2022 9th International Conference on Dependable Systems and Their Applications (DSA)最新文献

筛选
英文 中文
Multi-scale Graph Aggregation based Ship Target Recognition 基于多尺度图聚合的船舶目标识别
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00102
Weiwen Cui, Ziwei Wang, Huiling Zhao, Cong Xia, Xing Xu, Zhanyun Feng, Weijie Wu, Yuanjie Hao, Jie Li, Jin Wang, Jiale Chen
{"title":"Multi-scale Graph Aggregation based Ship Target Recognition","authors":"Weiwen Cui, Ziwei Wang, Huiling Zhao, Cong Xia, Xing Xu, Zhanyun Feng, Weijie Wu, Yuanjie Hao, Jie Li, Jin Wang, Jiale Chen","doi":"10.1109/DSA56465.2022.00102","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00102","url":null,"abstract":"The deep learning method for ship recognition on remote sensing images has the advantages of high efficiency and high precision. However, traditional ship detection methods have two shortcomings: 1) The convolution receptive field used for feature extraction is fixed, which is difficult to be compatible with the feature extraction of multi-scale objects, resulting in the distortion of some object features. 2) Traditional pixel-based methods lack object-level integrity in identifying object contours in complex scenes. This paper proposes a multi-scale ship target recognition model (mGAT), which realizes the dynamic extraction of multi-scale object features through a multi-scale feature fusion convolution network based on gating mechanism, and combines the idea of graph aggregation in GAT to propagate the object feature information. Experiments show that, compared with traditional semantic segmentation methods, the proposed method can effectively improve the recognition accuracy of multi-scale ships and other objects in the scene.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"511 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115345360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating Autonomous Driving Test Scenarios based on OpenSCENARIO 基于OpenSCENARIO的自动驾驶测试场景生成
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00093
He Chen, Hongping Ren, Rui Li, Guang Yang, Shanshan Ma
{"title":"Generating Autonomous Driving Test Scenarios based on OpenSCENARIO","authors":"He Chen, Hongping Ren, Rui Li, Guang Yang, Shanshan Ma","doi":"10.1109/DSA56465.2022.00093","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00093","url":null,"abstract":"At present, with the rapid development of autonomous driving technology, simulation test has become an important means of autonomous driving technology verification and evaluation due to its high-test efficiency, strong repeatability, low cost, and process safety. However, the parameters in the test scenarios in the current simulation test are all fixed values, the test is only a discrete test, and a comprehensive test of the entire parameter space is lacking. Therefore, this paper proposes a generating method of autonomous driving test scenarios based on OpenSCENARIO and constructs a test scenario including parameter space. This method automatically builds the test scenario by constructing the configuration file of the test scenario and writing Python scripts. When executing the test scenario, the road elements, weather elements and traffic participant elements are used to screen the test scenarios that conform to the operation design domain of the autonomous driving, and the autonomous driving function is tested and verified through the Carla simulation platform. Finally, a test scenario is built for the lane keeping function. Experiments show that the test scenarios constructed automatically in this paper can not only meet the needs of autonomous driving simulation test, but also simplify the writing of test scenarios and greatly improve the efficiency of scenario construction.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Software Operation Simulation Method based On Complex Network Game 基于复杂网络博弈的软件运行仿真方法
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00090
Xiaoying Huang, Rui Yin, Wu Liu, Hong Zhang
{"title":"Software Operation Simulation Method based On Complex Network Game","authors":"Xiaoying Huang, Rui Yin, Wu Liu, Hong Zhang","doi":"10.1109/DSA56465.2022.00090","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00090","url":null,"abstract":"The scale of software systems is becoming more and more complex, and the traditional software engineering evaluation methods are only limited to the structural characteristics of software systems, but lack the understanding of the operational characteristics. In this paper, we propose a method to obtain software internal operation path information based on complex network simulation, firstly, we extract the code information of the target software to obtain the complex network model of the software system, and then we propose an execution simulation method to obtain the control flow path and a parameter association simulation method to obtain the data flow relationship, and the two are combined to obtain more complete software operation path information. The experiment proves that the method can monitor the running status of the program in real time and reflect the real running situation of the software, which is important for the maintenance of the software.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115394077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Named Entity Recognition in Chinese E-commerce Domain Based on Multi-Head Attention 基于多头关注的中文电子商务领域命名实体识别
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00083
Hongliang Mao, Azragul Yusup, Yifei Ge, Degang Chen
