首页 > 最新文献

2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)最新文献

英文 中文
Generalized Network Temperature for DDoS Detection through Rényi Entropy 基于rsamnyi熵的DDoS检测广义网络温度
Xiang Wang, Xing Zhang, Changda Wang
Distributed Denial-of-Services (DDoS) are serious network threats hardly eliminated. Current network entropy-based DDoS detection methods suffer from distinguishing DDoS attack traffic among normal traffic through a fixed empirical detection threshold, i.e., most of such thresholds are case-sensitive ones. With the Rényi entropy of a network, the paper devised a Generalized Network Temperature (GNT) based approach for DDoS attack detection, where GNT is a novel and fine-granular-scale statistical indicator that describes the network entropy changes in the light of both network traffic and network topology changes. Within a series of predefined time windows, our proposed approach first collects the selected network traffic features and then calculates the GNT for each time window. Second, the DDoS attacks are then acknowledged or denied by comparing each GNT to a dynamically adjustable thresh-old generated by the Exponentially Weighted Moving Average (EWMA) model. Furthermore, the publicly available CIC DoS 2017 dataset is utilized to test the proposed approach in the paper. The experimental results show that our proposed approach outperforms the known Shannon entropy-based DDoS attack detection methods with respect to both efficacy and efficiency.
分布式拒绝服务(DDoS)是一种难以消除的严重网络威胁。目前基于网络熵的DDoS检测方法存在通过固定的经验检测阈值来区分DDoS攻击流量和正常流量的问题,即大多数阈值是区分大小写的。利用网络的rsamunyi熵,设计了一种基于广义网络温度(GNT)的DDoS攻击检测方法,GNT是一种新颖的细粒度统计指标,可以根据网络流量和网络拓扑的变化来描述网络熵的变化。在一系列预定义的时间窗口内,我们提出的方法首先收集选定的网络流量特征,然后计算每个时间窗口的GNT。其次,通过将每个GNT与指数加权移动平均(EWMA)模型生成的动态可调阈值进行比较,对DDoS攻击进行确认或拒绝。此外,利用公开可用的CIC DoS 2017数据集来测试本文提出的方法。实验结果表明,我们提出的方法在有效性和效率方面都优于已知的基于香农熵的DDoS攻击检测方法。
{"title":"Generalized Network Temperature for DDoS Detection through Rényi Entropy","authors":"Xiang Wang, Xing Zhang, Changda Wang","doi":"10.1109/QRS-C57518.2022.00014","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00014","url":null,"abstract":"Distributed Denial-of-Services (DDoS) are serious network threats hardly eliminated. Current network entropy-based DDoS detection methods suffer from distinguishing DDoS attack traffic among normal traffic through a fixed empirical detection threshold, i.e., most of such thresholds are case-sensitive ones. With the Rényi entropy of a network, the paper devised a Generalized Network Temperature (GNT) based approach for DDoS attack detection, where GNT is a novel and fine-granular-scale statistical indicator that describes the network entropy changes in the light of both network traffic and network topology changes. Within a series of predefined time windows, our proposed approach first collects the selected network traffic features and then calculates the GNT for each time window. Second, the DDoS attacks are then acknowledged or denied by comparing each GNT to a dynamically adjustable thresh-old generated by the Exponentially Weighted Moving Average (EWMA) model. Furthermore, the publicly available CIC DoS 2017 dataset is utilized to test the proposed approach in the paper. The experimental results show that our proposed approach outperforms the known Shannon entropy-based DDoS attack detection methods with respect to both efficacy and efficiency.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131549363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hyperledger Fabric-Based Copyright Management System for Clothing design drawings 基于Hyperledger面料的服装设计图纸版权管理系统
Wenxuan Wang, Yongqiang Chen, Jiangchen Zhou, Huan Jin
The growth of the Internet has accelerated the distribution of digital content such as graphics and audio, and its copyright issues have gained attention. One particular industry worth noting, apparel design, has no explicit legal constraints, making piracy even easier. In this paper, we combine the decentralized and tamper-evident features of blockchain to design and implement a federated chain-based copyright management system for apparel design diagrams using the Hyperledger Fabric platform. In this paper, the copyright checking model uses perceptual hash algorithm and difference hash algorithm to calculate the graph similarity of garment effect and garment plan respectively, and calculate the mean value of similarity between them to determine whether they are plagiarized. The design diagrams are stored on IPFS, which makes up for the drawbacks of blockchain's difficulty in scaling and expensive storage space. Simulation experiments show that the blockchain system can maintain a high throughput and the originality checking model proposed in this paper can meet the practical requirements.
