SEKE2020 Technical Sessions

July 9 to 19, 8am-11:30am New York, 2pm-5:30pm Rome, 8pm-11:30pm Beijing

July 9 8am-11:30am EST Session ITR: Internet of Things and Robotics (Chair: Prof. Angelo Perkusich, Federal University of Campina Grande, Brazil)

Formalization and Verification of VANET Ran Li, Huibiao Zhu, Lili Xiao, Jiaqi Yin, Yuan Fei and Gang Lu (page 1)

The Prediction of Delay Time and Route Planning for Autonomous Vehicles (S) Gen Wang Gou, Yong Xin Zhao, Jia Wei Jiang and Ling Shi (page 7)

DCBlock : Efficient Module for Unpaired Image to Image Translation Using GANs Jin Yong Kim, Myeong Oh Lee and Geun Sik Jo (page 13)

A Detect-and-Modify Region-based Classifier to Defend Evasion Attacks Jiawei Jiang, Yongxin Zhao, Xi Wu and Genwang Gou (page 19)

Modeling and Verifying NDN-based IoV Using CSP Ningning Chen, Huibiao Zhu, Jiaqi Yin, Lili Xiao and Yuan Fei (page 31)

Controller Synthesis for ROS-based Multi-Robot Collaboration Xudong Zhao, Rui Li, Wanwei Liu, Hao Shi, Shaoxian Shu and Wei Dong (page 37)

Understanding Travel Patterns of Commuting Private Cars using Big data of Electronic Registration Identification of Vehicles Junchao Lv, Linjiang Zheng, Yuhui Ye and Chenglin Ye (page 43)

TIMESIGHT: Discovering Time-driven Insights Automatically and Fairly Yohan Bae, Suyeong Lee and Yeonghun Nam (page 49)

Physical Artifacts for Agents in a Cyber-Physical System: A Case Study in Oil & Gas Scenario (EEAS) Fabian Cesar Manoel, Carlos Pantoja, Leandro Samyn and Vinicius Jesus (page 55)

July 10 8am-11:30am EST Session OKG: Ontologies and Knowledge Graphs (Chair: Dr. Raul Garcia Castro, Polytechical University of Madrid, Spain)

Keynote by Dr. Ji WU, BeiHang University, Beijing, China

Classifying Common Security Vulnerabilities by Software Type (S) Onyeka Ezenwoye, Yi Liu and William Patten (page 61)

Modeling Relation Path for Knowledge Graph via Dynamic Projection (S) Hongming Zhu, Yizhi Jiang, Xiaowen Wang, Hongfei Fan, Qin Liu and Bowen Du (page 65)

Modeling HiBrinto Ontology to Develop Knowledge Management Portal for Highway Bridge Construction Shanmuganathan Vasanthapriyan and Banujan Kuhaneswaran (page 71)

An Extended Knowledge Representation Learning Approach for Context-based Traceability Link Recovery (S) Guoshuai Zhao, Tong Li and Zhen Yang (page 77)

Identifying Security Concerns Based on a Use Case Ontology Framework Imano Williams and Xiaohong Yuan (page 83)

Towards High Quality Recommendations: A Goal-Oriented and Ontology-Based Interactive Approach (S) Ronaldo Goncalves, Robert Ahn, Tom Hill and Lawrence Chung (page 89)

SHAMROQ: Towards semantic models of regulations Patrick Cook, Susan Mengal and Siva Parameswaran (page 93)

On the Reuse of Knowledge to Develop Intelligent Software Engineering Solutions José Ferdinandy Silva Chagas, Luiz Antonio Pereira Silva, Mirko Perkusich, Ademar França Sousa Neto, Danyllo Albuquerque, Dalton Cézane Gomes Valadares, Hyggo Almeida and Angelo Perkusich (page 101)

July 11 8am-11:30am EST Session SS: Software Specification (Chair: Prof. Kazuhiro Ogata, JAIST, Japan)

Research on Multi Source Fusion Evolution Requirements Acquisition in Mobile Applications (S) Yuanbang Li, Rong Peng, Bangchao Wang and Dong Sun (page 107)

Detecting and Modeling Method-level Hotspots in Architecture Design Flaws Ran Mo, Shaozhi Wei and Ting Hu (page 111)

Threat and Security Modeling for Secure Software Requirements and Architecture (S) Michael Shin, Don Pathirage and Dongsoo Jang (page 117)

Knowledge-based Interface transition diagram for SRS(Software Requirements Specification) in mobile application (S) Taeghyun Kang, Hyungbae Park and Venkata Inukollu (page 121)

Correct Software by Design for Software-Defined Networking: A preliminary Study Liang Hao, Xin Sun, Lan Lin and Zedong Peng (page 127)