{"title":"Named Entity Recognition in Chinese E-commerce Domain Based on Multi-Head Attention","authors":"Hongliang Mao, Azragul Yusup, Yifei Ge, Degang Chen","doi":"10.1109/DSA56465.2022.00083","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00083","url":null,"abstract":"At present, the demand for entity recognition for product query and product recommendation systems of e-commerce domain is growing. Traditional methods that rely on experts to define artificial features and domain knowledge can no longer meet the needs of the domain due to their low recognition accuracy. According to the above background, a Chinese named entity recognition method in the e-commerce domain that incorporates a multi-headed attention mechanism and bidirectional long-short term memory network is proposed. A word vector represents the product title statements of e-commerce platforms. The generated word vector sequences are fed into a bi-directional long-short term memory network that mines their contextual semantic features. A multi-headed attention mechanism is introduced to focus on the entity words in the text to unearth their hidden features. In contrast, the entity recognition results are labeled by calculating the joint probability of sequence labels through conditional random fields. The experimental data show that the method can reach 86.16% accuracy and 86.57% F1 value for entity recognition in the e-commerce domain, which is practical and feasible.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132410018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Pattern Detection Through Diagonally Distributed Matrix Matching 基于对角分布矩阵匹配的安全模式检测
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00059
A. Alvi, Mohammad Zulkernine
{"title":"Security Pattern Detection Through Diagonally Distributed Matrix Matching","authors":"A. Alvi, Mohammad Zulkernine","doi":"10.1109/DSA56465.2022.00059","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00059","url":null,"abstract":"Security requirements should be realized in the design phase of a secure software system. Security patterns are artifacts used to implement security requirements as to security controls and features. The strength in the security of software systems is directly proportional to the number of security patterns used. We can use the number of existing security patterns to measure the security strength of software systems. Therefore, early detection of the absence of security patterns or non-standard security features will tremendously reduce development and maintenance costs. We first convert the security patterns and the software system model into graphs and store them as matrices in the security pattern detection process. Then, we explore and detect security patterns inside the software system using a matching technique. Finally, we remove false positives with the help of a semantic analysis technique. This paper proposes a diagonally distributed matrix matching (DDMM) technique for detecting security patterns. The detection technique uses a standard security pattern matrix (SPM). It selects the main diagonal of the SPM. Then compares it for matching with the diagonals of the target system matrix (TSM) using all possible combinations of diagonal elements. A security pattern detection tool is implemented based on the proposed DDMM technique. The experimental results show sufficient detection accuracy and reasonable time consumption for five java-based software projects with zero false positives.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131398860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantitative Analysis of Information Leakage Hardware Trojans in IP Cores IP核中信息泄露硬件木马的定量分析
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00063
Senjie Zhang, Shuai Wang, Jinbo Wang, Shan Zhou, Zhaohui Yao
{"title":"Quantitative Analysis of Information Leakage Hardware Trojans in IP Cores","authors":"Senjie Zhang, Shuai Wang, Jinbo Wang, Shan Zhou, Zhaohui Yao","doi":"10.1109/DSA56465.2022.00063","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00063","url":null,"abstract":"Computing hardware has attracted the attention of malicious attackers due to the globalization of hardware designs and supply chains and the integration of third-party intellectual property (IP) cores. The gate level information flow tracking (GLIFT) method has been proposed to detect information leakage hardware trojans by setting labels and detecting the propagation of labels. However, the existing researches focus on binary labels, which cannot quantify the leaked information and obtain the information leakage path. Therefore, we propose a precise multi-bit label tracking method. By detecting the propagation of the multi-bit labels, we can exactly understand which bits have leaked and the leaked paths. At the same time, in order to reduce the complexity of the multi-bit label propagation logic, we also propose an optimization method. Experiments show that our method can quantitatively analyze information leakage trojans in IP cores, and the optimization method can also reduce the complexity.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130627446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software Reliability Evaluation System of Ship Information Management System 船舶信息管理系统软件可靠性评估系统
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00019
Xueqing Li, Maoyuan Ma, Jing Zhang, Hanting Zhao, Wenxiu Zhang, Zixin Liu