互联网的发展加速了图形、音频等数字内容的传播,其版权问题也引起了人们的关注。值得注意的是,服装设计行业没有明确的法律约束,这使得盗版更加容易。在本文中,我们结合区块链的去中心化和防篡改特性,使用Hyperledger Fabric平台设计并实现了一个基于联邦链的服装设计图版权管理系统。本文的版权检查模型分别使用感知哈希算法和差分哈希算法计算服装效果和服装方案的图相似度,并计算两者之间相似度的平均值,判断是否抄袭。设计图存储在IPFS上,这弥补了区块链难以扩展和昂贵的存储空间的缺点。仿真实验表明,区块链系统能够保持较高的吞吐量,本文提出的独创性检验模型能够满足实际要求。
{"title":"Hyperledger Fabric-Based Copyright Management System for Clothing design drawings","authors":"Wenxuan Wang, Yongqiang Chen, Jiangchen Zhou, Huan Jin","doi":"10.1109/QRS-C57518.2022.00022","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00022","url":null,"abstract":"The growth of the Internet has accelerated the distribution of digital content such as graphics and audio, and its copyright issues have gained attention. One particular industry worth noting, apparel design, has no explicit legal constraints, making piracy even easier. In this paper, we combine the decentralized and tamper-evident features of blockchain to design and implement a federated chain-based copyright management system for apparel design diagrams using the Hyperledger Fabric platform. In this paper, the copyright checking model uses perceptual hash algorithm and difference hash algorithm to calculate the graph similarity of garment effect and garment plan respectively, and calculate the mean value of similarity between them to determine whether they are plagiarized. The design diagrams are stored on IPFS, which makes up for the drawbacks of blockchain's difficulty in scaling and expensive storage space. Simulation experiments show that the blockchain system can maintain a high throughput and the originality checking model proposed in this paper can meet the practical requirements.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131261921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Learning Path Recommendation Method for Knowledge Graph of Professional Courses 一种专业课程知识图谱的学习路径推荐方法
Yujuan Cheng
In this era of information explosion, in order to help students select suitable resources when facing a large number of online courses, this paper proposes a knowledge graph-based learning path recommendation method to bring personalized course recommendations to students. The knowledge graph of professional courses is realized by completing the construction of the ontology library of online courses, and the graph database Neo4j is used to store the knowledge graph. SpringBoot is used to build the backend system and implement a set of course recommendation algorithm to filter the learning resources after analyzing the courses students have taken and the quality of course learning, and generate a list of course recommendations for each student. After developing the system based on this method, it can effectively help learners recommend course learning paths and greatly meet students' learning needs.
