A comparative study of class rebalancing methods for security bug report classification

W Zheng, Y Xun, X Wu, Z Deng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Identifying security bug reports (SBRs) accurately from a bug repository can reduce a
software product's security risk. However, the class imbalance problem exists for SBR …

Gang of eight: A defect taxonomy for infrastructure as code scripts

A Rahman, E Farhana, C Parnin… - Proceedings of the ACM …, 2020 - dl.acm.org
Defects in infrastructure as code (IaC) scripts can have serious consequences, for example,
creating large-scale system outages. A taxonomy of IaC defects can be useful for …

The impact factors on the performance of machine learning-based vulnerability detection: A comparative study

W Zheng, J Gao, X Wu, F Liu, Y Xun, G Liu… - Journal of Systems and …, 2020 - Elsevier
Abstract Machine learning-based Vulnerability detection is an active research topic in
software security. Different traditional machine learning-based and deep learning-based …

Tandem: A taxonomy and a dataset of real-world performance bugs

AB Sánchez, P Delgado-Pérez, I Medina-Bulo… - IEEE …, 2020 - ieeexplore.ieee.org
The detection of performance bugs, like those causing an unexpected execution time, has
gained much attention in the last years due to their potential impact in safety-critical and …

Deep learning-based software bug classification

JP Meher, S Biswas, R Mall - Information and Software Technology, 2024 - Elsevier
Context: Accurate classification of bugs can help accelerate the bug triage process, code
inspection, and repair activities. In this context, many machine learning techniques have …

CVE-assisted large-scale security bug report dataset construction method

X Wu, W Zheng, X Chen, F Wang, D Mu - Journal of Systems and Software, 2020 - Elsevier
Identifying SBRs (security bug reports) is crucial for eliminating security issues during
software development. Machine learning are promising ways for SBR prediction. However …

State reconciliation defects in infrastructure as code

MM Hassan, J Salvador, SKK Santu… - Proceedings of the ACM …, 2024 - dl.acm.org
In infrastructure as code (IaC), state reconciliation is the process of querying and comparing
the infrastructure state prior to changing the infrastructure. As state reconciliation is pivotal to …

Duplicate bug report detection using named entity recognition

W Zheng, Y Li, X Wu, J Cheng - Knowledge-Based Systems, 2024 - Elsevier
Software bugs pose significant challenges in management. The Bug Tracking System (BTS)
serves as a standard platform to chronicle, oversee, and manage bugs throughout software …

[HTML][HTML] Run-time failure detection via non-intrusive event analysis in a large-scale cloud computing platform

D Cotroneo, L De Simone, P Liguori… - Journal of Systems and …, 2023 - Elsevier
Cloud computing systems fail in complex and unforeseen ways due to unexpected
combinations of events and interactions among hardware and software components. These …

An empirical study on cross-component dependent changes: A case study on the components of OpenStack

A Arabat, M Sayagh - Empirical Software Engineering, 2024 - Springer
Modern software systems are composed of several loosely coupled components. Typical
examples of such systems are plugin-based systems, microservices, and modular software …