SEKE23 and DMS23 Conferences

(Explanation: Virtual events can be attended by participants anywhere. Hybrid events can be attended by participants anywhere but will include live presentations. Live events can only be attended by live participants. The time in the schedule refers to USA West Coast time.)

DMS2023 Technical Program

June 29 Thursday

Virtual DMS Session I (Chair: Walter Balzano) (5a-8a West Coast Time)

010 Takanori Ishibashi and Kazuhiro Ogata. Formal Specification and Model Checking of Raft Log Replication in Maude (pdf, ppt)
071 Chen Yang, Zinan Ma, Peng Liang and Xiaohua Liu. Automatic Identification and Extraction of Assumptions on GitHub (pdf, ppt)
089 Wenzhu Cai and Mark Junjie Li. An Interval RSP-based ensemble model for big data analysis (pdf, ppt)
051 Yuhong Zhang, Dan Lu, Chenyang Bu, Kui Yu and Xindong Wu. Cross-Knowledge Graph Relation Completion for Non-isomorphic Cross-lingual Entity Alignment (pdf, ppt)
007 Pengfei Qiu, Yang Zou, Xiaoqin Zeng, Xiaoxiang Lu and Xiangchen Wu. Directional Residual Frame: Turns the motion information into a static RGB frame (S) (pdf, ppt)
105 Chen Luo. A Topic Lifecycle Trend Prediction Algorithm on Facebook (pdf, ppt)
034 Maria Assunta Cappelli, Ashley Caselli and Giovanna Di Marzo Serugendo. Enriching RDF-based Document Management System with Semantic-based Reasoning (S) (pdf, ppt)
106 Xinyu Hou, Cui Zhu and Wenjun Zhu. DSWA: A Dilated Shift Window Attention Method for Chinese Named Entity Recognition (S) (pdf, ppt)
187 Guofu Tang, Jianmin Jiang and Hao Wen. Consistency analysis of UML models (S) (pdf, ppt)

June 30 Friday Travel Day

SEKE2023 Technical Program

July 1 Saturday (SEKE23 Live Conference will be held at the Larkspur Meeting Room on the first floor of Larkspur Hotel. More information about SEKE23 Live Conference )

Hybrid Opening Ceremony (7:45a-8a West Coast TIme)

Hybrid WSE Panel: Women in Software Engineering (8a-9a)

Moderator: Pankaj Kamthan, Concordia University, Canada; Panelists: Edna Canedo, University of Brasília, Brasília, Brazil; Mirella Moro, Federal University of Minas Gerais, Belo Horizonte, Brazil; Nazlie Shahmir, Canadian Pacific Railway Limited, Calgary, Canada; Bianca Trinkenreich, Northern Arizona University, Flagstaff, USA

Live Coffee Break (9a-9:30a)

Hybrid SCE Session: Social Computing and Engineering (Chair: Xinzhi Wang) (9:30a-11:30a)

067 Xinzhi Wang, Mengyue Li, Yige Yao, Zhennan Li, Yi Liu and Hui Zhang. Short Review of Intention Mining in Social Crisis Management through Automatic Technologies(pdf, ppt)
046 Qitao Hu and Xiao Wei. Topic and Speaker-aware Hierarchical Encoder-Decoder Model for Dialogue Generation (pdf, ppt)
030 Senjun Pei and Weidong Liu. Convolution Neural Network Based Patent Infringement Detection Method(pdf, ppt)
053 Wenwen Xiao, Xinzhi Wang, Xiangfeng Luo and Shaorong Xie. DDCL: A Dual Decision-making Continuous Reinforcement Learning Method Based on Sim2Real(pdf, ppt)
096 Fayrouz Elsalmy, Nada Hany Sherief and Walid Abdelmoez. Inclusive Gamification: An Exploratory Study in Software Development Enterprises (S) (pdf, ppt)

Live SEKE Session I (Chair: Carlos Eduardo Pantoja) (2p-3:40p)

