首页 > 最新文献

2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)最新文献

英文 中文
Prefilter: A Fault Localization Method using Unlabelled Test Cases based on K-Means Clustering and Similarity 预滤波:一种基于k均值聚类和相似性的无标记测试用例故障定位方法
Dong An, Shihai Wang, Liandie Zhu, Xunli Yang, Xiaobo Yan
Current research begins to apply unlabelled test cases to fault localization. However, in these methods, the labeled test cases randomly selected as the basis for fault localization cannot cover enough execution information, which will reduce fault localization efficiency. In this paper, a method based on K-Means clustering and similarity is proposed. At the beginning of the test, K-Means clustering is performed on the test case suite and the test cases filtered can cover more execution information. Next, for the test cases with failed execution results, the test cases with similar execution information are filtered to better highlight the fault information in the failed test cases. Experiments on Defects4J datasets show that the proposed method can be combined with other technologies to improve their efficiency, and the proposed method also has good compatibility with traditional software fault localization algorithms. The average improvement reached 13.37% in 8 scenarios.
目前的研究开始将未标记的测试用例应用于故障定位。然而,在这些方法中,随机选择的带有标记的测试用例作为故障定位的基础,无法覆盖足够的执行信息,从而降低了故障定位的效率。本文提出了一种基于k均值聚类和相似度的聚类方法。在测试开始时,K-Means聚类在测试用例集上执行,过滤的测试用例可以覆盖更多的执行信息。接下来,对于具有失败执行结果的测试用例,过滤具有相似执行信息的测试用例,以更好地突出失败测试用例中的错误信息。在Defects4J数据集上的实验表明,该方法可以与其他技术相结合,提高其效率,并且与传统的软件故障定位算法具有良好的兼容性。在8个场景中,平均提升率达到13.37%。
{"title":"Prefilter: A Fault Localization Method using Unlabelled Test Cases based on K-Means Clustering and Similarity","authors":"Dong An, Shihai Wang, Liandie Zhu, Xunli Yang, Xiaobo Yan","doi":"10.1109/QRS-C57518.2022.00046","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00046","url":null,"abstract":"Current research begins to apply unlabelled test cases to fault localization. However, in these methods, the labeled test cases randomly selected as the basis for fault localization cannot cover enough execution information, which will reduce fault localization efficiency. In this paper, a method based on K-Means clustering and similarity is proposed. At the beginning of the test, K-Means clustering is performed on the test case suite and the test cases filtered can cover more execution information. Next, for the test cases with failed execution results, the test cases with similar execution information are filtered to better highlight the fault information in the failed test cases. Experiments on Defects4J datasets show that the proposed method can be combined with other technologies to improve their efficiency, and the proposed method also has good compatibility with traditional software fault localization algorithms. The average improvement reached 13.37% in 8 scenarios.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"24 21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131423373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic Transformation Method from UML to Event-B 从UML到Event-B的系统转换方法
Xue Geng, Sheng-rong Zou, Junpeng Yao
In object-oriented software development, UML has become a de facto modeling standard. However, although UML is easy to understand and apply, it has inaccurate semantics, and UML is a semi-formal modeling language, which cannot be formally verified. Event-B is a formal method based on a large number of mathematical predicate logic, which is precise but difficult to understand and apply. Therefore, how to combine the advantages of UML diagram and Event-B method is the focus of the research. The previous transformation methods are based on the transformation from UML scatter diagram to Event-B, which is prone to conflict and inconsistency. Therefore, we propose a systematic transformation method that can realize the corresponding unification of elements in UML and those in Event-B. The general software system is a medium-sized system. We believe that the medium-sized system can be clearly expressed by using use case diagram, class diagram, state diagram and sequence diagram. In this paper, the transformation methods from these four diagrams to Event-B are given respectively. The transformation method of the system is applied to the elevator control system which requires high safety and reliability. The system transformation method from UML to Event-B not only improves the accuracy of UML and is easy for software practitioners to use, but also enhances the comprehensibility of formal methods and is conducive to the promotion and application of formal methods.