在这个信息爆炸的时代,为了帮助学生在面对大量的在线课程时选择合适的资源,本文提出了一种基于知识图的学习路径推荐方法,为学生带来个性化的课程推荐。通过完成在线课程本体库的构建,实现专业课程的知识图谱,并使用图形数据库Neo4j存储知识图谱。使用SpringBoot构建后端系统,实现一套课程推荐算法,通过分析学生修过的课程和课程学习质量,对学习资源进行筛选,生成针对每个学生的课程推荐列表。基于该方法开发的系统可以有效地帮助学习者推荐课程学习路径,极大地满足学生的学习需求。
{"title":"A Learning Path Recommendation Method for Knowledge Graph of Professional Courses","authors":"Yujuan Cheng","doi":"10.1109/QRS-C57518.2022.00076","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00076","url":null,"abstract":"In this era of information explosion, in order to help students select suitable resources when facing a large number of online courses, this paper proposes a knowledge graph-based learning path recommendation method to bring personalized course recommendations to students. The knowledge graph of professional courses is realized by completing the construction of the ontology library of online courses, and the graph database Neo4j is used to store the knowledge graph. SpringBoot is used to build the backend system and implement a set of course recommendation algorithm to filter the learning resources after analyzing the courses students have taken and the quality of course learning, and generate a list of course recommendations for each student. After developing the system based on this method, it can effectively help learners recommend course learning paths and greatly meet students' learning needs.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132560260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature Difference based Misclassified Sample Detection for CNN Models Deployed in Online Environment 基于特征差分的在线环境下CNN模型误分类样本检测
Changtian He, Qing Sun, Ji Wu, Hai-yan Yang, Tao Yue
In recent years, Convolutional Neural Network (CNN) has achieved a great success in computer vision. However, at present, for an image classification task, there is no CNN model that can perform 100% accurately due to insufficient or excessive feature learning. Once a CNN model deployed to perform tasks online, misclassified samples might lead the system with the CNN model deployed to enter an unsafe state such as collisions. To assess the performance of such online models, we, in this paper, propose Parallel Signal Routing Paths (PSRP) method to identify misclassified samples by extracting execution paths for each sample and comparing inherent feature differences in terms of CNN nodes between misclassified and well-classified samples, for the ultimate aim of addressing the challenge of test data not having ground-truth labels in online environment where the CNN models are deployed, and give availability results for applying PSRP on 3 public datasets and 3 typical CNN models.
近年来,卷积神经网络(CNN)在计算机视觉领域取得了巨大的成功。然而,目前对于一项图像分类任务,由于特征学习不足或过度,还没有一种CNN模型能够达到100%的准确率。一旦部署CNN模型在线执行任务,错误分类的样本可能会导致部署CNN模型的系统进入不安全状态,例如碰撞。为了评估这种在线模型的性能,我们在本文中提出了并行信号路由路径(PSRP)方法,通过提取每个样本的执行路径,并比较错误分类和良好分类样本在CNN节点方面的固有特征差异,来识别错误分类的样本,最终目的是解决在部署CNN模型的在线环境中测试数据没有ground-truth标签的挑战。给出了在3个公共数据集和3个典型CNN模型上应用PSRP的可用性结果。
{"title":"Feature Difference based Misclassified Sample Detection for CNN Models Deployed in Online Environment","authors":"Changtian He, Qing Sun, Ji Wu, Hai-yan Yang, Tao Yue","doi":"10.1109/QRS-C57518.2022.00126","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00126","url":null,"abstract":"In recent years, Convolutional Neural Network (CNN) has achieved a great success in computer vision. However, at present, for an image classification task, there is no CNN model that can perform 100% accurately due to insufficient or excessive feature learning. Once a CNN model deployed to perform tasks online, misclassified samples might lead the system with the CNN model deployed to enter an unsafe state such as collisions. To assess the performance of such online models, we, in this paper, propose Parallel Signal Routing Paths (PSRP) method to identify misclassified samples by extracting execution paths for each sample and comparing inherent feature differences in terms of CNN nodes between misclassified and well-classified samples, for the ultimate aim of addressing the challenge of test data not having ground-truth labels in online environment where the CNN models are deployed, and give availability results for applying PSRP on 3 public datasets and 3 typical CNN models.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130344677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Empirical Study of Software Testing Quality based on Natural Experiments 基于自然实验的软件测试质量实证研究
Jiahao Li, Xinhao Cui, Yichen Wang, Feng Xie
