default search action
27th PRDC 2022: Beijing, China
- 27th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2022, Beijing, China, November 28 - Dec. 1, 2022. IEEE 2022, ISBN 978-1-6654-8555-5
- Xiuwen Lu, Zhicong Zhang, Hui Xu:
Safe Rust Code Recommendation Based on Siamese Graph Neural Network. 1-11 - Mehdi Maleki, Mateen Malik, Peter Folkesson, Behrooz Sangchoolie, Johan Karlsson:
Modeling and Evaluating the Effects of Jamming Attacks on Connected Automated Road Vehicles. 12-23 - Yinqin Zhao, Chang Liu, Tao Yu, Long Wang, Xuanqing Shi, Yong Yang, Ying Li, Zhengang Wang, Dongdong Shangguan:
Tracing Processing of Service Requests in Cloud Environments. 24-33 - Mitsuho Takahashi, Fumio Machida, Qiang Wen:
How Data Diversification Benefits the Reliability of Three-version Image Classification Systems. 34-42 - Carmen Cârlan, Lydia Gauerhof, Barbara Gallina, Simon Burton:
Automating Safety Argument Change Impact Analysis for Machine Learning Components. 43-53 - Sabuj Laskar, Md Hasanur Rahman, Bohan Zhang, Guanpeng Li:
Characterizing Deep Learning Neural Network Failures Between Algorithmic Inaccuracy and Transient Hardware Faults. 54-67 - Raul Sena Ferreira, Joris Guérin, Jérémie Guiochet, Hélène Waeselynck:
SiMOOD: Evolutionary Testing Simulation With Out-Of-Distribution Images. 68-77 - David Paiva, Raffael S. C. G. de Lima, Manoel J. M. Carvalho, Fátima Mattiello-Francisco, Henrique Madeira:
Enhanced software development process for CubeSats to cope with space radiation faults. 78-88 - Zhihao Dai, Matthew Leeke, Yulong Ding, Shuanghua Yang:
A Heterogeneous Redundant Architecture for Industrial Control System Security. 89-97 - Giulio Masetti, Silvano Chiaradonna, Leonardo Robol, Felicita Di Giandomenico:
Random Bad State Estimator to Address False Data Injection in Critical Infrastructures. 98-108 - Joe Hewett, Mark Etman, Robbie Marseglia, Tomas Mella Pickersgill, Matthew Leeke:
Towards a Dependable Energy Market: Proof of Authority in a Blockchain-based Peer-to-Peer Microgrid. 109-118 - Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Dan Dongseong Kim:
Performance and Security Evaluation of a Moving Target Defense Based on a Software-Defined Networking Environment. 119-129 - Peter Folkesson, Behrooz Sangchoolie, Pierre Kleberger, Nasser Nowdehi:
On the Evaluation of Three Pre-Injection Analysis Techniques for Model-Implemented Fault- and Attack Injection. 130-140 - Júlio Mendonça, Minjune Kim, Rafal Graczyk, Marcus Völp, Dan Dongseong Kim:
Security Modeling and Analysis of Moving Target Defense in Software Defined Networks. 141-151 - José D'Abruzzo Pereira, João Henggeler Antunes, Marco Vieira:
A Software Vulnerability Dataset of Large Open Source C/C++ Projects. 152-163 - Trishna Rajkumar, Johnny Öberg:
AnoDe: A Log-based Self-Supervised Framework to Detect Scrubber Failures in SRAM-FPGA. 164-171 - Archita Ghosh, J. Lakshmi:
Understanding the Resiliency of Cloud Storage Services. 172-183 - Kangning Song, Siwei Zhou, Luyao Ye, Piaoyi Liu, Jing Tian, Jianwen Xiang:
Reliability Analysis of Multi-State System Based on Irrelevance Coverage Model. 184-193 - Anamta Khan, Naghmeh Ivaki, Henrique Madeira:
Are UAVs' Flight Controller Software Reliable? 194-204 - Joe Hewett, Matthew Leeke:
Developing a GPT-3-Based Automated Victim for Advance Fee Fraud Disruption. 205-211 - Qianying Liao, Alexandre Cortez Santos, Bruno Cabral, João Paulo Fernandes, Nuno Lourenço:
HERB+: Evolving an Industrial-Strength Privacy-Preserving Machine Learning Framework. 212-223 - Juan Manuel Morote, Jose Luis de la Vara, Giovanni Giachetti, Clara Ayora, Luis Alonso:
An Industrial Approach for Model-Based Reliability-Oriented System Design. 224-229 - Nicolas Rapin, Boutheina Bannour, Morayo Adedjouma:
Model-Based Generation and Analysis Toolset of Fault Trees With Heterogeneous Failure Events. 230-235 - Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, Pang-Chieh Wang:
Examining the Utility of Differentially Private Synthetic Data Generated using Variational Autoencoder with TensorFlow Privacy. 236-241 - Emad Kareem Mutar:
Signature of Electrical System Reliability Used Inside Aircraft. 242-247 - Jinwoo Kim, Jaehyun Nam:
Towards Building Secure and Reconfigurable Virtual Networks on Multi-Tenant Data Centers. 248-251 - Dohan Kim, Aming Wu, Young-Woo Kwon:
Comparison of Meta-Heuristic Algorithms for Task Scheduling in Distributed Stream Processing. 252-255 - Tomohiro Ishii, Kazuteru Namba:
Stuck-at Fault Tolerance in DNN Using Statistical data. 256-257 - Yinqin Zhao, Long Wang:
Extracting Network Knowledge and Monitoring Network Status on Cloud Container Platforms. 258-260 - Daoqi Han, Tao Yu, Yueming Lu:
Progressive Evolution Scheme with Socialization Swarm for Privacy Blockchain. 261-263
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.