在面向对象的软件开发中,UML已经成为事实上的建模标准。然而,尽管UML易于理解和应用,但它具有不准确的语义,并且UML是一种半形式化的建模语言,无法进行形式化验证。Event-B是一种基于大量数学谓词逻辑的形式化方法,虽然精度高,但难以理解和应用。因此,如何将UML图和Event-B方法的优点结合起来是研究的重点。以前的转换方法是基于从UML散点图到Event-B的转换,容易产生冲突和不一致。因此,我们提出了一种系统的转换方法,可以实现UML中元素与Event-B中元素的相应统一。通用软件系统是一个中等规模的系统。我们认为中型系统可以用用例图、类图、状态图和序列图来清晰地表达。本文分别给出了从这四种图到Event-B的转换方法。将该系统的改造方法应用于对安全性和可靠性要求较高的电梯控制系统。从UML到Event-B的系统转换方法不仅提高了UML的准确性,便于软件从业者使用,而且增强了形式化方法的可理解性,有利于形式化方法的推广和应用。
{"title":"Systematic Transformation Method from UML to Event-B","authors":"Xue Geng, Sheng-rong Zou, Junpeng Yao","doi":"10.1109/QRS-C57518.2022.00127","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00127","url":null,"abstract":"In object-oriented software development, UML has become a de facto modeling standard. However, although UML is easy to understand and apply, it has inaccurate semantics, and UML is a semi-formal modeling language, which cannot be formally verified. Event-B is a formal method based on a large number of mathematical predicate logic, which is precise but difficult to understand and apply. Therefore, how to combine the advantages of UML diagram and Event-B method is the focus of the research. The previous transformation methods are based on the transformation from UML scatter diagram to Event-B, which is prone to conflict and inconsistency. Therefore, we propose a systematic transformation method that can realize the corresponding unification of elements in UML and those in Event-B. The general software system is a medium-sized system. We believe that the medium-sized system can be clearly expressed by using use case diagram, class diagram, state diagram and sequence diagram. In this paper, the transformation methods from these four diagrams to Event-B are given respectively. The transformation method of the system is applied to the elevator control system which requires high safety and reliability. The system transformation method from UML to Event-B not only improves the accuracy of UML and is easy for software practitioners to use, but also enhances the comprehensibility of formal methods and is conducive to the promotion and application of formal methods.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115926609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breaking Anonymity of Social Media by Profiling from Multimodal Information 从多模态信息分析打破社交媒体的匿名性
Eina Hashimoto, Masatsugu Ichino, H. Yoshiura
Information on social media is important for forensics in the real and cyber worlds, because social media platforms are used for various illicit purposes. However, the anonymity of social media accounts hinders their forensic use. Conventional methods of deanonymizing social media accounts are not sufficiently precise, because they only use information from words in social media posts. Another drawback is that those methods require not only information from the anonymous accounts that are the target of deanonymization, but also information from real-name accounts belonging to the same people who own the anonymous accounts. This paper proposes a new deanonymization method that profiles anonymous accounts to infer their users' attributes and matches the inferred attributes with the known attributes of candidates for deanonymization. In this method, the profiling of anonymous accounts uses not only word information but also information from posted sentences and images. Evaluation with data from 78 volunteers demonstrates the proposed method's viability.
社交媒体上的信息对于现实世界和网络世界的取证都很重要,因为社交媒体平台被用于各种非法目的。然而,社交媒体账户的匿名性阻碍了它们在法庭上的应用。传统的去匿名化社交媒体账户的方法不够精确,因为它们只使用社交媒体帖子中的文字信息。另一个缺点是,这些方法不仅需要来自去匿名化目标的匿名账户的信息,还需要来自拥有匿名账户的同一个人的实名账户的信息。本文提出了一种新的去匿名化方法,该方法通过分析匿名帐户来推断其用户的属性,并将推断的属性与已知的去匿名化候选者的属性进行匹配。在这种方法中,对匿名帐户的分析不仅使用单词信息,还使用发布的句子和图像信息。对78名志愿者的数据进行评估,证明了该方法的可行性。
{"title":"Breaking Anonymity of Social Media by Profiling from Multimodal Information","authors":"Eina Hashimoto, Masatsugu Ichino, H. Yoshiura","doi":"10.1109/QRS-C57518.2022.00028","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00028","url":null,"abstract":"Information on social media is important for forensics in the real and cyber worlds, because social media platforms are used for various illicit purposes. However, the anonymity of social media accounts hinders their forensic use. Conventional methods of deanonymizing social media accounts are not sufficiently precise, because they only use information from words in social media posts. Another drawback is that those methods require not only information from the anonymous accounts that are the target of deanonymization, but also information from real-name accounts belonging to the same people who own the anonymous accounts. This paper proposes a new deanonymization method that profiles anonymous accounts to infer their users' attributes and matches the inferred attributes with the known attributes of candidates for deanonymization. In this method, the profiling of anonymous accounts uses not only word information but also information from posted sentences and images. Evaluation with data from 78 volunteers demonstrates the proposed method's viability.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123863889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SemirFL: Boosting Fault Localization via Combining Semantic Information and Information Retrieval SemirFL:结合语义信息和信息检索增强故障定位
