default search action
35th ISSRE 2024: Tsukuba, Japan
- 35th IEEE International Symposium on Software Reliability Engineering, ISSRE 2024, Tsukuba, Japan, October 28-31, 2024. IEEE 2024, ISBN 979-8-3503-5388-4
- Lei Cui, Yiran Zhu, Junnan Yin, Zhiyu Hao, Wei Wang, Peng Liu, Ziqi Yang, Xiaochun Yun:
APIBeh: Learning Behavior Inclination of APIs for Malware Classification. 1-12 - Ziang Liu, Xin Liu, Yingli Zhang, Zihao Zhang, Song Li, Weina Niu, Qingguo Zhou, Rui Zhou, Xiaokang Zhou:
LiScopeLens: An Open-Source License Incompatibility Analysis Tool Based on Scope Representation of License Terms. 13-24 - Yuan Yuan, Tongqing Zhou, Xiuhong Tan, Yongqian Sun, Yuqi Li, Zhixing Li, Zhiping Cai, Tiejun Li:
Exploring Hierarchical Patterns for Alert Aggregation in Supercomputers. 25-36 - Tommaso Puccetti, Andrea Ceccarelli:
Detection Latencies of Anomaly Detectors - An Overlooked Perspective? 37-48 - Changhua Pei, Zihan Liu, Jianhui Li, Erhan Zhang, Le Zhang, Haiming Zhang, Wei Chen, Dan Pei, Gaogang Xie:
Self-Evolutionary Group-wise Log Parsing Based on Large Language Model. 49-60 - Haotian Si, Jianhui Li, Changhua Pei, Hang Cui, Jingwen Yang, Yongqian Sun, Shenglin Zhang, Jingjing Li, Haiming Zhang, Jing Han, Dan Pei, Gaogang Xie:
TimeSeriesBench: An Industrial-Grade Benchmark for Time Series Anomaly Detection Models. 61-72 - Zichao Xia, Yuting Chen, Pengbo Nie, Zihan Wang:
Detecting Numerical Deviations in Deep Learning Models Introduced by the TVM Compiler. 73-83 - Shaojie Yang, Haoran Xu, Fangliang Xu, Yongjun Wang:
S2Vul: Vulnerability Analysis Based on Self-supervised Information Integration. 84-95 - Shree Hari Bittugondanahalli Indra Kumar, Lilia Rodrigues Sampaio, André Martin, Andrey Brito, Christof Fetzer:
A Comprehensive Study on the Impact of Vulnerable Dependencies on Open-Source Software. 96-107 - Wei Chang, Chunyang Ye, Hui Zhou:
Fine-Tuning Pre-trained Model with Optimizable Prompt Learning for Code Vulnerability Detection. 108-119 - Mei Han, Lulu Wang, Jianming Chang, Bixin Li, Chunguang Zhang:
Learning Graph-based Patch Representations for Identifying and Assessing Silent Vulnerability Fixes. 120-131 - Minghua He, Tong Jia, Chiming Duan, Huaqian Cai, Ying Li, Gang Huang:
LLMeLog: An Approach for Anomaly Detection based on LLM-enriched Log Events. 132-143 - Pei Xiao, Tong Jia, Chiming Duan, Huaqian Cai, Ying Li, Gang Huang:
LogCAE: An Approach for Log-based Anomaly Detection with Active Learning and Contrastive Learning. 144-155 - Jinyuan Wang, Tong Li, Runzi Zhang, Zifang Tang, Di Wu, Zhen Yang:
VCRLog: Variable Contents Relationship Perception for Log-based Anomaly Detection. 156-167 - Wanhao Zhang, Qianli Zhang, Enyu Yu, Yuxiang Ren, Yeqing Meng, Mingxi Qiu, Jilong Wang:
Leveraging RAG-Enhanced Large Language Model for Semi-Supervised Log Anomaly Detection. 168-179 - Pietro Liguori, Cristina Improta, Roberto Natella, Bojan Cukic, Domenico Cotroneo:
Enhancing AI-based Generation of Software Exploits with Contextual Information. 180-191 - Shuang Li, Rui Li, Shishuai Yang, Wenrui Diao:
Android's Cat-and-Mouse Game: Understanding Evasion Techniques against Dynamic Analysis. 192-203 - Minghui Li, Yang Li, Hao Han, Xiaopeng Ke, Tongyu Wang, Fengyuan Xu, Liming Fang:
REDLC: Learning-driven Reverse Engineering for Deep Learning Compilers. 204-215 - Shuang Li, Yuntao Cheng, Jinfu Chen, Jifeng Xuan, Sen He, Weiyi Shang:
Assessing the Performance of AI-Generated Code: A Case Study on GitHub Copilot. 216-227 - Yunze Zhao, Yuchen Zhang, Dan Chacko, Justin Cappos:
CovSBOM: Enhancing Software Bill of Materials with Integrated Code Coverage Analysis. 228-237 - Shenglin Zhang, Zeyu Che, Zhongjie Pan, Xiaohui Nie, Yongqian Sun, Lemeng Pan, Dan Pei:
LabelEase: A Semi-Automatic Tool for Efficient and Accurate Trace Labeling in Microservices. 238-247 - Anna Schmedding, Lishan Yang, Adwait Jog, Evgenia Smirni:
Aspis: Lightweight Neural Network Protection Against Soft Errors. 248-259 - Keyur Joshi, Chiao Hsieh, Sayan Mitra, Sasa Misailovic:
GAS: Generating Fast & Accurate Surrogate Models for Simulations of Autonomous Vehicle Systems. 260-271 - João Paulo Costa de Araujo, Balahari Vignesh Balu, Eik Reichmann, Jessica Kelly, Stefan Kugele, Núria Mata, Lars Grunske:
Applying Concept-Based Models for Enhanced Safety Argumentation. 272-283 - Torin Viger, Logan Murphy, Simon Diemert, Claudio Menghi, Jeff Joyce, Alessio Di Sandro, Marsha Chechik:
AI-Supported Eliminative Argumentation: Practical Experience Generating Defeaters to Increase Confidence in Assurance Cases. 284-294 - Yifan Wang, Jun Xu:
Multi-level Fuzzing for Document File Formats with Intermediate Representations. 295-306 - Tingke Wen, Yuwei Li, Lu Zhang, Huimin Ma, Zulie Pan:
An Empirical Study on the Distance Metric in Guiding Directed Grey-box Fuzzing. 307-318 - Taiyan Wang, Ruipeng Wang, Yu Chen, Lu Yu, Zulie Pan, Min Zhang, Huimin Ma, Jinghua Zheng:
Enhancing Black-box Compiler Option Fuzzing with LLM through Command Feedback. 319-330 - Zhenye Fan, Guixin Ye, Tianmin Hu, Zhanyong Tang:
History-driven Compiler Fuzzing via Assembling and Scheduling Bug-triggering Code Segments. 331-342 - Hao Wang, Pu (Luke) Yi, Jeremias Parladorio, Wing Lam, Darko Marinov, Tao Xie:
Hierarchy-Aware Regression Test Prioritization. 343-354 - Tarek Mahmud, Meiru Che, Anne H. H. Ngu, Guowei Yang:
An Empirical Investigation on Android App Testing Practices. 355-366 - Jun Liu, Jiwei Yan, Yuanyuan Xie, Jun Yan, Jian Zhang:
Fix the Tests: Augmenting LLMs to Repair Test Cases with Static Collector and Neural Reranker. 367-378 - Patanamon Thongtanunam, Chakkrit Tantithamthavorn:
Code Ownership: The Principles, Differences, and Their Associations with Software Quality. 379-390 - Zhenhe Yao, Haowei Ye, Changhua Pei, Guang Cheng, Guangpei Wang, Zhiwei Liu, Hongwei Chen, Hang Cui, Zeyan Li, Jianhui Li, Gaogang Xie, Dan Pei:
SparseRCA: Unsupervised Root Cause Analysis in Sparse Microservice Testing Traces. 391-402 - Wenwei Gu, Xinying Sun, Jinyang Liu, Yintong Huo, Zhuangbin Chen, Jianping Zhang, Jiazhen Gu, Yongqiang Yang, Michael R. Lyu:
KPIRoot: Efficient Monitoring Metric-based Root Cause Localization in Large-scale Cloud Systems. 403-414 - Jin Huang, Pengfei Chen, Guangba Yu, Yilun Wang, Haiyu Huang, Zilong He:
