| 2022 | 22nd IEEE International Conference on Software Quality, Reliability and Security, QRS 2022, Guangzhou, China, December 5-9, 2022 |
| 2022 | A BiLSTM-Attention Model for Detecting Smart Contract Defects More Accurately. Chen Qian, Tianyuan Hu, Bixin Li |
| 2022 | A Collaboration-Aware Approach to Profiling Developer Expertise with Cross-Community Data. Xiaotao Song, Jiafei Yan, Yuexin Huang, Hailong Sun, Hongyu Zhang |
| 2022 | A Comprehensive Analysis of NVD Concurrency Vulnerabilities. Lili Bo, Xing Meng, Xiaobing Sun, Jingli Xia, Xiaoxue Wu |
| 2022 | A Detection Method for Scarcity Defect of Blockchain Digital Asset based on Invariant Analysis. Jin-lei Sun, Song Huang, Xingya Wang, Meijuan Wang, Jinhu Du |
| 2022 | A Distance-Based Dynamic Random Testing Strategy for Natural Language Processing DNN Models. Yuechen Li, Hanyu Pei, Linzhi Huang, Beibei Yin |
| 2022 | A Framework for Scanning Privacy Information based on Static Analysis. Yuan Zhao, Gaolei Yi, Fan Liu, Zhanwei Hui, Jianhua Zhao |
| 2022 | A Functional FMECA Approach for the Assessment of Critical Infrastructure Resilience. Gonçalo Carvalho, Nádia Medeiros, Henrique Madeira, Bruno Cabral |
| 2022 | A New Code Review Method based on Human Errors. Fuqun Huang, Bo Zhao, Henrique Madeira |
| 2022 | A Novel Approach for Bounded Model Checking Through Full Parallelism. Debao Sang, Jing Liu, Haiying Sun, Jin Xu, Jiexiang Kang |
| 2022 | A Pattern-Based Test Platform for Families of Smart Health Products. Pedro Almeida, João Pascoal Faria, Bruno Lima |
| 2022 | A Proactive Self-Adaptation Approach for Software Systems based on Environment-Aware Model Predictive Control. Zhengyin Chen, Wenpin Jiao |
| 2022 | A Survey on Backdoor Attack and Defense in Natural Language Processing. Xuan Sheng, Zhaoyang Han, Piji Li, Xiangmao Chang |
| 2022 | A Taxonomy of Software Flaws Leading to Buffer Overflows. Raphaël Khoury |
| 2022 | API Misuse Detection Method Based on Transformer. Jingbo Yang, Jian Ren, Wenjun Wu |
| 2022 | Adopting Misclassification Detection and Outlier Modification to Fault Correction in Deep Learning-Based Systems. Chuan-Min Chu, Chin-Yu Huang, Neil C. Fang |
| 2022 | An Anomaly-Based Approach for Detecting Modularity Violations on Method Placement. Kazuki Yoda, Tomoki Nakamaru, Soramichi Akiyama, Shigeru Chiba |
| 2022 | An Effective Low-Dimensional Software Code Representation using BERT and ELMo. Srijoni Majumdar, Ashutosh Varshney, Partha Pratim Das, Paul D. Clough, Samiran Chattopadhyay |
| 2022 | An Empirical Study of the Bug Link Rate. Chenglin Li, Yangyang Zhao, Yibiao Yang |
| 2022 | An Empirical Study on Software Aging of Long-Running Object Detection Algorithms. Roberto Pietrantuono, Domenico Cotroneo, Ermeson C. Andrade, Fumio Machida |
| 2022 | An Empirical Study on Software Defect Prediction using Function Point Analysis. Xinghan Zhao, Cong Tian |
| 2022 | An Empirical Study on Source Code Feature Extraction in Preprocessing of IR-Based Requirements Traceability. Bangchao Wang, Yang Deng, Ruiqi Luo, Huan Jin |