050 Ryo Soga, Hideyuki Kanuka, Takatomi Kubo, Takashi Ishio and Kenichi Matsumoto. Will you use software development support using biosignals? A survey from software developers (LIVE) (pdf, ppt)
063 Melody Hammel and Lan Lin. Assuring Domain Software Quality through Workflow Testing and Specification (LIVE) (pdf, ppt)
068 Ju Ma, Yi-Yang Sun, Peng He and Zhang-Fan Zeng. GSAGE2defect: An Improved Approach to Software Defect Prediction based on Inductive Graph Neural Network (pdf, ppt)
002 Pankaj Kamthan and Nazlie Shahmir. Small Educational Steps Towards Improving the Status of Women in Software Engineering (LIVE) (pdf, ppt)
128 Yuanchi Ma, Hui He and Zhendong Niu. BDC:Using BERT and Deep Clustering to Improve Chinese Proper Noun Recognition (LIVE) (pdf, ppt)

Live Coffee Break (3:40p-4p)

Live Tutorial: Quantum Software (Speaker: Iaakov Exman) (4p-5p)

Live Reception Dinner at Larkspur Room on the first floor of the hotel (BLUE coupon required)(5:30p-7p)

July 2 Sunday

Virtual DMS Keynote (Marco Fanfani): Development of the Smart City Digital Twin of Florence (Chair: Bernardo Breve) (8a-9a West Coast Time)

Live Coffee Break (9a-9:30a)

Hybrid DMS Session II (Chair: Maiga Chang) (9:30a-11:30a)

006 Alessia Fantini, Antonino Asta, Alfredo Cuzzocrea and Giovanni Pilato. Building and Assessing an Italian Textual Dataset for Emotion Recognition in Human-Robot Interactions (pdf, ppt)
005 Elena Molinari and Andrea Molinari. Providing Accessible and Supportive User Experience through conversational UI and digital humans: a case study (pdf, ppt)
003 Zhibin Wu, Yang Zou, Jian Zhou, Min Wang and Xiaoqin Zeng. End-to-End Contextual Speech Recognition With Word-Piece-Level Token Selection (pdf, ppt)
008 Bernardo Breve, Gaetano Cimino, Vincenzo Deufemia and Annunziata Elefante. A BERT-based Model for Semantic Consistency Checking of Automation Rules (S) (pdf, ppt)
217 Ramon Santos, Felipe Cunha, Thiago Rique, Mirko Perkusich, Hyggo Almeda, Angelo Perkusich and Icaro Costa, A Comparative Analysis of Agile Teamwork Quality Instruments in Agile Software Development: A Qualitative Approach (LIVE) (pdf, ppt)
017 Michael Kyobe and Hishaam Damon, The Influence Of Techonological Factors On Dark Market Operations (LIVE) (pdf, ppt)

Live SEKE Session II (Chair: Nazlie Shahmir) (2p-3:40p)

154 Keita Murase and Shingo Takada. Applying Reinforcement Learning for Automated Testing of Mobile Application Focusing on State Definition, Reward, and Learning Method (LIVE) (pdf, ppt)
018 Carlos Pantoja, João Victor Guinelli, Tielle Alexandre and Jose Viterbo. A Model-Driven Development Framework for Geographical and Relational Database Systems (LIVE) (pdf, ppt)
223 Masaya Fujimoto, Hiroyuki Nakagawa and Tatsuhiro Tsuchiya. Expansion Mechanism for Runtime Verification of Self-adaptive Systems (LIVE) (pdf, ppt)
035 Jing Zhou, Shan Leng, Fang Wang and Hansheng Wang. Automatic Discovery of Controversial Legal Judgments by an Entropy-Based Measurement (S) (LIVE) (pdf, ppt)
032 Wasja Brunotte, Jakob Droste and Kurt Schneider. Context, Content, Consent - How to Design User-Centered Privacy Explanations (S) (LIVE) (pdf, ppt)

Live Coffee Break (3:40p-4p)

Live Tutorial: Brainstorming and Mind Mapping for Software Engineering Education (Speaker: Pankaj Kamthan) (4p-5p)

