Accepted Papers of TASE 2020

  • 1. Xu Shenglin, Xie Peidai and Wang Yongjun.
        AT-ROP: Using static analysis and binary patch technology to defend against ROP attacks based on return instruction
  • 2. Wanling Xie, Huibiao Zhu and Shengchao Qin.
         An Axiomatic Approach to BigrTiMo
  • 3. Chenyi Zhang and Jun Pang.
         Characterising Probabilistic Alternating Simulation for Concurrent Games
  • 4. Liu Yang, Li Wang, Zhigang Hu, Yanwen Wang and Jun Long.
         Automatic Tagging for Open Source Software by Utilizing Package Dependency Information
  • 5. Jianlin Wang, Chao Peng and Zhenbing Zeng.
         A Formal Proof of the Soundness of the Hybrid CPS Clock Theory
  • 6. Cheng-Hao Cai, Jing Sun and Gillian Dobbie.
          Measuring the Quality of B Abstract Machines with ISO/IEC 25010
  • 7. Chunyuan Wu, Aijuan Qian, Xiaoju Dong and Yanling Zhang.
          Feature-oriented Design of Visual Analytics System for Interpretable Deep Learning based Intrusion Detection
  • 8. Feifei Xu, Guanqun Ding and Wenkai Zhang.
          RKC-H: A Rich Knowledge Based Model for Multi-turn Dialogue Generation
  • 9. Yao Li, Wenbing Tang, Bochen Chen and Zuohua Ding.
          Tracking a Ground Moving Target with UAV Based on Interval Type-2 Fuzzy Logic
  • 10. Zhen Wang, Xiaoning Han, Weiqiang Kong, Gang Hou, Masahiko Watanabe and Akira Fukuda.
           A Multi-Strategy Combination Framework for Android Malware Detection Based on Various Features
  • 11. Mengmeng Jiang, Xiaohong Li, Xiaofei Xie and Yao Zhang.
           An Empirical Study in Software Verification Tools
  • 12. Wenjing Chu and Marcello Bonsangue.
           Learning probabilistic languages by k-testable machine
  • 13. Kai Zhang, Yongtai Zhang, Liwei Zhang, Hongyu Gao, Rongjie Yan and Jun Yan.
           Neuron Activation Frequency Based Test Case Prioritization
  • 14. Zuohua Ding, Qingfen Zhang and Mingyue Jiang.
           Metamorphic Testing of Code Search Engines
  • 15. Daisuke Ishii and Saito Fujii.
           Formalizing the Soundness of the Encoding Methods of SAT-based Model Checking
  • 16. Chenguang Mao, Hao Wang, Gaojie Han and Xiaofang Zhang.
          Droidlens: Robust and Fine-Grained Detection for Android Code Smells
  • 17. Shiming Guo, Xin Chen and Dongjin Yu.
           Defect Report Severity Prediction Based on Genetic Algorithms and Convolutional Neural Network
  • 18. Hong Lu, Jiacheng Gui, Chengyi Wang and Hao Huang.
           A Novel Data-Driven Approach for Generating Verified Loop Invariants
  • 19. Liu Yang, Zhou Chen, Yiqing Feng, Zhifang Liao, Zhigang Hu and Jun Long.
           WLeidenRDF:RDF Data Query Method based on Semantic-Enhanced Graph-Clustering Algorithm
  • 20. Gaigai Tang, Shuangyin Ren, Weipeng Cao, Lianxiao Meng, Qiang Wang, Lin Yang and Huiqiang Wang.
           A comparative study of neural network techniques for automatic software vulnerability detection
  • 21. Zhiwu Xu, Xiongya Hu, Yida Tao and Shengchao Qin.
           Analyzing Cryptographic API Usages for Android Applications
  • 22. André De Matos Pedro, Martin Leucker, David Pereira and Jorge Sousa Pinto.
           Real-time MTL with durations as SMT with applications to schedulability analysis
  • 23. Chenyang Zhu, Michael Butler and Corina Cirstea.
           Real-time Trigger-Response Properties for Event-B Applied to the Pacemaker
  • 24. Xiaohong Chen, Frederic Mallet and Xiaoshan Liu.
           Formally Verifying Sequence diagrams for Safety Critical Systems
  • 25. Wenjing Xu, Yongwang Zhao, Yuxin Zhang, Qian Xiao and Dianfu Ma.
           Rely-Guarantee Reasoning about Messaging System for Autonomous Vehicles
  • 26. Yu Zhang and Xiaohong Li.
           The Scheme of Security Requirement Acquisition Based on Knowledge Graph
  • 27. Robert Husák, Filip Zavoral and Jan Kofroň.
           Optimizing Transformations of Dynamic Languages Compiled to Intermediate Representationss
  • 28. Chunyan Mu.
           A language-based approach to analysing flow security properties in virtualised computing systems
  • 29. Shiraj Arora and M V Panduranga Rao.
          The Bouquet Algorithm for Model Checking Unbounded Until