首页 > 最新文献

2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)最新文献

英文 中文
Time-aware multi-resolutional approach to re-identifying location histories by using social networks 利用社会网络重新识别位置历史的时间感知多分辨率方法
Takuto Ohka, Shun Matsumoto, Masatsugu Ichino, H. Yoshiura
Identifying people from anonymous location histories is important for two purposes. i.e. to clarify privacy risks in using the location histories and to find evidence of who went where and when. Although linking with social network accounts is an excellent approach for such identification, previous methods need information about social relationships and have a limitation on the number of target data sets. Moreover, they make limited use of time information. We present models that overcome these problems by estimating the sameness and difference of people by using combinations of time and distance. Our proposed method uses these models along with multi-resolution models for both sides of linking, i.e. location histories and social network accounts. Evaluation using real data demonstrated the effectiveness of our method even when linking only one pseudonymized and obfuscated location history to 1 of 10,000 social network accounts without any information about social relationships.
从匿名位置历史记录中识别人有两个重要目的。例如,澄清使用位置历史记录的隐私风险,以及寻找谁在何时何地去过的证据。虽然与社交网络账户链接是一种很好的识别方法,但以前的方法需要有关社交关系的信息,并且对目标数据集的数量有限制。此外,他们对时间信息的利用有限。我们提出了克服这些问题的模型,通过使用时间和距离的组合来估计人们的相似性和差异性。我们提出的方法使用这些模型以及链接双方的多分辨率模型,即位置历史和社交网络帐户。使用真实数据的评估证明了我们的方法的有效性,即使只将一个假名化和模糊的位置历史链接到10,000个社交网络帐户中的一个,而没有任何有关社交关系的信息。
{"title":"Time-aware multi-resolutional approach to re-identifying location histories by using social networks","authors":"Takuto Ohka, Shun Matsumoto, Masatsugu Ichino, H. Yoshiura","doi":"10.1109/QRS-C51114.2020.00038","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00038","url":null,"abstract":"Identifying people from anonymous location histories is important for two purposes. i.e. to clarify privacy risks in using the location histories and to find evidence of who went where and when. Although linking with social network accounts is an excellent approach for such identification, previous methods need information about social relationships and have a limitation on the number of target data sets. Moreover, they make limited use of time information. We present models that overcome these problems by estimating the sameness and difference of people by using combinations of time and distance. Our proposed method uses these models along with multi-resolution models for both sides of linking, i.e. location histories and social network accounts. Evaluation using real data demonstrated the effectiveness of our method even when linking only one pseudonymized and obfuscated location history to 1 of 10,000 social network accounts without any information about social relationships.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115902094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Analyzing Smart Contracts using Predicate Transition Nets 基于谓词转换网络的智能合约建模与分析
Xudong He
Blockchain technology has gained wide acceptance in recent years. Smart contracts facilitate the application of the blockchain technology. Smart contracts are programs running distributed environments and are thus error prone. Smart contracts often lack precise specifications and are written in high-level programming languages such as Solidity. In this paper, we present an approach to formally model and analyze smart contracts using predicate transitions nets. We use the blind auction smart contract to demonstrate our approach, which reveals some problematic implementation of some smart contract functions. We have applied predicate transition nets in modeling and analyzing all 11 smart contracts in Azure blockchain workbench. Although we cannot tell whether there is any problem in these smart contracts based on their informal descriptions and Solidity programs without designer input. Our experience has shown the applicability and suitability of predicate transition nets. We believe that our approach can help smart contract designers to detect and prevent early design problems in the current practice of using informal textual descriptions of smart contracts.