Live Half Moon Bay Tour and Dinner (RED coupon required)(5p Bus Boarding, 9p Return)

July 3 Monday

Virtual SEKE Keynote (Mario Gerardo Piattini): Quantum Software Engineering: Practical Challenges (Chair: Iaakov Exman) (8a-9a West Coast Time)

Live Coffee Break (9a-9:30a)

Hybrid QSE Panel: Quantum Software Engineering (9:30a-10:30a)

Moderator: Prof. Iaakov Exman, Holon Institute of Technology, Israel; Panelists: Prof. Michael Felderer, Director of the Institute for Software Technology at German Aerospace Center, Germany; Professor Mario Piattini, University of Castilla-La Mancha, Spain

Hybrid TSECQS Session: Theoretical Software Engineering, Classical and Quantum Software Similarities (Chair: Iaakov Exman) (10:30a-11:30a)

214 Iaakov Exman and Ariel Zvulunov. Quantum Software Models: Quantum Modules Tomography and Recovery Theorem (LIVE) (pdf, ppt)
196 Krishn Vishwas Kher, Ishan Joshi, Bharat Chandra Mukkavalli, Lei Zhang and M. V. Panduranga Rao. Automatic Diagnosis of Quantum Software Bug Fix Motifs (pdf, ppt)
014 Canh Minh Do and Kazuhiro Ogata. Symbolic Model Checking Quantum Circuits in Maude(pdf, ppt)

Live SEKE Session III (Chair: Patrick Cook) (1p-2p)

110 Yihao Zhang, Zeming Wei, Xiyue Zhang and Meng Sun. Using Z3 for Formal Modeling and Verification of FNN Global Robustness (S) (pdf, ppt)
152 Marco Fiore, Marina Mongiello, Giovanni Tricarico, Francesco Bozzo, Cinzia Montemurro, Alessandro Petrontino, Clemente Giambattista and Giorgio Mercuri. Blockchain-based Food Traceability System for Apulian Marketplace: Enhancing Transparency and Accountability in the Food Supply Chain (S) (LIVE) (pdf, ppt)
070 Kazusa Takemoto and Shingo Takada. Applying Symbolic Execution to Semantic Code Clone Detection (S) (LIVE) (pdf, ppt)

Live Tutorial: Engineering Embedded Multiagent Systems (Speaker: Carlos Eduardo Pantoja) (2p-3p)

Live Tutorial: Requirements Extraction with SHAMROQ (Speaker: Patrick Cook) (3p-4p)

Live Closing Ceremony and Announcement of Awards (4p-4:15p)

July 4 Holiday

July 5 - 10 SEKE2023 Virtual Sessions (5a-9a West Coast Time, 8a-12a East Coast Time, 2p-6p Rome Time, 8p-12p Beijing Time)

July 5 ESSE: Empirical Studies and Software Engineering (Chair: ShiKuo Chang)

