2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)最新文献

筛选
英文 中文
Mapping Method between 2D Landscape Image and 3D Spatial Data based on Adversarial Relative Depth Constraint Network 基于对抗相对深度约束网络的二维景观图像与三维空间数据映射方法
Shuhao Wang, Zhuoru Lin, Zhimo Weng, Anna Li
{"title":"Mapping Method between 2D Landscape Image and 3D Spatial Data based on Adversarial Relative Depth Constraint Network","authors":"Shuhao Wang, Zhuoru Lin, Zhimo Weng, Anna Li","doi":"10.1109/QRS-C57518.2022.00101","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00101","url":null,"abstract":"This paper proposes a mapping method of 2D image and 3D spatial data based on the adversarial relative depth constraint network. The steps are as follows: 1) Input pixel coordinates of key nodes of 2D landscape image, and conduct normalization preprocessing; 2) Input two-dimensional pixel coordinates into the depth prediction network and output the depth values of key nodes; 3) Using depth values and two-dimensional pixel coordinates to reconstruct three-dimensional coordinates of key nodes; 4) Input DEM data to the discriminator of the generated adversarial network to calculate the authenticity error value, and use the relative depth information between the attitude characteristics of mountain and hydrology and the corresponding key nodes of the image to calculate the relative depth error; 5) Add the authenticity error and relative depth error calculated above to get the total error, and feed back to the depth prediction network to get a more accurate mapping evaluation, so as to realize mapping discovery. The problems solved in this paper include: lack of characteristic pose data in the traditional geo-evidence-based process of 2D landscape images; The results of the generative adversarial network method do not conform to the relative depth relationship of feature points in 3D spatial data.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133255619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Research on Information Gravitation 关于信息引力的研究
K. Cai
{"title":"Towards Research on Information Gravitation","authors":"K. Cai","doi":"10.1109/QRS-C57518.2022.00118","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00118","url":null,"abstract":"In response to the advent of software defined world, this Fast Abstract introduces a new notion, information gravitation, with an attempt to unify and expand two related ones, information mass (related to the supposed fifth force) and data gravitation. This is motivated by the following question: is there a new kind of (gravitational) force between any two distinct pieces of information conveying messages. A possibly affirmative answer to this question of information gravitation, which is supposed to explore the theoretically and/or experimentally justified interplay between information and gravitation, might make significant sense for the software defined world being augmented with artificial intelligence and virtual reality in the age of information. Information induces gravitation. Information gravitation should be related to Newton's law of universal gravitation and Einstein's general theory of relativity, and even to gravitational waves and the unified theory of everything.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133371265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Elevator Maintenance Site Selection Optimization via Fine-Tuned K-Means 基于精细k均值的电梯维修选址优化
Yuegui Feng, Guangwei Qing, Qianfei Zhou
{"title":"Elevator Maintenance Site Selection Optimization via Fine-Tuned K-Means","authors":"Yuegui Feng, Guangwei Qing, Qianfei Zhou","doi":"10.1109/QRS-C57518.2022.00074","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00074","url":null,"abstract":"Elevator failure is a common problem scenario in real life, and arranging reasonable maintenance site locations is crucial to reduce the time to repair elevators. However, reasonable site selection for large-scale datasets remains a challenge in the present time. Considering the nature of clustering models that may naturally fit the requirements of the siting problem, we propose a siting method called Fine-tune K-means which called FTK-means. This approach is based on the K-means clustering method and fine-tunes the initial clustering results. It is worth mentioning that we take into account the fault properties of elevators and use the concept of fault center of mass when finding the mean value. Experiments prove that our method achieves better site selection on real elevator datasets, and in addition achieves site load fairness.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126063104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The IoT Service Agent Model based on Federated Learning to Improve Service Quality 基于联邦学习提高服务质量的物联网服务代理模型
Tse-Chuan Hsu, William C. Chu, Shyh-Wei Chen