近年来,区块链技术得到了广泛的接受。智能合约促进了区块链技术的应用。智能合约是运行在分布式环境中的程序,因此很容易出错。智能合约通常缺乏精确的规范,并且是用Solidity等高级编程语言编写的。在本文中,我们提出了一种使用谓词转换网络正式建模和分析智能合约的方法。我们使用盲拍智能合约来演示我们的方法,这揭示了一些智能合约功能的一些有问题的实现。我们将谓词转换网络应用于Azure区块链工作台中的所有11个智能合约的建模和分析。虽然在没有设计师输入的情况下,我们无法根据这些智能合约的非正式描述和Solidity程序判断它们是否存在问题。我们的经验表明谓词转换网的适用性和适宜性。我们相信,我们的方法可以帮助智能合约设计者在当前使用智能合约的非正式文本描述的实践中发现和防止早期设计问题。
{"title":"Modeling and Analyzing Smart Contracts using Predicate Transition Nets","authors":"Xudong He","doi":"10.1109/QRS-C51114.2020.00029","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00029","url":null,"abstract":"Blockchain technology has gained wide acceptance in recent years. Smart contracts facilitate the application of the blockchain technology. Smart contracts are programs running distributed environments and are thus error prone. Smart contracts often lack precise specifications and are written in high-level programming languages such as Solidity. In this paper, we present an approach to formally model and analyze smart contracts using predicate transitions nets. We use the blind auction smart contract to demonstrate our approach, which reveals some problematic implementation of some smart contract functions. We have applied predicate transition nets in modeling and analyzing all 11 smart contracts in Azure blockchain workbench. Although we cannot tell whether there is any problem in these smart contracts based on their informal descriptions and Solidity programs without designer input. Our experience has shown the applicability and suitability of predicate transition nets. We believe that our approach can help smart contract designers to detect and prevent early design problems in the current practice of using informal textual descriptions of smart contracts.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"25 21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125764058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Rule Engine for Anomaly Detection in 5G Mobile Edge Computing 5G移动边缘计算异常检测自适应规则引擎
Peng Sun, Liang Luo, Shangxin Liu, Weifeng Wu
Mobile Edge Computing received significant attention in recent years. MEC can effectively reduce the data transmission pressure from end to cloud, while meeting the requirements of low latency and high bandwidth in 5G scenarios, and has wide application prospects in industrial and medical fields. In this paper, we propose to adopt the deployment of computing resources in the telecom operator's C-RAN (Centralized Radio Access Network) to form a landing solution for MEC. At the same time, it is combined with smart street light equipped with 5G base stations to form the IoT front-end of the C-RAN network for data collection. Finally, an adaptive rule engine is used to routinely monitor data and detect data anomalies in a timely manner. The anomaly monitoring solution can meet the rapid response capability to anomalies in 5G communication.
近年来,移动边缘计算受到了极大的关注。MEC可以有效降低端到云的数据传输压力,同时满足5G场景下低时延、高带宽的需求,在工业和医疗领域具有广泛的应用前景。本文提出在电信运营商的C-RAN(集中式无线接入网)中部署计算资源,形成MEC的落地方案。同时与搭载5G基站的智慧路灯结合,构成C-RAN网络的IoT前端,进行数据采集。最后,使用自适应规则引擎对数据进行常规监控,及时检测数据异常。该异常监控方案能够满足5G通信中对异常的快速响应能力。
{"title":"Adaptive Rule Engine for Anomaly Detection in 5G Mobile Edge Computing","authors":"Peng Sun, Liang Luo, Shangxin Liu, Weifeng Wu","doi":"10.1109/QRS-C51114.2020.00123","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00123","url":null,"abstract":"Mobile Edge Computing received significant attention in recent years. MEC can effectively reduce the data transmission pressure from end to cloud, while meeting the requirements of low latency and high bandwidth in 5G scenarios, and has wide application prospects in industrial and medical fields. In this paper, we propose to adopt the deployment of computing resources in the telecom operator's C-RAN (Centralized Radio Access Network) to form a landing solution for MEC. At the same time, it is combined with smart street light equipped with 5G base stations to form the IoT front-end of the C-RAN network for data collection. Finally, an adaptive rule engine is used to routinely monitor data and detect data anomalies in a timely manner. The anomaly monitoring solution can meet the rapid response capability to anomalies in 5G communication.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133732915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Creative Computing based Experimental Study of Somatosensory Games for Promoting Intention Understanding 基于创造性计算的体感游戏促进意图理解的实验研究
Jie Jian, Xiaotong Zhang, Ping-Ping Ma
This paper attempts to understand the theoretical connotation of creative computing constructively through an experimental study. In this experiment, the somatosensory game designed and developed by integrating multidisciplinary knowledge and human power can help leaners develop their intention understanding ability. The data showed that the leaners in the experimental group performed better in intention understanding tasks in the somatosensory interaction environment. The activation of motor related brain regions in mirror neurons may be the basis for understanding the experimental results. From the design and conclusion of this experiment, we constructively verify that a creative computing based method is an effective one.
