{"id":52,"date":"2021-04-08T09:10:45","date_gmt":"2021-04-08T09:10:45","guid":{"rendered":"https:\/\/cyprusconferences.org\/mpu2022\/?page_id=52"},"modified":"2024-09-22T18:08:44","modified_gmt":"2024-09-22T18:08:44","slug":"program","status":"publish","type":"page","link":"https:\/\/cyprusconferences.org\/iceccs2024\/program\/","title":{"rendered":"Program"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221; top_divider_color=&#8221;rgba(2,119,135,0.24)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|auto|-6px|auto||&#8221; custom_padding=&#8221;||11px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Program<\/h1>\n<p>[\/et_pb_text][et_pb_divider _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 style=\"text-align: right;\">ROOM: MEGARON G<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;3px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;7px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_tabs _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_tab title=&#8221;Wednesday&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]&nbsp;<\/p>\n<table width=\"609\" style=\"background-color: #f1f2f3; width: 866px;\">\n<tbody>\n<tr>\n<td colspan=\"2\" style=\"width: 857.6px;\"><strong>Day 1: 19 June, 2024 (Wednesday)<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 159.825px;\"><strong>8:30 &#8211; 8:45<\/strong><\/td>\n<td style=\"width: 692.575px;\">Registration<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 159.825px;\"><strong>8:45 &#8211; 9:00<\/strong><\/td>\n<td style=\"width: 692.575px;\">Opening Remarks<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"5\" style=\"width: 159.825px;\"><strong>9:00 &#8211; 10:30<\/strong><\/td>\n<td style=\"width: 692.575px;\"><strong>Machine Learning and Complex Systems (Session Chair: <span>Akram Idani<\/span>)<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 692.575px;\"><span>DASHCHEF: A Metric Recommendation Service for Online Systems Using Graph Learning <em>Zilong He, Tao Huang, Pengfei Chen, Ruipeng Li, Rui Wang, and Zibin Zheng<\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 692.575px;\"><span>SC-WGAN: GAN-Based Oversampling Method for Network Intrusion Detection Wuxia Bai, <em>Kailong Wang, Kai Chen, Shenghui Li, Bingqian Li, and Ning Zhang <\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" style=\"width: 692.575px;\"><span>Automated Parameter Determination for Enhancing the Product Configuration System of Renault: An experience report <\/span><br \/>\n<em>Hao Xu, Souheib Baarir, Tewfik Ziadi, Siham Essodaigui, and Yves Bossu<\/em><\/td>\n<\/tr>\n<tr><\/tr>\n<tr>\n<td style=\"width: 159.825px; background-color: #daeff8;\"><strong>10:30 &#8211; 11:00<\/strong><\/td>\n<td style=\"width: 692.575px; background-color: #daeff8; text-align: center;\">Break<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\" style=\"width: 159.825px; text-align: center;\"><strong>11:00 &#8211; 12:00<\/strong><\/td>\n<td style=\"width: 692.575px;\"><strong>Neural Network Verification (Session Chair: Marc Frappier)<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 692.575px;\"><span>Optimal Solution Guided Branching Strategy for Neural Network Branch and Bound Verification <\/span><br \/>\n<em>Xiaoyong Xue and Meng Sun<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 692.575px;\"><span>AccMILP: An Approach for Accelerating Neural Network Verification Based on Neuron Importance <\/span><br \/>\n<em>Fei Zheng, Qingguo Xu, Zhou Lei, and Huaikou Miao<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 159.825px; background-color: #daeff8;\"><strong>12:00 &#8211; 14:00<\/strong><\/td>\n<td style=\"width: 692.575px; background-color: #daeff8; text-align: center;\">Lunch<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" style=\"width: 159.825px;\"><strong>14:00 &#8211; 15:30<\/strong><\/td>\n<td style=\"width: 692.575px;\"><strong>A.I. for Software Engineering (Session Chair: Marc Frappier)<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 692.575px;\"><span>Word2Vec-BERT-bmu: Classification of RISC-V Architecture Software Package Build Failures <em>Shitian Ma, Hui Li, Jiaxin Zhu, Xiaohui He, Shuyang Zhang, and Junfeng Zeng <\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 692.575px;\"><span>Test Architecture Generation by Leveraging BERT and Control and Data Flows <\/span><br \/>\n<em>Guangyu Wang, Ji Wu, Haiyan Yang, Qing Sun, and Tao Yue<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 692.575px;\">Less is More: an Empirical Study of Undersampling Techniques for Technical Debt Prediction <strong>(Short Paper)<\/strong><br \/>\n<em>Gichan Lee and Scott Uk-Jin Lee<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 159.825px; background-color: #daeff8;\"><strong>15:30 &#8211; 16:00<\/strong><\/td>\n<td style=\"width: 692.575px; background-color: #daeff8; text-align: center;\">Break<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" style=\"width: 159.825px;\"><strong>16:00 &#8211; 17:00<\/strong><\/td>\n<td style=\"width: 692.575px;\"><strong>Smart Contract (Session Chair: George Papadopoulos)<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 692.575px;\"><span>Modeling and Verification of Solidity Smart Contracts with the B Method<\/span><br \/>\n<em>Fay\u00e7al Baba, Amel Mammar, Marc Frappier, and Regine Laleau<\/em><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" style=\"width: 692.575px;\"><span>Template-Based Smart Contract Verification: A Case Study on Maritime Transportation Domain <\/span><br \/>\n<em>Xufeng Zhao, Qiuyang Wei, Xue-Yang Zhu, and Wenhui Zhang<\/em><\/td>\n<\/tr>\n<tr><\/tr>\n<tr>\n<td style=\"width: 159.825px; background-color: #daeff8;\"><strong>19:00-20:30<\/strong><\/td>\n<td style=\"width: 692.575px; background-color: #daeff8; text-align: center;\">Reception<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_tab][et_pb_tab title=&#8221;Thursday&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<table width=\"609\" style=\"background-color: #f1f2f3; width: 894px;\">\n<tbody>\n<tr>\n<td colspan=\"2\" style=\"width: 885.6px;\"><strong>Day 2: 20 June, 2024 (Thursday)<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 141.325px;\"><strong>09:30 &#8211; 10:30<\/strong><\/td>\n<td style=\"width: 739.075px;\"><strong>Keynote 1: Constantine Dovrolis, The Cyprus Institute (Session Chair: George Angelos Papadopoulos)<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 141.325px; background-color: #daeff8;\"><strong>10:30 &#8211; 11:00<\/strong><\/td>\n<td style=\"width: 739.075px; background-color: #daeff8; text-align: center;\">Break<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" style=\"width: 141.325px;\"><strong>11:00 &#8211; 12:30<\/strong><\/td>\n<td style=\"width: 739.075px;\"><strong>Formal Methods 1 (Session Chair: Hui Li)<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 739.075px;\">QuanSafe: A DTBN-based Framework of Quantitative Safety Analysis for AADL Models<br \/>\n<em>Yiwei Zhu, Jing Liu, Haiying Sun, Wei Yin and Jiexiang Kang<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 739.075px;\"><span>A Event-B-based Approach for Schedulability Analysis For Real-time Scheduling Algorithms through Deadlock Detection <\/span><br \/>\n<em>Jiale Quan and Qin Li<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 739.075px;\">Validation of railML using ProB <strong>(Short Paper)<\/strong><br \/>\n<em>Jan Gruteser and Michael Leuschel<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 141.325px; background-color: #daeff8;\"><strong>12:30 &#8211; 14:00<\/strong><\/td>\n<td style=\"width: 739.075px; background-color: #daeff8; text-align: center;\">Lunch<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" style=\"width: 141.325px; text-align: center;\"><strong>14:00 &#8211; 15:30<\/strong><\/td>\n<td style=\"width: 739.075px;\"><strong>Security (Session Chair: Scott Uk-Jin Lee)<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 739.075px;\">Confidentiality Management in Complex Systems Design<br \/>\n<em>Michel Bourdelles, Jamal El Hachem <\/em><em style=\"font-size: 14px; background-color: #f1f2f3;\">and<\/em><em style=\"font-size: 14px; background-color: #f1f2f3;\">\u00a0Salah Sadou<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 739.075px;\"><em><span>Analyzing Excessive Permission Requests in Google Workspace Add-ons <\/span><\/em><br \/>\n<em>Liuhuo Wan, Chuan Yan, Mark Huasong Meng, Kailong Wang and Haoyu Wang<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 739.075px;\">Formal Verification Techniques for Post-Quantum Cryptography: A Systematic Review<br \/>\n<em>Yuexi Xu, Zhenyuan Li, Naipeng Dong, Veronika Kuchta, Zhe Hou and Dongxi Liu<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 141.325px; background-color: #daeff8;\"><strong>15:30 &#8211; 16:00<\/strong><\/td>\n<td style=\"width: 739.075px; background-color: #daeff8; text-align: center;\">Break<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" style=\"width: 141.325px; text-align: center;\"><strong>16:00 &#8211; 17:30<\/strong><\/td>\n<td style=\"width: 739.075px;\"><strong>Formal Methods 2 (Session Chair: Michel Bourdelles)<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 739.075px;\">Reachability analysis of concurrent self-modifying code<br \/>\n<em>Walid Messahel and Tayssir Touili<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 739.075px;\">An Iterative Formal Model-Driven Approach to Railway Systems Validation<br \/>\n<em>Asfand Yar, Akram Idani, Yves Ledru, Simon Collart-Dutilleul, Amel Mammar <\/em><em style=\"font-size: 14px; background-color: #f1f2f3;\">and <\/em><em style=\"font-size: 14px; background-color: #f1f2f3;\">German Vega\u00a0<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 