077 Beiqi Zhang, Peng Liang, Xiyu Zhou, Aakash Ahmad and Muhammad Waseem. Practices and Challenges of Using GitHub Copilot: An Empirical Study (pdf, ppt)
125 Qing Mi, Haotian Bai, Xiaozhou Wang, Wenrui Liu and Xingyue Song. An Empirical Study of Coding Style Compliance on Stack Overflow (pdf, ppt)
161 Zeshan Xu, Jie Zhu, Li Yang and Chun Zuo. Mining the Relationship between Object-Relational Mapping Performance Anti-patterns and Code Clones (pdf, ppt)
180 Haifeng Wang, Kun Yang, Xiangnan Zhao, Yuchen Cui and Weiwei Wang. Contribution-based Test Case Reduction Strategy for Mutation-based Fault Localization (S) (pdf, ppt)
016 Anelis Pereira-Vale, Daniel Perovich and Sergio F. Ochoa. Understanding the Pre-Contract Process of Small Software Projects (pdf, ppt)
072 Junfeng Zhao, Wenhui Gai and Han Wu. Fortran Code Refactoring Based on MapReduce Programming Model (pdf, ppt)
098 Jiman Du, Jiaxin Zhu, Hui Li, Wei Chen, Lijie Xu, Jie Liu and Zhifeng Chen. A Case Study of Dependency Network for Building Packages: The Fedora Linux Distribution (pdf, ppt)
120 Shuo Li, Jie Liu, Haoxiang Tian, Shuai Wang, Wei Chen, Liangyi Kang and Dan Ye. EasyPip: Detect and Fix Dependency Problems in Python Dependency Declaration Files (pdf, ppt)
123 Peiyang Li, Zixin Liu, Yuening Su, Hao Wang and Bo Jiang. CAPS: An Efficient Whole-Program Critical Paths Search Framework for Large-Scale Software (pdf, ppt)
122 Zhiyong Ren and Hui Xu. Detect Stack Overflow Bugs in Rust via Improved Fuzzing Technique (pdf, ppt)
208 Hao Zhu, Yichen Li, Jie Li and Xiaofang Zhang. An Efficient Design Smell Detection Approach with Inter-class Relation (S) (pdf, ppt)
139 Tianmai Deng, Yixiao Xu, Chi Zhang and Zhengwei Qi. Dissecting Scale-Out Applications Performance on Diverse TLB Designs (S) (pdf, ppt)
001 Yu Guo, Jun Guo, Mohan Shi and Aixuan Dong. Real-time Estimation Approach to Scrum Projects Effort: Task Point and Individual Reliability (S) (pdf, ppt)
109 Zhiguo Li and Qin Li. ASC4AI: A Novel Automatic Service Composition Framework for AI Systems (S) (pdf, ppt)
199 Omkarendra Tiwari and Vrinda Yadav. A Review of Methods for Identifying Extract Method Refactoring (pdf, ppt)
229 Lufeng Wei, Zhi Li and Yuansong Qin. Towards generating contextualised fault scenarios for reliability risk analysis of cyber-physical systems (P) (pdf, ppt)

July 6 SEAI: Software Engineering and AI (Co-Chairs: Giuseppe Polese and Bernardo Breve)

090 Zhenhua Zhang, Shizhan Chen, Guodong Fan, Guang Yang and Zhiyong Feng. CCGRA: Smart Contract Code Comment Generation with Retrieval-enhanced Approach (pdf, ppt)
095 Ed van Doorn and Sylvia Stuurman. Detecting Design Patterns As Described By An Explicit Specification (S) (pdf, ppt)
115 Jingjing Wang, Minhuan Huang, Yuanping Nie, Xiaohui Kuang, Xiang Li and Wenjing Zhong. Fine-Grained Source Code Vulnerability Detection via Graph Neural Networks (S) (pdf, ppt)
119 Xinyan Yi, Hao Xu, Lu Lu, Quanyi Zou and Zhanyu Yang. Software Defect Prediction via Positional Hierarchical Attention Network (S) (pdf, ppt)
218 Ran Mo, Yushuo Wang, Yao Zhang and Zengyang Li. Just-in-Time Defect Severity Prediction (S) (pdf, ppt)
118 Jiaxin Liu, Hao Xu, Lu Lu, Quanyi Zou and Zhanyu Yang. A Software Defect Prediction Method based on Multi-type Features and Feature Selection (pdf, ppt)
227 Kirthy Kolluri, Tom Hill and Lawrence Chung. Identifying Risks and Risk Mitigation Strategies for Collaborative Systems during Requirements Engineering: A Goal-Oriented Approach (S) (pdf, ppt)
075 Haochen Jin, Liwei Zheng and Zhanqi Cui. AFL2oop: Loop Coverage Guided Greybox Fuzz Testing (pdf, ppt)
182 Liang Sun, Peng Wu and Shaoxian Shu. Research on Directed Grey-box Fuzzing Technology Based on Target (S) (pdf, ppt)
188 Wei Li, Zhiyi Zhang, Yifan Jian, Chen Liu and Zhiqiu Huang. DeepRank: Test Case Prioritization for Deep Neural Networks (pdf, ppt)
226 Shaojian Qiu, Shaosheng Wang, Yujun Liang, Wenchao Jiang and Fanlong Zhang. Code Clone Detection via Software Visualization Representation Learning (pdf, ppt)
136 Guang Yang, Tiancheng Jin and Liang Dou. Heterogeneous Directed Hypergraph Neural Network over abstract syntax tree (AST) for Code Classification (pdf, ppt)
059 Shuaishuai Feng, Xi Wu, Yongxin Zhao and Yongjian Li. Dispatching and Scheduling Dependent Tasks Based on Multi-agent Deep Reinforcement Learning (pdf, ppt)
084 Qing Qi and Jian Cao. GAT-Team: A Team Recommendation Model for Open-Source Software Projects (pdf, ppt)
108 Yiheng Shen, Xiaolin Ju, Xiang Chen and Guang Yang. An Empirical Study of Adversarial Training in Code Comment Generation (pdf, ppt)
185 Jun Cheng, Honglei Su and Jari Korhonen. No-Reference Point Cloud Quality Assessment via Weighted Patch Quality Prediction (pdf, ppt)
192 Jie Li, Lixuan Li, Hao Zhu and Xiaofang Zhang. GraphPLBART: Code Summarization Based on Graph Embedding and Pre-Trained Model (pdf, ppt)

