首页 > 最新文献

2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)最新文献

英文 中文
A Software Defect Prediction Classifier based on Three Minimum Support Threshold Association Rule Mining 基于三最小支持度阈值关联规则挖掘的软件缺陷预测分类器
Wentao Wu, Shihai Wang, Yuanxun Shao, Mingxing Zhang, Wandong Xie
With the increasing complexity of software system, the cost of software maintenance is increasing. In this case, software reliability is difficult to guarantee. To address this problem, software defect prediction technology based on machine learning has been attached great importance by a large number of scholars. Because of the strong interpretability of association rules, association rule algorithms are often used in classification tasks. However, the class imbalance problem seriously impacts the performance of traditional software defect classifiers based on association rule mining, therefore, it is necessary to use association rule algorithm that can be used to handle class imbalance data to deal with this problem. In this paper, a software defect prediction classifier based on three minimum support threshold association rule mining is proposed, which aims to improve the quality of these three frequent item-sets by considering the support of frequent item-sets containing defect labels, including non-defect labels and only including software metrics. The algorithm is compared with other four machine learning algorithms, and the results show that the algorithm is effective.
随着软件系统的日益复杂,软件维护的成本也在不断增加。在这种情况下,软件的可靠性很难保证。针对这一问题,基于机器学习的软件缺陷预测技术受到了大量学者的重视。由于关联规则具有较强的可解释性,关联规则算法经常被用于分类任务中。然而,类不平衡问题严重影响了基于关联规则挖掘的传统软件缺陷分类器的性能,因此,有必要使用可用于处理类不平衡数据的关联规则算法来处理这一问题。本文提出了一种基于三个最小支持度阈值关联规则挖掘的软件缺陷预测分类器,该分类器通过考虑包含缺陷标签的频繁项集的支持度、包括非缺陷标签的频繁项集的支持度和仅包含软件度量的频繁项集的支持度来提高这三个频繁项集的质量。将该算法与其他四种机器学习算法进行了比较,结果表明该算法是有效的。
{"title":"A Software Defect Prediction Classifier based on Three Minimum Support Threshold Association Rule Mining","authors":"Wentao Wu, Shihai Wang, Yuanxun Shao, Mingxing Zhang, Wandong Xie","doi":"10.1109/QRS-C57518.2022.00048","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00048","url":null,"abstract":"With the increasing complexity of software system, the cost of software maintenance is increasing. In this case, software reliability is difficult to guarantee. To address this problem, software defect prediction technology based on machine learning has been attached great importance by a large number of scholars. Because of the strong interpretability of association rules, association rule algorithms are often used in classification tasks. However, the class imbalance problem seriously impacts the performance of traditional software defect classifiers based on association rule mining, therefore, it is necessary to use association rule algorithm that can be used to handle class imbalance data to deal with this problem. In this paper, a software defect prediction classifier based on three minimum support threshold association rule mining is proposed, which aims to improve the quality of these three frequent item-sets by considering the support of frequent item-sets containing defect labels, including non-defect labels and only including software metrics. The algorithm is compared with other four machine learning algorithms, and the results show that the algorithm is effective.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125922462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Empirical Study of Software Testing Quality based on Natural Experiments 基于自然实验的软件测试质量实证研究
Jiahao Li, Xinhao Cui, Yichen Wang, Feng Xie
Software testing is an indispensable part of the software life cycle, and the quality of software testing largely affects the quality of software delivered to users. However, in the current stage of software testing quality research, the focus on testing quality influencing factors is still limited to theoretical analysis and model application, and there is a lack of empirical research based on real data and samples. To address this problem, this paper proposes the idea of using natural experiments to conduct empirical research in the field of software testing quality for the first time, and analyzes the feasibility of the research proposal through literature research. In this paper, the empirical study was conducted using real data provided by enterprises, through the research of cooperative enterprise project data and event records, selected the “CNAS expansion of the on-site review and audit training” as an exogenous event, team capacity as the explanatory variable to build a natural experimental model of test quality. After completing the empirical model, we analyze the results, which show that the exogenous events have a significant disposition effect on test quality, and the empirical results pass the four commonly used robustness tests, indicating that the experimental results have a high 95% confidence level. In addition, this paper also analyzes the control variables in the empirical model and finds that test team size can have an impact on test quality by affecting test diversity, which provides ideas for subsequent research. Finally, based on the experimental ideas and empirical results of this study, this paper summarizes the methodological paradigm of applying the natural experiment method to empirically study and analyze the factors affecting test quality, which provides an important reference example for future empirical studies by introducing the natural experiment method in the study of software quality and test quality, and greatly expands the research horizon of related fields.
