Program
ROOM: MEGARON G
Day 1: 19 June, 2024 (Wednesday) | |
8:30 – 8:45 | Registration |
8:45 – 9:00 | Opening Remarks |
9:00 – 10:30 | Machine Learning and Complex Systems (Session Chair: Akram Idani) |
DASHCHEF: A Metric Recommendation Service for Online Systems Using Graph Learning Zilong He, Tao Huang, Pengfei Chen, Ruipeng Li, Rui Wang, and Zibin Zheng | |
SC-WGAN: GAN-Based Oversampling Method for Network Intrusion Detection Wuxia Bai, Kailong Wang, Kai Chen, Shenghui Li, Bingqian Li, and Ning Zhang |
|
Automated Parameter Determination for Enhancing the Product Configuration System of Renault: An experience report Hao Xu, Souheib Baarir, Tewfik Ziadi, Siham Essodaigui, and Yves Bossu |
|
10:30 – 11:00 | Break |
11:00 – 12:00 | Neural Network Verification (Session Chair: Marc Frappier) |
Optimal Solution Guided Branching Strategy for Neural Network Branch and Bound Verification Xiaoyong Xue and Meng Sun |
|
AccMILP: An Approach for Accelerating Neural Network Verification Based on Neuron Importance Fei Zheng, Qingguo Xu, Zhou Lei, and Huaikou Miao |
|
12:00 – 14:00 | Lunch |
14:00 – 15:30 | A.I. for Software Engineering (Session Chair: Marc Frappier) |
Word2Vec-BERT-bmu: Classification of RISC-V Architecture Software Package Build Failures Shitian Ma, Hui Li, Jiaxin Zhu, Xiaohui He, Shuyang Zhang, and Junfeng Zeng | |
Test Architecture Generation by Leveraging BERT and Control and Data Flows Guangyu Wang, Ji Wu, Haiyan Yang, Qing Sun, and Tao Yue |
|
Less is More: an Empirical Study of Undersampling Techniques for Technical Debt Prediction (Short Paper) Gichan Lee and Scott Uk-Jin Lee |
|
15:30 – 16:00 | Break |
16:00 – 17:00 | Smart Contract (Session Chair: George Papadopoulos) |
Modeling and Verification of Solidity Smart Contracts with the B Method Fayçal Baba, Amel Mammar, Marc Frappier, and Regine Laleau |
|
Template-Based Smart Contract Verification: A Case Study on Maritime Transportation Domain Xufeng Zhao, Qiuyang Wei, Xue-Yang Zhu, and Wenhui Zhang |
|
19:00-20:30 | Reception |
Day 2: 20 June, 2024 (Thursday) | |
09:30 – 10:30 | Keynote 1: Constantine Dovrolis, The Cyprus Institute (Session Chair: George Angelos Papadopoulos) |
10:30 – 11:00 | Break |
11:00 – 12:30 | Formal Methods 1 (Session Chair: Hui Li) |
QuanSafe: A DTBN-based Framework of Quantitative Safety Analysis for AADL Models Yiwei Zhu, Jing Liu, Haiying Sun, Wei Yin and Jiexiang Kang |
|
A Event-B-based Approach for Schedulability Analysis For Real-time Scheduling Algorithms through Deadlock Detection Jiale Quan and Qin Li |
|
Validation of railML using ProB (Short Paper) Jan Gruteser and Michael Leuschel |
|
12:30 – 14:00 | Lunch |
14:00 – 15:30 | Security (Session Chair: Scott Uk-Jin Lee) |
Confidentiality Management in Complex Systems Design Michel Bourdelles, Jamal El Hachem and Salah Sadou |
|
Analyzing Excessive Permission Requests in Google Workspace Add-ons Liuhuo Wan, Chuan Yan, Mark Huasong Meng, Kailong Wang and Haoyu Wang |
|
Formal Verification Techniques for Post-Quantum Cryptography: A Systematic Review Yuexi Xu, Zhenyuan Li, Naipeng Dong, Veronika Kuchta, Zhe Hou and Dongxi Liu |
|
15:30 – 16:00 | Break |
16:00 – 17:30 | Formal Methods 2 (Session Chair: Michel Bourdelles) |
Reachability analysis of concurrent self-modifying code Walid Messahel and Tayssir Touili |
|
An Iterative Formal Model-Driven Approach to Railway Systems Validation Asfand Yar, Akram Idani, Yves Ledru, Simon Collart-Dutilleul, Amel Mammar and German Vega |
|
An Efficient Distributed Dispatching Vehicles Protocol for Intersection Traffic Control (Short Paper) Fang Qi, Rui Wang, Yong Guan and Xiaoyu Song |
|
19:00-23:00 | Banquet |
Day 3: 21 June, 2024 (Friday) | |
09:30 – 10:30 | Keynote 2: Christos Panayiotou (Session Chair: George Angelos Papadopoulos) |
10:30 – 11:00 | Break |
11:00 – 12:30 | Program Analysis (Session Chair: Tayssir Touili) |
AutoWeb: Automatically Inferring Web Framework Semantics via Configuration Mutation Haining Meng, Haofeng Li, Jie Lu, Chenghang Shi, Liqing Cao, Lian Li and Lin Gao |
|
SafePtrX: Research on Mitigation of Heap-based Memory Safety Violations for Intel x86-64 Lilie Chen, Junyu Wu and Yuan Liu |
|
Towards Efficiently Parallelizing Patch-Space Exploration in Automated Program Repair (Short Paper) Omar Al-Bataineh |
|
12:30 – 14:00 | Lunch |