July 7 KE: Knowledge Engineering (Chair: Stefano Cirillo)

107 Qia Wang, Yi Wang and Ying Wang. An Efficient Lossless Graph Summarization Method for Large Streaming Graphs (pdf, ppt)
100 Wen Sun, Yifan Li, Junfeng Yao, Qingqiang Wu and Kunhong Liu. Combining Structure Embedding and Text Semantics for Efficient Knowledge Graph Completion (pdf, ppt)
190 Li-E Wang, Huachang Zeng, Shenghan Li, Xianxian Li, Shengda Zhuo, Jiahua Xie, Bin Qu, Zhigang Sun and Tianran Liu. CRCC: Collaborative Relation Context Consistency on the Knowledge Graph for Recommender Systems (S) (pdf, ppt)
132 Yuxin Zhao, Xinjun Mao, Bo Sun, Tanghaoran Zhang and Shuo Yang. An Effective Method for Constructing Knowledge Graph to Search Reusable ROS Nodes (S) (pdf, ppt)
148 Bin Li, Jian Wen Ding, Zhen Nan Chen, Han Peng Jiang and Fan Lin. Multi-Domain Feature Representation and Multi-Dimensional Feature Interaction for Person-Job Fit (pdf, ppt)
163 Shizhao Huang, Yimin Wu, Jinwei Lu and Chao Deng. Related Questions Detection Model in Stack Overflow based on Semantic Matching (pdf, ppt)
222 Yifan Wang, Jibin Wang, Jing Shang, Zhuo Chen, Xuelian Ding and Heyuan Wang. Learning Event Logic Graph Knowledge for Credit Risk Forecast (pdf, ppt)
205 Junmin Zhu, Yizhao Yao, Xianwen Deng, Yaoguang Yong, Yanhao Wang, Libo Chen, Zhi Xue and Ruijie Zhao. SAWD: Structural-Aware Webshell Detection System with Control Flow Graph (pdf, ppt)
143 Tong Niu, Yicong Xu, Shengping Xiao, Lili Xiao, Yanhong Huang and Jianwen Li. LTLf Satisfiability Checking via Formula Progression (S) (pdf, ppt)
170 Yifan Wang, Masaki Nakamura, Kazutoshi Sakakibara and Yuki Okura. Formal Specification and Verification of an Autonomous Vehicle Control System by the OTS/CafeOBJ method (S) (pdf, ppt)
189 Magali Legast and Axel Legay. Assistance in the management of rule sets for rule-based expert systems (S) (pdf, ppt)
221 Mengyuan Wang, Tengfei Li, Jing Liu, Hui Dou, Hongtao Chen, John Zhang, Lipeng Zhang. Modeling and Verification of Autonomous Driving Systems under Stochastic Spatio-Temporal Constraints (pdf, ppt)