{"title":"The IoT Service Agent Model based on Federated Learning to Improve Service Quality","authors":"Tse-Chuan Hsu, William C. Chu, Shyh-Wei Chen","doi":"10.1109/QRS-C57518.2022.00113","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00113","url":null,"abstract":"The combination of learning analysis technology and terminal equipment can provide a rapidly imitating learning method between devices, and cognitive intelligence affects the learning effect. To enhance automated learning services, we can use federated learning methods to enable the training of different devices and enhance each other through devices. Using the training database to improve the quality of automated learning services. In this study, a novel agent-assisted active detection and data collection framework is designed. Monitoring agents can learn from each other to establish intelligent models, and through mutual communication between devices. Can check if established data can be applied to machine data model to get data. It can be used for intelligent manufacturing in the future. The agent may learn methods of learning and managing between devices having different properties. Obtaining experimental simulation and control data, and using machine learning to analyze growth progress and results allow for a deeper analysis of associated adjustments and anticipated changes.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122018082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling Trust Relationships in Blockchain Applications: The Case of Reconfigurable Systems-on-Chip 区块链应用中的信任关系建模:以可重构的片上系统为例
M. Méré, F. Jouault, Loïc Pallardy, R. Perdriau
{"title":"Modeling Trust Relationships in Blockchain Applications: The Case of Reconfigurable Systems-on-Chip","authors":"M. Méré, F. Jouault, Loïc Pallardy, R. Perdriau","doi":"10.1109/QRS-C57518.2022.00020","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00020","url":null,"abstract":"Nowadays, System-on-Chip (SoC) components are found everywhere in all kinds of smart devices. Each System-on-Chip contains many different blocks that provide specific functionalities, such as WiFi or Bluetooth connectivity. Whereas integrating each such block in a SoC typically requires paying some royalties, not all blocks are necessary for all applications, or throughout a device's lifecycle. Moreover, it is not possible to manufacture a specific SoC for each application. Significant advantages are therefore expected to be gained by enabling trustworthy remote SoC reconfiguration throughout their life cycles. A few approaches attempting to address this challenge have been proposed in the literature. They are typically based on Blockchain technology in order to support decentralization without relinquishing trust. Reviewing these approaches lead us to identify a potential flaw in the proposed protocols. Indeed, a SoC should be able to trust Blockchain information that it is given, without requiring any centralization. In order to validate our suspicions, we propose in this paper to use Verifpal: a cryptographic protocol verification tool that works from textual protocol models. We use it in a slightly unorthodox way in order to model the trust relationships in one of the approaches from the literature, and to verify it. The results show that, under some assumptions, a flaw is indeed present. We propose and model several possible fixes, and present their respective limitations.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126176280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TrustAuction: A TEE based Privacy Protection Framework for Auction Contracts 委托:基于TEE的拍卖合同隐私保护框架
Jiahao He, Dongyu Cao, Ying Zhou
{"title":"TrustAuction: A TEE based Privacy Protection Framework for Auction Contracts","authors":"Jiahao He, Dongyu Cao, Ying Zhou","doi":"10.1109/QRS-C57518.2022.00125","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00125","url":null,"abstract":"Auctions are particularly favored as a means of financial transaction for high-value commodities. The Turing-complete script provided by the Ethereum platform facilitates different types of auctions. However, the transparency of Ethereum may lead to threats to the privacy of financial transactions, which is also the biggest obstacle to the practical application of blockchain. This paper proposes an auction contract privacy protection method named TrustAuction, which protects the transaction data privacy and user identity privacy in the auction process through the Trusted Execution Environment(TEE). Specifically, TEE is used to generate new identities for users in the auction process, and the bids submitted by users using the new identities exist are encrypted outside the TEE.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129684655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Coverage-Guided Greybox Fuzzing Method based on Grammar-Aware with Particle Swarm Optimization 一种基于语法感知和粒子群优化的覆盖引导灰盒模糊方法
Shengran Wang, Jinfu Chen, Saihua Cai, Chi Zhang, Haibo Chen
{"title":"A Novel Coverage-Guided Greybox Fuzzing Method based on Grammar-Aware with Particle Swarm Optimization","authors":"Shengran Wang, Jinfu Chen, Saihua Cai, Chi Zhang, Haibo Chen","doi":"10.1109/QRS-C57518.2022.00132","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00132","url":null,"abstract":"Coverage-guided Greybox Fuzzing (CGF) as a popular testing approach has been widely used in software testing. However, the existing CGF has some problems, for example, the testing efficiency is often poor in the face of structured input. To solve this problem, Grammar-Aware Greybox Fuzzing (GAGF) has gained attention for its use of abstract syntax trees (AST) to help processing the structured inputs and it has achieved higher fuzzing efficiency than CGF. However, the improvement of efficiency may not be enough. Therefore, we proposed a particle swarm optimization algorithm to help GAGF to further improving the efficiency. The proposed algorithm can selectively optimize the mutation operator in GAGF mutation stage, as well as accelerate the mutation efficiency of fuzzing to achieve more higher code coverage.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122851493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute-Based Non-Interactive Privacy-Protected Crowd-Sourcing Software Testing Engineer Selection Mechanism 基于属性的非交互式隐私保护众包软件测试工程师选择机制