Dynamic Architecture-Implementation Mapping for Architecture-Based Runtime Software Adaptation Cuong Cu, Rachel Culver and Yongjie Zheng (page 135)

An Automated Goal Labeling Method Based on User Reviews Shuaicai Ren, Hiroyuki Nakagawa and Tatsuhiro Tsuchiya (page 141)

A Co-evolutionary Method Between Architecture and Code Tong Wang, Bixin Li and Lingyuan Zhu (page 147)

Self-training algorithm combining density peak and cut edge weight (S) Liiu Yang (page 93)

An Investigation on the influence of interactive aesthetics in virtual industrial design (P) Zhu Gao and Qi Li (page 98)

July 12 8am-11:30am EST Session ESE: Empirical Software Engineering (Chair: Prof. Rong Peng, Wuhan University, China)

An Empirical Study of Maven Archetype (S) Xinlei Ma and Yan Liu (page 153)

Evaluating the Usefulness and Ease of Use of an Experimentation Definition Language (S) Florian Auer and Michael Felderer (page 158)

Time-Aware Models for Software Effort Estimation (S) Michael Franklin Bosu, Stephen MacDonell and Peter Whigham (page 164)

An Empirical Study on Issue Knowledge Transfer from Python to R for Machine Learning Software (S) Wenchin Huang, Zhenlan Ji and Yanhui Li (page 168)

Quantifying the Relationship Between Health Outcomes and Unhealthy Habits (S) Swapna Gokhale (page 174)

The Reaction of Open Source Projects to C++ Templates and Lambdas: An Empirical Replication Study Donghoon Kim and Loc Ho (page 180)

Analyzing the Performance of Apps Developed by using Cross-Platform and Native Technologies Lucas Barros, Flávio Medeiros, Eduardo Moraes and Anderson Feitosa Júnior (page 186)

On the Use of Support Mechanisms to Perform Experimental Variables Selection Lilian Passos Scatalon, Rogério Eduardo Garcia and Ellen Francine Barbosa (page 192)

Testing the Stationarity Assumption in Software Effort Estimation Datasets Michael Bosu, Stephen MacDonell and Peter Whigham (page 198)

July 13 8am-11:30am EST Session DSML: Distributed Systems and Machine Learning (Chair: Prof. Giuseppe Polese, University of Salerno, Italy)

Graph Machine Learning for Anomaly Prediction in Distributed Systems Sheyda Kiani Mehr, Wenting Sun, Xuancheng Fan, Nikita Butakov and Nicolas Ferlans (page 204)

F(X)-MAN: An Algebraic and Hierarchical Composition Model for Function-as-a-Service Chen Qian and Wenjing Zhu (page 210)

Privacy-aware OrLa Based Access Control Model in the Cloud Pengfei Shao and Shuyuan Jin (page 216)

Formal Modelling and Verification of MCAC Router Architecture in ICN Junya Xu, Huibiao Zhu, Lili Xiao, Jiaqi Yin, Yuan Fei and Gang Lu (page 222)

Data-sparsity Service Discovery using Enriched Neural Topic Model and Attentional Bi-LSTM Li Yao, Bing Li and Jian Wang (page 228)

Explainable Deep Convolutional Candlestick Learner (S) Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai and Chih-Shiang Shur (page 234)

Conditional Normalizing Flow-based Generative Model for Zero-Shot Recognition Xinwei Zhu, Haiping Zhang, Liming Guan, Dongjin Yu and Zhongjin Li (page 238)

An SNN Construction Method Based on CNN Conversion and Threshold Setting Ying Shang, Yongli Li and Feng You (page 244)

Multi Classification of Alzheimer’s Disease using Linear Fusion with TOP-MRI Images and Clinical Indicators Qiao Pan, Golddy Indra Kumara and Jiahuan Chu (page 250)

Deep Hashing with Large Batch Training for Cross-modal Retrieval Xuewang Zhang and Yin Zhou (page 257)

July 14 8am-11:30am EST Session SD: Software Development (Chair: Dr. Iaakov Exman, Jerusalem College of Engineering, Israel)

Algebraic Higher-Abstraction for Software Refactoring Automation (TSE) (S) Iaakov Exman and Alexey Nechaev (page 264)

Reliable Compilation Optimization Selection Based on Gate Graph Neural Network Wu Jiang and Xu Jianjun (page 270)

Trends in Software Reverse Engineering (S) Rehman Arshad (page 276)

Do Experienced Programmers put too Much Confidence in Comments? (S) Elia Eiroa-Lledo, Abby Bechtel, Emily Daskas, Lily Foster, Raha Pirzadeh, Katie Rodeghiero and Erik Linstead (page 281)