Software testing is an indispensable part of the software life cycle, and the quality of software testing largely affects the quality of software delivered to users. However, in the current stage of software testing quality research, the focus on testing quality influencing factors is still limited to theoretical analysis and model application, and there is a lack of empirical research based on real data and samples. To address this problem, this paper proposes the idea of using natural experiments to conduct empirical research in the field of software testing quality for the first time, and analyzes the feasibility of the research proposal through literature research. In this paper, the empirical study was conducted using real data provided by enterprises, through the research of cooperative enterprise project data and event records, selected the “CNAS expansion of the on-site review and audit training” as an exogenous event, team capacity as the explanatory variable to build a natural experimental model of test quality. After completing the empirical model, we analyze the results, which show that the exogenous events have a significant disposition effect on test quality, and the empirical results pass the four commonly used robustness tests, indicating that the experimental results have a high 95% confidence level. In addition, this paper also analyzes the control variables in the empirical model and finds that test team size can have an impact on test quality by affecting test diversity, which provides ideas for subsequent research. Finally, based on the experimental ideas and empirical results of this study, this paper summarizes the methodological paradigm of applying the natural experiment method to empirically study and analyze the factors affecting test quality, which provides an important reference example for future empirical studies by introducing the natural experiment method in the study of software quality and test quality, and greatly expands the research horizon of related fields.
软件测试是软件生命周期中不可缺少的一部分,软件测试的质量在很大程度上影响交付给用户的软件的质量。然而,在现阶段的软件测试质量研究中,对测试质量影响因素的关注仍然局限于理论分析和模型应用,缺乏基于真实数据和样本的实证研究。针对这一问题,本文首次提出了利用自然实验在软件测试质量领域进行实证研究的思路,并通过文献研究分析了研究方案的可行性。本文利用企业提供的真实数据进行实证研究,通过对合作企业项目数据和事件记录的研究,选取“CNAS拓展现场评审审核培训”作为外生事件,团队能力作为解释变量,构建检验质量的自然实验模型。在完成实证模型后,我们对结果进行了分析,结果表明外源事件对检验质量具有显著的配置效应,并且实证结果通过了四种常用的稳健性检验,表明实验结果具有较高的95%置信水平。此外,本文还对实证模型中的控制变量进行了分析,发现测试团队规模可以通过影响测试多样性对测试质量产生影响,为后续研究提供思路。最后,基于本研究的实验思路和实证结果,总结出应用自然实验方法对测试质量影响因素进行实证研究和分析的方法论范式,将自然实验方法引入到软件质量和测试质量的研究中,为今后的实证研究提供了重要的参考范例,大大拓展了相关领域的研究视野。
{"title":"An Empirical Study of Software Testing Quality based on Natural Experiments","authors":"Jiahao Li, Xinhao Cui, Yichen Wang, Feng Xie","doi":"10.1109/QRS-C57518.2022.00080","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00080","url":null,"abstract":"Software testing is an indispensable part of the software life cycle, and the quality of software testing largely affects the quality of software delivered to users. However, in the current stage of software testing quality research, the focus on testing quality influencing factors is still limited to theoretical analysis and model application, and there is a lack of empirical research based on real data and samples. To address this problem, this paper proposes the idea of using natural experiments to conduct empirical research in the field of software testing quality for the first time, and analyzes the feasibility of the research proposal through literature research. In this paper, the empirical study was conducted using real data provided by enterprises, through the research of cooperative enterprise project data and event records, selected the “CNAS expansion of the on-site review and audit training” as an exogenous event, team capacity as the explanatory variable to build a natural experimental model of test quality. After completing the empirical model, we analyze the results, which show that the exogenous events have a significant disposition effect on test quality, and the empirical results pass the four commonly used robustness tests, indicating that the experimental results have a high 95% confidence level. In addition, this paper also analyzes the control variables in the empirical model and finds that test team size can have an impact on test quality by affecting test diversity, which provides ideas for subsequent research. Finally, based on the experimental ideas and empirical results of this study, this paper summarizes the methodological paradigm of applying the natural experiment method to empirically study and analyze the factors affecting test quality, which provides an important reference example for future empirical studies by introducing the natural experiment method in the study of software quality and test quality, and greatly expands the research horizon of related fields.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124744564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Software Defect Prediction Classifier based on Three Minimum Support Threshold Association Rule Mining 基于三最小支持度阈值关联规则挖掘的软件缺陷预测分类器