| 2022 | An Exploratory Study for GUI Posts on Stack Overflow. Jing Ding, Liming Nie, Yang Liu, Zuohua Ding, Jifeng Xuan |
| 2022 | An Ontological Analysis of Safety-Critical Software and Its Anomalies. Hezhen Liu, Zhi Jin, Zheng Zheng, Chengqiang Huang, Xun Zhang |
| 2022 | Anomaly Detection in Encrypted Identity Resolution Traffic based on Machine Learning. Zhishen Zhu, Hao Zhou, Qingya Yang, Chonghua Wang, Zhen Li |
| 2022 | Assessing the Quality of Low-Code and Model-Driven Engineering Platforms for Engineering IoT Systems. Felicien Ihirwe, Davide Di Ruscio, Simone Gianfranceschi, Alfonso Pierantonio |
| 2022 | AuthROS: Secure Data Sharing Among Robot Operating Systems based on Ethereum. Shenhui Zhang, Wenkai Li, Xiaoqi Li, Boyi Liu |
| 2022 | Automated Grey-Box Testing of Microservice Architectures. Luca Giamattei, Antonio Guerriero, Roberto Pietrantuono, Stefano Russo |
| 2022 | Automated Identification of Performance Changes at Code Level. David Georg Reichelt, Stefan Kühne, Wilhelm Hasselbring |
| 2022 | Automated Synthesis of Quantum Circuits using Neural Network. Kentaro Murakami, Jianjun Zhao |
| 2022 | Automatic Collaborative Testing of Applications Integrating Text Features and Priority Experience Replay. Lizhi Cai, Jin Wang, Mingang Chen, Jilong Wang |
| 2022 | Availability and Cost aware Multi-'omain Service Deployment Optimization. Chuangchuang Zhang, Yanming Liu, Hongyong Yang, Yihao Li, Shuning Zhang |
| 2022 | Building Safe and Stable DNN Controllers using Deep Reinforcement Learning and Deep Imitation Learning. Xudong He |
| 2022 | CBSDI: Cross-Architecture Binary Code Similarity Detection based on Index Table. Longmin Deng, Dongdong Zhao, Junwei Zhou, Zhe Xia, Jianwen Xiang |
| 2022 | CGMBL: Combining GAN and Method Name for Bug Localization. Hao Chen, Haiyang Yang, Zilun Yan, Li Kuang, Lingyan Zhang |
| 2022 | CRUST: Towards a Unified Cross-Language Program Analysis Framework for Rust. Shuang Hu, Baojian Hua, Lei Xia, Yang Wang |
| 2022 | Cache Optimizations for Test Case Reduction. Dániel Vince, Ákos Kiss |
| 2022 | Can PoW Consensus Protocol Resist the Whale Attack? Xueyong Sun, Qihao Bao, Bixin Li |
| 2022 | Cast Away: On the Security of DLNA Deployments in the SmartTV Ecosystem. Guangwei Tian, Jiongyi Chen, Kailun Yan, Shishuai Yang, Wenrui Diao |
| 2022 | CodeBERT-nt: Code Naturalness via CodeBERT. Ahmed Khanfir, Matthieu Jimenez, Mike Papadakis, Yves Le Traon |
| 2022 | Comprehensiveness, Automation and Lifecycle: A New Perspective for Rust Security. Shuang Hu, Baojian Hua, Yang Wang |
| 2022 | Conceptualizing the Secure Machine Learning Operations (SecMLOps) Paradigm. Xinrui Zhang, Jason Jaskolka |
| 2022 | Context-Aware Program Simplification to Improve Information Retrieval-Based Bug Localization. Yilin Yang, Ziyuan Wang, Zhenyu Chen, Baowen Xu |
| 2022 | Contextual Operationalization of Metrics as Scores: Is My Metric Value Good? Sebastian Hönel, Morgan Ericsson, Welf Löwe, Anna Wingkvist |
| 2022 | Continuous Usability Requirements Evaluation based on Runtime User Behavior Mining. Tong Li, Tianai Zhang |