739.075px;\">An Efficient Distributed Dispatching Vehicles Protocol for Intersection Traffic Control <strong>(Short Paper)<\/strong><br \/>\n<em>Fang Qi, Rui Wang, Yong Guan <\/em><em style=\"font-size: 14px; background-color: #f1f2f3;\">and <\/em><em style=\"font-size: 14px; background-color: #f1f2f3;\">Xiaoyu Song<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 141.325px; background-color: #daeff8;\"><strong>19:00-23:00<\/strong><\/td>\n<td style=\"width: 739.075px; background-color: #daeff8; text-align: center;\">Banquet<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_tab][et_pb_tab title=&#8221;Friday&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<table width=\"609\" style=\"background-color: #f1f2f3; width: 896px;\">\n<tbody>\n<tr>\n<td colspan=\"2\" style=\"width: 887.6px;\"><strong>Day 3: 21 June, 2024 (Friday)<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136.062px;\"><strong>09:30 &#8211; 10:30<\/strong><\/td>\n<td style=\"width: 746.338px;\"><strong>Keynote 2: Christos Panayiotou (Session Chair: George Angelos Papadopoulos)<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #daeff8; width: 136.062px;\"><strong>10:30 &#8211; 11:00<\/strong><\/td>\n<td style=\"background-color: #daeff8; width: 746.338px; text-align: center;\">Break<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" style=\"width: 136.062px;\"><strong>11:00 &#8211; 12:30<\/strong><\/td>\n<td style=\"width: 746.338px;\"><strong>Program Analysis (Session Chair: Tayssir Touili)<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 746.338px;\">AutoWeb: Automatically Inferring Web Framework Semantics via Configuration Mutation<br \/><em>Haining Meng, Haofeng Li, Jie Lu, Chenghang Shi, Liqing Cao, Lian Li and Lin Gao<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 746.338px;\">SafePtrX: Research on Mitigation of Heap-based Memory Safety Violations for Intel x86-64<br \/><em>Lilie Chen, Junyu Wu and Yuan Liu<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 746.338px;\">Towards Efficiently Parallelizing Patch-Space Exploration in Automated Program Repair <strong>(Short Paper)<\/strong><br \/><em>Omar Al-Bataineh<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #daeff8; width: 136.062px;\"><strong>12:30 &#8211; 14:00<\/strong><\/td>\n<td style=\"background-color: #daeff8; width: 746.338px; text-align: center;\">Lunch<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_tab][\/et_pb_tabs][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ProgramROOM: MEGARON G&nbsp; Day 1: 19 June, 2024 (Wednesday) 8:30 &#8211; 8:45 Registration 8:45 &#8211; 9:00 Opening Remarks 9:00 &#8211; 10:30 Machine Learning and Complex Systems (Session Chair: Akram Idani) DASHCHEF: A Metric Recommendation Service for Online Systems Using Graph Learning Zilong He, Tao Huang, Pengfei Chen, Ruipeng Li, Rui Wang, and Zibin Zheng SC-WGAN: GAN-Based Oversampling Method for Network Intrusion Detection Wuxia Bai, Kailong Wang, Kai Chen, Shenghui Li, Bingqian Li, and Ning Zhang Automated Parameter Determination for Enhancing the Product Configuration System of Renault: An experience report Hao Xu, Souheib Baarir, Tewfik Ziadi, Siham Essodaigui, and Yves Bossu 10:30 &#8211; 11:00 Break 11:00 &#8211; 12:00 Neural Network Verification (Session Chair: Marc Frappier) Optimal Solution Guided Branching Strategy for Neural Network Branch and Bound Verification Xiaoyong Xue and Meng Sun AccMILP: An Approach for Accelerating Neural Network Verification Based on Neuron Importance Fei Zheng, Qingguo Xu, Zhou Lei, and Huaikou Miao 12:00 &#8211; 14:00 Lunch 14:00 &#8211; 15:30 A.I. for Software Engineering (Session Chair: Marc Frappier) Word2Vec-BERT-bmu: Classification of RISC-V Architecture Software Package Build Failures Shitian Ma, Hui Li, Jiaxin Zhu, Xiaohui He, Shuyang Zhang, and Junfeng Zeng Test Architecture Generation by Leveraging BERT and Control and Data Flows [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"_links":{"self":[{"href":"https:\/\/cyprusconferences.org\/iceccs2024\/wp-json\/wp\/v2\/pages\/52"}],"collection":[{"href":"https:\/\/cyprusconferences.org\/iceccs2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyprusconferences.org\/iceccs2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyprusconferences.org\/iceccs2024\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cyprusconferences.org\/iceccs2024\/wp-json\/wp\/v2\/comments?post=52"}],"version-history":[{"count":34,"href":"https:\/\/cyprusconferences.org\/iceccs2024\/wp-json\/wp\/v2\/pages\/52\/revisions"}],"predecessor-version":[{"id":244155,"href":"https:\/\/cyprusconferences.org\/iceccs2024\/wp-json\/wp\/v2\/pages\/52\/revisions\/244155"}],"wp:attachment":[{"href":"https:\/\/cyprusconferences.org\/iceccs2024\/wp-json\/wp\/v2\/media?parent=52"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}