{"title":"Multi-scale Graph Aggregation based Ship Target Recognition","authors":"Weiwen Cui, Ziwei Wang, Huiling Zhao, Cong Xia, Xing Xu, Zhanyun Feng, Weijie Wu, Yuanjie Hao, Jie Li, Jin Wang, Jiale Chen","doi":"10.1109/DSA56465.2022.00102","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00102","url":null,"abstract":"The deep learning method for ship recognition on remote sensing images has the advantages of high efficiency and high precision. However, traditional ship detection methods have two shortcomings: 1) The convolution receptive field used for feature extraction is fixed, which is difficult to be compatible with the feature extraction of multi-scale objects, resulting in the distortion of some object features. 2) Traditional pixel-based methods lack object-level integrity in identifying object contours in complex scenes. This paper proposes a multi-scale ship target recognition model (mGAT), which realizes the dynamic extraction of multi-scale object features through a multi-scale feature fusion convolution network based on gating mechanism, and combines the idea of graph aggregation in GAT to propagate the object feature information. Experiments show that, compared with traditional semantic segmentation methods, the proposed method can effectively improve the recognition accuracy of multi-scale ships and other objects in the scene.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"511 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115345360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
He Chen, Hongping Ren, Rui Li, Guang Yang, Shanshan Ma
{"title":"Generating Autonomous Driving Test Scenarios based on OpenSCENARIO","authors":"He Chen, Hongping Ren, Rui Li, Guang Yang, Shanshan Ma","doi":"10.1109/DSA56465.2022.00093","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00093","url":null,"abstract":"At present, with the rapid development of autonomous driving technology, simulation test has become an important means of autonomous driving technology verification and evaluation due to its high-test efficiency, strong repeatability, low cost, and process safety. However, the parameters in the test scenarios in the current simulation test are all fixed values, the test is only a discrete test, and a comprehensive test of the entire parameter space is lacking. Therefore, this paper proposes a generating method of autonomous driving test scenarios based on OpenSCENARIO and constructs a test scenario including parameter space. This method automatically builds the test scenario by constructing the configuration file of the test scenario and writing Python scripts. When executing the test scenario, the road elements, weather elements and traffic participant elements are used to screen the test scenarios that conform to the operation design domain of the autonomous driving, and the autonomous driving function is tested and verified through the Carla simulation platform. Finally, a test scenario is built for the lane keeping function. Experiments show that the test scenarios constructed automatically in this paper can not only meet the needs of autonomous driving simulation test, but also simplify the writing of test scenarios and greatly improve the efficiency of scenario construction.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Operation Simulation Method based On Complex Network Game","authors":"Xiaoying Huang, Rui Yin, Wu Liu, Hong Zhang","doi":"10.1109/DSA56465.2022.00090","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00090","url":null,"abstract":"The scale of software systems is becoming more and more complex, and the traditional software engineering evaluation methods are only limited to the structural characteristics of software systems, but lack the understanding of the operational characteristics. In this paper, we propose a method to obtain software internal operation path information based on complex network simulation, firstly, we extract the code information of the target software to obtain the complex network model of the software system, and then we propose an execution simulation method to obtain the control flow path and a parameter association simulation method to obtain the data flow relationship, and the two are combined to obtain more complete software operation path information. The experiment proves that the method can monitor the running status of the program in real time and reflect the real running situation of the software, which is important for the maintenance of the software.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115394077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Named Entity Recognition in Chinese E-commerce Domain Based on Multi-Head Attention","authors":"Hongliang Mao, Azragul Yusup, Yifei Ge, Degang Chen","doi":"10.1109/DSA56465.2022.00083","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00083","url":null,"abstract":"At present, the demand for entity recognition for product query and product recommendation systems of e-commerce domain is growing. Traditional methods that rely on experts to define artificial features and domain knowledge can no longer meet the needs of the domain due to their low recognition accuracy. According to the above background, a Chinese named entity recognition method in the e-commerce domain that incorporates a multi-headed attention mechanism and bidirectional long-short term memory network is proposed. A word vector represents the product title statements of e-commerce platforms. The generated word vector sequences are fed into a bi-directional long-short term memory network that mines their contextual semantic features. A multi-headed attention mechanism is introduced to focus on the entity words in the text to unearth their hidden features. In contrast, the entity recognition results are labeled by calculating the joint probability of sequence labels through conditional random fields. The experimental data show that the method can reach 86.16% accuracy and 86.57% F1 value for entity recognition in the e-commerce domain, which is practical and feasible.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132410018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Pattern Detection Through Diagonally Distributed Matrix Matching","authors":"A. Alvi, Mohammad Zulkernine","doi":"10.1109/DSA56465.2022.00059","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00059","url":null,"abstract":"Security requirements should be realized in the design phase of a secure software system. Security patterns are artifacts used to implement security requirements as to security controls and features. The strength in the security of software systems is directly proportional to the number of security patterns used. We can use the number of existing security patterns to measure the security strength of software systems. Therefore, early detection of the absence of security patterns or non-standard security features will tremendously reduce development and maintenance costs. We first convert the security patterns and the software system model into graphs and store them as matrices in the security pattern detection process. Then, we explore and detect security patterns inside the software system using a matching technique. Finally, we remove false positives with the help of a semantic analysis technique. This paper proposes a diagonally distributed matrix matching (DDMM) technique for detecting security patterns. The detection technique uses a standard security pattern matrix (SPM). It selects the main diagonal of the SPM. Then compares it for matching with the diagonals of the target system matrix (TSM) using all possible combinations of diagonal elements. A security pattern detection tool is implemented based on the proposed DDMM technique. The experimental results show sufficient detection accuracy and reasonable time consumption for five java-based software projects with zero false positives.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131398860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Senjie Zhang, Shuai Wang, Jinbo Wang, Shan Zhou, Zhaohui Yao