本文试图通过实验研究,建设性地理解创造性计算的理论内涵。在本实验中,结合多学科知识和人力资源设计开发的体感游戏可以帮助学习者发展意图理解能力。实验结果表明,实验组学习者在体感交互环境下的意图理解任务中表现较好。镜像神经元中运动相关脑区的激活可能是理解实验结果的基础。从实验的设计和结论中,我们建设性地验证了一种基于创造性计算的方法是有效的。
{"title":"Creative Computing based Experimental Study of Somatosensory Games for Promoting Intention Understanding","authors":"Jie Jian, Xiaotong Zhang, Ping-Ping Ma","doi":"10.1109/QRS-C51114.2020.00112","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00112","url":null,"abstract":"This paper attempts to understand the theoretical connotation of creative computing constructively through an experimental study. In this experiment, the somatosensory game designed and developed by integrating multidisciplinary knowledge and human power can help leaners develop their intention understanding ability. The data showed that the leaners in the experimental group performed better in intention understanding tasks in the somatosensory interaction environment. The activation of motor related brain regions in mirror neurons may be the basis for understanding the experimental results. From the design and conclusion of this experiment, we constructively verify that a creative computing based method is an effective one.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131442560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Decision-Tree Algorithm for detecting DDoS flooding attacks 一种轻量级决策树算法检测DDoS flood攻击
Godswill Lucky, F. Jjunju, A. Marshall
The development of an accurate, efficient and lightweight distributed solution for the detection and prevention of DDoS attacks provides network designers with new options to monitor and secure networks according to their strategic needs. Here we present, a lightweight architecture that distinguishes attack network flows from normal traffic flows with a detection accuracy of over 99.9%. The architecture presented is optimised for deployment in low-cost environments for efficient, rapid detection and prevention of DDoS attacks. To achieve a computationally efficiency architecture, the system was trained with a minimal number of features using a robust features selection approach and validated against the CIC 2017 and 2019 datasets. Analysis of the design is presented and results shows that the new architecture uses just 7% processing power of the detection system and provides no additional overhead to the monitored network.
为检测和预防DDoS攻击而开发的准确,高效和轻量级分布式解决方案为网络设计人员提供了根据其战略需求监控和保护网络的新选项。在这里,我们提出了一种轻量级架构,可以区分攻击网络流和正常流量流,检测准确率超过99.9%。该架构针对低成本环境的部署进行了优化,以实现高效、快速的DDoS攻击检测和预防。为了实现计算效率架构,使用鲁棒特征选择方法对系统进行了最少数量的特征训练,并针对CIC 2017和2019数据集进行了验证。对设计进行了分析,结果表明,新架构只使用了检测系统7%的处理能力,并且没有给被监测网络带来额外的开销。
{"title":"A Lightweight Decision-Tree Algorithm for detecting DDoS flooding attacks","authors":"Godswill Lucky, F. Jjunju, A. Marshall","doi":"10.1109/QRS-C51114.2020.00072","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00072","url":null,"abstract":"The development of an accurate, efficient and lightweight distributed solution for the detection and prevention of DDoS attacks provides network designers with new options to monitor and secure networks according to their strategic needs. Here we present, a lightweight architecture that distinguishes attack network flows from normal traffic flows with a detection accuracy of over 99.9%. The architecture presented is optimised for deployment in low-cost environments for efficient, rapid detection and prevention of DDoS attacks. To achieve a computationally efficiency architecture, the system was trained with a minimal number of features using a robust features selection approach and validated against the CIC 2017 and 2019 datasets. Analysis of the design is presented and results shows that the new architecture uses just 7% processing power of the detection system and provides no additional overhead to the monitored network.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132818320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Reliability Service Assurance in Public Clouds based on Blockchain 基于区块链的公共云可靠性服务保障
Sa Meng, Liang Luo, Peng Sun, Yuan Gao
The public cloud is a type of cloud computing offered by third-party providers over the public Internet, making them available to Internet users. The public cloud is featured in large-scale, high complexity, dynamic resource change. However, how to provide secure and reliable cloud services to the widest range of Internet users is a big challenge for the development of cloud computing. Blockchain is a new decentralized distributed computing paradigm. The data stored in the blockchain has the characteristics of unforgeability, whole process trace, traceability, openness and transparency, and collective maintenance. Based on these characteristics, blockchain has laid a solid foundation of trust and created a reliable cooperation mechanism. Applying blockchain technology to the cloud computing platform and improving the service quality of the cloud computing platform by using the blockchain mechanism is a research topic with great application prospects.
