Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey
Software security vulnerabilities are one of the critical issues in the realm of computer
security. Due to their potential high severity impacts, many different approaches have been …
security. Due to their potential high severity impacts, many different approaches have been …
Deep knowledge tracing
Abstract Knowledge tracing, where a machine models the knowledge of a student as they
interact with coursework, is an established and significantly unsolved problem in computer …
interact with coursework, is an established and significantly unsolved problem in computer …
Software vulnerability detection using deep neural networks: a survey
The constantly increasing number of disclosed security vulnerabilities have become an
important concern in the software industry and in the field of cybersecurity, suggesting that …
important concern in the software industry and in the field of cybersecurity, suggesting that …
Deep code search
To implement a program functionality, developers can reuse previously written code
snippets by searching through a large-scale codebase. Over the years, many code search …
snippets by searching through a large-scale codebase. Over the years, many code search …
Coconut: combining context-aware neural translation models using ensemble for program repair
Automated generate-and-validate (GV) program repair techniques (APR) typically rely on
hard-coded rules, thus only fixing bugs following specific fix patterns. These rules require a …
hard-coded rules, thus only fixing bugs following specific fix patterns. These rules require a …
Convolutional neural networks over tree structures for programming language processing
Programming language processing (similar to natural language processing) is a hot
research topic in the field of software engineering; it has also aroused growing interest in the …
research topic in the field of software engineering; it has also aroused growing interest in the …
A survey on the evolution of fileless attacks and detection techniques
S Liu, G Peng, H Zeng, J Fu - Computers & Security, 2024 - Elsevier
Fileless attacks have gained significant prominence and have become the prevailing type of
attack in recent years. The exceptional level of stealthiness and difficulty in detection …
attack in recent years. The exceptional level of stealthiness and difficulty in detection …
Cyber resilience in healthcare digital twin on lung cancer
As a key service of the future 6G network, healthcare digital twin is the virtual replica of a
person, which employs Internet of Things (IoT) technologies and AI-powered models to …
person, which employs Internet of Things (IoT) technologies and AI-powered models to …
Neural detection of semantic code clones via tree-based convolution
Code clones are similar code fragments that share the same semantics but may differ
syntactically to various degrees. Detecting code clones helps reduce the cost of software …
syntactically to various degrees. Detecting code clones helps reduce the cost of software …
Checking smart contracts with structural code embedding
Smart contracts have been increasingly used together with blockchains to automate
financial and business transactions. However, many bugs and vulnerabilities have been …
financial and business transactions. However, many bugs and vulnerabilities have been …