


default search action
IEEE Transactions on Reliability, Volume 71
Volume 71, Number 1, March 2022
- Yi Ding

, Yishuang Hu, Yu Lin, Zhiguo Zeng
:
Reliability Analysis of Multiperformance Multistate System Considering Performance Conversion Process. 2-15 - Mohammed Sayed Kotb

, Marwa Mostafa Mohie El-Din:
Parametric Inference for Step-Stress Accelerated Life Testing From Rayleigh Distribution Under Ordered Ranked Set Sampling. 16-27 - Shuo Li, Matteo Pozzi

:
Predicting the Evolution of Controlled Systems Modeled by Finite Markov Processes. 28-46 - Zhen Chen

, Tangbin Xia
, Yaping Li
, Ershun Pan
:
Random-Effect Models for Degradation Analysis Based on Nonlinear Tweedie Exponential-Dispersion Processes. 47-62 - Jing Li

, Rebecca J. Stones, Jinfei Luo:
Random Versus Copyset Placement: Data-Loss Models for Proactive-Tolerance Replica-Based Data Storage. 63-74 - Huimin Wang, Qi Huang

, Zhaojun Steven Li
:
A Dynamic Bayesian Network Control Strategy for Modeling Grid-Connected Inverter Stability. 75-86 - Reza Ahmadi

, Shaomin Wu
, Amirhossein Sobhani
:
Reliability Modeling and Maintenance Optimization for a Repairable System With Heterogeneity Population. 87-99 - S. F. Bagheri, Akbar Asgharzadeh

, Arturo J. Fernández
, Carlos J. Pérez-González
:
Joint Prediction for Future Failures Times Under Type-II Censoring. 100-110 - Xiaopeng Xu, Chuancai Liu

, Hongji Yang
:
Robust Inference Based On the Complementary Hamiltonian Monte Carlo. 111-126 - Changbo Hou

, Jie Zhang
, Yonggui Yuan
, Jun Yang, Libo Yuan:
Reliability Demodulation Algorithm Design for Phase Generated Carrier Signal. 127-138 - Ju Zeng

, Xiaopan Zhang
:
An Adaptive Large Neighborhood Search for Single-Machine Batch Processing Scheduling With 2-D Rectangular Bin-Packing Constraints. 139-148 - Rakesh Garg

, Supriya Raheja
, Ramesh Kumar Garg
:
Decision Support System for Optimal Selection of Software Reliability Growth Models Using a Hybrid Approach. 149-161 - Shunkun Yang

, Xiaodong Gou
, Minghao Yang
, Qi Shao
, Chong Bian
, Ming Jiang, Yongjie Qiao:
Software Bug Number Prediction Based on Complex Network Theory and Panel Data Model. 162-177 - Junlong Zhou

, Mingyue Zhang, Jin Sun
, Tian Wang
, Xiumin Zhou, Shiyan Hu
:
DRHEFT: Deadline-Constrained Reliability-Aware HEFT Algorithm for Real-Time Heterogeneous MPSoC Systems. 178-189 - He Jiang

, Guojun Gao, Zhilei Ren, Xin Chen
, Zhide Zhou
:
SMARTEST: A Surrogate-Assisted Memetic Algorithm for Code Size Reduction. 190-203 - Zhou Xu

, Kunsong Zhao, Tao Zhang
, Chunlei Fu
, Meng Yan
, Zhiwen Xie, Xiaohong Zhang
, Gemma Catolino
:
Effort-Aware Just-in-Time Bug Prediction for Mobile Apps Via Cross-Triplet Deep Feature Embedding. 204-220 - Junyan Qian

, Fan Shi
, Yong Cai, Haiyu Pan
:
Approximate Safety Properties in Metric Transition Systems. 221-234 - Binhang Qi

, Hailong Sun
, Wei Yuan
, Hongyu Zhang
, Xiangxin Meng
:
DreamLoc: A Deep Relevance Matching-Based Framework for bug Localization. 235-249 - Xiaoyuan Xie