公共云是由第三方提供商通过公共互联网提供的一种云计算,使其可供互联网用户使用。公有云具有大规模、高复杂性、资源动态变化等特点。然而,如何为最广泛的互联网用户提供安全可靠的云服务是云计算发展面临的一大挑战。区块链是一种新的去中心化分布式计算范式。区块链中存储的数据具有不可伪造性、全程可追溯性、公开透明、集体维护等特点。基于这些特点,区块链奠定了坚实的信任基础,创造了可靠的合作机制。将区块链技术应用于云计算平台,利用区块链机制提高云计算平台的服务质量是一个极具应用前景的研究课题。
{"title":"Reliability Service Assurance in Public Clouds based on Blockchain","authors":"Sa Meng, Liang Luo, Peng Sun, Yuan Gao","doi":"10.1109/QRS-C51114.2020.00122","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00122","url":null,"abstract":"The public cloud is a type of cloud computing offered by third-party providers over the public Internet, making them available to Internet users. The public cloud is featured in large-scale, high complexity, dynamic resource change. However, how to provide secure and reliable cloud services to the widest range of Internet users is a big challenge for the development of cloud computing. Blockchain is a new decentralized distributed computing paradigm. The data stored in the blockchain has the characteristics of unforgeability, whole process trace, traceability, openness and transparency, and collective maintenance. Based on these characteristics, blockchain has laid a solid foundation of trust and created a reliable cooperation mechanism. Applying blockchain technology to the cloud computing platform and improving the service quality of the cloud computing platform by using the blockchain mechanism is a research topic with great application prospects.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134081074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Depth Estimation and Object Detection for Monocular Semantic SLAM Using Deep Convolutional Network 基于深度卷积网络的单目语义SLAM深度估计与目标检测
Changbo Hou, Xuejiao Zhao, Yun Lin
It is still challenging to efficiently construct semantic map with a monocular camera. In this paper, deep learning is introduced to combined with SLAM to realize semantic map production. We replace depth estimation module of SLAM with FCN which effectively solves the contradiction of triangulation. The Fc layers of FCN are modified to convolutional layers. Redundant calculation of Fc layers is avoided after optimization, and images can be input in any size. Besides, Faster RCNN, namely, a two-stage object detection network is utilized to obtain semantic information. We fine-tune RPN and Fc layers by transfer learning. The two algorithms are evaluated on official dataset. Results show that the average relative error of depth estimation is reduced by 12.6%, the accuracy of object detection is improved by 10.9%. The feasibility of the combination of deep learning and SLAM is verified.