Formal verification of an abstract version of Anderson protocol with CafeOBJ, CiMPA and CiMPG (S) Duong Dinh Tran and Kazuhiro Ogata (page 287)

Plagiarism Detection of Multi-threaded Programs using Frequent Behavioral Pattern Mining Qing Wang, Zhenzhou Tian, Cong Gao and Lingwei Chen (page 293)

The Impact of Auto-Refactoring Code Smells on the Resource Utilization of Cloud Software Asif Imran and Tevfik Kosar (page 299)

Towards Fine-Grained Compiler Identification with Neural Modeling Borun Xie, Zhenzhou Tian, Cong Gao and Lingwei Chen (page 305)

Evaluating the Relationship of Personality and Teamwork Quality in the Context of Agile Software Development Alexandre Braga Gomes, Manuel Silva, Dalton Valadares, Mirko Perkusich, Danyllo Albuquerque, Hyggo Almeida and Angelo Perkusich (page 311)

Inspect Characteristics of Rice via Machine Learning Method (S) Xin Ma, Mingliang Li, Jinxi Kong, Zhao Siming, Wei Li and Xiaohui Cui (page 25)

July 15 8am-11:30am EST Session ST: Software Testing (Chair: Mr. Michael Bosu, New Zealand)

ISC-FS: An Improved Spectral Clustering with Feature Selection for Defect Prediction (S) Xuan Zhou, Lu Lu and Yexia Qin (page 317)

A Semantic Convolutional Auto-Encoder Model for Software Defect Prediction (S) Zhihan Wang and Lu Lu (page 323)

Revisiting Dependence Cluster Metrics based Defect Prediction Qiguo Huang, Xiang Chen, Zhengliang Li, Chao Ni and Qing Gu (page 329)

Guidelines for Quality Assurance of Machine Learning-based Artificial Intelligence Koichi Hamada, Fuyuki Ishikawa, Satoshi Masuda, Tomoyuki Myojin, Yasuharu Nishi, Hideto Ogawa, Takahiro Toku, Susumu Tokumoto, Kazunori Tsuchiya, Yasuhiro Ujita and Mineo Matsuya (page 335)

Call Sequence List Distiller for Practical Stateful API Testing (S) Koji Yamamoto, Takao Nakagawa, Shogo Tokui and Kazuki Munakata (page 342)

Impact of Label Noise and Efficacy of Noise Filters in Software Defect Prediction Shihab Shahriar Khan, Nishat Tasnim Niloy, Md Aquib Azmain and Ahmedul Kabir (page 347)

Using Deep Learning Classifiers to Identify Candidate Classes for Unit Testing in Object-Oriented Systems Wyao Matcha, Fadel Touré, Mourad Badri and Linda Badri (page 353)

Unit Test Effort Prioritization Using Combined Datasets and Deep Learning: A Cross-Systems Validation (S) Fadel Toure and Mourad Badri (page 359)

An Empirical Investigation on the Relationship Between Bug Severity and Bug Fixing Change Complexity Zengyang Li, Dengwei Li, Peng Liang and Ran Mo (page 365)

July 16 8am-11:30am EST Session NLP: Natural Language Processing (Chair: Mr. Patrick Cook, Texas Tech University, USA)

Can language help in the characterization of user behavior? Feature engineering experiments with Word (S) Eduardo Lopez and Kamran Sartipi (page 371)

Patent Technical Function-effect Representation and Mining Method (S) Weidong Liu, Piying Zhang and Wenbo Qiao (page 375)

Towards A Systematic Derivation Of BPMN Model From Business Process Textual Description (S) Wiem Khlif, Nourchène Elleuch Ben Ayed and Faten Chihi (page 380)

A Novel Self-Attention Based Automatic Code Completion Neural Network (IPA) Bohao Wang, Wanyou Lv, Jianqi Shi and Yanhong Huang (page 386)

An Ensemble Approach to Detect Code Comment Inconsistencies using Topic Modeling (S) Fazle Rabbi, Md Nazmul Haque, Md Eusha Kadir, Md Saeed Siddik and Ahmedul Kabir (page 392)

A Combined Model for Extractive and Abstractive summarization based on Transformer model (S) Xin Liu and Liutong Xu (page 396)

Modeling Topic Exhaustion for Programming Languages on StackOverflow (IPA) Rao Hamza Ali and Erik Linstead (page 400)

An Efficient Application Searching Approach Based on User Review Knowledge Graph Fang Li and Tong Li (page 406)

SLK-NER: Exploiting Second-order Lexicon Knowledge for Chinese NER (S) Dou Hu and Lingwei Wei (page 413)

July 17 8am-11:30am EST Session SMM: Social Media Mining (Chair: Prof. Swapna Gokhale, University of Connecticut, USA and India)