July 7 DPCC: Data Privacy and Cloud Computing (Chair: Patrick Cook)

038 Georg Grabner, Ali Ahmed and Nilufar Baghaei. Using Blockchain to Preserve Chain of Custody: Cloud Forensics Analysis (S) (pdf, ppt)
150 Wenxiu Xu, Ningjiang Chen and Huan Tu. DNN Inference Task Offloading Based on Distributed Soft Actor-Critic in Mobile Edge Computing (pdf, ppt)
124 Yuxin Xiang, Bing Deng, Hongyu Zhang, Randy Xu, Marc Mao, Yun Wang and Zhengwei Qi. Bindox: An Efficient and Secure Cross-System IPC Mechanism for Multi-Platform Containers (pdf, ppt)
183 Xiguo Gu, Huiwen Yang, Shifan Liu and Zhanqi Cui. Smart Contract Vulnerability Detection Based on Clustering Opcode Instructions (pdf, ppt)
172 Yingjia Du, Yuan Fei, Sini Chen and Huibiao Zhu. Formalization and Verification of Data Auction Mechanism Based on Smart Contract Using CSP (pdf, ppt)

July 8 DMA: Data Mining and Analytics (Chair: Carlos Eduardo Pantoja)

097 Gabriel Mac'Hamilton Renaux Alves and Alexandre Magno Andrade Maciel. Survey on Data Ingestion for AutoML (S) (pdf, ppt)
094 Bowen Chen. DGNN: Dynamic Graph Neural Networks for Anomaly Detection in Multivariate Time Series (pdf, ppt)
175 Dolly Agarwal, Abdullah Al Imran and Kasun S Perera. FOODIE: A Data-centric Sifting Framework for Social Media Analytics (pdf, ppt)
028 Jie Xiong, Huiyuan Li, Qiyuan Duan and Qihan Du. Towards Extreme Multi-label Text Classification Through Group-wise Label Ranking (pdf, ppt)
167 Guangwei Zhang, Ming Jing, Yunjing Liu, Li Zhang, Anming Dong and Jiguo Yu. Interactive Visualization of Temporal Brain Connectivity Data based-on Frequent Feature Mining (S) (pdf, ppt)
184 Peng Zhang, Zhaohui Zhang, Chaochao Hu and Pengwei Wang. A Dynamic Drilling Sampling Method and Evaluation Model for Large-Scale Streaming Data (pdf, ppt)
102 Bowen Chen. ASTD: Automatic Seasonal-Trend Decomposition for Time Series (pdf, ppt)
103 Lidan Zhao, Tong Li, Zhen Yang and Junrui Liu. A novel subjective bias detection method based on multi-information fusion (pdf, ppt)
191 Rongxi Guo, Wanrong Jiang, Xi Zhao, Ding Cao and Guiquan Liu. ASMix: An Attention-based Smooth Data Augmentation Approach (pdf, ppt)
176 Samuel Abedu, Solomon Mensah, Frederick Boafo, Eva Bushel and Elizabeth Akuafum. An Optimal Spacing Approach for Sampling Small-sized Datasets (pdf, ppt)
099 Wei Du and Shifei Ding. Heterogeneous Multi-Agent Communication Learning via Graph Information Maximization (pdf, ppt)
054 Ziyi Zhang, Rong Yan and Wei Yuan. Identifying Influential Spreaders in Complex Networks Using Neighborhood Network Structure (pdf, ppt)

July 8 OAEP: Optimization Approaches for Enhanced Performances (Chair: Nazlie Shahmir)

