default search action
35th SEKE 2023: KSIR Virtual Conference Center, USA
- Shi-Kuo Chang:
The 35th International Conference on Software Engineering and Knowledge Engineering, SEKE 2023, KSIR Virtual Conference Center, USA, July 1-10, 2023. KSI Research Inc. 2023, ISBN 1-891706-56-X
Session SCE: Social Computing and Engineering
- Xinzhi Wang, Mengyue Li, Yige Yao, Zhennan Li, Yi Liu, Hui Zhang:
Short Review of Intention Mining in Social Crisis Management through Automatic Technologies. 2-7 - Qitao Hu, Xiao Wei:
Topic and Speaker-aware Hierarchical Encoder-Decoder Model for Dialogue Generation. 8-13 - Senjun Pei, Weidong Liu:
Convolution Neural Network Based Patent Infringement Detection Method. 14-19 - Wenwen Xiao, Xinzhi Wang, Xiangfeng Luo, Shaorong Xie:
DDCL: A Dual Decision-making Continuous Reinforcement Learning Method Based on Sim2Real. 20-25 - Fayrouz Elsalmy, Nada Sherief, Walid M. Abdelmoez:
Inclusive Gamification: An Exploratory Study in Software Development Enterprises (S). 26-29
Session SEKE1: Software Engineering and Knowledge Engineering
- Ryo Soga, Hideyuki Kanuka, Takatomi Kubo, Takashi Ishio, Kenichi Matsumoto:
Will you use software development support using biosignals? A survey from software developers. 31-36 - Melody L. Hammel, Lan Lin:
Assuring Domain Software Quality through Workflow Testing and Specification. 37-44 - Ju Ma, Yi-Yang Sun, Peng He, Zhang-Fan Zeng:
GSAGE2defect: An Improved Approach to Software Defect Prediction based on Inductive Graph Neural Network. 45-50 - Pankaj Kamthan, Nazlie Shahmir:
Small Educational Steps Towards Improving the Status of Women in Software Engineering. 51-56 - Yuanchi Ma, Hui He, Zhendong Niu:
BDC: Using BERT and Deep Clustering to Improve Chinese Proper Noun Recognition. 57-62
Session SEKE2: Software Engineering and Knowledge Engineering
- Keita Murase, Shingo Takada:
Applying Reinforcement Learning for Automated Testing of Mobile Application Focusing on State Definition, Reward, and Learning Method. 64-69 - Carlos Eduardo Pantoja, João Victor Guinelli, Tielle Alexandre, José Viterbo:
A Model-Driven Development Framework for Geographical and Relational Database Systems. 70-75 - Masaya Fujimoto, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya:
Expansion Mechanism for Runtime Verification of Self-adaptive Systems. 76-81 - Jing Zhou, Shan Leng, Fang Wang, Hansheng Wang:
Automatic Discovery of Controversial Legal Judgments by an Entropy-Based Measurement (S). 82-85 - Wasja Brunotte, Jakob Droste, Kurt Schneider:
Context, Content, Consent - How to Design User-Centered Privacy Explanations (S). 86-89
Session TSECQS: Theoretical and Quantum Software Engineering
- Iaakov Exman, Ariel Zvulunov:
Quantum Software Models: Quantum Modules Tomography and Recovery Theorem. 91-96 - Krishn Vishwas Kher, Ishan Joshi, Bharat Chandra Mukkavalli, Lei Zhang, M. V. Panduranga Rao:
Automatic Diagnosis of Quantum Software Bug Fix Motifs. 97-102 - Canh Minh Do, Kazuhiro Ogata:
Symbolic Model Checking Quantum Circuits in Maude. 103-108
Session SEKE3: Software Engineering and Knowledge Engineering
- Yihao Zhang, Zeming Wei, Xiyue Zhang, Meng Sun:
Using Z3 for Formal Modeling and Verification of FNN Global Robustness (S). 110-113 - Marco Fiore, Marina Mongiello, Giovanni Tricarico, Francesco Bozzo, Cinzia Montemurro, Alessandro Petrontino, Clemente Giambattista, Giorgio Mercuri:
Blockchain-based Food Traceability System for Apulian Marketplace: Enhancing Transparency and Accountability in the Food Supply Chain (S). 114-117 - Kazusa Takemoto, Shingo Takada:
Applying Symbolic Execution to Semantic Code Clone Detection (S). 118-122
Session ESSE: Empirical Studies and Software Engineering
- Beiqi Zhang, Peng Liang, Xiyu Zhou, Aakash Ahmad, Muhammad Waseem:
Practices and Challenges of Using GitHub Copilot: An Empirical Study. 124-129 - Qing Mi, Haotian Bai, Xiaozhou Wang, Wenrui Liu, Xingyue Song:
An Empirical Study of Coding Style Compliance on Stack Overflow. 130-135 - Zeshan Xu, Jie Zhu, Li Yang, Chun Zuo:
Mining the Relationship between Object-Relational Mapping Performance Anti-patterns and Code Clones. 136-141 - Haifeng Wang, Kun Yang, Xiangnan Zhao, Yuchen Cui, Weiwei Wang:
Contribution-based Test Case Reduction Strategy for Mutation-based Fault Localization (S). 142-145 - Anelis Pereira Vale, Daniel Perovich, Sergio F. Ochoa:
Understanding the Pre-Contract Process of Small Software Projects. 146-151 - Junfeng Zhao, Wenhui Gai, Han Wu:
Fortran Code Refactoring Based on MapReduce Programming Model. 152-157 - Jiman Du, Jiaxin Zhu, Hui Liu, Wei Chen, Lijie Xu, Jie Liu, Zhifeng Chen:
A Case Study of Dependency Network for Building Packages: The Fedora Linux Distribution. 158-161 - Shuo Li, Jie Liu, Haoxiang Tian, Shuai Wang, Wei Chen, Liangyi Kang, Dan Ye:
EasyPip: Detect and Fix Dependency Problems in Python Dependency Declaration Files. 162-168 - Peiyang Li, Zixin Liu, Yuening Su, Hao Wang, Bo Jiang:
CAPS: An Efficient Whole-Program Critical Paths Search Framework for Large-Scale Software. 169-174 - Zhiyong Ren, Hui Xu:
Detect Stack Overflow Bugs in Rust via Improved Fuzzing Technique. 175-180 - Hao Zhu, Yichen Li, Jie Li, Xiaofang Zhang:
An Efficient Design Smell Detection Approach with Inter-class Relation (S). 181-186 - Tianmai Deng, Yixiao Xu, Chi Zhang, Zhengwei Qi:
Dissecting Scale-Out Applications Performance on Diverse TLB Designs (S). 187-192 - Yu Guo, Jun Guo, Mohan Shi, Aixuan Dong:
Real-time Estimation Approach to Scrum Projects Effort: Task Point and Individual Reliability (S). 193-196 - Zhiguo Li, Qin Li:
ASC4AI: A Novel Automatic Service Composition Framework for AI Systems (S). 197-202 - Omkarendra Tiwari, Vrinda Yadav:
A Review of Methods for Identifying Extract Method Refactoring. 203-208 - Lufeng Wei, Zhi Li, Yuansong Qin:
Towards generating contextualised fault scenarios for reliability risk analysis of cyber-physical systems (P). 209-210
Session SEAI: Software Engineering and AI
- Zhenhua Zhang, Shizhan Chen, Guodong Fan, Guang Yang, Zhiyong Feng:
CCGRA: Smart Contract Code Comment Generation with Retrieval-enhanced Approach. 212-217 - Ed van Doorn, Sylvia Stuurman:
Detecting Design Patterns As Described By An Explicit Specification (S). 218-221 - Jingjing Wang, Minhuan Huang, Yuanping Nie, Xiaohui Kuang, Xiang Li, Wenjing Zhong:
Fine-Grained Source Code Vulnerability Detection via Graph Neural Networks (S). 222-227 - Xinyan Yi, Hao Xu, Lu Lu, Quanyi Zou, Zhanyu Yang:
Software Defect Prediction via Positional Hierarchical Attention Network (S). 228-231 - Ran Mo, Yushuo Wang, Yao Zhang, Zengyang Li:
Just-in-Time Defect Severity Prediction (S). 232-237 - Jiaxin Liu, Hao Xu, Lu Lu, Quanyi Zou, Zhanyu Yang:
A Software Defect Prediction Method based on Multi-type Features and Feature Selection. 238-243 - Kirthy Kolluri, Tom Hill, Lawrence Chung:
Identifying Risks and Risk Mitigation Strategies for Collaborative Systems during Requirements Engineering: A Goal-Oriented Approach (S). 244-249 - Haochen Jin, Liwei Zheng, Zhanqi Cui:
AFL2oop: Loop Coverage Guided Greybox Fuzz Testing. 250-255 - Liang Sun, Peng Wu, Shaoxian Shu:
Research on Directed Grey-box Fuzzing Technology Based on Target (S). 256-261 - Wei Li, Zhiyi Zhang, Yifan Jian, Chen Liu, Zhiqiu Huang:
DeepRank: Test Case Prioritization for Deep Neural Networks. 262-267 - Shaojian Qiu, Shaosheng Wang, Yujun Liang, Wenchao Jiang, Fanlong Zhang:
Code Clone Detection via Software Visualization Representation Learning. 268-273 - Guang Yang, Tiancheng Jin, Liang Dou:
Heterogeneous Directed Hypergraph Neural Network over abstract syntax tree (AST) for Code Classification. 274-279 - Shuaishuai Feng, Xi Wu, Yongxin Zhao, Yongjian Li:
Dispatching and Scheduling Dependent Tasks Based on Multi-agent Deep Reinforcement Learning. 280-285 - Qing Qi, Jian Cao:
GAT-Team: A Team Recommendation Model for Open-Source Software Projects. 286-291 - Yiheng Shen, Xiaolin Ju, Xiang Chen, Guang Yang:
An Empirical Study of Adversarial Training in Code Comment Generation. 292-297 - Jun Cheng, Honglei Su, Jari Korhonen:
No-Reference Point Cloud Quality Assessment via Weighted Patch Quality Prediction. 298-303 - Jie Li, Lixuan Li, Hao Zhu, Xiaofang Zhang:
GraphPLBART: Code Summarization Based on Graph Embedding and Pre-Trained Model. 304-309
Session KE: Knowledge Engineering
- Qia Wang, Yi Wang, Ying Wang:
An Efficient Lossless Graph Summarization Method for Large Streaming Graphs. 311-316 - Wen Sun, Yifan Li, Junfeng Yao, Qingqiang Wu, Kunhong Liu:
Combining Structure Embedding and Text Semantics for Efficient Knowledge Graph Completion. 317-322 - Li-E Wang, Huachang Zeng, Shenghan Li, Xianxian Li, Shengda Zhuo, Jiahua Xie, Bin Qu, Zhigang Sun, Tianran Liu:
CRCC: Collaborative Relation Context Consistency on the Knowledge Graph for Recommender Systems (S). 323-328 - Yuxin Zhao, Xinjun Mao, Sun Bo, Tanghaoran Zhang, Shuo Yang:
An Effective Method for Constructing Knowledge Graph to Search Reusable ROS Nodes (S). 329-332 - Bin Li, Jianwen Ding, Zhennan Chen, Hanpeng Jiang, Fan Lin:
Multi-Domain Feature Representation, Multi-Dimensional Feature Interaction for Person-Job Fit. 333-338 - Shizhao Huang, Yimin Wu, Jinwei Lu, Chao Deng:
Related Questions Detection Model in Stack Overflow based on Semantic Matching. 339-344 - Yifan Wang, Jibin Wang, Jing Shang, Zhuo Chen, Xuelian Ding, Heyuan Wang:
Learning Event Logic Graph Knowledge for Credit Risk Forecast. 345-350 - Junmin Zhu, Yizhao Yao, Xianwen Deng, Yaoguang Yong, Yanhao Wang, Libo Chen, Zhi Xue, Ruijie Zhao:
SAWD: Structural-Aware Webshell Detection System with Control Flow Graph. 351-356 - Tong Niu, Yicong Xu, Shengping Xiao, Lili Xiao, Yanhong Huang, Jianwen Li:
LTLf Satisfiability Checking via Formula Progression (S). 357-362 - Yifan Wang, Masaki Nakamura, Kazutoshi Sakakibara, Yuki Okura:
Formal Specification and Verification of an Autonomous Vehicle Control System by the OTS/CafeOBJ method (S). 363-366 - Magali Legast, Axel Legay:
Assistance in the management of rule sets for rule-based expert systems (S). 367-372 - Mengyuan Wang, Tengfei Li, Jing Liu, Hui Dou, HongTao Chen, John Zhang, Lipeng Zhang:
Modeling and Verification of Autonomous Driving Systems under Stochastic Spatio-Temporal Constraints. 373-378
Session DPCC: Data Privacy and Cloud Computing
- Georg Grabner, Ali Ahmed, Nilufar Baghaei:
Using Blockchain to Preserve Chain of Custody: Cloud Forensics Analysis (S). 380-385 - Wenxiu Xu, Ningjiang Chen, Huan Tu:
DNN Inference Task Offloading Based on Distributed Soft Actor-Critic in Mobile Edge Computing. 386-391 - Yuxin Xiang, Bing Deng, Hongyu Zhang, Randy Xu, Marc Mao, Yun Wang, Zhengwei Qi:
Bindox: An Efficient and Secure Cross-System IPC Mechanism for Multi-Platform Containers. 392-397 - Xiguo Gu, Huiwen Yang, Shifan Liu, Zhanqi Cui:
Smart Contract Vulnerability Detection Based on Clustering Opcode Instructions. 398-403 - Yingjia Du, Yuan Fei, Sini Chen, Huibiao Zhu:
Formalization and Verification of Data Auction Mechanism Based on Smart Contract Using CSP. 404-409
Session DMA: Data Mining and Analytics
- Gabriel Mac'Hamilton Renaux Alves, Alexandre Magno Andrade Maciel:
Survey on Data Ingestion for AutoML (S). 411-414 - Bowen Chen:
DGNN: Dynamic Graph Neural Networks for Anomaly Detection in Multivariate Time Series. 415-420 - Dolly Agarwal, Abdullah Al Imran, Kasun S. Perera:
FOODIE: A Data-centric Sifting Framework for Social Media Analytics. 421-426 - Jie Xiong, Huiyuan Li, Qiyuan Duan, Qihan Du:
Towards Extreme Multi-label Text Classification Through Group-wise Label Ranking. 427-432 - Guangwei Zhang, Ming Jing, Yunjing Liu, Li Zhang, Anming Dong, Jiguo Yu:
Interactive Visualization of Temporal Brain Connectivity Data based-on Frequent Feature Mining (S). 433-436 - Peng Zhang, Zhaohui Zhang, Chaochao Hu, Pengwei Wang:
A Dynamic Drilling Sampling Method and Evaluation Model for Large-Scale Streaming Data. 437-442 - Bowen Chen:
ASTD: Automatic Seasonal-Trend Decomposition for Time Series. 443-448 - Lidan Zhao, Tong Li, Zhen Yang, Junrui Liu:
A novel subjective bias detection method based on multi-information fusion. 449-455 - Rongxi Guo, Wanrong Jiang, Xi Zhao, Ding Cao, Guiquan Liu:
ASMix: An Attention-based Smooth Data Augmentation Approach. 456-461 - Samuel Abedu, Solomon Mensah, Frederick Boafo, Eva Bushel, Elizabeth Akuafum:
An Optimal Spacing Approach for Sampling Small-sized Datasets. 462-467 - Wei Du, Shifei Ding:
Heterogeneous Multi-Agent Communication Learning via Graph Information Maximization. 468-473 - Ziyi Zhang, Rong Yan, Wei Yuan:
Identifying Influential Spreaders in Complex Networks Using Neighborhood Network Structure. 474-479
Session OAEP: Optimization Approaches for Enhanced Performances
- Bishshoy Das, Milton Mondal, Brejesh Lall, Shiv Dutt Joshi, Sumantra Dutta Roy:
Altering Backward Pass Gradients to Improve Convergence (S). 481-486 - Wei Liang, Wanghua Shi, Zhengyu Liao, Shiyou Qian, Zhonglong Zheng, Jian Cao, Guangtao Xue:
BOP: A Bitset-based Optimization Paradigm for Content-based Event Matching Algorithms (S). 487-492 - Yu Zhang, Ningjiang Chen, Siyu Yu:
Transient Data Caching Based on Maximum Entropy Actor-Critic in Internet-of-Things Networks. 493-498 - Yulong Wang, Kai Deng, Fanzhi Meng, Zhi Chen, Mingyong Yin, Run Yang:
Branchy-TEE: Deep Learning Security Inference Acceleration Using Trusted Execution Environment. 499-504 - Yaodanjun Ren, Chen Chen, Zhengwei Qi:
HaeNAS: Hardware-Aware Efficient Neural Architecture Search via Zero-Cost Proxy. 505-510 - Rong Wu:
L*-Based Learning of Probabilistic Timed Automata with One Clock (S). 511-516
Session MLDLA: Machine Learning and Deep Learning Applications
- Shunwen Shen, Lvqing Yang, Sien Chen, Wensheng Dong, Bo Yu, Qingkai Wang:
DeepMultiple: A Deep Learning Model for RFID-based Multi-object Activity Recognition. 518-523 - Shuai Li, Bing Shi, Yaping Deng:
A Dynamic Matching Time Strategy Based on Multi-Agent Reinforcement Learning in Ride-Hailing. 524-529 - Zhennan Chen, Zhicheng Zhang, Pengfei Li, Lingyue Wei, Shibo Feng, Fan Lin:
mTrader: A Multi-Scale Signal Optimization Deep Reinforcement Learning Framework for Financial Trading (S). 530-535 - Lei Mao, Jianxia Chen, Shi Dong, Liang Xiao, Haoying Si, Xinyun Wu:
Aspect-level Sentiment Analysis Based on Convolutional Network with Dependency Tree. 536-541 - Georg Stettinger, Franz Wotawa:
Smart Monitoring for Safety-Assurance in Autonomous Driving (S). 542-547 - Xingchen Ding, Chong Teng, Donghong Ji:
Fake News Detection with Context Awareness of the Publisher. 548-553 - Bakhta Haouari, Rania Mzid, Olfa Mosbahi:
PSRL: A New Method for Real-Time Task Placement and Scheduling Using Reinforcement Learning. 554-559 - Rui Xu, Cheng Zeng, Yujin Liu, Peng He, Min Chen:
A Triplet Network Approach for Chinese Confusing Text Classification. 560-565 - Xingfu Li, Bangchao Wang, Hongyan Wan, Yang Deng, Zihan Wang:
Applications of Machine Learning in Requirements Traceability: A Systematic Mapping Study (S). 566-571 - Chen Qian, Hui Xiong, Jiyun Li:
FeDeFo: A Personalized Federated Deep Forest Framework for Alzheimer's Disease Diagnosis. 572-577 - Kang Zhong, Wu Guo, Bin Gu, Weitai Zhang, Chao Lin:
A Detection-based Attention Alignment Method for Document-level Neural Machine Translation. 578-583 - Gaoyi Lin, Zhihua Zhang, Zhanqi Cui:
Widget Hierarchy Graph Guided Crash Reproduction Method for Android Applications (S). 584-587 - Xing Zhang, Tinglong Tang, Yirong Wu, Tingwei Quan:
Construction Site Fence Recognition Method Based on Multi-Scale Attention Fusion ENet Segmentation Network (S). 588-593 - Jingxia Zeng, Mianfan Chen, Jianing Liu, Yuncheng Jiang:
SLPKT: A Novel Simulated Learning Process Model for Knowledge Tracing. 594-599 - Chen Qian, Boyin Yang, Jiyun Li:
SARNet: A Self-Attention Embedded Residual Network for Multiclass Classification of Chronic Wounds (S). 600-603 - Yimin Peng, Rong Hu, Yiping Wen:
AT-NCF: An Attention-based Time-aware Neural Collaborative Filtering Approach for Personalized Recommendation (S). 604-607 - Cairong Yan, Xiaopeng Guan, Haixia Han, Zhaohui Zhang:
MB-DP: A Multi-behavior Recommendation Model Integrating Dynamic Preferences. 608-613
Session LMQA: Language Models and Question Answering
- Aoxing Wang, Pengfei Duan, Yongbing Li, Wenyan Hu, Shengwu Xiong:
LMGFuse: Language Models and Graph reasoning Fuse deeply for question answering. 615-620 - Zuotong Xie, Kai Ouyang, Xiangjin Xie, Hai-Tao Zheng, Wenqiang Liu, Dongxiao Huang, Bei Wu:
KLAPrompt: Infusing Semantic Knowledge into Pre-trained Language Models by Long-answer Prompt Learning. 621-626 - Xingang Wang, Xiaomin Li, Xiaoyu Liu:
Reinforced Multi-modal Circulant Fusion based Transformers for Rumor Detection (S). 627-631 - Qian Wang, Cheng Zeng, Yujin Liu, Peng He:
A Medical Question Classification Approach Based on Prompt Tuning and Contrastive Learning (S). 632-635 - Xiaoyan Gao, Ji Chen, Xiangqian Ding, Shuo Shi, Junhua Jia, Xiaowei Xin:
An intelligent question answering system based on RoBERTa-WWM under home appliance knowledge graph (S). 636-641 - Yingshuai Kou, Neng Gao, Yifei Zhang:
Variational Autoencoder with Stochastic Masks to Solve Exposure Bias in Recommendation (S). 642-645 - Fengyong Peng, Xi Wu, Yongxin Zhao, Yongjian Li:
Anaphora Ambiguity Detection Method Based on Cross-domain Pronoun Substitution (S). 646-649 - Zhe Wen, Yatao Qi, Huan Liu, Zheng Lin, Weiping Wang:
Multi-source Machine Reading Comprehension with Meta-Learning and Adaptive Adversarial Training. 650-655 - Tong Zhang, Ailing Tang, Rong Yan:
Enhanced BERT with Graph and Topic Information for Short Text Classification (S). 656-659 - Xi Tao, Hao Wang, Xiangfeng Luo, Pinpin Zhu:
Few-Shot Link Prediction using Variational Heterogeneous Attention Networks. 660-665 - Xingchen Ding, Chong Teng, Donghong Ji, Fei Li:
HGAPT: Heterogeneous Graph Augmented Prompt Tuning for Low-Resource Fake News Detection. 666-671 - Yunlai Luo:
Token-level Input Grammar Synthesis (P). 672-673
Session CVA: Computer Vision and Applications
- Puhui Qu, Keyu Chen, En Cheng:
YOLOv7-marine: An Improved YOLOv7 Model for Object Detection in Marine Environments (S). 675-678 - Yuheng He, Wenbin Yang, Xiangfeng Luo, Liyan Ma, Shaorong Xie:
Object-Level Contrast Learning for 3D Sparse Object Detection in Ocean Scene. 679-684 - Qiaoning Lei, Yinsai Guo, Liyan Ma, Xiangfeng Luo:
Few-Shot Object Detection via Instance-wise and Prototypical Contrastive Learning. 685-690 - Jiyun Li, Sheng Yang, Qian Chen:
SWS-NET: An Image Segmentation Framework For Chronic Wounds Based On Self-Supervised Learning. 691-696 - Shouhong Wan, Rui Wang, Peiquan Jin, Xuebin Yang:
BDC-FR: Faster R-CNN with Balanced Domain Classifier for Cross-Domain Object Detection (S). 697-700 - Yang Luo, Rongheng Lin:
MBR-MDA: Multi-person Behavior Recognition Method Based on Multi Descriptors Aggregations. 701-706
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.