{"title":"Software Reliability Evaluation System of Ship Information Management System","authors":"Xueqing Li, Maoyuan Ma, Jing Zhang, Hanting Zhao, Wenxiu Zhang, Zixin Liu","doi":"10.1109/DSA56465.2022.00019","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00019","url":null,"abstract":"With the rapid development of computer technology, software plays an increasingly important role in systems that require high reliability, such as weapons, aerospace and navigation. In this paper, the software of ship information management system project based on component development is taken as the main research object, and the application of software reliability evaluation system is studied. A reliability evaluation system combining Jelinski-Moranda geometric model with Goel-Okumoto Inhomogeneous Poisson Process Model is proposed. The evaluation system can help software reliability engineers to realize the early prediction and analysis of ship information management system reliability conveniently, which has important engineering significance.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123162934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Autonomous Evaluation Method of Unmanned Equipment based on OODA-I Framework 基于OODA-I框架的无人装备自主评估方法
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00078
Junshan Xue, Yu Jiang
{"title":"Autonomous Evaluation Method of Unmanned Equipment based on OODA-I Framework","authors":"Junshan Xue, Yu Jiang","doi":"10.1109/DSA56465.2022.00078","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00078","url":null,"abstract":"Aiming at the current problems of fuzzy concepts and different standards of autonomous evaluation of unmanned equipment, a universal evaluation method was explored. Firstly, the definition of unmanned equipment autonomy and the development status of evaluation methods are discussed. Secondly, based on the Observation., Orientation, Decision and Action (OODA) fighting loop to expand the OODA-Interaction (OODA-I) autonomous evaluation framework, adopt qualitative analysis and quantitative description method to quantify the evaluation index, the combination of clear scoring method, the evaluation index system of unmanned equipment autonomy is obtained. Then, Extension Analytic Hierarchy Process (EAHP) is introduced to get the weight of each index. Finally, according to the evaluation index system, index weight and score value, the autonomy of unmanned equipment is evaluated as a whole. A case study shows that this method can evaluate the autonomy of unmanned equipment quantitatively.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116879142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Code Clone Detection Accuracy and Efficiency based on Code Complexity Analysis 基于代码复杂度分析提高代码克隆检测的准确性和效率
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00017
Haochen Jin, Zhanqi Cui, Shifan Liu, Liwei Zheng
{"title":"Improving Code Clone Detection Accuracy and Efficiency based on Code Complexity Analysis","authors":"Haochen Jin, Zhanqi Cui, Shifan Liu, Liwei Zheng","doi":"10.1109/DSA56465.2022.00017","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00017","url":null,"abstract":"Code cloning is a common activity in software development, which refers to the copying and reusing of code fragments with appropriate modifications. In the era of big code, some code clone detection techniques are no longer suitable for large-scale software or repositories. Code clone filtering can not only significantly improve the efficiency of code clone detection but also effectively improve the accuracy of code clone detection. In this paper, we propose CCFilter which is a code clone filtering tool based on code complexity analysis. In CCFilter, the code complexity of all functions is analyzed, and the functions to be checked are filtered according to the threshold of complexity before detecting code clones. In order to evaluate CCFilter's performance, a set of experiments is conducted. CCFilter is more accurate and efficient than a filtering strategy based on code size. The experimental results also show that filtering improves the scalability and efficiency of code clone detection.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121740526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A UAV Cooperative Formation Capability Evaluation Method 一种无人机协同编队能力评估方法
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00091
PengQi Wang, Yuan Shi, LingZhong Meng, Shuting Kang, Yunzhi Xue, Liangliang Yu
{"title":"A UAV Cooperative Formation Capability Evaluation Method","authors":"PengQi Wang, Yuan Shi, LingZhong Meng, Shuting Kang, Yunzhi Xue, Liangliang Yu","doi":"10.1109/DSA56465.2022.00091","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00091","url":null,"abstract":"Aiming at the problem that there is no unified and comprehensive formation capability evaluation method in the field of UAV cooperative formation. A UAV cooperative formation capability evaluation method based on the l-l description method of UAV formation is proposed. This method proposes the l-l-l three-dimensional UAV formation description method, expands the l-l UAV formation description method to three-dimensional space. This evaluation method converts the position information of the UAV swarms from the world coordinate system to the formation coordinate system, so that the evaluation process can get rid of the geographic space. At the same time, only the position information of the UAV swarm is required to comprehensively evaluate the cooperative formation capability of the UAV swarm, evaluation indicators include formation time, formation hold, formation support, formation error, formation density, formation time mutual interference probability density, formation space mutual interference density, etc.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"600 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115108295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信