177 Bishshoy Das, Milton Mondal, Brejesh Lall, Shiv Dutt Joshi and Sumantra Dutta Roy. Altering Backward Pass Gradients to Improve Convergence (S) (pdf, ppt)
142 Wei Liang, Wanghua Shi, Zhengyu Liao, Shiyou Qian, Zhonglong Zheng, Jian Cao and Guangtao Xue. BOP: A Bitset-based Optimization Paradigm for Content-based Event Matching Algorithms (S) (pdf, ppt)
159 Yu Zhang, Ningjiang Chen and Siyu Yu. Transient Data Caching Based on Maximum Entropy Actor-Critic in Internet-of-Things Networks (pdf, ppt)
131 Yulong Wang, Kai Deng, Fanzhi Meng, Zhi Chen, Mingyong Yin and Run Yang. Branchy-TEE: Deep Learning Security Inference Acceleration Using Trusted Execution Environment (pdf, ppt)
116 Yaodanjun Ren, Chen Chen and Zhengwei Qi. HaeNAS: Hardware-Aware Efficient Neural Architecture Search via Zero-Cost Proxy (pdf, ppt)
156 Rong Wu. L∗-Based Learning of Probabilistic Timed Automata with One Clock (S) (pdf, ppt)

July 9 MLDLA: Machine Learning and Deep Learning Applications (Chair: Lan Lin)

138 Shunwen Shen, Lvqing Yang, Sien Chen, Wensheng Dong, Bo Yu and Qingkai Wang. DeepMultiple: A Deep Learning Model for RFID-based Multi-object Activity Recognition (pdf, ppt)
112 Shuai Li, Bing Shi and Yaping Deng. A Dynamic Matching Time Strategy Based on Multi-Agent Reinforcement Learning in Ride-Hailing (pdf, ppt)
168 Zhennan Chen, Zhicheng Zhang, Pengfei Li, Lingyue Wei, Shibo Feng and Fan Lin. mTrader: A Multi-Scale Signal Optimization Deep Reinforcement Learning Framework for Financial Trading (S) (pdf, ppt)
127 Lei Mao, Jianxia Chen, Shi Dong, Liang Xiao, Haoying Si and Xinyun Wu. Aspect-level Sentiment Analysis Based on Convolutional Network with Dependency Tree (pdf, ppt)
144 Georg Stettinger and Franz Wotawa. Smart Monitoring for Safety-Assurance in Autonomous Driving (S) (pdf, ppt)
061 Xingchen Ding, Chong Teng and Donghong Ji. Fake News Detection with Context Awareness of the Publisher (pdf, ppt)
178 Bakhta Haouari, Rania Mzid and Olfa Mosbahi. PSRL: A New Method for Real-Time Task Placement and Scheduling Using Reinforcement Learning (pdf, ppt)
037 Rui Xu, Cheng Zeng, Yujin Liu, Peng He and Min Chen. A Triplet Network Approach for Chinese Confusing Text Classification (pdf, ppt)
135 Xingfu Li, Bangchao Wang, Hongyan Wan, Yang Deng and Zihan Wang. Applications of Machine Learning in Requirements Traceability: A Systematic Mapping Study (S) (pdf, ppt)
013 Chen Qian, Hui Xiong and Jiyun Li. FeDeFo: A Personalized Federated Deep Forest Framework for Alzheimer's Disease Diagnosis (pdf, ppt)
165 Kang Zhong, Wu Guo, Bin Gu, Weitai Zhang and Chao Lin. A Detection-based Attention Alignment Method for Document-level Neural Machine Translation (pdf, ppt)
066 Gaoyi Lin, Zhihua Zhang and Zhanqi Cui. Widget Hierarchy Graph Guided Crash Reproduction Method for Android Applications (S) (pdf, ppt)
081 Xing Zhang, Tinglong Tang, Yirong Wu and Tingwei Quan. Construction Site Fence Recognition Method Based on Multi-Scale Attention Fusion ENet Segmentation Network (S) (pdf, ppt)
049 Jingxia Zeng, Mianfan Chen, Jianing Liu and Yuncheng Jiang. SLPKT: A Novel Simulated Learning Process Model for Knowledge Tracing (pdf, ppt)
069 Chen Qian, Boyin Yang and Jiyun Li. SARNet: A Self-Attention Embedded Residual Network for Multiclass Classification of Chronic Wounds (S) (pdf, ppt)
015 Yimin Peng, Rong Hu and Yiping Wen. AT-NCF: An Attention-based Time-aware Neural Collaborative Filtering Approach for Personalized Recommendation (S) (pdf, ppt)
130 Cairong Yan, Xiaopeng Guan, Haixia Han and Zhaohui Zhang. MB-DP: A Multi-behavior Recommendation Model Integrating Dynamic Preferences (pdf, ppt)