, Yuhui Su
, Songqiang Chen
, Lin Chen
, Jifeng Xuan
, Baowen Xu:
MULA: A Just-In-Time Multi-labeling System for Issue Reports. 250-263 - Yan Lei

, Huan Xie
, Tao Zhang
, Meng Yan
, Zhou Xu
, Chengnian Sun
:
Feature-FL: Feature-Based Fault Localization. 264-283 - Zhao Li

, Yuhang Chen, Yi Song, Kangjie Lu, Jinwei Shen
:
Effective Covering Array Generation Using an Improved Particle Swarm Optimization. 284-294 - Yang Liu, Xiaoyi Zhang

:
Adaptive Random Testing for Multiagent Path Finding Systems. 295-308 - Yongchao Zhang

, Zhe Liu
, Yu Jiang
:
The Classification and Detection of Malware Using Soft Relevance Evaluation. 309-320 - Nan Zhang

, Meng Wang
, Zhenhua Duan
, Cong Tian:
Verifying Properties of MapReduce-Based Big Data Processing. 321-338 - Cengiz Togay

, Ahmet Kasif, Cagatay Catal
, Bedir Tekinerdogan
:
A Firewall Policy Anomaly Detection Framework for Reliable Network Security. 339-347 - Gunasekaran Manogaran, Mamoun Alazab

, P. Mohamed Shakeel, Ching-Hsien Hsu
:
Blockchain Assisted Secure Data Sharing Model for Internet of Things Based Smart Industries. 348-358 - Pablo Romero

:
Universal Reliability Bounds for Sparse Networks. 359-369 - Lucas A. M. De Alcantara

, Guilherme Padilha
, Rui Abreu
, Marcelo d'Amorim
:
Syrius: Synthesis of Rules for Intrusion Detectors. 370-381 - Shin-Guang Chen

, Yi-Kuei Lin
:
An Improved Merge Search Approach to Evaluate Reliability in Multistate Network Systems. 382-389 - Pawel Marcin Kozyra

:
An Innovative and Very Efficient Algorithm for Searching All Multistate Minimal Cuts Without Duplicates. 390-403 - Michael R. Livesay

, Daniel Pless, Stephen J. Verzi
, Kevin Stamber
, Anneliese Lilje
:
A Theoretical Approach for Reliability Within Information Supply Chains With Cycles and Negations. 404-414 - Chang-Ai Sun

, An Fu
, Xinling Guo, Tsong Yueh Chen
:
ReMuSSE: A Redundant Mutant Identification Technique Based on Selective Symbolic Execution. 415-428 - Min Qian

, Yan-Fu Li
:
A Weakly Supervised Learning-Based Oversampling Framework for Class-Imbalanced Fault Diagnosis. 429-442 - Zhaoyi Xu

, Yanjie Guo
, Joseph Homer Saleh
:
Accurate Remaining Useful Life Prediction With Uncertainty Quantification: A Deep Learning and Nonstationary Gaussian Process Approach. 443-456 - Jie Zhong, Yujie Zhang, Jianyu Wang, Chong Luo

, Qiang Miao
:
Unmanned Aerial Vehicle Flight Data Anomaly Detection and Recovery Prediction Based on Spatio-Temporal Correlation. 457-468 - Xiaoge Zhang

, Zhen Hu
, Sankaran Mahadevan
:
Bilevel Optimization Model for Resilient Configuration of Logistics Service Centers. 469-483 - Yiming Chen

, Yu Liu
, Tangfan Xiahou
:
A Deep Reinforcement Learning Approach to Dynamic Loading Strategy of Repairable Multistate Systems. 484-499 - Liya Xu

, Mingzhu Ge
, Weili Wu
:
Edge Server Deployment Scheme of Blockchain in IoVs. 500-509
Volume 71, Number 2, June 2022
- Dingbang Fang

, Shaoying Liu
, Ai Liu
:
Gated Homogeneous Fusion Networks With Jointed Feature Extraction for Defect Prediction. 512-526 - Sa Meng

