In this work, we summarize our journal paper published in Empirical software Engineering (EMSE) in 2022 [Kr22]. Verification approaches for software Product Lines (SPL) aim at detecting variability-related defects and...
详细信息
The competitive game between agents exists in many critical applications, such as military unmanned aerial vehicles. It is urgent to test these agents to reduce the significant losses caused by their failures. Existin...
详细信息
The competitive game between agents exists in many critical applications, such as military unmanned aerial vehicles. It is urgent to test these agents to reduce the significant losses caused by their failures. Existing studies mainly are to construct a testing agent that competes with the target agent to induce its failures. These approaches usually focus on a single task, requiring much more time for multi-task testing. However, if the previously tested tasks (source tasks) and the task to be tested (target task) share similar agents or task objectives, the transferable knowledge in source tasks can potentially increase the effectiveness of testing in the target task. We propose Demo2Test for conducting transfer testing of agents in the competitive environment, i.e., leveraging the demonstrations of failure scenarios from the source task to boost the testing effectiveness in the target task. It trains a testing agent with demonstrations and incorporates the action perturbation at key states to balance the number of revealed failures and their diversity. We conduct experiments in the simulated robotics competitive environments of MuJoCo. The results indicate that Demo2Test outperforms the best-performing baseline with improvements ranging from 22.38% to 87.98%, and 12.69% to 60.98%, in terms of the number and diversity of discovered failure scenarios, respectively.
Face spoofing is a serious threat to the security of face recognition and face anti-spoofing (FAS) has become one of the popular research directions recently. The pipeline of modern face anti-spoofing methods is to tr...
详细信息
A rapid technology change has significant opportunities for almost every industry, especially for healthcare. By using advanced network technologies and Internet of Medical Things (IoMT) devices, health professionals ...
详细信息
To enhance the performance of recommendation models, numerous researchers have turned to knowledge graphs as auxiliary information. Nevertheless, prevailing recommendation methods primarily focus on utilizing knowledg...
详细信息
In order to achieve high quality monitoring and yield management, wafer defect detection for key processes has become a common consensus in advanced semiconductor manufacturing. The accuracy of wafer defect detection ...
详细信息
Non-Intrusive Load Monitoring (NILM) is a technique used for identifying individual appliances' energy consumption from a household's total power usage. This study examines a novel energy disaggregation model ...
详细信息
In order to improve the construction of smart home system and create a smart home environment for users. This paper studies the application of Internet of Things technology in smart home system. This paper expounds th...
详细信息
Cyberattacks have increased. Security throughout software development reduces the program's attack surface. Despite several fixes. new research indicates software security weaknesses and hackers are rising. SSD se...
详细信息
We define the adjacent fragment AF of first-order logic, obtained by restricting the sequences of variables occurring as arguments in atomic formulas. The adjacent fragment generalizes (after a routine renaming) two-v...
详细信息
暂无评论