Wentao Wu, Shihai Wang, Yuanxun Shao, Mingxing Zhang, Wandong Xie
With the increasing complexity of software system, the cost of software maintenance is increasing. In this case, software reliability is difficult to guarantee. To address this problem, software defect prediction technology based on machine learning has been attached great importance by a large number of scholars. Because of the strong interpretability of association rules, association rule algorithms are often used in classification tasks. However, the class imbalance problem seriously impacts the performance of traditional software defect classifiers based on association rule mining, therefore, it is necessary to use association rule algorithm that can be used to handle class imbalance data to deal with this problem. In this paper, a software defect prediction classifier based on three minimum support threshold association rule mining is proposed, which aims to improve the quality of these three frequent item-sets by considering the support of frequent item-sets containing defect labels, including non-defect labels and only including software metrics. The algorithm is compared with other four machine learning algorithms, and the results show that the algorithm is effective.
随着软件系统的日益复杂,软件维护的成本也在不断增加。在这种情况下,软件的可靠性很难保证。针对这一问题,基于机器学习的软件缺陷预测技术受到了大量学者的重视。由于关联规则具有较强的可解释性,关联规则算法经常被用于分类任务中。然而,类不平衡问题严重影响了基于关联规则挖掘的传统软件缺陷分类器的性能,因此,有必要使用可用于处理类不平衡数据的关联规则算法来处理这一问题。本文提出了一种基于三个最小支持度阈值关联规则挖掘的软件缺陷预测分类器,该分类器通过考虑包含缺陷标签的频繁项集的支持度、包括非缺陷标签的频繁项集的支持度和仅包含软件度量的频繁项集的支持度来提高这三个频繁项集的质量。将该算法与其他四种机器学习算法进行了比较,结果表明该算法是有效的。
{"title":"A Software Defect Prediction Classifier based on Three Minimum Support Threshold Association Rule Mining","authors":"Wentao Wu, Shihai Wang, Yuanxun Shao, Mingxing Zhang, Wandong Xie","doi":"10.1109/QRS-C57518.2022.00048","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00048","url":null,"abstract":"With the increasing complexity of software system, the cost of software maintenance is increasing. In this case, software reliability is difficult to guarantee. To address this problem, software defect prediction technology based on machine learning has been attached great importance by a large number of scholars. Because of the strong interpretability of association rules, association rule algorithms are often used in classification tasks. However, the class imbalance problem seriously impacts the performance of traditional software defect classifiers based on association rule mining, therefore, it is necessary to use association rule algorithm that can be used to handle class imbalance data to deal with this problem. In this paper, a software defect prediction classifier based on three minimum support threshold association rule mining is proposed, which aims to improve the quality of these three frequent item-sets by considering the support of frequent item-sets containing defect labels, including non-defect labels and only including software metrics. The algorithm is compared with other four machine learning algorithms, and the results show that the algorithm is effective.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125922462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bug Patterns in Probabilistic Programming Systems 概率编程系统中的Bug模式
Shoma Hamada, Haibo Yu, Vo Dai Trinh, Yuri Nishimura, Jianjun Zhao
Probabilistic programming systems allow developers to model random phenomena and perform reasoning about the model efficiently. As the number of probabilistic programming systems is growing significantly and are used more and more widely, the reliability of such systems is becoming very important. It is crucial to analyze real bugs of existing similar systems in order to develop efficient bug detection tools for probabilistic programming systems. This paper conducts an empirical study investigating bugs and their features on PyMC3, a real probabilistic programming system. Among 271 closed bugs, we identified 20 bugs that are unique to probabilistic programming languages and extracted eight bug patterns from these bugs. The result showed that many of the bugs were caused by types. We also propose some possible methods for automatically detecting these bug patterns. It is expected that this will contribute to the development of bug detection tools by capturing the characteristics of bugs in actual probabilistic programs in the future.