软件测试是软件生命周期中不可缺少的一部分,软件测试的质量在很大程度上影响交付给用户的软件的质量。然而,在现阶段的软件测试质量研究中,对测试质量影响因素的关注仍然局限于理论分析和模型应用,缺乏基于真实数据和样本的实证研究。针对这一问题,本文首次提出了利用自然实验在软件测试质量领域进行实证研究的思路,并通过文献研究分析了研究方案的可行性。本文利用企业提供的真实数据进行实证研究,通过对合作企业项目数据和事件记录的研究,选取“CNAS拓展现场评审审核培训”作为外生事件,团队能力作为解释变量,构建检验质量的自然实验模型。在完成实证模型后,我们对结果进行了分析,结果表明外源事件对检验质量具有显著的配置效应,并且实证结果通过了四种常用的稳健性检验,表明实验结果具有较高的95%置信水平。此外,本文还对实证模型中的控制变量进行了分析,发现测试团队规模可以通过影响测试多样性对测试质量产生影响,为后续研究提供思路。最后,基于本研究的实验思路和实证结果,总结出应用自然实验方法对测试质量影响因素进行实证研究和分析的方法论范式,将自然实验方法引入到软件质量和测试质量的研究中,为今后的实证研究提供了重要的参考范例,大大拓展了相关领域的研究视野。
{"title":"An Empirical Study of Software Testing Quality based on Natural Experiments","authors":"Jiahao Li, Xinhao Cui, Yichen Wang, Feng Xie","doi":"10.1109/QRS-C57518.2022.00080","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00080","url":null,"abstract":"Software testing is an indispensable part of the software life cycle, and the quality of software testing largely affects the quality of software delivered to users. However, in the current stage of software testing quality research, the focus on testing quality influencing factors is still limited to theoretical analysis and model application, and there is a lack of empirical research based on real data and samples. To address this problem, this paper proposes the idea of using natural experiments to conduct empirical research in the field of software testing quality for the first time, and analyzes the feasibility of the research proposal through literature research. In this paper, the empirical study was conducted using real data provided by enterprises, through the research of cooperative enterprise project data and event records, selected the “CNAS expansion of the on-site review and audit training” as an exogenous event, team capacity as the explanatory variable to build a natural experimental model of test quality. After completing the empirical model, we analyze the results, which show that the exogenous events have a significant disposition effect on test quality, and the empirical results pass the four commonly used robustness tests, indicating that the experimental results have a high 95% confidence level. In addition, this paper also analyzes the control variables in the empirical model and finds that test team size can have an impact on test quality by affecting test diversity, which provides ideas for subsequent research. Finally, based on the experimental ideas and empirical results of this study, this paper summarizes the methodological paradigm of applying the natural experiment method to empirically study and analyze the factors affecting test quality, which provides an important reference example for future empirical studies by introducing the natural experiment method in the study of software quality and test quality, and greatly expands the research horizon of related fields.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124744564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maintenance Optimization for Dependent Two-Unit Systems Considering Stochastic Degradation and Imperfect Maintenance 考虑随机退化和不完全维修的相关两单元系统维修优化
Wanqing Cheng, Xiujie Zhao
Modeling on complex multi-component systems and seek the maintenance optimization have been widely investigated in recent years. In this paper, we propose a maintenance optimization policy that is applicable to dependent two-unit systems. The degradation model is based on a bivariate Wiener process. We simultaneously consider the three maintenance actions including doing nothing, imperfect repair and replacement, and implement the modeling of imperfect repair by introducing the degradation ratio that follows the beta distribution. Moreover, we solve the optimal maintenance problem of infinite horizons using the typical MDP method in sequential decision making, and give its structural properties and value iteration method. A numerical example is then demonstrated to illustrate the algorithm's viability and to investigate the model's properties.