Xiangyu Shi, Xiaolin Ju, Xiang Chen, Guilong Lu, Mengqi Xu
Automated fault localization aims to reduce software maintenance's workload during software development's evolution. Applying different features extracted from bug reports and source files can help locate faults. However, these approaches consider programming languages as natural when measuring similarity features, considering only precise term matching and ignoring deep semantic similarity features. Furthermore, existing bug localization approaches need to utilize the structural information extracted from source files, where program languages have unique structural features compared to natural languages. In this paper, we proposed SemirFL, a model combining both Convolutional Neural Network(CNN) and revised Vector Space Model(rVSM), which is feeded with four metadata features (bug-fixing recency, bug-fixing frequency, collaborative filtering score, and class name similarity). SemirFL has been studied on four open-source projects. The experimental results show that SemirFL can significantly outperform the existing representative techniques in locating faults in the buggy source files.
自动化故障定位旨在减少软件开发演进过程中的软件维护工作量。应用从bug报告和源文件中提取的不同特性可以帮助定位故障。然而,这些方法在测量相似度特征时将编程语言视为自然的,只考虑精确的术语匹配而忽略深层语义相似度特征。此外,现有的缺陷定位方法需要利用从源文件中提取的结构信息,而程序语言与自然语言相比具有独特的结构特征。在本文中,我们提出了一个结合卷积神经网络(CNN)和修正向量空间模型(rVSM)的模型SemirFL,该模型具有4个元数据特征(bug修复近时性、bug修复频率、协同过滤得分和类名相似度)。SemirFL已经在四个开源项目中进行了研究。实验结果表明,SemirFL在错误源文件的故障定位方面明显优于现有的代表性技术。
{"title":"SemirFL: Boosting Fault Localization via Combining Semantic Information and Information Retrieval","authors":"Xiangyu Shi, Xiaolin Ju, Xiang Chen, Guilong Lu, Mengqi Xu","doi":"10.1109/QRS-C57518.2022.00055","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00055","url":null,"abstract":"Automated fault localization aims to reduce software maintenance's workload during software development's evolution. Applying different features extracted from bug reports and source files can help locate faults. However, these approaches consider programming languages as natural when measuring similarity features, considering only precise term matching and ignoring deep semantic similarity features. Furthermore, existing bug localization approaches need to utilize the structural information extracted from source files, where program languages have unique structural features compared to natural languages. In this paper, we proposed SemirFL, a model combining both Convolutional Neural Network(CNN) and revised Vector Space Model(rVSM), which is feeded with four metadata features (bug-fixing recency, bug-fixing frequency, collaborative filtering score, and class name similarity). SemirFL has been studied on four open-source projects. The experimental results show that SemirFL can significantly outperform the existing representative techniques in locating faults in the buggy source files.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124995828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Quantum Information and Cybernetics Based Algorithm for Creativity Applying in Cultural Heritage Products Design 基于量子信息和控制论的创意算法在文物产品设计中的应用
Qinyun Liu, William C. Chu, Xiaochun Zhang, Shou-Yu Lee, Wei Mo
Creative products based on cultural heritage are high value-added products relying on wisdom, skills and talents, creating and promoting cultural resources and cultural products. Cultural heritage creative products are the organic integration of content creativity and cultural heritage carrier. At the technical level, the design algorithm has not been widely applied, but it has been studied. The output design algorithm fails to take into account both intelligent design and creative design. Computer cannot make creativity even based on the most robust algorithm. As the computing logic is 0 or 1. Quantum information theory can solve the problem. In this research, we proposed the creativity generation scheme inspired by multi data and information entanglement. Application scene is the culture products design with traditional elements based on world culture heritage, the Forbidden City. In this research, it is proposed the creativity generation scheme inspired by multi data and information entanglement.