Sentiment Analysis over Collaborative Relationships in Open Source Software Projects Lingjia Li, Jian Cao and David Lo (page 418)

Searching, Examining, and Exploiting In-demand Technical (SEE IT) Skills using Web Data Mining Taeghyun Kang, Hyungbae Park and Sunae Shin (page 424)

Sentiment Analysis of Online Reviews with a Hierarchical Attention Network Jingren Zhou and Peiquan Jin (page 429)

Cross-project Reopened Pull Request Prediction in GitHub (S) Abdillah Mohamed, Li Zhang and Jing Jiang (page 435)

Restaurant Failure Prediction Based on Multi-View Online Data Ping Liang, Dongjin Yu and Xiaoxiao Sun (page 439)

Detecting Spammers from Hot Events on Microblog Platforms: An Experimental Study Jialing Liang and Peiquan Jin (page 445)

Automatic Identification of Architecture Smell Discussions from Stack Overflow Fangchao Tian, Fan Lu, Peng Liang and Muhammad Ali Babar (page 451)

Exploring CQA User Contributions and Their Influence on Answer Distribution (S) Yi Yang, Xinjun Mao, Zixi Xu and Yao Lu (page 457)

Copy and Paste Behavior: A Systematic Mapping Study (S) Luqi Guan, John Castro, Xavier Ferré and Silvia Acuña (page 463)

Generating Luck from Weak Ties in Social Networks (S) Iaakov Exman, Omer Ganon and Asaf Yosef (page 467)

July 18 8am-11:30am EST Session RS: Recommender Systems (Chair: Yohan Bae, Samsung Electronics, Korea)

Personalized Video Recommendation Based on Latent Community (S) Han Yan, Ye Tian, Shunyao Wang, Xiangyang Gong, Xirong Que and Wendong Wang (page 473)

Mining and Predicting Micro-Process Patterns of Issue Resolution for Open Source Software Projects Yiran Wang, Jian Cao and David Lo (page 477)

Deep Graph Attention Neural Network for Click-Through Rate Prediction Wen Fang and Lu Lu (page 483)

A Session-based Job Recommendation System Combining Area Knowledge and Interest Graph Neural Networks (S) Yusen Wang, Kaize Shi and Zhendong Niu (page 489)

Modeling and Selecting Frameworks in terms of Patterns, Tactics, and System Qualities Hind Milhem, Michael Weiss and Stéphane Somé (page 493)

An Evaluation of Recommendation Algorithms for Tourist Attractions Anderson Feitosa Júnior, Flávio Medeiros and Ivo Calado (page 501)

Who Should Close the Questions: Recommending Voters for Closing Questions Based on Tags Zhang Zhang, Xinjun Mao, Yao Lu and Jinyu Lu (page 507)

A Deep Spatio-temporal Residual Network Model for Commercial Activeness Prediction Ping Liang, Dongjin Yu and Xiaoxiao Sun (page 513)

Collaborative Denoising Graph Attention Autoencoders for Social Recommendation Nan Mu, Daren Zha, Lin Zhao and Rui Gong (page 519)

Identifying Similar Users Based on Metagraph of Check-in Trajectory Data Rui Song, Tong Li, Xin Dong and Zhiming Ding (page 525)

July 19 8am-11:30am EST Session SB: Security and Blockchain (Chair: Prof. Oscar Pereira, University of Aveiro, Portugal)

Formal Security Analysis for Blockchain-based Software Architecture Nacha Chondamrongkul, Jing Sun and Ian Warren (page 532)

Characterizing Vulnerabilities in a Major Linux Distribution Stephen Tate, Moulika Bollinadi and Joshua Moore (page 538)

Mining DApp Repositories: Towards In-Depth Comprehension and Accurate Classification Yeming Lin, Jianbo Gao, Tong Li, Jingguo Ge, Bingzhen Wu (page 544)

Automated Rogue Behavior Detection for Android Applications (S) Shuangmin Zhang, Ruixuan Li, Junwei Tang and Xiwu Gu (page 550)

Benchmarking the efficiency of RDF-based access for blockchain environments Juan Cano-Benito, Andrea Cimmino Arriaga and Raúl García-Castro (page 554)

SecureChange: An Automated Framework to Guide Programmers in Fixing Vulnerability Sayem Mohammad Imtiaz, Kazi Zakia Sultana and Tanmay Bhowmik (page 560)

Significant API Calls in Android Malware Detection (Using Feature Selection Techniques and Correlation Based Feature Elimination) Asadullah Hill Galib and B M Mainul Hossain (page 566)

Threat Intelligence Relationship Extraction Based on Distant Supervision and Reinforcement Learning (S) Wang Xuren, Yang Jie, Wang Qiuyun, and Su Changxin (page 572)