近年来,复杂多部件系统的建模和维修优化问题得到了广泛的研究。本文提出了一种适用于相关双单元系统的维护优化策略。退化模型是基于二元维纳过程的。同时考虑不维修、不完善维修和更换三种维修行为,通过引入服从beta分布的退化比实现不完善维修的建模。在此基础上,利用序列决策中的典型MDP方法求解了无限视界的最优维护问题,并给出了该方法的结构性质和值迭代方法。最后通过数值算例说明了该算法的可行性,并对模型的性质进行了研究。
{"title":"Maintenance Optimization for Dependent Two-Unit Systems Considering Stochastic Degradation and Imperfect Maintenance","authors":"Wanqing Cheng, Xiujie Zhao","doi":"10.1109/QRS-C57518.2022.00089","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00089","url":null,"abstract":"Modeling on complex multi-component systems and seek the maintenance optimization have been widely investigated in recent years. In this paper, we propose a maintenance optimization policy that is applicable to dependent two-unit systems. The degradation model is based on a bivariate Wiener process. We simultaneously consider the three maintenance actions including doing nothing, imperfect repair and replacement, and implement the modeling of imperfect repair by introducing the degradation ratio that follows the beta distribution. Moreover, we solve the optimal maintenance problem of infinite horizons using the typical MDP method in sequential decision making, and give its structural properties and value iteration method. A numerical example is then demonstrated to illustrate the algorithm's viability and to investigate the model's properties.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117009907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Learning Path Recommendation Method for Knowledge Graph of Professional Courses 一种专业课程知识图谱的学习路径推荐方法
Yujuan Cheng
In this era of information explosion, in order to help students select suitable resources when facing a large number of online courses, this paper proposes a knowledge graph-based learning path recommendation method to bring personalized course recommendations to students. The knowledge graph of professional courses is realized by completing the construction of the ontology library of online courses, and the graph database Neo4j is used to store the knowledge graph. SpringBoot is used to build the backend system and implement a set of course recommendation algorithm to filter the learning resources after analyzing the courses students have taken and the quality of course learning, and generate a list of course recommendations for each student. After developing the system based on this method, it can effectively help learners recommend course learning paths and greatly meet students' learning needs.
在这个信息爆炸的时代,为了帮助学生在面对大量的在线课程时选择合适的资源,本文提出了一种基于知识图的学习路径推荐方法,为学生带来个性化的课程推荐。通过完成在线课程本体库的构建,实现专业课程的知识图谱,并使用图形数据库Neo4j存储知识图谱。使用SpringBoot构建后端系统,实现一套课程推荐算法,通过分析学生修过的课程和课程学习质量,对学习资源进行筛选,生成针对每个学生的课程推荐列表。基于该方法开发的系统可以有效地帮助学习者推荐课程学习路径,极大地满足学生的学习需求。
{"title":"A Learning Path Recommendation Method for Knowledge Graph of Professional Courses","authors":"Yujuan Cheng","doi":"10.1109/QRS-C57518.2022.00076","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00076","url":null,"abstract":"In this era of information explosion, in order to help students select suitable resources when facing a large number of online courses, this paper proposes a knowledge graph-based learning path recommendation method to bring personalized course recommendations to students. The knowledge graph of professional courses is realized by completing the construction of the ontology library of online courses, and the graph database Neo4j is used to store the knowledge graph. SpringBoot is used to build the backend system and implement a set of course recommendation algorithm to filter the learning resources after analyzing the courses students have taken and the quality of course learning, and generate a list of course recommendations for each student. After developing the system based on this method, it can effectively help learners recommend course learning paths and greatly meet students' learning needs.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132560260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hyperledger Fabric-Based Copyright Management System for Clothing design drawings 基于Hyperledger面料的服装设计图纸版权管理系统
Wenxuan Wang, Yongqiang Chen, Jiangchen Zhou, Huan Jin
The growth of the Internet has accelerated the distribution of digital content such as graphics and audio, and its copyright issues have gained attention. One particular industry worth noting, apparel design, has no explicit legal constraints, making piracy even easier. In this paper, we combine the decentralized and tamper-evident features of blockchain to design and implement a federated chain-based copyright management system for apparel design diagrams using the Hyperledger Fabric platform. In this paper, the copyright checking model uses perceptual hash algorithm and difference hash algorithm to calculate the graph similarity of garment effect and garment plan respectively, and calculate the mean value of similarity between them to determine whether they are plagiarized. The design diagrams are stored on IPFS, which makes up for the drawbacks of blockchain's difficulty in scaling and expensive storage space. Simulation experiments show that the blockchain system can maintain a high throughput and the originality checking model proposed in this paper can meet the practical requirements.
