Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJuly 2022
Repairing Adversarial Texts Through Perturbation
Theoretical Aspects of Software EngineeringPages 29–48https://doi.org/10.1007/978-3-031-10363-6_3AbstractIt is known that neural networks are subject to attacks through adversarial perturbations. Worse yet, such attacks are impossible to eliminate, i.e., the adversarial perturbation is still possible after applying mitigation methods such as ...
- ArticleJuly 2022
The Complexity of Evaluating Nfer
Theoretical Aspects of Software EngineeringPages 388–405https://doi.org/10.1007/978-3-031-10363-6_26AbstractNfer is a rule-based language for abstracting event streams into a hierarchy of intervals with data. Nfer has multiple implementations and has been applied in the analysis of spacecraft telemetry and autonomous vehicle logs. This work provides the ...
- ArticleJuly 2022
End-to-End Heat-Pump Control Using Continuous Time Stochastic Modelling and Uppaal Stratego
Theoretical Aspects of Software EngineeringPages 363–380https://doi.org/10.1007/978-3-031-10363-6_24AbstractHeatpump-based floor-heating systems for domestic heating offer flexibility in energy-consumption patterns, which can be utilized for reducing heating costs—in particular when considering hour-based electricity prices. Such flexibility is hard to ...
- ArticleJuly 2022
AllSynth: Transiently Correct Network Update Synthesis Accounting for Operator Preferences
Theoretical Aspects of Software EngineeringPages 344–362https://doi.org/10.1007/978-3-031-10363-6_23AbstractThe increasingly stringent dependability requirements on communication networks as well as the need to render these networks more adaptive to improve performance, demand for more automated approaches to operate networks. We present AllSynth, a ...
- ArticleJuly 2022
Improving Adversarial Robustness of Deep Neural Networks via Linear Programming
Theoretical Aspects of Software EngineeringPages 326–343https://doi.org/10.1007/978-3-031-10363-6_22AbstractAdversarial training provides an effective means to improve the robustness of neural networks against adversarial attacks. The nonlinear feature of neural networks makes it difficult to find good adversarial examples where project gradient descent ...
- ArticleJuly 2022
Consistency of Heterogeneously Typed Behavioural Models: A Coalgebraic Approach
Theoretical Aspects of Software EngineeringPages 308–325https://doi.org/10.1007/978-3-031-10363-6_21AbstractSystematic and formally underpinned consistency checking of heterogeneously typed interdependent behavioural models requires a common metamodel, into which the involved models can be translated. And, if additional system properties are imposed on ...
- ArticleJuly 2022
A Language-Based Causal Model for Safety
Theoretical Aspects of Software EngineeringPages 290–307https://doi.org/10.1007/978-3-031-10363-6_20AbstractInspired by the seminal works on causal analysis by Halpern and Pearl, in this paper we introduce a causal model based on counterfactuals, adapted to finite automata models and with safety properties defined by regular expressions. The latter ...
- ArticleJuly 2022
Development of Monitoring Systems for Anomaly Detection Using ASTD Specifications
Theoretical Aspects of Software EngineeringPages 274–289https://doi.org/10.1007/978-3-031-10363-6_19AbstractAnomaly-based intrusion detection systems are essential defenses against cybersecurity threats because they can identify anomalies in current activities. However, these systems have difficulties providing entity processing independence through a ...
- ArticleJuly 2022
Dynamic Environment Simulation for Database Performance Evaluation
Theoretical Aspects of Software EngineeringPages 238–255https://doi.org/10.1007/978-3-031-10363-6_17AbstractThe wide popularity and the maturity of cloud platform promote the development of Cloud Native database systems. On-demand resource configuration or application is an attractive feature of cloud platforms, but its complexity in resource management ...
- ArticleJuly 2022
MSDetector: A Static PHP Webshell Detection System Based on Deep-Learning
Theoretical Aspects of Software EngineeringPages 155–172https://doi.org/10.1007/978-3-031-10363-6_11AbstractWebshell is a web script containing malicious code fragment, which hackers could use to launch web attacks. Hence, it is of great signifiance to identify whether a web script contains malicious code fragments in the aspect of web security. However,...