以文化遗产为基础的创意产品是依靠智慧、技能和人才,创造和推广文化资源和文化产品的高附加值产品。文化遗产创意产品是内容创意与文化遗产载体的有机结合。在技术层面上,设计算法尚未得到广泛应用,但已被研究。输出设计算法未能兼顾智能设计和创意设计。即使是基于最强大的算法,计算机也无法产生创造力。因为计算逻辑是0或1。量子信息理论可以解决这个问题。在本研究中,我们提出了基于多数据和信息纠缠的创意生成方案。应用场景是基于世界文化遗产紫禁城的传统元素的文化产品设计。本研究提出了基于多数据和信息纠缠的创意生成方案。
{"title":"A Quantum Information and Cybernetics Based Algorithm for Creativity Applying in Cultural Heritage Products Design","authors":"Qinyun Liu, William C. Chu, Xiaochun Zhang, Shou-Yu Lee, Wei Mo","doi":"10.1109/QRS-C57518.2022.00116","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00116","url":null,"abstract":"Creative products based on cultural heritage are high value-added products relying on wisdom, skills and talents, creating and promoting cultural resources and cultural products. Cultural heritage creative products are the organic integration of content creativity and cultural heritage carrier. At the technical level, the design algorithm has not been widely applied, but it has been studied. The output design algorithm fails to take into account both intelligent design and creative design. Computer cannot make creativity even based on the most robust algorithm. As the computing logic is 0 or 1. Quantum information theory can solve the problem. In this research, we proposed the creativity generation scheme inspired by multi data and information entanglement. Application scene is the culture products design with traditional elements based on world culture heritage, the Forbidden City. In this research, it is proposed the creativity generation scheme inspired by multi data and information entanglement.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129997546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PTLC: Protect the Identity Privacy during Cross-Chain Asset Transaction More Effectively PTLC:更有效地保护跨链资产交易中的身份隐私
Jingyuan Cai, Ying Zhou, Tianyuan Hu, Bixin Li
With the continuous development and innovation of blockchain technology, a large number of blockchain networks with various features have emerged to satisfy the needs of differ-ent scenarios. For example, Cross-Chain technologies have been proposed to enable information interaction and value transfer between two blockchains. In Cross-Chain asset transaction, the Hashed Timelock Contract (HTLC for short) algorithm is the most widely used to control asset transaction. However, the HTLC algorithm has a problem of low-level security assurance in practical applications: Attackers can associate the accounts of both parties involved in a Cross-Chain transaction by comparing contract parameters on different chains, which leads to the disclosure of identity privacy information of both relevant parties in the Cross-Chain transactions. In order to protect the identity privacy information of Cross-Chain traders, a new privacy protection method for Cross-Chain asset transaction was proposed based on Paillier homomorphic encryption (PTLC for short) in this paper, which uses Paillier homomorphic encryption to replace hash encryption in privacy protection process. It not only maintains a high security of Cross-Chain asset transaction, but also solves the major problem of identity privacy information leakage during whole asset transaction process. Experiments of cross-chain asset transactions are conducted in two different Ethereum private chains, and experimental results show that the proposed method PTLC can protect the identity privacy information effectively and achieve a low GAS consumption value in the Cross-Chain process.