互联网的发展加速了图形、音频等数字内容的传播,其版权问题也引起了人们的关注。值得注意的是,服装设计行业没有明确的法律约束,这使得盗版更加容易。在本文中,我们结合区块链的去中心化和防篡改特性,使用Hyperledger Fabric平台设计并实现了一个基于联邦链的服装设计图版权管理系统。本文的版权检查模型分别使用感知哈希算法和差分哈希算法计算服装效果和服装方案的图相似度,并计算两者之间相似度的平均值,判断是否抄袭。设计图存储在IPFS上,这弥补了区块链难以扩展和昂贵的存储空间的缺点。仿真实验表明,区块链系统能够保持较高的吞吐量,本文提出的独创性检验模型能够满足实际要求。
{"title":"Hyperledger Fabric-Based Copyright Management System for Clothing design drawings","authors":"Wenxuan Wang, Yongqiang Chen, Jiangchen Zhou, Huan Jin","doi":"10.1109/QRS-C57518.2022.00022","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00022","url":null,"abstract":"The growth of the Internet has accelerated the distribution of digital content such as graphics and audio, and its copyright issues have gained attention. One particular industry worth noting, apparel design, has no explicit legal constraints, making piracy even easier. In this paper, we combine the decentralized and tamper-evident features of blockchain to design and implement a federated chain-based copyright management system for apparel design diagrams using the Hyperledger Fabric platform. In this paper, the copyright checking model uses perceptual hash algorithm and difference hash algorithm to calculate the graph similarity of garment effect and garment plan respectively, and calculate the mean value of similarity between them to determine whether they are plagiarized. The design diagrams are stored on IPFS, which makes up for the drawbacks of blockchain's difficulty in scaling and expensive storage space. Simulation experiments show that the blockchain system can maintain a high throughput and the originality checking model proposed in this paper can meet the practical requirements.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131261921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalized Network Temperature for DDoS Detection through Rényi Entropy 基于rsamnyi熵的DDoS检测广义网络温度
Xiang Wang, Xing Zhang, Changda Wang
Distributed Denial-of-Services (DDoS) are serious network threats hardly eliminated. Current network entropy-based DDoS detection methods suffer from distinguishing DDoS attack traffic among normal traffic through a fixed empirical detection threshold, i.e., most of such thresholds are case-sensitive ones. With the Rényi entropy of a network, the paper devised a Generalized Network Temperature (GNT) based approach for DDoS attack detection, where GNT is a novel and fine-granular-scale statistical indicator that describes the network entropy changes in the light of both network traffic and network topology changes. Within a series of predefined time windows, our proposed approach first collects the selected network traffic features and then calculates the GNT for each time window. Second, the DDoS attacks are then acknowledged or denied by comparing each GNT to a dynamically adjustable thresh-old generated by the Exponentially Weighted Moving Average (EWMA) model. Furthermore, the publicly available CIC DoS 2017 dataset is utilized to test the proposed approach in the paper. The experimental results show that our proposed approach outperforms the known Shannon entropy-based DDoS attack detection methods with respect to both efficacy and efficiency.