{"title":"Quantitative Analysis of Information Leakage Hardware Trojans in IP Cores","authors":"Senjie Zhang, Shuai Wang, Jinbo Wang, Shan Zhou, Zhaohui Yao","doi":"10.1109/DSA56465.2022.00063","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00063","url":null,"abstract":"Computing hardware has attracted the attention of malicious attackers due to the globalization of hardware designs and supply chains and the integration of third-party intellectual property (IP) cores. The gate level information flow tracking (GLIFT) method has been proposed to detect information leakage hardware trojans by setting labels and detecting the propagation of labels. However, the existing researches focus on binary labels, which cannot quantify the leaked information and obtain the information leakage path. Therefore, we propose a precise multi-bit label tracking method. By detecting the propagation of the multi-bit labels, we can exactly understand which bits have leaked and the leaked paths. At the same time, in order to reduce the complexity of the multi-bit label propagation logic, we also propose an optimization method. Experiments show that our method can quantitatively analyze information leakage trojans in IP cores, and the optimization method can also reduce the complexity.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130627446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Reliability Evaluation System of Ship Information Management System","authors":"Xueqing Li, Maoyuan Ma, Jing Zhang, Hanting Zhao, Wenxiu Zhang, Zixin Liu","doi":"10.1109/DSA56465.2022.00019","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00019","url":null,"abstract":"With the rapid development of computer technology, software plays an increasingly important role in systems that require high reliability, such as weapons, aerospace and navigation. In this paper, the software of ship information management system project based on component development is taken as the main research object, and the application of software reliability evaluation system is studied. A reliability evaluation system combining Jelinski-Moranda geometric model with Goel-Okumoto Inhomogeneous Poisson Process Model is proposed. The evaluation system can help software reliability engineers to realize the early prediction and analysis of ship information management system reliability conveniently, which has important engineering significance.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123162934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomous Evaluation Method of Unmanned Equipment based on OODA-I Framework","authors":"Junshan Xue, Yu Jiang","doi":"10.1109/DSA56465.2022.00078","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00078","url":null,"abstract":"Aiming at the current problems of fuzzy concepts and different standards of autonomous evaluation of unmanned equipment, a universal evaluation method was explored. Firstly, the definition of unmanned equipment autonomy and the development status of evaluation methods are discussed. Secondly, based on the Observation., Orientation, Decision and Action (OODA) fighting loop to expand the OODA-Interaction (OODA-I) autonomous evaluation framework, adopt qualitative analysis and quantitative description method to quantify the evaluation index, the combination of clear scoring method, the evaluation index system of unmanned equipment autonomy is obtained. Then, Extension Analytic Hierarchy Process (EAHP) is introduced to get the weight of each index. Finally, according to the evaluation index system, index weight and score value, the autonomy of unmanned equipment is evaluated as a whole. A case study shows that this method can evaluate the autonomy of unmanned equipment quantitatively.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116879142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Code Clone Detection Accuracy and Efficiency based on Code Complexity Analysis","authors":"Haochen Jin, Zhanqi Cui, Shifan Liu, Liwei Zheng","doi":"10.1109/DSA56465.2022.00017","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00017","url":null,"abstract":"Code cloning is a common activity in software development, which refers to the copying and reusing of code fragments with appropriate modifications. In the era of big code, some code clone detection techniques are no longer suitable for large-scale software or repositories. Code clone filtering can not only significantly improve the efficiency of code clone detection but also effectively improve the accuracy of code clone detection. In this paper, we propose CCFilter which is a code clone filtering tool based on code complexity analysis. In CCFilter, the code complexity of all functions is analyzed, and the functions to be checked are filtered according to the threshold of complexity before detecting code clones. In order to evaluate CCFilter's performance, a set of experiments is conducted. CCFilter is more accurate and efficient than a filtering strategy based on code size. The experimental results also show that filtering improves the scalability and efficiency of code clone detection.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121740526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A UAV Cooperative Formation Capability Evaluation Method","authors":"PengQi Wang, Yuan Shi, LingZhong Meng, Shuting Kang, Yunzhi Xue, Liangliang Yu","doi":"10.1109/DSA56465.2022.00091","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00091","url":null,"abstract":"Aiming at the problem that there is no unified and comprehensive formation capability evaluation method in the field of UAV cooperative formation. A UAV cooperative formation capability evaluation method based on the l-l description method of UAV formation is proposed. This method proposes the l-l-l three-dimensional UAV formation description method, expands the l-l UAV formation description method to three-dimensional space. This evaluation method converts the position information of the UAV swarms from the world coordinate system to the formation coordinate system, so that the evaluation process can get rid of the geographic space. At the same time, only the position information of the UAV swarm is required to comprehensively evaluate the cooperative formation capability of the UAV swarm, evaluation indicators include formation time, formation hold, formation support, formation error, formation density, formation time mutual interference probability density, formation space mutual interference density, etc.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"600 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115108295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}