{"id":"https://openalex.org/W7123335554","doi":"https://doi.org/10.1109/dsa66321.2025.00026","title":"Incremental Dataflow Anomaly Detection During Deletion Activities","display_name":"Incremental Dataflow Anomaly Detection During Deletion Activities","publication_year":2025,"publication_date":"2025-11-24","ids":{"openalex":"https://openalex.org/W7123335554","doi":"https://doi.org/10.1109/dsa66321.2025.00026"},"language":null,"primary_location":{"id":"doi:10.1109/dsa66321.2025.00026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsa66321.2025.00026","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 12th International Conference on Dependable Systems and Their Applications (DSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114444236","display_name":"Koko Harianto","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Koko Harianto","raw_affiliation_strings":["Electrical Engineering and Computer Science, National Yang Ming Chiao Tung University,Hsinchu,Taiwan"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering and Computer Science, National Yang Ming Chiao Tung University,Hsinchu,Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086935910","display_name":"Feng-Jian Wang","orcid":"https://orcid.org/0000-0001-8725-2195"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Feng-Jian Wang","raw_affiliation_strings":["National Yang Ming Chiao Tung University,Department of Computer Science,Hsinchu,Taiwan"],"affiliations":[{"raw_affiliation_string":"National Yang Ming Chiao Tung University,Department of Computer Science,Hsinchu,Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103171273","display_name":"Pei-Shu Huang","orcid":"https://orcid.org/0000-0002-0130-0553"},"institutions":[{"id":"https://openalex.org/I143545923","display_name":"Central Police University","ror":"https://ror.org/03xms6995","country_code":"TW","type":"education","lineage":["https://openalex.org/I143545923"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Pei-Shu Huang","raw_affiliation_strings":["Central Police University,Department of Special Police,Taoyuan,Taiwan"],"affiliations":[{"raw_affiliation_string":"Central Police University,Department of Special Police,Taoyuan,Taiwan","institution_ids":["https://openalex.org/I143545923"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122894302","display_name":"Zisen Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I143545923","display_name":"Central Police University","ror":"https://ror.org/03xms6995","country_code":"TW","type":"education","lineage":["https://openalex.org/I143545923"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Zisen Zhou","raw_affiliation_strings":["Central Police University,Department of Special Police,Taoyuan,Taiwan"],"affiliations":[{"raw_affiliation_string":"Central Police University,Department of Special Police,Taoyuan,Taiwan","institution_ids":["https://openalex.org/I143545923"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019477840","display_name":"H. Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I153648349","display_name":"University of Leicester","ror":"https://ror.org/04h699437","country_code":"GB","type":"education","lineage":["https://openalex.org/I153648349"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Hongji Yang","raw_affiliation_strings":["School of Computing and Mathematical Sciences, University of Leicester,Leicester,United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing and Mathematical Sciences, University of Leicester,Leicester,United Kingdom","institution_ids":["https://openalex.org/I153648349"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5114444236"],"corresponding_institution_ids":["https://openalex.org/I148366613"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.82782862,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"01","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.8202999830245972,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.8202999830245972,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.06210000067949295,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.02889999933540821,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dataflow","display_name":"Dataflow","score":0.9592000246047974},{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.8603000044822693},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6583999991416931},{"id":"https://openalex.org/keywords/iterative-and-incremental-development","display_name":"Iterative and incremental development","score":0.6146000027656555},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5782999992370605},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5677000284194946},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5425999760627747},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.5099999904632568}],"concepts":[{"id":"https://openalex.org/C96324660","wikidata":"https://www.wikidata.org/wiki/Q205446","display_name":"Dataflow","level":2,"score":0.9592000246047974},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.8603000044822693},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7943000197410583},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6583999991416931},{"id":"https://openalex.org/C143587482","wikidata":"https://www.wikidata.org/wiki/Q1543216","display_name":"Iterative and incremental development","level":2,"score":0.6146000027656555},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5782999992370605},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5677000284194946},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5425999760627747},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.5099999904632568},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4950000047683716},{"id":"https://openalex.org/C176727019","wikidata":"https://www.wikidata.org/wiki/Q1172415","display_name":"Dataflow architecture","level":3,"score":0.48730000853538513},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.4790000021457672},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.47099998593330383},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.42890000343322754},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4007999897003174},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36340001225471497},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3612000048160553},{"id":"https://openalex.org/C182365436","wikidata":"https://www.wikidata.org/wiki/Q50701","display_name":"Variable (mathematics)","level":2,"score":0.35749998688697815},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.35339999198913574},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3425000011920929},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.3361999988555908},{"id":"https://openalex.org/C88468194","wikidata":"https://www.wikidata.org/wiki/Q1172416","display_name":"Data-flow analysis","level":3,"score":0.3208000063896179},{"id":"https://openalex.org/C136388014","wikidata":"https://www.wikidata.org/wiki/Q17084976","display_name":"Algorithmic program debugging","level":3,"score":0.3025999963283539},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.27459999918937683},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.27140000462532043}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsa66321.2025.00026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsa66321.2025.00026","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 12th International Conference on Dependable Systems and Their Applications (DSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Code":[0],"editing":[1],"in":[2],"software":[3],"development":[4],"environments":[5],"(SDEs)":[6],"involves":[7],"iterative":[8],"insertions,":[9],"deletions,":[10],"and":[11,84,118,141],"combinations,":[12],"forming":[13],"incremental":[14,28,55],"development.":[15,29],"Incremental":[16],"dataflow":[17,25,46,56],"anomaly":[18,57],"detection":[19],"is":[20],"a":[21,44,53,60,66,73,80,104,111,115],"process":[22],"to":[23],"detect":[24],"anomalies":[26,91],"during":[27],"AI":[30],"assistance,":[31],"especially":[32],"large":[33],"language":[34],"models":[35],"(LLMs),":[36],"can":[37],"propose":[38],"these":[39],"edits":[40],"but":[41],"often":[42],"lacks":[43],"localized":[45,67],"view":[47],"for":[48,69],"deletions.":[49],"This":[50],"paper":[51],"presents":[52],"deletion-aware":[54],"detector":[58],"on":[59,72,126],"TTA":[61],"Graph.":[62],"We":[63,122],"introduce":[64],"DF_three,":[65],"relation":[68],"each":[70],"operation":[71],"variable.":[74],"A":[75],"running":[76],"example":[77],"shows":[78],"that":[79,107,143],"single":[81],"deletion":[82,144],"updates":[83],"analyzes":[85],"only":[86],"the":[87,101],"affected_DF_three":[88],"while":[89],"revealing":[90],"such":[92],"as":[93],"Write-Write":[94],"anomaly.":[95],"For":[96],"practice,":[97],"we":[98],"discuss":[99],"integrating":[100],"function":[102],"into":[103],"debugging":[105],"tool":[106],"provides":[108],"three":[109],"views:":[110],"brief":[112],"pre-deletion":[113],"preview,":[114],"virtual":[116],"result,":[117],"an":[119],"after-deletion":[120],"summary.":[121],"further":[123],"demonstrate":[124],"feasibility":[125],"real":[127],"code":[128],"by":[129],"analyzing":[130],"TinyExpr":[131],"(tinyexpr.c),":[132],"extracting":[133],"489":[134],"operations":[135],"across":[136],"<tex":[137],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[138],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$100+$</tex>":[139],"variables":[140],"confirming":[142],"effects":[145],"are":[146],"reported":[147],"without":[148],"full":[149],"reanalysis.":[150]},"counts_by_year":[],"updated_date":"2026-02-23T20:09:44.859080","created_date":"2026-01-14T00:00:00"}
