How to keep text private? A systematic review of deep learning methods for privacy-preserving natural language processing

S Sousa, R Kern - Artificial Intelligence Review, 2023‏ - Springer
Deep learning (DL) models for natural language processing (NLP) tasks often handle
private data, demanding protection against breaches and disclosures. Data protection laws …

Dos and don'ts of machine learning in computer security

D Arp, E Quiring, F Pendlebury, A Warnecke… - 31st USENIX Security …, 2022‏ - usenix.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

A survey on machine learning techniques for source code analysis

T Sharma, M Kechagia, S Georgiou, R Tiwari… - arxiv preprint arxiv …, 2021‏ - arxiv.org
The advancements in machine learning techniques have encouraged researchers to apply
these techniques to a myriad of software engineering tasks that use source code analysis …

AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors

M Abuhamad, T Abuhmed, D Mohaisen… - IEEE Internet of …, 2020‏ - ieeexplore.ieee.org
Smartphones have become crucial for our daily life activities and are increasingly loaded
with our personal information to perform several sensitive tasks, including, mobile banking …

Analyzing and detecting emerging Internet of Things malware: A graph-based approach

H Alasmary, A Khormali, A Anwar, J Park… - IEEE Internet of …, 2019‏ - ieeexplore.ieee.org
The steady growth in the number of deployed Internet of Things (IoT) devices has been
paralleled with an equal growth in the number of malicious software (malware) targeting …

Authorship Attribution Methods, Challenges, and Future Research Directions: A Comprehensive Survey

X He, AH Lashkari, N Vombatkere, DP Sharma - Information, 2024‏ - mdpi.com
Over the past few decades, researchers have put their effort and paid significant attention to
the authorship attribution field, as it plays an important role in software forensics analysis …

Misleading authorship attribution of source code using adversarial learning

E Quiring, A Maier, K Rieck - 28th USENIX Security Symposium …, 2019‏ - usenix.org
In this paper, we present a novel attack against authorship attribution of source code. We
exploit that recent attribution methods rest on machine learning and thus can be deceived by …

[PDF][PDF] Unifying the perspectives of nlp and software engineering: A survey on language models for code

Z Zhang, C Chen, B Liu, C Liao, Z Gong… - arxiv preprint arxiv …, 2023‏ - simg.baai.ac.cn
In this work we systematically review the recent advancements in code processing with
language models, covering 50+ models, 30+ evaluation tasks, 170+ datasets, and 700 …

Assessing the generalizability of code2vec token embeddings

HJ Kang, TF Bissyandé, D Lo - 2019 34th IEEE/ACM …, 2019‏ - ieeexplore.ieee.org
Many Natural Language Processing (NLP) tasks, such as sentiment analysis or syntactic
parsing, have benefited from the development of word embedding models. In particular …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023‏ - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …