microservice Fault Simulation System (Tools and Artifact Track). 297-308 - Bin Du, Yuxiaoyang Cai, Haifeng Wang, Yong Liu, Xiang Chen:
Improving the Performance of Mutation-based Fault Localization via Mutant Bias Practical Experience Report. 309-320 - Yiran Cheng, Bo Cheng, Pengxiang Jin, Yongqian Sun, Xiaohui Nie, Nengwen Zhao, Shenglin Zhang, Dan Pei:
Effective Attribute Selection for Multi-dimensional Root Cause Analysis. 321-331 - Ning Ge, Yuchen Liu:
MC-FLoc: Learning from Traces to Locate Fault in Petri Net Model Checking. 332-343 - Yanping Yang, Ling Xu, Meng Yan, Zhou Xu, Zhongyang Deng:
A Naming Pattern Based Approach for Method Name Recommendation. 344-354 - He Su, Lili Xu, Huina Chao, Feng Li, Zimu Yuan, Jianhua Zhou, Wei Huo:
A Sanitizer-centric Analysis to Detect Cross-Site Scripting in PHP Programs. 355-365 - Xuanrun Wang, Kanglin Yin, Qianyu Ouyang, Xidao Wen, Shenglin Zhang, Wenchi Zhang, Li Cao, Jiuxue Han, Xing Jin, Dan Pei:
Identifying Erroneous Software Changes through Self-Supervised Contrastive Learning on Time Series Data. 366-377 - Mingyue Zhang, Zhi Jin, Jian Hou, Renwei Luo:
Resilient Mechanism Against Byzantine Failure for Distributed Deep Reinforcement Learning. 378-389 - Jing Su, Zhen Zhang, Peng Wu, Xuran Li, Jian Zhang:
Adversarial Input Detection Based on Critical Transformation Robustness. 390-401 - Xiaoyuan Xie, Ying Duan, Songqiang Chen, Jifeng Xuan:
Towards the Robustness of Multiple Object Tracking Systems. 402-413 - Joris Guérin, Raul Sena Ferreira, Kevin Delmas, Jérémie Guiochet:
Unifying Evaluation of Machine Learning Safety Monitors. 414-422 - Zhihao Liu, Yang Zheng, Xiaoting Du, Zheng Hu, Wenjie Ding, Yanming Miao, Zheng Zheng:
Taxonomy of Aging-related Bugs in Deep Learning Libraries. 423-434 - Kai Jia, Xiao Yu, Chen Zhang, Wenhua Hu, Dongdong Zhao, Jianwen Xiang:
The Impact of Software Aging and Rejuvenation on the User Experience for Android System. 435-445 - Jianfei Zhu, Guanping Xiao, Zheng Zheng, Yulei Sui:
Enhancing Traceability Link Recovery with Unlabeled Data. 446-457 - Dongjin Yu, Yihang Xu, Lehui Weng, Jie Chen, Xin Chen, Quanxin Yang:
Detecting and Refactoring Feature Envy Based on Graph Neural Network. 458-469 - Xingliang Du, Jun Ma:
AexPy: Detecting API Breaking Changes in Python Packages. 470-481 - Ao Liu, Chenkai Guo, Naipeng Dong, Yinjie Wang, Jing Xu:
DALT: Deep Activity Launching Test via Intent-Constraint Extraction. 482-493 - Facundo Molina, Pablo Ponzio, Nazareno Aguirre, Marcelo F. Frias:
Learning to Prune Infeasible Paths in Generalized Symbolic Execution. 494-504 - Qiuping Yi, Guowei Yang:
Feedback-Driven Incremental Symbolic Execution. 505-516 - Claudius Jordan, Philipp Foth, Matthias Fruth, Alexander Pretschner:
Why Did the Test Execution Fail? Failure Classification Using Association Rules (Practical Experience Report). 517-528 - Haoxin Tu, He Jiang, Xiaochen Li, Zhilei Ren, Zhide Zhou, Lingxiao Jiang:
Remgen: Remanufacturing a Random Program Generator for Compiler Testing. 529-540 - Jon Ayerdi, Aitor Arrieta, Ernest Bota Pobee, Maite Arratibel:
Multi-Objective Metamorphic Test Case Selection: an Industrial Case Study (Practical Experience Report). 541-552
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.