分布式拒绝服务(DDoS)是一种难以消除的严重网络威胁。目前基于网络熵的DDoS检测方法存在通过固定的经验检测阈值来区分DDoS攻击流量和正常流量的问题,即大多数阈值是区分大小写的。利用网络的rsamunyi熵,设计了一种基于广义网络温度(GNT)的DDoS攻击检测方法,GNT是一种新颖的细粒度统计指标,可以根据网络流量和网络拓扑的变化来描述网络熵的变化。在一系列预定义的时间窗口内,我们提出的方法首先收集选定的网络流量特征,然后计算每个时间窗口的GNT。其次,通过将每个GNT与指数加权移动平均(EWMA)模型生成的动态可调阈值进行比较,对DDoS攻击进行确认或拒绝。此外,利用公开可用的CIC DoS 2017数据集来测试本文提出的方法。实验结果表明,我们提出的方法在有效性和效率方面都优于已知的基于香农熵的DDoS攻击检测方法。
{"title":"Generalized Network Temperature for DDoS Detection through Rényi Entropy","authors":"Xiang Wang, Xing Zhang, Changda Wang","doi":"10.1109/QRS-C57518.2022.00014","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00014","url":null,"abstract":"Distributed Denial-of-Services (DDoS) are serious network threats hardly eliminated. Current network entropy-based DDoS detection methods suffer from distinguishing DDoS attack traffic among normal traffic through a fixed empirical detection threshold, i.e., most of such thresholds are case-sensitive ones. With the Rényi entropy of a network, the paper devised a Generalized Network Temperature (GNT) based approach for DDoS attack detection, where GNT is a novel and fine-granular-scale statistical indicator that describes the network entropy changes in the light of both network traffic and network topology changes. Within a series of predefined time windows, our proposed approach first collects the selected network traffic features and then calculates the GNT for each time window. Second, the DDoS attacks are then acknowledged or denied by comparing each GNT to a dynamically adjustable thresh-old generated by the Exponentially Weighted Moving Average (EWMA) model. Furthermore, the publicly available CIC DoS 2017 dataset is utilized to test the proposed approach in the paper. The experimental results show that our proposed approach outperforms the known Shannon entropy-based DDoS attack detection methods with respect to both efficacy and efficiency.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131549363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge Graph Question Answering based on Contrastive Learning and Feature Transformation 基于对比学习和特征转换的知识图谱问答
Xinrong Hu, Jingjing Huang, Junping Liu, Qiang Zhu, J. Yang
Traditional Knowledge Graph Question Answering(KGQA) usually focuses on entity recognition and relation detection. Common relation detection methods cannot detect new relations without corresponding word entries in the system, and the propagation of errors leads to the loss of some semantic similarity information. In this paper, we propose an end-to-end knowledge graph question-answering framework (TransCL). Latent knowledge is first mined from the knowledge base and augmented information is generated in the form of question-answer pairs. Positive features are then transformed into difficult positive features using a feature transformation method based on positive extrapolation. We use contrastive learning methods to aggregate vectors and retain the original information, capturing deep matching features between data samples by contrast. TransCL is more capable of fuzzy matching and dealing with unknown inputs. Experiments show that our method achieves an F1 score of 85.50% on the NLPCC-ICCPOL-2016 open domain QA dataset.
传统的知识图谱问答(Knowledge Graph Question answer, KGQA)通常侧重于实体识别和关系检测。常用的关系检测方法无法检测到系统中没有对应词项的新关系,并且错误的传播导致一些语义相似信息的丢失。本文提出了一个端到端的知识图谱问答框架(TransCL)。首先从知识库中挖掘潜在知识,并以问答对的形式生成增强信息。然后利用基于正外推的特征转换方法将正特征转换为难正特征。我们使用对比学习方法聚合向量并保留原始信息,通过对比捕捉数据样本之间的深度匹配特征。TransCL具有更强的模糊匹配能力和处理未知输入的能力。实验表明,该方法在nlpcc - iccpl -2016开放域QA数据集上获得了85.50%的F1分数。
{"title":"Knowledge Graph Question Answering based on Contrastive Learning and Feature Transformation","authors":"Xinrong Hu, Jingjing Huang, Junping Liu, Qiang Zhu, J. Yang","doi":"10.1109/QRS-C57518.2022.00097","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00097","url":null,"abstract":"Traditional Knowledge Graph Question Answering(KGQA) usually focuses on entity recognition and relation detection. Common relation detection methods cannot detect new relations without corresponding word entries in the system, and the propagation of errors leads to the loss of some semantic similarity information. In this paper, we propose an end-to-end knowledge graph question-answering framework (TransCL). Latent knowledge is first mined from the knowledge base and augmented information is generated in the form of question-answer pairs. Positive features are then transformed into difficult positive features using a feature transformation method based on positive extrapolation. We use contrastive learning methods to aggregate vectors and retain the original information, capturing deep matching features between data samples by contrast. TransCL is more capable of fuzzy matching and dealing with unknown inputs. Experiments show that our method achieves an F1 score of 85.50% on the NLPCC-ICCPOL-2016 open domain QA dataset.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"22 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123651239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Test Case Generation Method based on Test Requirements for Testing Software Component 基于测试软件组件测试需求的改进测试用例生成方法
Jinfu Chen, Yemin Yin, Saihua Cai, Ye Geng, Longxia Huang
With the rapid development of computer science and technology, the scale of software is becoming much bigger, and the advantages of components also makes it deeply used in component-based software engineering. However, once some security risks appear in the components, then, the whole software system would suffer irreversible problems or even fatal collapse. In recent years, various testing methods have been proposed to ensure the component security, but these traditional component testing methods did not consider whether the process of software testing satisfies the testing requirements, which causes the generated test cases cannot effectively detect potential faults in components. To solve this problem, this paper proposes an improved test case generation method based on testing requirements, namely TGTR, to generate effectively test cases for better detecting the software faults. We first construct test requirement meta model through selecting some features of the system under test; And then, we convert the state diagram model of the system under test to marker migration system based on the designed migration path generation algorithm; Finally, we generate the improved test cases through reachable path. Experimental results on three components show that the method optimizes the migration path compared to traditional test methods, resulting in fewer test cases while achieving similar detection efficiencies and taking less time.