随着区块链技术的不断发展和创新,出现了大量具有各种功能的区块链网络,以满足不同场景的需求。例如,已经提出了跨链技术,以实现两个区块链之间的信息交互和价值转移。在跨链资产交易中,Hashed Timelock Contract(简称HTLC)算法是应用最广泛的资产交易控制算法。但HTLC算法在实际应用中存在安全保障水平较低的问题:攻击者可以通过比较不同链上的合约参数,将跨链交易双方的账户关联起来,从而导致跨链交易双方的身份隐私信息泄露。为了保护跨链交易者的身份隐私信息,本文提出了一种基于Paillier同态加密(PTLC)的跨链资产交易隐私保护新方法,该方法在隐私保护过程中使用Paillier同态加密代替哈希加密。它不仅保持了跨链资产交易的高安全性,而且解决了整个资产交易过程中身份隐私信息泄露的主要问题。在两个不同的以太坊私链上进行了跨链资产交易实验,实验结果表明,提出的PTLC方法可以有效地保护身份隐私信息,并在跨链过程中实现较低的GAS消耗值。
{"title":"PTLC: Protect the Identity Privacy during Cross-Chain Asset Transaction More Effectively","authors":"Jingyuan Cai, Ying Zhou, Tianyuan Hu, Bixin Li","doi":"10.1109/QRS-C57518.2022.00019","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00019","url":null,"abstract":"With the continuous development and innovation of blockchain technology, a large number of blockchain networks with various features have emerged to satisfy the needs of differ-ent scenarios. For example, Cross-Chain technologies have been proposed to enable information interaction and value transfer between two blockchains. In Cross-Chain asset transaction, the Hashed Timelock Contract (HTLC for short) algorithm is the most widely used to control asset transaction. However, the HTLC algorithm has a problem of low-level security assurance in practical applications: Attackers can associate the accounts of both parties involved in a Cross-Chain transaction by comparing contract parameters on different chains, which leads to the disclosure of identity privacy information of both relevant parties in the Cross-Chain transactions. In order to protect the identity privacy information of Cross-Chain traders, a new privacy protection method for Cross-Chain asset transaction was proposed based on Paillier homomorphic encryption (PTLC for short) in this paper, which uses Paillier homomorphic encryption to replace hash encryption in privacy protection process. It not only maintains a high security of Cross-Chain asset transaction, but also solves the major problem of identity privacy information leakage during whole asset transaction process. Experiments of cross-chain asset transactions are conducted in two different Ethereum private chains, and experimental results show that the proposed method PTLC can protect the identity privacy information effectively and achieve a low GAS consumption value in the Cross-Chain process.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116341183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Software Multi-Fault Clustering Ensemble Technology 软件多故障聚类集成技术
Mingxing Zhang, Shihai Wang, Wentao Wu, Weiguo Qiu, Wandong Xie
In the software multi-fault scenario, the failed test cases of different fault sources are classified by clustering, and then the program statements in each cluster are ranked with suspicion by the fault location technology based on program spectrum. Software multi-fault location technology decouples failed test cases by clustering their code coverage information. At present, there are many clustering strategies for software failed test cases. However, due to the characteristics of high dimension, complex structure and variable shape of the execution information of failed test cases, it is difficult for a single clustering algorithm to accurately identify the cluster structure, so that it cannot be decoupled accurately. In this paper, a variety of clustering algorithms and different parameters are selected to obtain multiple cluster members, according to the clustering members to get the similarity matrix, and then hierarchical clustering is used to obtain the final clustering results, to achieve the integration between different clustering algorithms, so that the algorithm can identify the complex cluster structure, and then improve the efficiency of fault location.
在软件多故障场景中,通过聚类对不同故障源的失败测试用例进行分类,然后利用基于程序谱的故障定位技术对每个聚类中的程序语句进行可疑排序。软件多故障定位技术通过聚类失败测试用例的代码覆盖信息来解耦失败测试用例。目前,针对软件失败测试用例的聚类策略有很多。然而,由于失败测试用例执行信息具有高维、结构复杂、形状多变等特点,单一聚类算法难以准确识别聚类结构,从而无法准确解耦。本文通过选择多种聚类算法和不同参数获得多个聚类成员,根据聚类成员得到相似度矩阵,然后采用分层聚类获得最终聚类结果,实现不同聚类算法之间的整合,使算法能够识别复杂的聚类结构,进而提高故障定位效率。
{"title":"A Software Multi-Fault Clustering Ensemble Technology","authors":"Mingxing Zhang, Shihai Wang, Wentao Wu, Weiguo Qiu, Wandong Xie","doi":"10.1109/QRS-C57518.2022.00059","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00059","url":null,"abstract":"In the software multi-fault scenario, the failed test cases of different fault sources are classified by clustering, and then the program statements in each cluster are ranked with suspicion by the fault location technology based on program spectrum. Software multi-fault location technology decouples failed test cases by clustering their code coverage information. At present, there are many clustering strategies for software failed test cases. However, due to the characteristics of high dimension, complex structure and variable shape of the execution information of failed test cases, it is difficult for a single clustering algorithm to accurately identify the cluster structure, so that it cannot be decoupled accurately. In this paper, a variety of clustering algorithms and different parameters are selected to obtain multiple cluster members, according to the clustering members to get the similarity matrix, and then hierarchical clustering is used to obtain the final clustering results, to achieve the integration between different clustering algorithms, so that the algorithm can identify the complex cluster structure, and then improve the efficiency of fault location.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122602065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prototype Algorithm: Number Chain Features in Spatial Similarity Calculation of Time-Series Graph Sources 原型算法:时间序列图源空间相似性计算中的数链特征
Ziyang Weng, Shuhao Wang, W. Yan, Yinger Liang
In this paper, we propose a method to calculate spatial semantic similarity based on sampled same-area time-series images. First, we preprocess the corpus data containing spatial information, then we project the coordinates in the preprocessed corpus data to obtain the actual spatial ranges, then we determine the contextual annotations of geographical feature gestures in the time-series images and perform comparison sampling, and finally we calculate the similarity between the coordinates of the overall same-area time-series image geo-corpus The similarity is evaluated for each two nodes in the set of the overall same-region geo-serial corpus. This paper identifies the causes of data noise and interpretation bias arising from the migration process of geographic data in time-series images, which effectively complements the traditional natural semantic similarity model and improves the effectiveness of intelligent geographic information retrieval and ancient landscape painting verification.
