


default search action
25th QRS 2025: Hangzhou, China - Companion
- 25th International Conference on Software Quality, Reliability, and Security, QRS 2025 - Companion, Hangzhou, China, July 16-20, 2025. IEEE 2025, ISBN 978-1-6654-7773-4

- Afef Awadid, Mateo Becquart, Maxence Gagnant, André Meyer-Vitali:

A Retrieval-Augmented Generation (RAG) System for Supporting Architectural Design of Intelligent Transportation Systems. 1-10 - Xinyan Zhang, Xiaobing Feng, Xiujuan Xu, Zhiliang Zheng, Rongxuan Zhao:

RIRAG+: A Cross-Jurisdictional Financial Legal QA Framework Bridging Civil and Common Law Systems. 11-20 - Rishab Nuguru:

RadML: An Empirical Software Framework for Machine Learqrsning in Extreme Space Environments. 21-32 - Aaradhya Partap, Umme Shafiya Mubeen, Nithya Chandra Mohan, Yukthi Chikkanna, Akhila Iyengar:

The Role of Generative AI in Transforming Healthcare Services. 33-39 - William Cheng-Chung Chu, Shyh-Wei Chen, Shou-Yu Lee, Yu-Kang Chang, Yao-Hsien Tseng:

A Retrospective Study on Predicting Hyperglycemia and Hypoglycemia in Hospitalized Patients Using Machine Learning. 40-45 - Qiang Liu, Wenchuan Wang, Xinpan Yuan, Liujie Hua, Xianchao Zhou:

DualPrompt-CLIP: Enhancing Zero-Shot Anomaly Detection by Learnable Prefix-Suffix Textual Context. 46-52 - Qianren Yang, Yong Li, Tao Zhao:

FL-DPLoRA: An Integrated and Efficient Privacy-Preserving Training Framework for Large Language Models in Privacy-Critical Applications. 53-62 - Yukuan Yang, Lina Lai, Zhili Zhang, Yunzhi Xue, Lingzhong Meng:

JANUS-CARLA: An Emergency-Oriented Driving Assistance Framework with Fast Hazard Detection and Response Powered by Multimodal Large Language Models. 63-70 - Wei Lin, Sini Chen, Huibiao Zhu:

A Framework for Verifying BPMN with Hoare Logic. 71-81 - Logan Margabandu, Zizhao Chen, W. Eric Wong, Chih-Wei Hsu:

A Design of Experiments Oracle LLM for Research-Grounded Combinatorial Testing. 82-90 - Zhilong An, Yuezhong Wu

, Lingjiao Chen, Dawei He:
Short-Term Wind Power Forecasting Method Based on Improved iTransformer. 91-100 - Jin Wang, Qihe Feng, Qi Liu, Yonghong Zhang, Linglong Zhu:

An Improved Method of Spatiotemporal Representation Transfer and Self-attention Mechanism for Long-term Radar Echo Extrapolation. 101-108 - Yunkun Li, Tetsutaro Uehara:

Introduction of HDR Media Analysis for Digital Forensics. 109-118 - Amber Hayat, Veeravalli Jasmitha, Dase Chaitraja, Vireshwar Kumar, Ashok Kumar Bhateja:

Multimodal Biometric Template Protection based on Deep Binary Encoding. 119-126 - Keisuke Tanaka, Yu Tsuda, Tetsutaro Uehara:

Design and Implementation of a Security Assessment Tool towards Practical Ransomware Countermeasures. 127-136 - Xiaohan Hu, Jyoti Sahni

, Colin R. Simpson, Normalia Samian, Winston K. G. Seah:
Efficient Patient-centric EMR Sharing Block Tree. 137-146 - Sangsha Fang, Fakhar Abbas

, Tao Deng, Mehboob Hussain, Zuohua Ding:
HFLD: A Secure and Scalable Hybrid Framework for Intelligent V2X Communications in Next-Generation Wireless Networks. 147-156 - Thierno Aliou Ba, Fadel Touré, Usef Faghihi:

Software Defects Prediction: Source Code Is All You Need. 157-167 - Chi Sun, Yong Li, Zheyuan Pan:

SDPFE: A Formal Reasoning Approach for Explaining Software Defect Predictions. 168-177 - Lantian Li, Zhihao Liu, Zhongxing Yu:

Solsmith: Solidity Random Program Generator for Compiler Testing. 178-187 - Wei Zou, Tao Xiao, Siyou Ma, Fei Deng, Lianzhi Qi:

A Frame Data Generation Method for Test Execution. 188-195 - Hao Zhang, Tao Xiao, Fei Deng, Chi Hu, Yuyao Zhou:

Design and Validation of a Verification Platform for Enhancing Robustness of Image Object Recognition Systems. 196-203 - Jianhao Li, Yi Zhu, Qiao Yu, Yi Ding, Chongyang Huang:

Software Defect Prediction Based on Gated Fusion of Pre-trained Models. 204-213 - Siqi Wu, Lili Chen, Yao Xu, Jingyi Fu:

Analyzing Data Coupling and Control Coupling in Airborne Software: A Comprehensive Method and Implementation Guide. 214-221 - Yifan Zou

, Huiqiang Wang, Hongwu Lv, Shuai Zhao:
Deep Learning-Based Cross-Project Defect Prediction: A Comprehensive Survey. 222-231 - Xu Wang, Shijie Li, Dandan Wang, Yuhao Ge, Yang Yang:

From Prototype Interface to Test Case Generation with Large Language Model. 232-239 - Yin Wang, Hong-Xiang Sun:

Physics-Informed Neural Network for Accurate Prediction of Sound Spectra. 240-247 - Hongshuai Zhang, Xuzheng Jiang, Shijie Li, Jie Chen, Dandan Wang:

JMH-Prophet: Optimizing Java Microbenchmark Performance Predictions with Multimodal Deep Learning Techniques. 248-257 - Long Zhang, Jie Chen, Shijie Li, Jun Hu, Dongjin Yu:

Hybrid Deep Learning Models for Dynamic Warm-Up Iteration Optimization in Performance Testing. 258-267 - Zhichao Zhen, Yang Hu, Peng Zhao, Hongbin Zhang, Li Qin:

Enhancing AIOps with LILT: A LoRA-Based Incremental Learning Transformer for Robust Adaptation to Concept Drift. 268-277 - Siwei Yan:

Reinforcement Learning Based UAV Control Algorithm and Safety Performance Analysis. 278-286 - Bei Zhang, Haichi Huang, Daoyi Li, Shunkun Yang:

Spatiotemporal Remaining Useful Life Prediction Using Bayesian Graph Neural Differential Models. 287-294 - Yonglai Wang, Jiezhi Li, Bei Zhang, Cuicui Chen, Shunkun Yang:

A Bayesian CNN-LSTM Framework with Novel Dual Uncertainty Calibration for Aircraft Engine RUL Prognostics. 295-303 - Fang Liu, Fuping Zeng, Zeyu Wang, Yujia Li, Ling-lin Gong:

Research on Software Adaptive Testing Strategy Combined with Static Analysis. 304-310 - Shitong Liang, Zhan Shi, He Chen, Hongpin Ren, Lingzhong Meng:

Survey on Physics-Informed Neural Networks for Vehicle Dynamics Modeling in Autonomous Driving. 311-319 - Xiaodong Gou, Pingping Zhang, Xixi Li, Yixin Huo, Zhaomingyue Zheng:

Empirical Analysis on the Effectiveness of Centrality Metrics in Identifying Critical Nodes of Complex System: A Case Study on Transportation Networks. 320-326 - Xintao Zhao, Yeqing Song, Yijia Hu, Ying Gao, Ruiying Li:

A New Reliability Improvement Goal Allocation Method for Deep Space Exploration Missions. 327-332 - Liyuan Zhang, Hongbin Xiao, Wenhao Wang, Zhi Li, Changjin Li:

PF4SAFE: Problem Frames extension for Safety Analysis based on FBN Evaluation. 333-342 - Qiang Liu, Xiaonuo Han, Xinpan Yuan, Liujie Hua, Xianchao Zhou:

YOLOE-Based Semantic Segmentation Framework with VAM and DVCL for Enhanced Monitoring Accuracy in Highway Collapse Detection. 343-351 - Kuiying Zhang