| 2022 | Coverage Testing of Industrial Simulink Models using Monte-Carlo and SMT-Based Methods. Daisuke Ishii, Takashi Tomita, Toshiaki Aoki, The Quyen Ngo, Thi Bich Ngoc Do, Hideaki Takai |
| 2022 | Cross Platform API Mappings based on API Documentation Graphs. Yanjie Shao, Tianyue Luo, Xiang Ling, Limin Wang, Senwen Zheng |
| 2022 | Crowdsourced Testing Task Assignment based on Knowledge Graphs. Peng Yang, Chao Chang, Yong Tang |
| 2022 | DeepRTest: A Vulnerability-Guided Robustness Testing and Enhancement Framework for Deep Neural Networks. Minghao Yang, Shunkun Yang, Wenda Wu |
| 2022 | Division by Zero: Threats and Effects in Spectrum-Based Fault Localization Formulas. Dániel Vince, Attila Szatmári, Ákos Kiss, Árpád Beszédes |
| 2022 | EDDNet: An Efficient and Accurate Defect Detection Network for the Industrial Edge Environment. Runbing Qin, Ningjiang Chen, Yihui Huang |
| 2022 | EWDLL: Software Aging State Identification based on LightGBM-LR Hybrid Model. Xueyong Tan, Jing Liu |
| 2022 | Emotional Dashboard: a Non-Intrusive Approach to Monitor Software Developers' Emotions and Personality Traits. Leo Silva, Marília Castro, Miriam Bernardino Silva, Milena Santos, Uirá Kulesza, Margarida Lima, Henrique Madeira |
| 2022 | Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN Environments. Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Ryan K. L. Ko, Dan Dongseong Kim |
| 2022 | Evaluating the Robustness of Deep Reinforcement Learning for Autonomous Policies in a Multi-Agent Urban Driving Environment. Aizaz Sharif, Dusica Marijan |
| 2022 | Evaluation of the Architecture Alternatives for Real-Time Intrusion Detection Systems for Vehicles. Mubark Jedh, Jian Kai Lee, Lotfi Ben Othmane |
| 2022 | Exploring Transformers for Multi-Label Classification of Java Vulnerabilities. Cláudia Mamede, Eduard Pinconschi, Rui Abreu, José Campos |
| 2022 | Extracting Temporal Models from Data Episodes. Nour Chetouane, Franz Wotawa |
| 2022 | Fine-Tuning Pre-Trained Model to Extract Undesired Behaviors from App Reviews. Wenyu Zhang, Xiaojuan Wang, Shanyan Lai, Chunyang Ye, Hui Zhou |
| 2022 | Focus on New Test Cases in Continuous Integration Testing based on Reinforcement Learning. Fanliang Chen, Zheng Li, Ying Shang, Yang Yang |
| 2022 | Formal Verification of Hierarchical Ptolemy II Synchronous-Reactive Models with Bounded Model Checking. Xiaozhen Zhang, Zhaoming Yang, Hui Kong, Weiqiang Kong |
| 2022 | GAN-Based Privacy-Preserving Unsupervised Domain Adaptation. Dongdong Zhao, Zhao Wang, Huanhuan Li, Jianwen Xiang |
| 2022 | GOV: A Verification Method for Smart Contract Gas-Optimization. Yuan Huang, Rong Wang, Xiangping Chen, Xiaocong Zhou, Ziyan Wang |
| 2022 | Generating Abstract Test Cases from User Requirements using MDSE and NLP. Sai Chaithra Allala, Juan P. Sotomayor, Dionny Santiago, Tariq M. King, Peter J. Clarke |
| 2022 | GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call Sequences. Catherine Tony, Nicolás E. Díaz Ferreyra, Riccardo Scandariato |
| 2022 | Identity Authentication Strategy of Mobile Crowd Sensing based on CFL. Lin Wang, Fangxiao Li, Yunfei Xie, Leyi Shi |