本文提出了一种基于采样的同面积时间序列图像的空间语义相似度计算方法。首先对包含空间信息的语料库数据进行预处理,然后对预处理后的语料库数据进行坐标投影,得到实际的空间范围,然后确定时间序列图像中地理特征手势的语境标注,并进行对比采样;最后计算整体同区域时间序列图像地理序列语料库坐标之间的相似度,对整体同区域地理序列语料库集合中的每两个节点进行相似度评估。本文识别了时间序列图像中地理数据迁移过程中产生数据噪声和解译偏差的原因,有效补充了传统的自然语义相似度模型,提高了智能地理信息检索和古代山水画验证的有效性。
{"title":"Prototype Algorithm: Number Chain Features in Spatial Similarity Calculation of Time-Series Graph Sources","authors":"Ziyang Weng, Shuhao Wang, W. Yan, Yinger Liang","doi":"10.1109/QRS-C57518.2022.00102","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00102","url":null,"abstract":"In this paper, we propose a method to calculate spatial semantic similarity based on sampled same-area time-series images. First, we preprocess the corpus data containing spatial information, then we project the coordinates in the preprocessed corpus data to obtain the actual spatial ranges, then we determine the contextual annotations of geographical feature gestures in the time-series images and perform comparison sampling, and finally we calculate the similarity between the coordinates of the overall same-area time-series image geo-corpus The similarity is evaluated for each two nodes in the set of the overall same-region geo-serial corpus. This paper identifies the causes of data noise and interpretation bias arising from the migration process of geographic data in time-series images, which effectively complements the traditional natural semantic similarity model and improves the effectiveness of intelligent geographic information retrieval and ancient landscape painting verification.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116142949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Blockchain in Trusted Data Provenance 区块链在可信数据溯源中的应用
Xiangke Mao, C. Li, Guigang Zhang, Xin Wei, Chunxiao Xing
Data provenance is a basic requirement for trusted data management in the era of big data. Before the emergence of blockchain technology, data provenance mainly used a centralized database to store data records, log records, etc., to facilitate subsequent audit tracking, but database has the security problem of data tampering. After the emergence of blockchain technology, researchers have conducted a lot of research on trusted data provenance in the Internet of Things (IoT), product supply chain, medical health and other fields based on the characteristics of blockchain decentralization, tamper resistance, and traceability, etc., to ensure the security and trustworthiness of data provenance results. This paper will sort out the research on the use of blockchain technology for data provenance in different fields in recent years, and analyze the similarities and differences between existing blockchain based data provenance methods as a whole. Finally, the possible challenges in data provenance based on blockchain technology are pointed out and the possible solutions are given.