, Liang Luo
, Xiwei Qiu
, Yuanshun Dai:
Service-Oriented Reliability Modeling and Autonomous Optimization of Reliability for Public Cloud Computing Systems. 527-538 - Christine H. Müller

, Renate Meyer
:
Inference of Intensity-Based Models for Load-Sharing Systems With Damage Accumulation. 539-554 - Arturo J. Fernández

:
Gamma Reliability Test Times With Minimal Costs and Limited Risks. 555-563 - Manish Tripathi

, Lalit Kumar Singh
, Suneet Singh, Pooja Singh
:
A Comparative Study on Reliability Analysis Methods for Safety Critical Systems Using Petri-Nets and Dynamic Flowgraph Methodology: A Case Study of Nuclear Power Plant. 564-578 - Zheng Zheng

, Chenglong Li
, Yanjie Liu, Zhiyu Xi
:
A Phase-Type Expansion Approach for the Performability of Composite Web Services. 579-589 - Tomasz Rychlik

, Magdalena Szymkowiak
:
Signature Conditions for Distributional Properties of System Lifetimes if Component Lifetimes are I.I.D. Exponential. 590-602 - Bentolhoda Jafary, Saurabh Jha

, Lance Fiondella
, Ravishankar K. Iyer
:
Data-Driven Application-Oriented Reliability Model of a High-Performance Computing System. 603-615 - Forough Yaghoubi

, Marija Furdek
, Ahmad Rostami, Peter Öhlén, Lena Wosinska
:
Design and Reliability Performance of Wireless Backhaul Networks Under Weather-Induced Correlated Failures. 616-629 - Eisa Mahmoudi

, Rahmat Sadat Meshkat
, Hamzeh Torabi
:
Copula-Based Reliability for Weighted-$k$-Out-of-$n$ Systems Having Randomly Chosen Components of $m$ Different Types. 630-639 - Leonardo Montecchi

, Paolo Lollini
, Andrea Bondavalli
:
Stochastic Activity Networks Templates: Supporting Variability in Performability Models. 640-656 - Haihua Chen

, Lavinia Florentina Pieptea, Junhua Ding
:
Construction and Evaluation of a High-Quality Corpus for Legal Intelligence Using Semiautomated Approaches. 657-673 - Peihan Qi

, Tao Jiang
, Lizhan Wang, Xu Yuan
, Zan Li
:
Detection Tolerant Black-Box Adversarial Attack Against Automatic Modulation Classification With Deep Learning. 674-686 - Man Zhao

, Guoyang Li, Hui Li, Shenglong Li:
Reliable Scheduling Algorithm for Space Debris Monitoring Resources Using Adaptive Multipopulation Differential Evolutionary Optimization With Reinforcement Learning. 687-697 - Yangyang Zhao

, Yibiao Yang
, Yuming Zhou
, Zuohua Ding
:
DEPICTER: A Design-Principle Guided and Heuristic-Rule Constrained Software Refactoring Approach. 698-715 - Ziyuan Wang

, Dexin Bu
, Aiyue Sun
, Shanyi Gou
, Yong Wang
, Lin Chen
:
An Empirical Study on Bugs in Python Interpreters. 716-734 - Zhe Liu

, Rui Kang
:
Imperfect Debugging Software Belief Reliability Growth Model Based on Uncertain Differential Equation. 735-746 - Santosh Singh Rathore

, Satyendra Singh Chouhan
, Dixit Kumar Jain, Aakash Gopal Vachhani
:
Generative Oversampling Methods for Handling Imbalanced Data in Software Fault Prediction. 747-762 - Tingting Zhang

, Lai Chai, Shenshen Wang
, Junyu Jin, Xiaofan Liu
, Aiguo Song
, Yushi Lan:
Improving Autonomous Behavior Strategy Learning in an Unmanned Swarm System Through Knowledge Enhancement. 763-774 - Zhe Liu