| 2022 | Improved Methods of Pointer Mixture Network for Code Completion. Cheng Wei, Zhiqiu Huang, Yaoshen Yu |
| 2022 | IntJect: Vulnerability Intent Bug Seeding. Benjamin Petit, Ahmed Khanfir, Ezekiel O. Soremekun, Gilles Perrouin, Mike Papadakis |
| 2022 | LogGD: Detecting Anomalies from System Logs with Graph Neural Networks. Yongzheng Xie, Hongyu Zhang, Muhammad Ali Babar |
| 2022 | MC/DC Test Case Automatic Generation for Safety-Critical Systems. Cong Wang, Haiying Sun, Hui Dou, Hongtao Chen, Jing Liu |
| 2022 | MetaA: Multi-Dimensional Evaluation of Testing Ability via Adversarial Examples in Deep Learning. Siqi Gu, Jiawei Liu, Zhanwei Hui, Wenhong Liu, Zhenyu Chen |
| 2022 | MiSim: A Simulator for Resilience Assessment of Microservice-Based Architectures. Sebastian Frank, Lion Wagner, M. Alireza Hakamian, Martin Straesser, André van Hoorn |
| 2022 | Model Checking the Safety of Raft Leader Election Algorithm. Qihao Bao, Bixin Li, Tianyuan Hu, Dongyu Cao |
| 2022 | Multi-Transaction Sequence Vulnerability Detection for Smart Contracts based on Inter-Path Data Dependency. Shuai Zhang, Meng Wang, Yi Liu, Yuhan Zhang, Bin Yu |
| 2022 | Mutation Testing based Safety Testing and Improving on DNNs. Yuhao Wei, Song Huang, Yu Wang, Ruilin Liu, Chunyan Xia |
| 2022 | Nimbus: Toward Speed Up Function Signature Recovery via Input Resizing and Multi-Task Learning. Yi Qian, Ligeng Chen, Yuyang Wang, Bing Mao |
| 2022 | PDG2Vec: Identify the Binary Function Similarity with Program Dependence Graph. Yuntao Zhang, Yanhao Wang, Yuwei Liu, Zhengyuan Pang, Binxing Fang |
| 2022 | Pain Pickle: Bypassing Python Restricted Unpickler for Automatic Exploit Generation. Nan-Jung Huang, Chih-Jen Huang, Shih-Kun Huang |
| 2022 | ParGCN: Abnormal Transaction Detection based on Graph Neural Networks. Lian Yu, Qi Jing, Ruomiao Li, Zhiya Cheng, Chang Xu |
| 2022 | Parameter Description Generation with the Code Parameter Flow. Qiuyuan Chen, Zezhou Yang, Zhongxin Liu, Shanping Li, Cuiyun Gao |
| 2022 | Predictive Mutation Analysis of Test Case Prioritization for Deep Neural Networks. Zhengyuan Wei, Haipeng Wang, Imran Ashraf, W. K. Chan |
| 2022 | Proposing a Quality Model for Evaluating and Identifying Opportunities in Clinical Practice Guideline Engines. Manuel Carrero, Elena Enamorado-Díaz, J. A. García-García, María J. Escalona |
| 2022 | Quantitative Analysis of Sparsely Synchronized Fail-Safe Processors. Jun Inoue, Hideaki Nishihara, Akira Mori |
| 2022 | Quantity-Simulation-Analysis Method based Novel RSA Timing Attack Algorithm for Single-Chip Microcomputer Platform. Cong Li, Qiang Han, Tao Zhang, Bingbing Lei, Yu He |
| 2022 | RetCom: Information Retrieval-Enhanced Automatic Source-Code Summarization. Yubo Zhang, Yanfang Liu, Xinxin Fan, Yunfeng Lu |
| 2022 | Reuse of Test Case based on Attributes Weight Optimization. Yaqing Shi, Song Huang, Jinyong Wan |
| 2022 | SAS-GKE: A Secure Authenticated Scalable Group Key Exchange. Abu Faisal, Mohammad Zulkernine |
| 2022 | Safety SysML: An Executable Safety-Critical Avionics Requirement Modeling Language. Huiyu Liu, Jing Liu, Wei Yin, Haiying Sun, Chenchen Yang |
| 2022 | Salus: A Novel Data-Driven Monitor that Enables Real-Time Safety in Autonomous Driving Systems. Bohan Zhang, Yafan Huang, Guanpeng Li |
| 2022 | Scriptless GUI Testing on Mobile Applications. Thorn Jansen, Fernando Pastor Ricós, Yaping Luo, Kevin van der Vlist, Robbert van Dalen, Pekka Aho, Tanja E. J. Vos |
| 2022 | Security Countermeasure Selection for Component-Based Software-Intensive Systems. Charilaos Skandylas, Narges Khakpour, Javier Cámara |
| 2022 | Semantic Feature Learning based on Double Sequences Structure for Software Defect Number Prediction. Tao Wang, Chuanqi Tao, Hongjing Guo, Lijin Tang |
| 2022 | Separating the Wheat from the Chaff: Using Indexing and Sub-Sequence Mining Techniques to Identify Related Crashes During Bug Triage. Kedrian James, Yufei Du, Sanjeev Das, Fabian Monrose |
| 2022 | Stateful Depletion and Scheduling of Containers on Cloud Nodes for Efficient Resource Usage. Amirali Amiri, Uwe Zdun, Konstantinos Plakidas |
| 2022 | Strategies for Improving the Error Robustness of Convolutional Neural Networks. António Morais, Raul Barbosa, Nuno Lourenço, Frederico Cerveira, Michele Lombardi, Henrique Madeira |
| 2022 | Telemetry-Based Software Failure Prediction by Concept-Space Model Creation. Bahareh Afshinpour, Roland Groz, Massih-Reza Amini |
| 2022 | Test Case Generation for Ethereum Smart Contract based on Data Dependency Analysis of State Variable. Jinhu Du, Song Huang, Xingya Wang, Changyou Zheng, Jin-lei Sun |
| 2022 | Test Reuse based on Adaptive Semantic Matching across Android Mobile Applications. Shuqi Liu, Yu Zhou, Tingting Han, Taolue Chen |
| 2022 | The Use of Pretrained Model for Matching App Reviews and Bug Reports. Xiaojuan Wang, Wenyu Zhang, Shanyan Lai, Chunyang Ye, Hui Zhou |
| 2022 | TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing. Mingpei Cao, Yueze Zhang, Zhenxuan Feng, Jiahao Hu, Yuesheng Zhu |
| 2022 | Towards Extending the Range of Bugs That Automated Program Repair Can Handle. Omar I. Al-Bataineh, Leon Moonen |
| 2022 | Towards Improving Multiple Authorship Attribution of Source Code. PengNan Hao, Zhen Li, Cui Liu, Yu Wen, Fanming Liu |
| 2022 | Uncertainty-Aware Behavior Modeling and Quantitative Safety Evaluation for Automatic Flight Control Systems. Huiyu Liu, Jing Liu, Haiying Sun, Tengfei Li, John Zhang |
| 2022 | Understanding and Mitigating Label Bias in Malware Classification: An Empirical Study. Jia Yan, Xiangkun Jia, Lingyun Ying, Purui Su |
| 2022 | Valkyrie: Improving Fuzzing Performance Through Deterministic Techniques. Yuyang Rong, Chibin Zhang, Jianzhong Liu, Hao Chen |
| 2022 | Visualization-Based Software Defect Prediction via Convolutional Neural Network with Global Self-Attention. Shaojian Qiu, Shaosheng Wang, Xuhong Tian, Mengyang Huang, Qiong Huang |
| 2022 | cPV - Simulation and Verification for Membrane Computing. Yezhou Liu, Jing Sun, Radu Nicolescu, Hai Wang |
| 2022 | ucXception: A Framework for Evaluating Dependability of Software Systems. Pedro David Almeida, Frederico Cerveira, Raul Barbosa, Henrique Madeira |