Int. J. Softw. Informatics最新文献

筛选
英文 中文
Deep Generative Crowdsourcing Learning with Worker Correlation Utilization 基于工人相关性利用的深度生成众包学习
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00270
Shaoyuan Li, Menglong Wei, Sheng-Jun Huang
{"title":"Deep Generative Crowdsourcing Learning with Worker Correlation Utilization","authors":"Shaoyuan Li, Menglong Wei, Sheng-Jun Huang","doi":"10.21655/ijsi.1673-7288.00270","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00270","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115533689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preface to the Topic of Formal Methods and Their Applications “形式方法及其应用”主题前言
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00252
Cong Tian, Yu Deng, Yu Jiang
{"title":"Preface to the Topic of Formal Methods and Their Applications","authors":"Cong Tian, Yu Deng, Yu Jiang","doi":"10.21655/ijsi.1673-7288.00252","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00252","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"6 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130611378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Tip Decomposition on Large Bipartite Graphs 大二部图的分布尖端分解
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00277
Xu Zhou, Tongfeng Weng, Zhibang Yang, Boren Li, Ji Zhang, Kenli Li
{"title":"Distributed Tip Decomposition on Large Bipartite Graphs","authors":"Xu Zhou, Tongfeng Weng, Zhibang Yang, Boren Li, Ji Zhang, Kenli Li","doi":"10.21655/ijsi.1673-7288.00277","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00277","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121507012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reverse Unfolding of Petri Nets and its Application in Program Data Race Detection Petri网的反向展开及其在程序数据竞争检测中的应用
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00254
Zongyin Hao, Faming Lu
{"title":"Reverse Unfolding of Petri Nets and its Application in Program Data Race Detection","authors":"Zongyin Hao, Faming Lu","doi":"10.21655/ijsi.1673-7288.00254","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00254","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114285222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Multi-party Data Federation System 安全的多方数据联合系统
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00273
Shuyuan Li, Yudian Ji, D. Shi, Wangdong Liao, Lipeng Zhang, Yongxin Tong, Ke Xu
{"title":"A Secure Multi-party Data Federation System","authors":"Shuyuan Li, Yudian Ji, D. Shi, Wangdong Liao, Lipeng Zhang, Yongxin Tong, Ke Xu","doi":"10.21655/ijsi.1673-7288.00273","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00273","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131387887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approach to Generating TAP Rules in IoT Systems Based on Enviro nment Modeling 基于环境建模的物联网系统TAP规则生成方法
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00260
Han Bian, Xiaohong Chen, Zhi Jin, M. Zhang
{"title":"Approach to Generating TAP Rules in IoT Systems Based on Enviro nment Modeling","authors":"Han Bian, Xiaohong Chen, Zhi Jin, M. Zhang","doi":"10.21655/ijsi.1673-7288.00260","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00260","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114390594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning-Based Hybrid Fuzz Testing 基于深度学习的混合模糊测试
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00261
Fengjuan Gao, Yu Wang, Lingyun Situ, Linzhang Wang
{"title":"Deep Learning-Based Hybrid Fuzz Testing","authors":"Fengjuan Gao, Yu Wang, Lingyun Situ, Linzhang Wang","doi":"10.21655/ijsi.1673-7288.00261","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00261","url":null,"abstract":"With the rapid development of software techniques, domain-driven software raises new challenges in software security and robustness. Symbolic execution and fuzzing have been rapidly developed in recent decades, demonstrating their ability in detecting software bugs. Enormous detected and fixed bugs demonstrate their feasibility. However, it is still a challenging task to combine the two methods due to their corresponding weakness. State-of-the-art techniques focus on incorporating the two methods such as using symbolic execution to solve paths when fuzzing gets stuck in complex paths. Unfortunately, such methods are inefficient because they have to  基金项目: 国家自然科学基金(62032010); 江苏省研究生科研与实践创新计划 Foundation item: National Natural Science Foundation of China (62032010); Postgraduate Research & Practice Innovation Program of Jiangsu Province 本文由“面向领域的软件系统构造与质量保障”专题特约编辑潘敏学教授、魏峻研究员、崔展齐教授推荐. 收稿时间: 2020-09-13; 修改时间: 2020-10-26; 采用时间: 2020-12-19; jos 在线出版时间: 2021-01-22 or Rearch O ly 高凤娟 等:基于深度学习的混合模糊测试方法 989 switch to fuzzing (resp. symbolic execution) when conducting symbolic execution (resp. fuzzing). This paper presents a new deep learning-based hybrid testing method using symbolic execution and fuzzing. This method tries to predict paths that are suitable for fuzzing (resp. symbolic execution) and guide the fuzzing (resp. symbolic execution) to reach the paths. To further enhance the effectiveness, a hybrid mechanism is proposed to make them interact with each other. The proposed approach is evaluated on the programs in LAVA-M, and the results are compared with that using symbolic execution or fuzzing independently. The proposed method achieves more than 20% increase of branch coverage, 1 to 13 times increase of the path number, and uncover 929 more bugs.","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129944102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open Source Software Supply Chain for Reliability Assurance of Operating Systems 面向操作系统可靠性保障的开源软件供应链
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00250
Guanyu Liang, Yanjun Wu, Jingzheng Wu, Chen Zhao
{"title":"Open Source Software Supply Chain for Reliability Assurance of Operating Systems","authors":"Guanyu Liang, Yanjun Wu, Jingzheng Wu, Chen Zhao","doi":"10.21655/ijsi.1673-7288.00250","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00250","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128263632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accelerator Virtualization Framework Based on Inter-VM Exitless Communication 基于虚拟机间无出口通信的加速器虚拟化框架
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00248
Ding Li, Zeyu Mi, Baodong Wu, Xun Chen, Yongwang Zhao, Zuohua Ding, Haibo Chen
{"title":"Accelerator Virtualization Framework Based on Inter-VM Exitless Communication","authors":"Ding Li, Zeyu Mi, Baodong Wu, Xun Chen, Yongwang Zhao, Zuohua Ding, Haibo Chen","doi":"10.21655/ijsi.1673-7288.00248","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00248","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131702102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Generation of Large-Granularity Pull Request Description 自动生成大粒度拉取请求描述
Int. J. Softw. Informatics Pub Date : 1900-01-01 DOI: 10.21655/ijsi.1673-7288.00253
Li Kuang, Ruyi Shi, Leihao Zhao, Huan Zhang, Honghao Gao
{"title":"Automatic Generation of Large-Granularity Pull Request Description","authors":"Li Kuang, Ruyi Shi, Leihao Zhao, Huan Zhang, Honghao Gao","doi":"10.21655/ijsi.1673-7288.00253","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00253","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122442428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信