随着计算机科学技术的飞速发展,软件的规模越来越大,组件的优势也使其在基于组件的软件工程中得到了深入的应用。但是,一旦组件出现了一些安全隐患,那么整个软件系统就会出现不可逆转的问题,甚至致命的崩溃。近年来,为了保证组件的安全性,人们提出了各种测试方法,但这些传统的组件测试方法没有考虑软件测试过程是否满足测试需求,导致生成的测试用例不能有效检测组件的潜在故障。针对这一问题,本文提出了一种改进的基于测试需求的测试用例生成方法——TGTR,以有效地生成测试用例,更好地检测软件故障。首先通过选择被测系统的一些特征,构建测试需求元模型;然后,基于设计的迁移路径生成算法,将待测系统的状态图模型转换为标记迁移系统;最后,我们通过可达路径生成改进的测试用例。在三个组件上的实验结果表明,与传统的测试方法相比,该方法优化了迁移路径,在达到相似检测效率的同时,减少了测试用例,缩短了测试时间。
{"title":"An Improved Test Case Generation Method based on Test Requirements for Testing Software Component","authors":"Jinfu Chen, Yemin Yin, Saihua Cai, Ye Geng, Longxia Huang","doi":"10.1109/QRS-C57518.2022.00039","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00039","url":null,"abstract":"With the rapid development of computer science and technology, the scale of software is becoming much bigger, and the advantages of components also makes it deeply used in component-based software engineering. However, once some security risks appear in the components, then, the whole software system would suffer irreversible problems or even fatal collapse. In recent years, various testing methods have been proposed to ensure the component security, but these traditional component testing methods did not consider whether the process of software testing satisfies the testing requirements, which causes the generated test cases cannot effectively detect potential faults in components. To solve this problem, this paper proposes an improved test case generation method based on testing requirements, namely TGTR, to generate effectively test cases for better detecting the software faults. We first construct test requirement meta model through selecting some features of the system under test; And then, we convert the state diagram model of the system under test to marker migration system based on the designed migration path generation algorithm; Finally, we generate the improved test cases through reachable path. Experimental results on three components show that the method optimizes the migration path compared to traditional test methods, resulting in fewer test cases while achieving similar detection efficiencies and taking less time.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116437485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bug Patterns in Probabilistic Programming Systems 概率编程系统中的Bug模式
Shoma Hamada, Haibo Yu, Vo Dai Trinh, Yuri Nishimura, Jianjun Zhao
Probabilistic programming systems allow developers to model random phenomena and perform reasoning about the model efficiently. As the number of probabilistic programming systems is growing significantly and are used more and more widely, the reliability of such systems is becoming very important. It is crucial to analyze real bugs of existing similar systems in order to develop efficient bug detection tools for probabilistic programming systems. This paper conducts an empirical study investigating bugs and their features on PyMC3, a real probabilistic programming system. Among 271 closed bugs, we identified 20 bugs that are unique to probabilistic programming languages and extracted eight bug patterns from these bugs. The result showed that many of the bugs were caused by types. We also propose some possible methods for automatically detecting these bug patterns. It is expected that this will contribute to the development of bug detection tools by capturing the characteristics of bugs in actual probabilistic programs in the future.