FaaSRCA: Full Lifecycle Root Cause Analysis for Serverless Applications. 415-426 - Jian Wang, Shangqing Liu, Xiaofei Xie, Jingkai Siow, Kui Liu, Yi Li:
Ratchet: Retrieval Augmented Transformer for Program Repair. 427-438 - Seongdeok Seo, Judy S. Lee, Mijung Kim:
Testing Diverse Geographical Features of Autonomous Driving Systems. 439-450 - Dong Huang, Tsz On Li, Xiaofei Xie, Heming Cui:
Themis: Automatic and Efficient Deep Learning System Testing with Strong Fault Detection Capability. 451-462 - Peng Wang, Shengyou Hu, Huayao Wu, Xintao Niu, Changhai Nie, Lin Chen:
A Combinatorial Interaction Testing Method for Multi-Label Image Classifier. 463-474 - Tobias John, Einar Broch Johnsen, Eduard Kamburjan:
Mutation-Based Integration Testing of Knowledge Graph Applications. 475-486 - Yi Cai, Xiaohui Wan, Zhihao Liu, Zheng Zheng:
DRLFailureMonitor: A Dynamic Failure Monitoring Approach for Deep Reinforcement Learning System. 487-498 - Haozhe Li, Minghua Ma, Yudong Liu, Pu Zhao, Shuo Li, Ze Li, Murali Chintalapati, Yingnong Dang, Chetan Bansal, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang:
Can We Trust Auto-Mitigation? Improving Cloud Failure Prediction with Uncertain Positive Learning. 499-510 - Junjie Huang, Zhihan Jiang, Jinyang Liu, Yintong Huo, Jiazhen Gu, Zhuangbin Chen, Cong Feng, Hui Dong, Zengyin Yang, Michael R. Lyu:
Demystifying and Extracting Fault-indicating Information from Logs for Failure Diagnosis. 511-522 - Zexin Wang, Jianhui Li, Minghua Ma, Ze Li, Yu Kang, Chaoyun Zhang, Chetan Bansal, Murali Chintalapati, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang, Changhua Pei, Gaogang Xie:
Large Language Models Can Provide Accurate and Interpretable Incident Triage. 523-534 - Wenting Dong, Huibiao Zhu, Sini Chen, Ning Ge:
A Security Verification Framework for the LoRaWAN Protocol with Application in the Manufacturing Industry. 535-546 - Kai Liang, Zhengxiong Luo, Yanyang Zhao, Wenlong Zhang, Ronghua Shi, Yu Jiang, Heyuan Shi, Chao Hu:
MDIplier: Protocol Format Recovery via Hierarchical Inference. 547-557 - Shishuai Yang, Guangdong Bai, Ruoyan Lin, Jialong Guo, Wenrui Diao:
Beyond the Horizon: Exploring Cross-Market Security Discrepancies in Parallel Android Apps. 558-569 - Ziming Chen, Yue Li, Jianbo Gao, Jiashuo Zhang, Ke Wang, Jian-bin Hu, Zhi Guan, Zhong Chen:
Understanding and Detecting Privacy Leakage Vulnerabilities in Hyperledger Fabric Chaincodes. 570-581 - Cheng Wang, Tengfei Tu, Sujuan Qin, Guangjun Wu, Fei Gao, Mingchao Wan:
Understanding Atomics and Memory Ordering Issues in Real-World Rust Software. 582-592 - Leonardo Paroli, Tommaso Botarelli, Laura Carnevali, Enrico Vicario:
A Compositional Approach to Coordinated Software Rejuvenation of Component-Based Systems. 593-604 - Andrea Cappelletti, Mark Grechanik:
Feedback-Directed Cross-Layer Optimization of Cloud-Based Functional Actor Applications. 605-616 - Delong Li, Jiayu Zeng, Liangda Fang, Chaonan Wang, Lin Cui, Quanlong Guan:
Exact Computation of Network Reliability with Sentential Decision Diagrams. 617-628
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.