概率编程系统允许开发人员对随机现象进行建模,并有效地对模型进行推理。随着概率规划系统数量的显著增长和应用的日益广泛,这种系统的可靠性变得非常重要。为了开发高效的概率编程系统bug检测工具,分析现有类似系统的真实bug至关重要。本文对一个真实的概率编程系统PyMC3的bug及其特征进行了实证研究。在271个已关闭的错误中,我们确定了20个概率编程语言特有的错误,并从这些错误中提取了8个错误模式。结果表明,许多错误是由类型引起的。我们还提出了一些自动检测这些错误模式的可能方法。预计这将有助于通过捕获实际概率程序中的错误特征来开发错误检测工具。
{"title":"Bug Patterns in Probabilistic Programming Systems","authors":"Shoma Hamada, Haibo Yu, Vo Dai Trinh, Yuri Nishimura, Jianjun Zhao","doi":"10.1109/QRS-C57518.2022.00063","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00063","url":null,"abstract":"Probabilistic programming systems allow developers to model random phenomena and perform reasoning about the model efficiently. As the number of probabilistic programming systems is growing significantly and are used more and more widely, the reliability of such systems is becoming very important. It is crucial to analyze real bugs of existing similar systems in order to develop efficient bug detection tools for probabilistic programming systems. This paper conducts an empirical study investigating bugs and their features on PyMC3, a real probabilistic programming system. Among 271 closed bugs, we identified 20 bugs that are unique to probabilistic programming languages and extracted eight bug patterns from these bugs. The result showed that many of the bugs were caused by types. We also propose some possible methods for automatically detecting these bug patterns. It is expected that this will contribute to the development of bug detection tools by capturing the characteristics of bugs in actual probabilistic programs in the future.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124630069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trial Application of Risk Assessment Method for Metaverse meta - verse风险评估方法的试验应用
R. Sasaki
In recent years, the use of the metaverse has been increasing for activities such as gaming, shopping, and sightseeing. While the metaverse has various advantages, there are also concerns about risks such as security problems. Unless appropriate risk assessments are carried out in advance and countermeasures are taken, serious damage may occur during metaverse use. However, there has been no proposal or application of a risk assessment method for the metaverse. Therefore, we considered an improved method by applying the method previously developed by the authors for IoT risk assessment to the metaverse gaming environment and developed the Multiple Risk Communicator for Metaverse (MRC-MV) as a risk assessment method. Furthermore, in this research, by trial application of MRC-MV to metaverse shopping, we obtained results that show that this method is effective for this activity. This method not only clarifies threats with high risks, but also makes it possible to clarify high-priority countermeasure groups by semi-quantitatively considering countermeasure effectiveness, cost, and usability.
近年来,虚拟世界在游戏、购物和观光等活动中的使用越来越多。虽然元数据具有各种优势,但也存在安全问题等风险。除非事先进行适当的风险评估并采取相应的对策,否则在使用过程中可能会造成严重的损害。然而,目前还没有针对虚拟世界的风险评估方法的建议或应用。因此,我们考虑了一种改进的方法,将作者之前开发的物联网风险评估方法应用于虚拟世界游戏环境,并开发了虚拟世界多重风险通信器(MRC-MV)作为风险评估方法。此外,在本研究中,我们尝试将MRC-MV应用于元空间购物,结果表明该方法对该活动是有效的。该方法不仅可以明确高风险威胁,还可以通过半定量地考虑对策有效性、成本和可用性,明确高优先级的对策组。
{"title":"Trial Application of Risk Assessment Method for Metaverse","authors":"R. Sasaki","doi":"10.1109/QRS-C57518.2022.00026","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00026","url":null,"abstract":"In recent years, the use of the metaverse has been increasing for activities such as gaming, shopping, and sightseeing. While the metaverse has various advantages, there are also concerns about risks such as security problems. Unless appropriate risk assessments are carried out in advance and countermeasures are taken, serious damage may occur during metaverse use. However, there has been no proposal or application of a risk assessment method for the metaverse. Therefore, we considered an improved method by applying the method previously developed by the authors for IoT risk assessment to the metaverse gaming environment and developed the Multiple Risk Communicator for Metaverse (MRC-MV) as a risk assessment method. Furthermore, in this research, by trial application of MRC-MV to metaverse shopping, we obtained results that show that this method is effective for this activity. This method not only clarifies threats with high risks, but also makes it possible to clarify high-priority countermeasure groups by semi-quantitatively considering countermeasure effectiveness, cost, and usability.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124755226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generalized Perceptual Modeling: Virtual Human Face Modeling and Expression Recognition Considering Emotion Understanding 广义感知建模:考虑情感理解的虚拟人脸建模与表情识别
Ziyang Weng, Ziyu Zhang, Yinger Liang, Biyi Dai
Human facial emotion recognition (FER) plays an important role in human-computer interaction applications. Given the widespread use of convolutional neural networks (CNNs) in automatic video and image classification systems, higher-level features can be automatically learned from hierarchical neural networks with large data. However, learning CNNs requires a large amount of training data for adequate generalization, while scale-invariant feature transform (SIFT) does not require large training samples to generate useful features. In this paper, we propose a representation of a generalized perceptual model for recognizing facial expressions from a single image frame, a model with a set of common interpretable features. The method combines SIFT and deep learning features extracted from CNNs models at different levels, and then employs these combined features and classifies the expressions using a support vector machine (SVM). The performance of the method has been validated in experiments testing expression recognition for virtual human face modeling, demonstrating the great potential of combining shallow features with deep learning features. The experiments show that features predicting aesthetic preferences can emerge in layers of deep convolutional neural networks trained only for emotion understanding recognition. It is found that human preferences for facial observation can be effectively translated into computationally inferable, systematic integration of emotionally latent behavioral organization features.
人脸情感识别在人机交互应用中起着重要的作用。鉴于卷积神经网络(cnn)在自动视频和图像分类系统中的广泛应用,可以从具有大数据的分层神经网络中自动学习更高级别的特征。然而,学习cnn需要大量的训练数据来进行充分的泛化,而尺度不变特征变换(SIFT)不需要大量的训练样本来生成有用的特征。在本文中,我们提出了一种广义感知模型的表示,用于从单个图像帧中识别面部表情,该模型具有一组共同的可解释特征。该方法将SIFT和从不同层次的cnn模型中提取的深度学习特征结合起来,然后利用这些组合特征,并使用支持向量机(SVM)对表达进行分类。该方法的性能已在虚拟人脸建模表情识别实验中得到验证,显示了浅特征与深度学习特征相结合的巨大潜力。实验表明,预测审美偏好的特征可以出现在深度卷积神经网络层中,这些神经网络只训练用于情感理解和识别。研究发现,人类对面部观察的偏好可以有效地转化为可计算推断的、情感潜在行为组织特征的系统整合。
