Paper ID |
Title |
Author(s) |
2 |
Dataset Fault Tree Analysis for Systematic Evaluation of Machine Learning Systems |
Toshiaki Aoki, Daisuke Kawakami, Nobuo Chida and Takashi Tomita |
4 |
Generative Deep Learning for Internet of Things Network Traffic Generation |
Mustafizur Rahman Shahid, Gregory Blanc, Jmila Houda, Zonghua Zhang and Hervé Debar |
5 |
Data Poisoning Attacks on Regression Learning and Corresponding Defenses |
Nicolas Müller, Daniel Kowatsch and Konstantin Böttinger |
8 |
Safe Online Reconfiguration of Mixed-Criticality Real-Time Systems |
Thawra Kadeed, Borislav Nikolic and Rolf Ernst |
10 |
Using Attack Injection to Evaluate Intrusion Detection Effectiveness in Container-based Systems |
José Flora, Paulo Gonçalves and Nuno Antunes |
17 |
Trading dependability and energy consumption in critical infrastructures: focus on the rail switch heating system |
Silvano Chiaradonna, Felicita Di Giandomenico and Giulio Masetti |
18 |
Topology Aware Leader Election Algorithm for Dynamic Networks |
Arnaud Favier, Nicolas Guittonneau, Jonathan Lejeune, Luciana Arantes, Anne Fladenmuller and Pierre Sens |
19 |
Using metamodels to improve model-based testing of service orchestrations |
Lucas Leal, Leonardo Montecchi, Andrea Ceccarelli and Eliane Martins |
22 |
A PSD-based fingerprinting approach to detect spoofing attacks in Smart Environments |
Florent Galtier, Romain Cayre, Guillaume Auriol, Mohamed Kaâniche and Vincent Nicomette |
23 |
Dynamic Reconfiguration of Safety-Critical Production Systems |
Faiz Ul Muram, Muhammad Atif Javed, Hans Hansson and Sasikumar Punnekkat |
25 |
Security and Availability Modeling of VM Migration as Moving Target Defense |
Matheus Torquato, Paulo Maciel and Marco Vieira |
28 |
Fengyi: Trusted Data Sharing in VANETs with Blockchain |
Chen Zeng, Yifan Wang, Xiaohui Peng and Liang Fan |
31 |
Risk-Aware Leak Detection at Binary Level |
Yuta Koizumi and Yoshitaka Arahori |
37 |
PLEXUS: A Pattern-Oriented Runtime System Architecture for Resilient Extreme-Scale High-Performance Computing Systems |
Saurabh Hukerikar and Christian Engelmann |
38 |
Introducing Multi-crossover and Multi-mutation Operators to Data Replication Strategies for Distributed Systems |
Syed Mohtashim Abbas Bokhari and Oliver Theel |
39 |
Organization of machine learning based product development as per ISO 26262 and ISO/PAS 21448 |
Krystian Radlak, Michal Szczepankiewicz, Tim Jones and Piotr Serwa |
40 |
Model Compression on Faulty Array based Neural Network Accelerator |
Krishna Teja Chitty-Venkata and Arun Somani |
44 |
GTFuzz: Guard Token Directed Grey-Box Fuzzing |
Rundong Li, Hongliang Liang, Liming Liu, Xutong Ma, Rong Qu, Jun Yan and Jian Zhang |