, Shunkun Yang
, Minghao Yang
, Rui Kang
:
Software Belief Reliability Growth Model Based on Uncertain Differential Equation. 775-787 - Yi Yang

, Meng Li, Jian Wang
, Weixing Huang, Yun Wang:
Entity Recommendation With Negative Feedback Memory Networks for Topic-Oriented Knowledge Graph Exploration. 788-802 - Yihao Li

, Pan Liu
:
A Preliminary Investigation on the Performance of SBFL Techniques and Distance Metrics in Parallel Fault Localization. 803-817 - Shan Zhou

, Jinbo Wang, Jiao Jia, Chi Zhang, Ruixue Wang:
A Formal Verification Method for the SOPC Software. 818-829 - Yonghao Wu

, Yong Liu
, Weibo Wang
, Zheng Li
, Xiang Chen
, Paul Doyle
:
Theoretical Analysis and Empirical Study on the Impact of Coincidental Correct Test Cases in Multiple Fault Localization. 830-849 - Jiaxi Xu

, Jun Ai
, Jingyu Liu
, Tao Shi
:
ACGDP: An Augmented Code Graph-Based System for Software Defect Prediction. 850-864 - Xiaohui Wan

, Zheng Zheng
, Yang Liu
:
SPE$^{2}$: Self-Paced Ensemble of Ensembles for Software Defect Prediction. 865-879 - Sakshi Udeshi

, Shanshan Peng, Gerald Woo, Lionell Loh, Louth Rawshan, Sudipta Chattopadhyay
:
Model Agnostic Defence Against Backdoor Attacks in Machine Learning. 880-895 - Zhide Zhou

, He Jiang
, Zhilei Ren, Yuting Chen, Lei Qiao:
LocSeq: Automated Localization for Compiler Optimization Sequence Bugs of LLVM. 896-910 - Rakesh Kumar

, Amrita Chaturvedi
, K. Lakshmanan:
An Unsupervised Software Fault Prediction Approach Using Threshold Derivation. 911-932 - Xiangyu Luo

, Sen Liang
, Lixiao Zheng
, Zuxi Chen, Fan Yang
:
Incremental Witness Generation for Branching-Time Logic CTL. 933-950 - Liang Zhao

, Hongmei Chai, Yuan Han, Keping Yu
, Shahid Mumtaz
:
A Collaborative V2X Data Correction Method for Road Safety. 951-962 - Mengjie Lv

, Jianxi Fan
, Weibei Fan
, Xiaohua Jia
:
Fault Diagnosis Based on Subsystem Structures of Data Center Network BCube. 963-972 - Zhuoran Cai

, Zhiyuan Liu, Liang Kou
:
Reliable UAV Monitoring System Using Deep Learning Approaches. 973-983 - Bixin Li

, Zhenyu Pan
, Tianyuan Hu
:
ReDefender: Detecting Reentrancy Vulnerabilities in Smart Contracts Automatically. 984-999 - Chang Liu

, Ruslan Antypenko, Iryna Sushko, Oksana Zakharchenko:
Intrusion Detection System After Data Augmentation Schemes Based on the VAE and CVAE. 1000-1010 - Sen Wang

, Yun Lin
, Ming Hao
, Huaitao Xu
, Qiao Tian
:
Interference Quality Assessment of Speech Communication Based on Deep Learning. 1011-1021 - Rajat Sadhukhan

:
A Classical and Machine Learning-Based Reliability Analysis on Catalan Object Encryption Scheme. 1022-1032 - Ibéria Medeiros

, Nuno Neves
, Miguel Correia
:
Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages. 1033-1056 - Gowtham M

, Pramod H. B
:
Semantic Query-Featured Ensemble Learning Model for SQL-Injection Attack Detection in IoT-Ecosystems. 1057-1074 - Ashraf Tantawy

, Sherif Abdelwahed, Abdelkarim Erradi
:
Cyber LOPA: An Integrated Approach for the Design of Dependable and Secure Cyber-Physical Systems. 1075-1091 - Yuan Liu

, Fengxia Han
, Shengjie Zhao
:
Flexible and Reliable Multiuser SWIPT IoT Network Enhanced by UAV-Mounted Intelligent Reflecting Surface. 1092-1103 - Bin Wang

, Ke Xu
, Shilian Zheng
, Huaji Zhou
, Yang Liu
:
A Deep Learning-Based Intelligent Receiver for Improving the Reliability of the MIMO Wireless Communication System. 1104-1115 - Xiujie Zhao, Ziyu Wang

:
Maintenance Policies for Two-Unit Balanced Systems Subject to Degradation. 1116-1126 - Kaiqi Liu

, Ji Wu
, Haiyan Yang, Qing Sun
, Ruiyuan Wan:
SRTEF: Test Function Recommendation With Scenarios and Latent Semantic for Implementing Stepwise Test Case. 1127-1140 - Ekincan Ufuktepe

, Tugkan Tuglular
, Kannappan Palaniappan:
Tracking Code Bug Fix Ripple Effects Based on Change Patterns Using Markov Chain Models. 1141-1156 - Haifeng Wang

, Zheng Li
, Yong Liu
, Xiang Chen
, Paul D. Franzon, Yuxiaoyang Cai, Luxi Fan
:
Can Higher-Order Mutants Improve the Performance of Mutation-Based Fault Localization? 1157-1173 - Yang Liu

, Zisen Xu, Ming Fan
, Yu Hao
, Kai Chen, Hao Chen, Yan Cai
, Zijiang Yang, Ting Liu
:
ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs. 1174-1188
Volume 71, Number 3, September 2022
- Wei Huang

, Youcheng Sun
, Xingyu Zhao
, James Sharp
, Wenjie Ruan
, Jie Meng
, Xiaowei Huang
:
Coverage-Guided Testing for Recurrent Neural Networks. 1191-1206 - Teng Wang

, Zheng Liu
, Min Liao, Nezih Mrad
, Guoliang Lu
:
Probabilistic Analysis for Remaining Useful Life Prediction and Reliability Assessment. 1207-1218 - Jianxiong Guo

, Xingjian Ding
, Weili Wu
:
Reliable Traffic Monitoring Mechanisms Based on Blockchain in Vehicular Networks. 1219-1229 - Liqiong Xu

, Shuming Zhou
, Sun-Yuan Hsieh
:
An $O(\log _3N)$ Algorithm for Reliability Assessment of 3-Ary $n$-Cubes Based on $h$-Extra Edge Connectivity. 1230-1240 - Limei Lin

, Yanze Huang
, Sun-Yuan Hsieh
, Li Xu
:
Strong Reliability of Star Graphs Interconnection Networks. 1241-1254 - Shu Guo

, Dong Zhou, Jilong Zhong
, Shunkun Yang
, Rui Kang
, Yi Ding
, Daqing Li
:
Operational Lifetime-Stress Model for Complex Networks. 1255-1263 - Jing Zhou, Yu Liu

, Tangfan Xiahou
, Tudi Huang:
A Novel FMEA-Based Approach to Risk Analysis of Product Design Using Extended Choquet Integral. 1264-1280 - Chen Cheng, Jun Yang

, Lei Li
:
Reliability Assessment of Multi-State Phased Mission Systems With Common Bus Performance Sharing Subjected to Epistemic Uncertainty. 1281-1293 - Ruifeng Duan

, Haitao Xu
, Yuanrui Fan
, Meng Yan
:
The Impact of Duplicate Changes on Just-in-Time Defect Prediction. 1294-1308 - Xin Chen

, Dongjin Yu
, Xulin Fan, Lin Wang, Jie Chen:
Multiclass Classification for Self-Admitted Technical Debt Based on XGBoost. 1309-1324 - Jing Jiang

, Jiangfeng Lv
, Jiateng Zheng, Li Zhang
:
How Developers Modify Pull Requests in Code Review. 1325-1339 - Tangbin Xia

