


default search action
27th PRDC 2022: Beijing, China
- 27th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2022, Beijing, China, November 28 - Dec. 1, 2022. IEEE 2022, ISBN 978-1-6654-8555-5

- Xiuwen Lu, Zhicong Zhang, Hui Xu:

Safe Rust Code Recommendation Based on Siamese Graph Neural Network. 1-11 - Mehdi Maleki, Mateen Malik, Peter Folkesson, Behrooz Sangchoolie, Johan Karlsson:

Modeling and Evaluating the Effects of Jamming Attacks on Connected Automated Road Vehicles. 12-23 - Yinqin Zhao, Chang Liu, Tao Yu, Long Wang, Xuanqing Shi, Yong Yang, Ying Li, Zhengang Wang, Dongdong Shangguan:

Tracing Processing of Service Requests in Cloud Environments. 24-33 - Mitsuho Takahashi, Fumio Machida, Qiang Wen:

How Data Diversification Benefits the Reliability of Three-version Image Classification Systems. 34-42 - Carmen Cârlan, Lydia Gauerhof, Barbara Gallina, Simon Burton:

Automating Safety Argument Change Impact Analysis for Machine Learning Components. 43-53 - Sabuj Laskar, Md Hasanur Rahman

, Bohan Zhang, Guanpeng Li:
Characterizing Deep Learning Neural Network Failures Between Algorithmic Inaccuracy and Transient Hardware Faults. 54-67 - Raul Sena Ferreira

, Joris Guérin
, Jérémie Guiochet, Hélène Waeselynck
:
SiMOOD: Evolutionary Testing Simulation With Out-Of-Distribution Images. 68-77 - David Paiva, Raffael S. C. G. de Lima, Manoel J. M. Carvalho, Fátima Mattiello-Francisco

, Henrique Madeira
:
Enhanced software development process for CubeSats to cope with space radiation faults. 78-88 - Zhihao Dai, Matthew Leeke, Yulong Ding, Shuanghua Yang

:
A Heterogeneous Redundant Architecture for Industrial Control System Security. 89-97 - Giulio Masetti, Silvano Chiaradonna, Leonardo Robol, Felicita Di Giandomenico:

Random Bad State Estimator to Address False Data Injection in Critical Infrastructures. 98-108 - Joe Hewett, Mark Etman, Robbie Marseglia, Tomas Mella Pickersgill, Matthew Leeke:

Towards a Dependable Energy Market: Proof of Authority in a Blockchain-based Peer-to-Peer Microgrid. 109-118 - Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Dan Dongseong Kim

:
Performance and Security Evaluation of a Moving Target Defense Based on a Software-Defined Networking Environment. 119-129 - Peter Folkesson, Behrooz Sangchoolie, Pierre Kleberger, Nasser Nowdehi:

On the Evaluation of Three Pre-Injection Analysis Techniques for Model-Implemented Fault- and Attack Injection. 130-140 - Júlio Mendonça

, Minjune Kim, Rafal Graczyk
, Marcus Völp
, Dan Dongseong Kim
:
Security Modeling and Analysis of Moving Target Defense in Software Defined Networks. 141-151 - José D'Abruzzo Pereira, João Henggeler Antunes, Marco Vieira

:
A Software Vulnerability Dataset of Large Open Source C/C++ Projects. 152-163 - Trishna Rajkumar

, Johnny Öberg:
AnoDe: A Log-based Self-Supervised Framework to Detect Scrubber Failures in SRAM-FPGA. 164-171 - Archita Ghosh, J. Lakshmi:

Understanding the Resiliency of Cloud Storage Services. 172-183 - Kangning Song, Siwei Zhou, Luyao Ye, Piaoyi Liu, Jing Tian, Jianwen Xiang:

Reliability Analysis of Multi-State System Based on Irrelevance Coverage Model. 184-193 - Anamta Khan

, Naghmeh Ivaki
, Henrique Madeira
:
Are UAVs' Flight Controller Software Reliable? 194-204 - Joe Hewett, Matthew Leeke:

Developing a GPT-3-Based Automated Victim for Advance Fee Fraud Disruption. 205-211 - Qianying Liao

, Alexandre Cortez Santos, Bruno Cabral, João Paulo Fernandes
, Nuno Lourenço:
HERB+: Evolving an Industrial-Strength Privacy-Preserving Machine Learning Framework. 212-223 - Juan Manuel Morote, Jose Luis de la Vara, Giovanni Giachetti, Clara Ayora

, Luis Alonso:
An Industrial Approach for Model-Based Reliability-Oriented System Design. 224-229 - Nicolas Rapin, Boutheina Bannour

, Morayo Adedjouma:
Model-Based Generation and Analysis Toolset of Fault Trees With Heterogeneous Failure Events. 230-235 - Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, Pang-Chieh Wang:

Examining the Utility of Differentially Private Synthetic Data Generated using Variational Autoencoder with TensorFlow Privacy. 236-241 - Emad Kareem Mutar

:
Signature of Electrical System Reliability Used Inside Aircraft. 242-247 - Jinwoo Kim, Jaehyun Nam:

Towards Building Secure and Reconfigurable Virtual Networks on Multi-Tenant Data Centers. 248-251 - Dohan Kim, Aming Wu

, Young-Woo Kwon:
Comparison of Meta-Heuristic Algorithms for Task Scheduling in Distributed Stream Processing. 252-255 - Tomohiro Ishii, Kazuteru Namba:

Stuck-at Fault Tolerance in DNN Using Statistical data. 256-257 - Yinqin Zhao, Long Wang:

Extracting Network Knowledge and Monitoring Network Status on Cloud Container Platforms. 258-260 - Daoqi Han, Tao Yu, Yueming Lu:

Progressive Evolution Scheme with Socialization Swarm for Privacy Blockchain. 261-263

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