数据溯源是大数据时代可信数据管理的基本要求。在区块链技术出现之前,数据溯源主要采用集中式数据库存储数据记录、日志记录等,方便后续审计跟踪,但数据库存在数据篡改的安全问题。区块链技术出现后,研究人员基于区块链去中心化、抗篡改、可追溯性等特点,在物联网(IoT)、产品供应链、医疗健康等领域对可信数据溯源进行了大量研究,以确保数据溯源结果的安全性和可信度。本文将梳理近年来在不同领域使用区块链技术进行数据溯源的研究,从整体上分析现有基于区块链的数据溯源方法之间的异同。最后,指出了基于区块链技术的数据溯源可能面临的挑战,并给出了可能的解决方案。
{"title":"Application of Blockchain in Trusted Data Provenance","authors":"Xiangke Mao, C. Li, Guigang Zhang, Xin Wei, Chunxiao Xing","doi":"10.1109/QRS-C57518.2022.00024","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00024","url":null,"abstract":"Data provenance is a basic requirement for trusted data management in the era of big data. Before the emergence of blockchain technology, data provenance mainly used a centralized database to store data records, log records, etc., to facilitate subsequent audit tracking, but database has the security problem of data tampering. After the emergence of blockchain technology, researchers have conducted a lot of research on trusted data provenance in the Internet of Things (IoT), product supply chain, medical health and other fields based on the characteristics of blockchain decentralization, tamper resistance, and traceability, etc., to ensure the security and trustworthiness of data provenance results. This paper will sort out the research on the use of blockchain technology for data provenance in different fields in recent years, and analyze the similarities and differences between existing blockchain based data provenance methods as a whole. Finally, the possible challenges in data provenance based on blockchain technology are pointed out and the possible solutions are given.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"704 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116120876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-Layer Fault Triggering Framework based on Evolutionary Strategy Guided Symbolic Execution for Automated Test Case Generation 一种基于进化策略的多层故障触发框架,用于自动生成测试用例
Zhiyu Duan, Yujia Li, Pubo Ma, Xiaodong Gou, Shunkun Yang
The powerful technique, symbolic execution, has become a promising approach for analyzing deep complex software failure modes recently. However, as the software scale grows rapidly in intelligent automatic control system, these methods unavoidably suffer the curse of path explosion and low global coverage. To solve the problem, an evolutionary strategy guided symbolic execution framework is proposed for triggering hard-to-excite input-relevant faults. A novel alternate asynchronous search strategy is adopted to enhance the breadth-search capability of symbol execution. Furthermore, by combining ANGR, a popular symbolic execution engine, and genetic algorithm, this method synchronously triggers the potentially hidden hybrid fault modes at different levels in the software architecture. Case studies on the SIR test suite demonstrate that the GA-enhanced symbolic execution greatly improves coverage and accelerates test convergence. Among them, the coverage rate has increased by up to 23.7%. With a baseline of 95% line coverage, the proposed method can reduce the number of iterations by at least 43.3%.
符号执行这一强大的技术,近年来已成为分析深层复杂软件故障模式的一种很有前途的方法。然而,随着智能自动控制系统中软件规模的快速增长,这些方法不可避免地遭受路径爆炸和低全球覆盖率的诅咒。为了解决这一问题,提出了一种进化策略指导的符号执行框架,用于触发难以激发的输入相关故障。为了提高符号执行的广度搜索能力,采用了一种新的交替异步搜索策略。此外,该方法结合流行的符号执行引擎ANGR和遗传算法,在软件体系结构的不同层次同步触发潜在隐藏的混合故障模式。对SIR测试套件的案例研究表明,ga增强的符号执行极大地提高了覆盖率并加速了测试收敛。其中,覆盖率提高了23.7%。在95%行覆盖率的基线下,所提出的方法可以将迭代次数减少至少43.3%。
{"title":"A Multi-Layer Fault Triggering Framework based on Evolutionary Strategy Guided Symbolic Execution for Automated Test Case Generation","authors":"Zhiyu Duan, Yujia Li, Pubo Ma, Xiaodong Gou, Shunkun Yang","doi":"10.1109/QRS-C57518.2022.00045","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00045","url":null,"abstract":"The powerful technique, symbolic execution, has become a promising approach for analyzing deep complex software failure modes recently. However, as the software scale grows rapidly in intelligent automatic control system, these methods unavoidably suffer the curse of path explosion and low global coverage. To solve the problem, an evolutionary strategy guided symbolic execution framework is proposed for triggering hard-to-excite input-relevant faults. A novel alternate asynchronous search strategy is adopted to enhance the breadth-search capability of symbol execution. Furthermore, by combining ANGR, a popular symbolic execution engine, and genetic algorithm, this method synchronously triggers the potentially hidden hybrid fault modes at different levels in the software architecture. Case studies on the SIR test suite demonstrate that the GA-enhanced symbolic execution greatly improves coverage and accelerates test convergence. Among them, the coverage rate has increased by up to 23.7%. With a baseline of 95% line coverage, the proposed method can reduce the number of iterations by at least 43.3%.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126979023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1