{"title":"Generalized Perceptual Modeling: Virtual Human Face Modeling and Expression Recognition Considering Emotion Understanding","authors":"Ziyang Weng, Ziyu Zhang, Yinger Liang, Biyi Dai","doi":"10.1109/QRS-C57518.2022.00067","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00067","url":null,"abstract":"Human facial emotion recognition (FER) plays an important role in human-computer interaction applications. Given the widespread use of convolutional neural networks (CNNs) in automatic video and image classification systems, higher-level features can be automatically learned from hierarchical neural networks with large data. However, learning CNNs requires a large amount of training data for adequate generalization, while scale-invariant feature transform (SIFT) does not require large training samples to generate useful features. In this paper, we propose a representation of a generalized perceptual model for recognizing facial expressions from a single image frame, a model with a set of common interpretable features. The method combines SIFT and deep learning features extracted from CNNs models at different levels, and then employs these combined features and classifies the expressions using a support vector machine (SVM). The performance of the method has been validated in experiments testing expression recognition for virtual human face modeling, demonstrating the great potential of combining shallow features with deep learning features. The experiments show that features predicting aesthetic preferences can emerge in layers of deep convolutional neural networks trained only for emotion understanding recognition. It is found that human preferences for facial observation can be effectively translated into computationally inferable, systematic integration of emotionally latent behavioral organization features.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124298635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IRRT: An Automated Software Requirements Traceability Tool based on Information Retrieval Model IRRT:基于信息检索模型的自动化软件需求跟踪工具
Sen Zhang, Hongyan Wan, Yong Xiao, Ziruo Li
In the software development process, requirements traceability is a key part for ensuring the success of the entire project. It is very important to generate requirements traceability links, which can promote the software development and maintenance processes, such as software requirements integrity analysis, software evaluation, software testing, software validating, etc. However, the generation of the requirements traceability links is usually time-consuming and labor-intensive. In order to solve it, we designed and developed an automated software requirements traceability tool based on information retrieval (IR) model. The tool can not only automatically generate trace links but also evaluate trace links. It uses Vector Space Model (VSM) and the trace recommendation-based code class structure (TRCCS) links to generate trace links. We measure the performance in term of Precision, Recall, and $boldsymbol{F}_{2}$ are used to evaluate the trace links. The experimental results show that the tool can improve the efficiency of requirements traceability links generation and better support software development activities.
在软件开发过程中,需求可追溯性是保证整个项目成功的关键部分。生成需求可追溯性链接是非常重要的,它可以促进软件开发和维护过程,如软件需求完整性分析、软件评估、软件测试、软件验证等。然而,需求可追溯性链接的生成通常是耗时和劳动密集型的。为了解决这个问题,我们设计并开发了一个基于信息检索(IR)模型的自动化软件需求追溯工具。该工具不仅可以自动生成跟踪链接,还可以对跟踪链接进行评估。它使用向量空间模型(VSM)和基于跟踪推荐的代码类结构(TRCCS)链接生成跟踪链接。我们根据精度、召回率和$boldsymbol{F}_{2}$来评估跟踪链接的性能。实验结果表明,该工具可以提高需求跟踪链接生成的效率,更好地支持软件开发活动。
{"title":"IRRT: An Automated Software Requirements Traceability Tool based on Information Retrieval Model","authors":"Sen Zhang, Hongyan Wan, Yong Xiao, Ziruo Li","doi":"10.1109/QRS-C57518.2022.00084","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00084","url":null,"abstract":"In the software development process, requirements traceability is a key part for ensuring the success of the entire project. It is very important to generate requirements traceability links, which can promote the software development and maintenance processes, such as software requirements integrity analysis, software evaluation, software testing, software validating, etc. However, the generation of the requirements traceability links is usually time-consuming and labor-intensive. In order to solve it, we designed and developed an automated software requirements traceability tool based on information retrieval (IR) model. The tool can not only automatically generate trace links but also evaluate trace links. It uses Vector Space Model (VSM) and the trace recommendation-based code class structure (TRCCS) links to generate trace links. We measure the performance in term of Precision, Recall, and $boldsymbol{F}_{2}$ are used to evaluate the trace links. The experimental results show that the tool can improve the efficiency of requirements traceability links generation and better support software development activities.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117049569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1