July 10 LMQA: Language Models and Question Answering (Chair: Pankaj Kamthan)

023 Aoxing Wang, Pengfei Duan, Yongbing Li, Wenyan Hu and Shengwu Xiong. LMGFuse: Language Models and Graph reasoning Fuse deeply for question answering (pdf, ppt)
200 Zuotong Xie, Kai Ouyang, Xiangjin Xie, Hai-Tao Zheng, Wenqiang Liu, Dongxiao Huang and Bei Wu. KLAPrompt: Infusing Semantic Knowledge into Pre-trained Language Models by Long-answer Prompt Learning (pdf, ppt)
162 Xingang Wang, Xiaomin Li and Xiaoyu Liu. Reinforced Multi-modal Circulant Fusion based Transformers for Rumor Detection (S) (pdf, ppt)
025 Qian Wang, Cheng Zeng, Yujin Liu and Peng He. A Medical Question Classification Approach Based on Prompt Tuning and Contrastive Learning (S) (pdf, ppt)
195 Xiaoyan Gao, Ji Chen, Xiangqian Ding, Shuo Shi, Junhua Jia and Xiaowei Xin. An intelligent question answering system based on RoBERTa-WWM under home appliance knowledge graph (S) (pdf, ppt)
047 Yingshuai Kou, Neng Gao and Yifei Zhang. Variational Autoencoder with Stochastic Masks to Solve Exposure Bias in Recommendation (S) (pdf, ppt)
173 Fengyong Peng, Xi Wu, Yongxin Zhao and Yongjian Li. Anaphora Ambiguity Detection Method Based on Cross-domain Pronoun Substitution (S) (pdf, ppt)
179 Zhe Wen, Yatao Qi, Huan Liu, Zheng Lin and Weiping Wang. Multi-source Machine Reading Comprehension with Meta-Learning and Adaptive Adversarial Training (pdf, ppt)
158 Tong Zhang, Ailing Tang and Rong Yan. Enhanced BERT with Graph and Topic Information for Short Text Classification (S) (pdf, ppt)
201 Xi Tao, Hao Wang, Xiangfeng Luo and Pinpin Zhu. Few-Shot Link Prediction using Variational Heterogeneous Attention Networks (pdf, ppt)
062 Xingchen Ding, Chong Teng, Donghong Ji and Fei Li. HGAPT: Heterogeneous Graph Augmented Prompt Tuning for Low-Resource Fake News Detection (pdf, ppt)
230 Yunlai Luo. Token-level Input Grammar Synthesis (P) (pdf, ppt)

July 10 CVA: Computer Vision and Applications (Chair: Kamran Sartipi)

042 Puhui Qu, Keyu Chen and En Cheng. YOLOv7-marine: An Improved YOLOv7 Model for Object Detection in Marine Environments (S) (pdf, ppt)
137 Yuheng He, Wenbin Yang, Xiangfeng Luo, Liyan Ma and Shaorong Xie. Object-Level Contrast Learning for 3D Sparse Object Detection in Ocean Scene (pdf, ppt)
129 Qiaoning Lei, Yinsai Guo, Liyan Ma and Xiangfeng Luo. Few-Shot Object Detection via Instance-wise and Prototypical Contrastive Learning (pdf, ppt)
134 Jiyun Li, Sheng Yang and Qian Chen. SWS-NET: An Image Segmentation Framework For Chronic Wounds Based On Self-Supervised Learning (pdf, ppt)
114 Shouhong Wan, Rui Wang, Peiquan Jin and Xuebin Yang. BDC-FR: Faster R-CNN with Balanced Domain Classifier for Cross-Domain Object Detection (S) (pdf, ppt)
169 Luo Yang and Lin Rongheng. MBR-MDA: Multi-person Behavior Recognition Method Based on Multi Descriptors Aggregations (pdf, ppt)