利用单目相机高效地构建语义地图仍然是一个挑战。本文引入深度学习,结合SLAM实现语义地图的生成。我们用FCN代替SLAM的深度估计模块,有效地解决了三角测量的矛盾。将FCN的Fc层修改为卷积层。优化后避免了Fc层的冗余计算,可以输入任意大小的图像。此外,采用更快的RCNN,即两阶段目标检测网络来获取语义信息。我们通过迁移学习对RPN和Fc层进行微调。在官方数据集上对两种算法进行了评估。结果表明,深度估计的平均相对误差降低了12.6%,目标检测的精度提高了10.9%。验证了深度学习与SLAM相结合的可行性。
{"title":"Depth Estimation and Object Detection for Monocular Semantic SLAM Using Deep Convolutional Network","authors":"Changbo Hou, Xuejiao Zhao, Yun Lin","doi":"10.1109/QRS-C51114.2020.00051","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00051","url":null,"abstract":"It is still challenging to efficiently construct semantic map with a monocular camera. In this paper, deep learning is introduced to combined with SLAM to realize semantic map production. We replace depth estimation module of SLAM with FCN which effectively solves the contradiction of triangulation. The Fc layers of FCN are modified to convolutional layers. Redundant calculation of Fc layers is avoided after optimization, and images can be input in any size. Besides, Faster RCNN, namely, a two-stage object detection network is utilized to obtain semantic information. We fine-tune RPN and Fc layers by transfer learning. The two algorithms are evaluated on official dataset. Results show that the average relative error of depth estimation is reduced by 12.6%, the accuracy of object detection is improved by 10.9%. The feasibility of the combination of deep learning and SLAM is verified.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134213977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Predicting Remaining Useful Life with Uncertainty Using Recurrent Neural Process 基于递归神经过程的不确定性剩余使用寿命预测
Guozhen Gao, Z. Que, Zhengguo Xu
Recently deep learning based remaining useful life (RUL) prediction approaches have gained increasing attention due to their scalability and generalization ability. Although deep learning based approaches can obtain promising point prediction performance, it is not easy for them to estimate the uncertainty in RUL prediction. In this paper, a recurrent neural process model is proposed to address the prognostics uncertainty problem based on deep learning. Compared with the original neural process model, a recurrent layer is added to extract sequential information from input sliding windows. The RUL prediction problem can be considered as finding a regression function mapping the sliding window input to its corresponding RUL. By obtaining the distribution over the regression functions, the recurrent neural process is able to model the probability distribution of the RUL. As a probabilistic model, stochastic variational inference and reparameterization trick is applied to learn the parameters of the model. The proposed method is validated through the C-MAPSS turbofan engine dataset.
近年来,基于深度学习的剩余使用寿命预测方法因其可扩展性和泛化能力而受到越来越多的关注。尽管基于深度学习的方法可以获得很好的点预测性能,但它们不容易估计出规则点预测中的不确定性。本文提出了一种基于深度学习的递归神经过程模型来解决预测不确定性问题。与原有的神经过程模型相比,该模型增加了一个循环层,从输入滑动窗口中提取序列信息。RUL预测问题可以看作是找到一个将滑动窗口输入映射到相应RUL的回归函数。通过得到回归函数上的分布,递归神经过程能够模拟RUL的概率分布。作为一个概率模型,采用随机变分推理和重参数化技巧来学习模型的参数。通过C-MAPSS涡扇发动机数据集对该方法进行了验证。
{"title":"Predicting Remaining Useful Life with Uncertainty Using Recurrent Neural Process","authors":"Guozhen Gao, Z. Que, Zhengguo Xu","doi":"10.1109/QRS-C51114.2020.00057","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00057","url":null,"abstract":"Recently deep learning based remaining useful life (RUL) prediction approaches have gained increasing attention due to their scalability and generalization ability. Although deep learning based approaches can obtain promising point prediction performance, it is not easy for them to estimate the uncertainty in RUL prediction. In this paper, a recurrent neural process model is proposed to address the prognostics uncertainty problem based on deep learning. Compared with the original neural process model, a recurrent layer is added to extract sequential information from input sliding windows. The RUL prediction problem can be considered as finding a regression function mapping the sliding window input to its corresponding RUL. By obtaining the distribution over the regression functions, the recurrent neural process is able to model the probability distribution of the RUL. As a probabilistic model, stochastic variational inference and reparameterization trick is applied to learn the parameters of the model. The proposed method is validated through the C-MAPSS turbofan engine dataset.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134252709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards Prioritizing Vulnerability Testing 对漏洞测试进行优先排序
Halit Alptekin, Simge Demir, Şevval Şimşek, Cemal Yilmaz
Vulnerability assessment is the process of identifying and prioritizing the vulnerabilities in a system. Vulnerability scanners can, for example, scan a website for known vulnerabilities by running a repository of security tests, each of which is designed to reveal a known vulnerability. As the security tests need to be executed on each and every web page encountered, it may take quite a while for these scanners to report vulnerabilities. In this work, we present an approach for revealing the vulnerabilities faster by prioritizing the executions of the security tests on a per web page basis. The approach is based on a simple conjecture that “similar” web pages may possess “similar” vulnerabilities and that identifying these similarities can help prioritize the security tests. The results of the experiments we carried out by using 2927 distinct web pages (collected from 80 web sites), support our basic hypothesis; the percentages of the times the actual vulnerabilities appear in the top 8 and 15 predicted vulnerabilities were 86.9% and 98.4%, respectively.