, Guojin Si
, Dong Wang
, Ershun Pan
, Lifeng Xi
:
Progressive Opportunistic Maintenance Policies for Service-Outsourcing Network With Prognostic Updating and Dynamical Optimization. 1340-1354 - Cheng-Fu Huang

, Ding-Hsiang Huang
, Yi-Kuei Lin
:
Reliability Evaluation of a Cloud-Fog Computing Network Considering Transmission Mechanisms. 1355-1367 - Antonio Velez-Estevez

, Lorena Gutiérrez-Madroñal
, Inmaculada Medina-Bulo
:
IoT-TEG 4.0: A New Approach 4.0 for Test Event Generation. 1368-1380 - Deepika Tiwari

, Long Zhang
, Martin Monperrus
, Benoit Baudry
:
Production Monitoring to Improve Test Suites. 1381-1397
Volume 71, Number 4, December 2022
- Winston Shieh:

Editorial Emerging Trends in Trustworthy Computing. 1399-1400 - Bing Yu, Hua Qi, Qing Guo

, Felix Juefei-Xu
, Xiaofei Xie
, Lei Ma
, Jianjun Zhao:
DeepRepair: Style-Guided Repairing for Deep Neural Networks in the Real-World Operational Environment. 1401-1416 - Tangfan Xiahou

, Zhiguo Zeng
, Yu Liu
, Hong-Zhong Huang
:
Measuring Conflicts of Multisource Imprecise Information in Multistate System Reliability Assessment. 1417-1434 - Zijie Wang

, Rongke Liu
, Qirui Liu
, Lincong Han
, John S. Thompson
, Yun Lin
, Weiqing Mu:
Toward Reliable UAV-Enabled Positioning in Mountainous Environments: System Design and Preliminary Results. 1435-1463 - Tongtong Yan

, Dong Wang
, Bingchang Hou
, Zhike Peng
:
Generic Framework for Integration of First Prediction Time Detection With Machine Degradation Modelling from Frequency Domain. 1464-1476 - Xufeng Zhao

, Butong Li
, Satoshi Mizutani, Toshio Nakagawa
:
A Revisit of Age-Based Replacement Models With Exponential Failure Distributions. 1477-1487 - Jiawen Hu

, Qiuzhuang Sun
, Zhisheng Ye
:
Replacement and Repair Optimization for Production Systems Under Random Production Waits. 1488-1500 - Yue Xu

, Dechang Pi
, Zhiyuan Wu, Junfu Chen
, Enrico Zio
:
Hybrid Discrete Differential Evolution and Deep Q-Network for Multimission Selective Maintenance. 1501-1512 - Changbo Ke

, Jiayu Wu, Fu Xiao
, Zhiqiu Huang
, Yunfei Meng
:
A Privacy Risk Assessment Scheme for Fog Nodes in Access Control System. 1513-1526 - Jakub Breier

, Dirmanto Jap
, Xiaolu Hou
, Shivam Bhasin
, Yang Liu
:
SNIFF: Reverse Engineering of Neural Networks With Fault Attacks. 1527-1539 - Xiaoting Du

, Zheng Zheng
, Guanping Xiao
, Zenghui Zhou
, Kishor S. Trivedi
:
DeepSIM: Deep Semantic Information-Based Automatic Mandelbug Classification. 1540-1554 - Hui Xiao

, Kunxiang Yi
, Rui Peng
, Gang Kou
:
Reliability of a Distributed Computing System With Performance Sharing. 1555-1566 - Chengning Zhou, Ning-Cong Xiao

, Ming Jian Zuo
, Wei Gao
:
An Active Kriging-Based Learning Method for Hybrid Reliability Analysis. 1567-1576 - Chunhui Guo

, Zhenglin Liang
:
Semi-Markovian Maintenance Optimization for Reinforced Concrete Enabled by a Synthesized Deterioration Model. 1577-1589

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














