2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)最新文献

筛选
英文 中文
MuNN: Mutation Analysis of Neural Networks 神经网络的突变分析
Weijun Shen, Jun Wan, Zhenyu Chen
{"title":"MuNN: Mutation Analysis of Neural Networks","authors":"Weijun Shen, Jun Wan, Zhenyu Chen","doi":"10.1109/QRS-C.2018.00032","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00032","url":null,"abstract":"Deep neural networks have made amazing progress in many areas over the past few years. After training deep neural networks, a common way is to build a set of test samples to evaluate the networks. However, test adequacy of deep neural networks is overlooked in both research and practice. This paper proposes MuNN, a mutation analysis method for (deep) neural networks, inspired by the success of mutation analysis in conventional software testing. Five mutation operators are designed on the characteristics of neural networks. The well known dataset MNIST has been used in our experiment. We study two research questions: (1) How does mutation affect neural networks; (2) How does neural depth affect mutation analysis. The experimental results show that mutation analysis of neural networks has strong domain characteristics. This indicates that domain mutation operators are needed to enhance mutation analysis. The experimental results also show that the mutation effects are gradually weakened with the deepening of neurons. We need to design new mutation mechanism for deep neural networks. We believe that mutation analysis can not only be used to measure test adequacy, but also be used to understand neural network operation.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125600557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
An AI Software Test Method Based on Scene Deductive Approach 一种基于场景演绎的人工智能软件测试方法
Xinghan Zhao, Xiangfei Gao
{"title":"An AI Software Test Method Based on Scene Deductive Approach","authors":"Xinghan Zhao, Xiangfei Gao","doi":"10.1109/QRS-C.2018.00017","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00017","url":null,"abstract":"Artificial intelligence (AI) software has high algorithm complexity, and the scale and dimension of the input and output parameters are high, and the test oracle isn't explicit. These features make a lot of difficulties for the design of test cases. This paper proposes an AI software testing method based on scene deductive approach. It models the input, output parameters and the environment, uses the random algorithm to generate the inputs of the test cases, then use the algorithm of deductive approach to make the software testing automatically, and use the test assertions to verify the results of the test. After description of the theory, this paper uses intelligent tracking car as an example to illustrate the application of this method and the problems needing attention. In the end, the paper describes the shortcoming of this method and the future research directions.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114394932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Data-Driven Smart Fault Diagnosis Method for Electric Motor 一种数据驱动的电动机智能故障诊断方法
Xiaodong Gou, Chong Bian, F. Zeng, Qingyang Xu, Wencai Wang, Shunkun Yang
{"title":"A Data-Driven Smart Fault Diagnosis Method for Electric Motor","authors":"Xiaodong Gou, Chong Bian, F. Zeng, Qingyang Xu, Wencai Wang, Shunkun Yang","doi":"10.1109/QRS-C.2018.00053","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00053","url":null,"abstract":"The electric motor is the elementary device of modern industry system, and its timely fault diagnosis leads to reduce the maintenance costs and downtime, and improve system reliability. This paper deals with the problem of fault diagnosis of electric motor based on power signal, and a data-driven fault diagnosis method based on genetic algorithm (GA) optimized support vector machine (SVM) is presented. The feature presentation, feature selection and feature extraction are applied as data preprocessing methods to reduce data dimensions, that is, we implement feature representation by the time domain analysis method and the range analysis method, and the fisher discriminant analysis is used for feature selection, and the locally linear embedding (LLE) is used for feature extraction. Then the GA is used to optimize the SVM classifier for fault classification after data preprocessing. Our method can obtain good fault classification effect, and the experimental results show that the classification accuracy of the proposed method is better than that of probabilistic neural network, and the feasibility and effectiveness of this proposed method in fault diagnosis of electric motor are proved.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127600600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Stateless Multiparty Trust Negotiation Protocol for Distributed Systems 分布式系统无状态多方信任协商协议
M. Allouzi, J. Khan
{"title":"Stateless Multiparty Trust Negotiation Protocol for Distributed Systems","authors":"M. Allouzi, J. Khan","doi":"10.1109/QRS-C.2018.00090","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00090","url":null,"abstract":"One of the most challenging problems in managing open distributed systems is specifying and enforcing security policies that regulate communications between peers and access to sensitive credentials. Existing academic research in Trust Management (TM) mainly focuses on establishing trust between two entities using the Automatic Trust Negotiation (ATN). However, real-word authorization processes, such as Service Level Agreement Negotiation (SLA), often involves more than two parties. Decomposition is insufficient to reduce an automated Multiparty Authorization into individual Automated Trust Negotiations, as individual negotiations may depend on one another; therefore, negotiation needs to be concurrent for the negotiation process to succeed. This paper proposes a distributed protocol that performs the trust establishment without a centralized moderator. Along with this protocol, a negotiation resolution algorithm known as Stateless Eager Multiparty Trust Negotiation strategy (SEMTN) is proposed in order to orchestrate the multiparty trust negotiation process. This paper shows that SEMTN is stateless, safe, and complete.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129067678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Contracts for a Mobility-as-a-Service Ecosystem 移动即服务生态系统的智能合约
A. Karinsalo, Kimmo Halunen