, Feiyang Chen
, Nannan Liang, Xiaomei Zhang, Zhiwei Zhang:
Vision Aid: A Large Model of Visual Compensation for Visually Impaired People. 352-359 - Honghao Zhen, Huqing Wang, Zhixin Sun:

Performance Evaluation of EOL EV Battery Reverse Logistics Enterprises with DEMATEL - TAISM - FR - SD Methods. 360-369 - Shaozhi Wu, Tiantian Zeng, Qiwei Zhang, Peng Sun, Xingang Liu:

Research on EEG Signal Feature Fusion and Sleep Staging Based on CNN-LSTM. 370-374 - Tiantian Zeng, Shaozhi Wu, Jinqi He, Zhanghan Zheng, Xingang Liu:

An Intelligent Diagnostic Model for ECG Based on Bidirectional LSTM with Multiscale Feature Fusion. 375-379 - Wan Zhou, Chenye Song, Shanshan Jiao, Xiangfeng Luo:

A Semantic-Driven Method for Adaptive Compression in Retrieval-Augmented Generation for Language Models. 380-389 - You Zeng

, Chunli Xie, Yuanfa Hu, Yuqi Wang:
SACCD: Semantic Alignment-based Cross-language Code Clone Detection. 390-399 - Bingwu Fang, Yong Li, Zhenyu Liu:

Anomaly Detection for Multivariate Industrial Time Series Based on Consistency Models. 400-406 - Ruiqi He, Yong Li, Chi Sun:

Software Defect Prediction Based on the Dynamic Attention Rule Explanation Method. 407-415 - Min Zhou, Zhibin Yang

, Yong Zhou, Shuyi Yang, Ai Liu:
Interactively Translating Real-world Software Requirements into Linear Temporal Logics with Large Language Models. 416-425 - Zhongxi Lu, Hongji Yang, Chong Zeng, Yumo Guo:

A Translation Engine for Mapping User Intent to Design Artifacts via Aesthetic Rule Compilation. 426-433 - Surui Shuai, Chen Yao, Waqas Rasheed, Songhua Li, Yuchen Xie:

Coverage-Guided Optimization of Concolic Testing for Deep Neural Networks. 434-443 - Zheng Li, Binbin Yang, Yue Deng, Shumei Wu, Yong Liu:

Mutants and Test Cases Reduction Strategy for Fault Localization via Graph Representation. 444-453 - Yong Liu, Xin Wang, Hengyuan Liu, Ruishi Huang, Yonghao Wu:

Empirical Evaluation of LLMs for Automated Program Fault Localisation. 454-463 - Ke Nan, Meng Wang, Xiaoning Cao, Wei Zheng:

MLRT-DETR: An Efficient and Lightweight Multi-Scale Object Detection Model for Intelligent Driving. 464-471 - Yaolin Han, Wei Zheng:

An Automatic Classification Model for Long Code Vulnerabilities Based on the Teacher-Student Framework. 472-482 - Quy Le Xuan, Marco Munderloh

, Jörn Ostermann
:
Lifelong Learning for Fault Prognostics in Predictive Maintenance with Bayesian Neural Networks. 483-491 - Pan Liu, Tian Pan, Zizhao Chen, Yihao Li:

EAR: A Unified Modeling Approach for Knowledge Graphs. 492-501 - Yingxia Yu, Yajing Ma, Gulila Altenbek:

Research on Multi-hop Intelligent Question Answering Reasoning Methods Based on Knowledge Graphs. 502-510 - Yunwei Dong, Bingxu Xiao, Xiao Wang, Xiaofeng Li:

Modeling and Pattern-Based Refinement of Software Architectures for Aerospace Control Systems. 511-520 - Yanhui Zhu, Hao Chen, Qiang Liu, Zhixuan Zhang, Xujian Ying:

A Multimodal Knowledge Graph Completion Method Based on Knowledge Supervision and Modality Consistency Evaluation. 521-529 - Zijian Huang, Jun Ai, Jingyu Liu:

Software Model Generation and Simulation for Change Impact Analysis with LLM. 530-539 - Jingjing Guo, Yupeng Xiong, Lixiang Wu, Kun Dong, Lidong Lee:

A Defense Scheme of Backdoor Attacks for Federated Learning Based on Multi-Index Cascading. 540-549 - Qi Liu, Yonghua Cui, Jinbao Chen, Chaoying Ji, Zhaopeng Sun:

A Few-shot Sentiment Analysis Algorithm Based on Prompt Learning with Contextual Contrastive Learning. 550-555 - Yingjie Li, Wei Liu, Junying Chen, Junshuang Wu, Bo Liu:

CPFuzz: A Model-based Black-box Fuzzer for Cryptographic Protocols. 556-565 - Xi Huang, Fei Deng, Hao Zhang, Siyou Ma, Xiang Jing:

A Simulation Test Platform for Visual Recognition Systems and Its Application. 566-573 - Tao Xiao, Xi Huang, Fei Deng, Siyou Ma, Chi Hu:

Data Poisoning Risk Identification Method based on Preprocessing Decision Difference. 574-583 - Alexandra Volentir, Nafiseh Soveizi, Zhiming Zhao:

Socially-Informed Jupyter Notebook Quality: A Role-and Lifecycle-Aware Metrics Framework. 584-593 - Wentian Xie, Sufan Zhang, Ziyuan Wang:

Do Type Annotations Help Students Improve Python Program Development Efficiency? 594-600 - Na Li, Xia Zeng, Dongdong Gao

, Boyuan Xie, Shuqi Li:
AEM: A Comprehensive Platform Integrating Software Engineering Development and Process Management. 601-608 - Wenhao Wang, Zicheng Huang, Hongbin Xiao, Zhi Li, Bo Huang:

Learning in Imperfect Environments: Multi-Label Classification of Non-Functional Requirements under Long-Tailed Distribution. 609-618 - Dong-Meau Chang, Tse-Chuan Hsu, Zhou Liang, Zengyan Peng:

Utilizing Brain-Computer Interface Technology for Objective Diagnosis of Mental Disorders in Special Needs Children. 619-625 - Jingjing Liang, Yue Wu:

A Creative Computing Framework for Integrating Northern Dynasties Robe (NDR) Elements into Contemporary Fashion Design. 626-635 - Yuanbang Li, Wei Guo, Siyu Li, Rong Peng, Zhenzhu Fu:

A Comparative Study of Deep Learning Approaches with Different Feature Combination Strategies for Traceability Link Recovery. 636-647 - Wu Peng, Zhihua Chen, Jingrun Wang, Chengchen Feng, Wangxi Zhang:

Design and Implementation of a Digital Platform for Intelligent Substation Point Table Strategy. 648-653 - Jiafeng Lv, Ruiqi Luo, Huanxi Chen, Shuting Miao, Zheng Liu:

GA-FusionNet: Global adaptive fusion network for RGBT tracking. 654-661 - Rui Liu, Ruiqi Luo, Zhenglong Li:

Global Channel Attention Enhances Multi-Scale Localization for Object Tracking. 662-670 - Shiyu Zhu, Yimiao Zhang, Wenqiang Xu, Wei Guo, Peng Ye:

LLMSDH: An Integrated Software-assisted Development Tool Based on Large Language Models. 671-678 - Ping Zhu, Sheng Gao, Junwei Tang, Tao Peng, Min Li:

Holistic Lookahead Scheduling for Real-time Workflow Applications in Heterogeneous Clouds. 679-688 - Jinfu Chen, Xingquan Mao

, Rongtian Xu, Bo Geng:
A Comprehensive Blockchain Security Evaluation Method Integrating Hierarchical Analysis, Entropy Weighting and Ideal Solution Techniques. 689-699 - Feiran Lei, Yihao Zhang, Xuefei Tong, Shuaida Wu, Meng Sun:

Towards Formal Modeling and Verification of the Stellar Consensus Protocol in Z3. 700-709 - Mahmoud M. Abouzeid, Hongji Yang, Feng-Jian Wang:

Enhancing Reliability of Temporal Workflows through Artifact Anomaly Detection. 710-720 - Wenhao Shi, Zeyu Wang:

Research on Automatic Detection of Infeasible Paths Based on Symbolic Execution and Constraint Solving. 721-728 - Yi Yang, Manxian Liu, Changcun Dong, Wenjie Dong, Jian Wang:

Cognitive World Model-based Risk Decision for Data Center. 729-733 - Kaitlyn Song Zhang, Zijie Niu, Kevin Zhang:

Predicting Equine Health Outcomes Using Machine Learning Models Trained on Clinical Indicators and Limited Behavioral Data. 734-742 - Yingte Chai, Min Ren, Hao Cheng, Gang Wang, Man Zhao:

Multi-Objective Algorithm for Device Resource Scheduling Based on ANN Surrogate Model. 743-752 - Dongcheng Li, W. Eric Wong, Hu Liu, Man Zhao, Zizhao Chen:

Coverage-Guided Many-Objective Test Generation for Deep Neural Networks. 753-762 - Te Zhang, Yugang Wang, Junyan Ma, Chengyuan Ren, Fengbiao Bu:

LogOracle: A Declarative Language for Log Pattern Validation. 763-764 - Xuan Mao, Zijie Huang, Jianxin Ge, Chao Wang, Lizhi Cai:

MindLint: A Static Analysis Tool for MindQuantum-Based Applications. 765-766 - Haotong Ding

, Anni Li, Rexford Nii Ayitey Sosu:
HFF-JIT: A Hybrid Fuzzing Framework for JIT Compiler Vulnerability Detection in JavaScript. 767-768 - Yin Wang, Hong-Xiang Sun:

A Physics-Informed Cascaded Neural Network for Prediction of Sound Absorbers. 769-770 - Zhenyu Mao

, Xinxin Fan, Yifei Wang
, Jacky Keung
, Jialong Li:
Hybrid Privacy Policy-Code Consistency Check using Knowledge Graphs and LLMs. 771-772 - Lantian Li, Yejian Liang, Zhongxing Yu:

IDOL: Improved Different Optimization Levels Testing for Solidity Compilers. 773-774 - Yicheng Sun

, Jacky Keung
, Zhen Yang
, Shuo Liu
, Wing Kwong Chan:
A Novel Semi-Supervised Model for Generalizing Log Anomaly Detection with Limited Labeled Data. 775-776 - Toshihide Ubukata, Mingyue Zhang, Takuto Yamauchi, Jialong Li, Kenji Tei:

Graph-Contextual Reinforcement Learning for Efficient Exploration in Directed Controller Synthesis. 777-779 - Wen Zhang, Jinfu Chen, Xingquan Mao

, Yisong Liu, Chenyu Zhao:
A Novel Seed Scheduling Method based on Neural Network Loss Evaluation in Coverage-Guided Greybox Fuzzing. 780-781 - Jingyi Chen, Jinfu Chen, Saihua Cai, Shengran Wang, Xiaosong Chang:

SEAFuzz: Structural Exploration-Aware Seed Scheduling Approach for Fuzzing. 782-783 - Xinping Shi, Jinfu Chen, Chaojie Wu, Rexford Nii Ayitey Sosu:

A Hybrid Analysis Method for Android Malware Classification based on Static and Dynamic Features with Machine Learning. 784-785 - Ye Wang, Chaoqun Dai, Siyuan Zhou, Qiao Huang, Lingfeng Bao:

AISum4DCR: A Multi-Topic Dialog Summarization Approach for Developer Chat Rooms Integrating AI Chain and Prompt Engineering. 786-787 - Dingshan Zhuang, You Zeng

, Jiaxun Li:
Tiered-Precision Hybrid Computation: A Memory-Constrained Solution for Optimizing Word Embedding Search in Large-Scale AI Models. 788-789 - Yang Xu, Jinming Lv, Hang Nai, Yong Li, Qiaoluan Xie:

FPDetection: False Positives Detection in Static Code Analysis with Deep Learning and LLM. 790-791 - Min Gu, Lu Liu, Xiangrui Sun, Jiangtao Lu, Song Huang:

SUPAE: Semantic-enhanced Understanding and PoC Aspect Extraction for Vulnerability Reports. 792-793 - Qiuying Li, Shuo Liu:

CO-LIME: Correlation-aware Locally Interpretable Model-agnostic Explanations. 794-795 - Fei Yu, Jiaxi Xu, Jingwei Shang:

Test Scenario Generation Method Based on the Extended Activity Diagram. 796-797 - Shahzad Nayab

, Franz Wotawa
:
Ontology-based Testing for Quality Assurance of Robotics Applications. 798-799

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