概率编程系统允许开发人员对随机现象进行建模,并有效地对模型进行推理。随着概率规划系统数量的显著增长和应用的日益广泛,这种系统的可靠性变得非常重要。为了开发高效的概率编程系统bug检测工具,分析现有类似系统的真实bug至关重要。本文对一个真实的概率编程系统PyMC3的bug及其特征进行了实证研究。在271个已关闭的错误中,我们确定了20个概率编程语言特有的错误,并从这些错误中提取了8个错误模式。结果表明,许多错误是由类型引起的。我们还提出了一些自动检测这些错误模式的可能方法。预计这将有助于通过捕获实际概率程序中的错误特征来开发错误检测工具。
{"title":"Bug Patterns in Probabilistic Programming Systems","authors":"Shoma Hamada, Haibo Yu, Vo Dai Trinh, Yuri Nishimura, Jianjun Zhao","doi":"10.1109/QRS-C57518.2022.00063","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00063","url":null,"abstract":"Probabilistic programming systems allow developers to model random phenomena and perform reasoning about the model efficiently. As the number of probabilistic programming systems is growing significantly and are used more and more widely, the reliability of such systems is becoming very important. It is crucial to analyze real bugs of existing similar systems in order to develop efficient bug detection tools for probabilistic programming systems. This paper conducts an empirical study investigating bugs and their features on PyMC3, a real probabilistic programming system. Among 271 closed bugs, we identified 20 bugs that are unique to probabilistic programming languages and extracted eight bug patterns from these bugs. The result showed that many of the bugs were caused by types. We also propose some possible methods for automatically detecting these bug patterns. It is expected that this will contribute to the development of bug detection tools by capturing the characteristics of bugs in actual probabilistic programs in the future.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124630069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trial Application of Risk Assessment Method for Metaverse meta - verse风险评估方法的试验应用
R. Sasaki
In recent years, the use of the metaverse has been increasing for activities such as gaming, shopping, and sightseeing. While the metaverse has various advantages, there are also concerns about risks such as security problems. Unless appropriate risk assessments are carried out in advance and countermeasures are taken, serious damage may occur during metaverse use. However, there has been no proposal or application of a risk assessment method for the metaverse. Therefore, we considered an improved method by applying the method previously developed by the authors for IoT risk assessment to the metaverse gaming environment and developed the Multiple Risk Communicator for Metaverse (MRC-MV) as a risk assessment method. Furthermore, in this research, by trial application of MRC-MV to metaverse shopping, we obtained results that show that this method is effective for this activity. This method not only clarifies threats with high risks, but also makes it possible to clarify high-priority countermeasure groups by semi-quantitatively considering countermeasure effectiveness, cost, and usability.
近年来,虚拟世界在游戏、购物和观光等活动中的使用越来越多。虽然元数据具有各种优势,但也存在安全问题等风险。除非事先进行适当的风险评估并采取相应的对策,否则在使用过程中可能会造成严重的损害。然而,目前还没有针对虚拟世界的风险评估方法的建议或应用。因此,我们考虑了一种改进的方法,将作者之前开发的物联网风险评估方法应用于虚拟世界游戏环境,并开发了虚拟世界多重风险通信器(MRC-MV)作为风险评估方法。此外,在本研究中,我们尝试将MRC-MV应用于元空间购物,结果表明该方法对该活动是有效的。该方法不仅可以明确高风险威胁,还可以通过半定量地考虑对策有效性、成本和可用性,明确高优先级的对策组。
{"title":"Trial Application of Risk Assessment Method for Metaverse","authors":"R. Sasaki","doi":"10.1109/QRS-C57518.2022.00026","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00026","url":null,"abstract":"In recent years, the use of the metaverse has been increasing for activities such as gaming, shopping, and sightseeing. While the metaverse has various advantages, there are also concerns about risks such as security problems. Unless appropriate risk assessments are carried out in advance and countermeasures are taken, serious damage may occur during metaverse use. However, there has been no proposal or application of a risk assessment method for the metaverse. Therefore, we considered an improved method by applying the method previously developed by the authors for IoT risk assessment to the metaverse gaming environment and developed the Multiple Risk Communicator for Metaverse (MRC-MV) as a risk assessment method. Furthermore, in this research, by trial application of MRC-MV to metaverse shopping, we obtained results that show that this method is effective for this activity. This method not only clarifies threats with high risks, but also makes it possible to clarify high-priority countermeasure groups by semi-quantitatively considering countermeasure effectiveness, cost, and usability.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124755226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1