Qiliang Yang, Lizhi Cai, Jiayu Gong, Minlu Tang, Yi Lin
{"title":"Attribute-Based Non-Interactive Privacy-Protected Crowd-Sourcing Software Testing Engineer Selection Mechanism","authors":"Qiliang Yang, Lizhi Cai, Jiayu Gong, Minlu Tang, Yi Lin","doi":"10.1109/QRS-C57518.2022.00040","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00040","url":null,"abstract":"The central management platforms in traditional crowd-sourced software testing networks are easy to become the target of attack by the enemies, and when the central management platform is attacked, it is easy to cause a single point of failure and bring the whole system down. In addition, when selecting software testing engineers for crowd-sourcing software testing tasks, most mechanisms select engineers based on their credits. This approach is too one-sided and fails to achieve fine-grained engineer selection. In order to solve above problems, we have proposed a non-interactive and fine-grained crowd-sourcing software testing engineer selection mechanism. In our mechanism, the task publisher can select engineers according to their attributes. Next, we have given an implementation of our non-interactive software testing engineer selection mechanism by applying QAP. The privacy of task publisher and engineers is protected. The security proof is also given. Simulation results show that our mechanism is feasible.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124002164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RandomMix: An Effective Framework to Protect User Privacy Information on Ethereum RandomMix:一个保护以太坊用户隐私信息的有效框架
Hao Yin, Dongyu Cao, Ying Zhou
{"title":"RandomMix: An Effective Framework to Protect User Privacy Information on Ethereum","authors":"Hao Yin, Dongyu Cao, Ying Zhou","doi":"10.1109/QRS-C57518.2022.00124","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00124","url":null,"abstract":"With the wide application of blockchain technology, the user privacy information involved in Ethereum is increasingly rich. But with the introduction of de-anonymization technologies, more and more attacks may lead to the disclosure of user privacy information. In this paper, as a user privacy protection approach, RandomMix is proposed based on account mixing and transaction value encryption. We conduct experiments on the real transactions on Ethereum and find out that RandomMix can resist account clustering attack, transaction fingerprint analysis attack and Sybil attack. Meanwhile, RandomMix consume less gas compared with other approaches.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115357224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability Analysis of a Computer-Based Interlocking System with a Double 2-out-of-2 Redundancy Structure using Algebraic Binary Decision Diagrams 基于代数二元决策图的双2 / 2冗余结构计算机联锁系统可靠性分析
Wenjia Long, Kaizhi Wang, Xuan Wang
{"title":"Reliability Analysis of a Computer-Based Interlocking System with a Double 2-out-of-2 Redundancy Structure using Algebraic Binary Decision Diagrams","authors":"Wenjia Long, Kaizhi Wang, Xuan Wang","doi":"10.1109/QRS-C57518.2022.00073","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00073","url":null,"abstract":"The computer-based interlocking (CBI) system of urban rail is a safe-critical system. To keep the high reliability of the CBI system of urban rail, reliability analysis is very necessary and important work. The double 2-out-of-2 redun-dancy structure has been widely used in the CBI system which is a core part of control signal equipment in urban rail. The dynamic fault tree (DFT) is an extension of the static fault tree (SFT), which is widely used for the reliability modeling of dynamic systems. An algebraic binary decision diagram (ABDD) is an extension of a binary decision diagram (BDD) which introduces a kind of node denoting a sequence-dependency between events. The DFT can be evaluated by the ABDD. This paper firstly presents a reliability analysis of the CBI system in urban rail by using the ABDD-based method. The CBI system is modeled by the DFT, then the DFT is converted into a function based on a temporal algebraic framework. According to the temporal function, the ABDD can be built for reliability analysis. Compared to the Markov-based method, the ABDD-based method can avoid space-state explosion and have no limitation on the exponential distribution of component failure. A case study related to the CBI system is presented to show the advantage of using our method.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115833951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信