{"title":"Smart Contracts for a Mobility-as-a-Service Ecosystem","authors":"A. Karinsalo, Kimmo Halunen","doi":"10.1109/QRS-C.2018.00036","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00036","url":null,"abstract":"In the future, ecosystems for managing travel and all the associated services will be more diverse and innovative. These Mobility-as-a-Service (MaaS) ecosystems will combine services in an unforeseen way to enable fluent travel experiences. However, to succeed, MaaS ecosystems require integrators and enablers. Blockchains can serve as an technology enabler, but to reach their best potential blockchains need to tackle new business needs. MaaS ecosystems form an excellent arena for this. We present a model of a MaaS ecosystem, enabling easy, quick and trusted transactions taking advantage of artificial intelligence and blockchain-enabled smart contracts. We also present a subset demonstration of this model, TravelToken, which utilizes QR code that stores and uses travel information in smart contract over Ethereum. The benefits are that all travel data can be stored in one ticket, information stays unaltered in blockchain, and value-share as well as compensations in case of delays will be automatic.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125738825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Research on Abnormal Behavior Detection Technology of Launch Vehicle Controlled Network 运载火箭控制网络异常行为检测技术研究
Yang Liu, Qingping Shi, Xiaotao Yan, Heng Zhang, Hang Yi, Weiqiang Xia, Hongwei Ma, Jian Kang
{"title":"Research on Abnormal Behavior Detection Technology of Launch Vehicle Controlled Network","authors":"Yang Liu, Qingping Shi, Xiaotao Yan, Heng Zhang, Hang Yi, Weiqiang Xia, Hongwei Ma, Jian Kang","doi":"10.1109/QRS-C.2018.00073","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00073","url":null,"abstract":"Launch vehicle network as an extremely important national defense information system, is faced with the threat of information security because of the dynamic detection limitation of the traditional firewall, virus detection software and so on. In this paper, we choose evaluation index and establish the entropy weight combination model based on the exponentially weighted moving-average (EWMA) model and the echo state network (ESN) model, Finally, we select the actual traffic data of the network, verify the effectiveness of the sequential dynamic security detection model, and study the influence of different time window observation scale on anomaly detection.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123973123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Software Defect Management System Based on Knowledge Base 基于知识库的软件缺陷管理系统
Haiyan Chai, N. Zhang, Bojiang Liu, Longli Tang
{"title":"A Software Defect Management System Based on Knowledge Base","authors":"Haiyan Chai, N. Zhang, Bojiang Liu, Longli Tang","doi":"10.1109/QRS-C.2018.00118","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00118","url":null,"abstract":"Software testing is an effective way to improving software quality, a software defect is identified before it goes live, a massive amount of bug-related data is accumulated during software testing, there is a point in studying how to improve the working efficiency of software testing through integration and use of such data. In this thesis, a software defect management system based on knowledge base is designed, where the three-tier knowledge base architecture is used to manage defects, data mining is performed with factual knowledge generated from the testing to derive rule knowledge that will be used for defect prediction, and the appropriate strategy knowledge is configured to manage bugs, so as to improve the working efficiency of software testing.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124308344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Test Path Generation Method Based on SSM Models 基于SSM模型的测试路径生成方法
Hao Lan, Yin Tong, Jin Guo, Yadong Zhang, Yao Li, Chang Rao
{"title":"A Test Path Generation Method Based on SSM Models","authors":"Hao Lan, Yin Tong, Jin Guo, Yadong Zhang, Yao Li, Chang Rao","doi":"10.1109/QRS-C.2018.00048","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00048","url":null,"abstract":"The traditional finite state machine (FSM) cannot express complicated systems due to its flattened sequential features. A safe state machine (SSM) is an extension of FSMs with capability of expressing hierarchical structure, parallel structure and historical mechanism. Therefore, it can accurately express complicated functions of a system, and SSMs have strict formal semantics. This paper provides a method for generating test paths based on SSMs. A method of creating the reachability graph (RG) of an SSM is presented, which can eliminate the hierarchical and parallel structure, and mark the history states. Finally, test paths are generated based on certain test coverage criteria of the RG mode.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117071937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chairs of Workshops Co-Located with QRS 2018 研讨会主席与QRS 2018同地
Song Huang
{"title":"Chairs of Workshops Co-Located with QRS 2018","authors":"Song Huang","doi":"10.1109/qrs-c.2018.00012","DOIUrl":"https://doi.org/10.1109/qrs-c.2018.00012","url":null,"abstract":"","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129705442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal Transaction Modeling and Verification for an Adaptable Web Service Orchestration 可适应Web服务编排的正式事务建模和验证
S. Zatout, M. Benabdelhafid, Mahmoud Boufaïda
{"title":"Formal Transaction Modeling and Verification for an Adaptable Web Service Orchestration","authors":"S. Zatout, M. Benabdelhafid, Mahmoud Boufaïda","doi":"10.1109/QRS-C.2018.00095","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00095","url":null,"abstract":"The integrity of Web service orchestration is one of the most relevant characters in the development of compositions. Particularly, transactions that include a set of activities which are performed by partner services. However, due to the complexity of these activities, several failures can occur during the execution leading to violate transactional properties. Therefore, the selfadaptive behavior is a feature which designers need to include in their orchestration process in order to improve the reliability of these properties. In this paper, we propose a development process of adaptable transactional Web services that makes use of Colored Petri Net (CPN) formalism to model Web service orchestration under adaptive transaction constraints, ASK-Computational Tree Logic (ASK-CTL) is used to formally define transactions properties; and Model Checking technique, that is available in the software CPN Tools, is used to verify the defined properties. An example of a bookstore process is given to illustrate our proposal.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129458643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信