脆弱性评估是识别系统中的脆弱性并确定其优先级的过程。例如,漏洞扫描器可以通过运行一个安全测试库来扫描一个网站,寻找已知的漏洞,每个测试库都旨在揭示一个已知的漏洞。由于安全测试需要在遇到的每个网页上执行,这些扫描器可能需要相当长的时间才能报告漏洞。在这项工作中,我们提出了一种通过在每个网页的基础上优先执行安全测试来更快地揭示漏洞的方法。该方法基于一个简单的猜想,即“相似”的网页可能具有“相似”的漏洞,并且识别这些相似性可以帮助确定安全测试的优先级。我们使用2927个不同的网页(收集自80个网站)进行的实验结果支持我们的基本假设;实际漏洞出现在预测漏洞前8名和前15名的次数分别为86.9%和98.4%。
{"title":"Towards Prioritizing Vulnerability Testing","authors":"Halit Alptekin, Simge Demir, Şevval Şimşek, Cemal Yilmaz","doi":"10.1109/qrs-c51114.2020.00114","DOIUrl":"https://doi.org/10.1109/qrs-c51114.2020.00114","url":null,"abstract":"Vulnerability assessment is the process of identifying and prioritizing the vulnerabilities in a system. Vulnerability scanners can, for example, scan a website for known vulnerabilities by running a repository of security tests, each of which is designed to reveal a known vulnerability. As the security tests need to be executed on each and every web page encountered, it may take quite a while for these scanners to report vulnerabilities. In this work, we present an approach for revealing the vulnerabilities faster by prioritizing the executions of the security tests on a per web page basis. The approach is based on a simple conjecture that “similar” web pages may possess “similar” vulnerabilities and that identifying these similarities can help prioritize the security tests. The results of the experiments we carried out by using 2927 distinct web pages (collected from 80 web sites), support our basic hypothesis; the percentages of the times the actual vulnerabilities appear in the top 8 and 15 predicted vulnerabilities were 86.9% and 98.4%, respectively.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115799301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decomposition of Attributes Oriented Software Trustworthiness Measure Based on Axiomatic Approaches 基于公理方法的面向属性的软件可信度度量分解
H. Tao, Yixiang Chen, Hengyang Wu
In order to make the software trustworthiness measures more rigorous, we once applied axiomatic approaches to measure software trustworthiness, and established a software trustworthiness measure based on the decomposition of attributes (STMBDA for short). For the sake of validating the effectiveness of STMBDA, in this paper we use it to assess the trustworthiness of 23 spacecraft softwares whose total code is about 300,000 lines. The validation result shows that STMBDA can effectively evaluate the trustworthiness of the spacecraft softwares and identify the weak links in the development process.
为了使软件可信度度量更加严格,我们曾采用公理方法对软件可信度进行度量,建立了基于属性分解的软件可信度度量(简称STMBDA)。为了验证STMBDA的有效性,本文利用它对23个航天器软件的可信度进行了评估,这些软件的代码总数约为30万行。验证结果表明,STMBDA能够有效地评估航天器软件的可信度,识别开发过程中的薄弱环节。
{"title":"Decomposition of Attributes Oriented Software Trustworthiness Measure Based on Axiomatic Approaches","authors":"H. Tao, Yixiang Chen, Hengyang Wu","doi":"10.1109/QRS-C51114.2020.00060","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00060","url":null,"abstract":"In order to make the software trustworthiness measures more rigorous, we once applied axiomatic approaches to measure software trustworthiness, and established a software trustworthiness measure based on the decomposition of attributes (STMBDA for short). For the sake of validating the effectiveness of STMBDA, in this paper we use it to assess the trustworthiness of 23 spacecraft softwares whose total code is about 300,000 lines. The validation result shows that STMBDA can effectively evaluate the trustworthiness of the spacecraft softwares and identify the weak links in the development process.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"17 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114108950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1