Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey

SM Ghaffarian, HR Shahriari - ACM computing surveys (CSUR), 2017 - dl.acm.org
Software security vulnerabilities are one of the critical issues in the realm of computer
security. Due to their potential high severity impacts, many different approaches have been …

Deep knowledge tracing

C Piech, J Bassen, J Huang… - Advances in neural …, 2015 - proceedings.neurips.cc
Abstract Knowledge tracing, where a machine models the knowledge of a student as they
interact with coursework, is an established and significantly unsolved problem in computer …

Software vulnerability detection using deep neural networks: a survey

G Lin, S Wen, QL Han, J Zhang… - Proceedings of the …, 2020 - ieeexplore.ieee.org
The constantly increasing number of disclosed security vulnerabilities have become an
important concern in the software industry and in the field of cybersecurity, suggesting that …

Deep code search

X Gu, H Zhang, S Kim - … of the 40th International Conference on …, 2018 - dl.acm.org
To implement a program functionality, developers can reuse previously written code
snippets by searching through a large-scale codebase. Over the years, many code search …

Coconut: combining context-aware neural translation models using ensemble for program repair

T Lutellier, HV Pham, L Pang, Y Li, M Wei… - Proceedings of the 29th …, 2020 - dl.acm.org
Automated generate-and-validate (GV) program repair techniques (APR) typically rely on
hard-coded rules, thus only fixing bugs following specific fix patterns. These rules require a …

Convolutional neural networks over tree structures for programming language processing

L Mou, G Li, L Zhang, T Wang, Z ** - Proceedings of the AAAI …, 2016 - ojs.aaai.org
Programming language processing (similar to natural language processing) is a hot
research topic in the field of software engineering; it has also aroused growing interest in the …

A survey on the evolution of fileless attacks and detection techniques

S Liu, G Peng, H Zeng, J Fu - Computers & Security, 2024 - Elsevier
Fileless attacks have gained significant prominence and have become the prevailing type of
attack in recent years. The exceptional level of stealthiness and difficulty in detection …

Cyber resilience in healthcare digital twin on lung cancer

J Zhang, L Li, G Lin, D Fang, Y Tai, J Huang - IEEE access, 2020 - ieeexplore.ieee.org
As a key service of the future 6G network, healthcare digital twin is the virtual replica of a
person, which employs Internet of Things (IoT) technologies and AI-powered models to …

Neural detection of semantic code clones via tree-based convolution

H Yu, W Lam, L Chen, G Li, T **e… - 2019 IEEE/ACM 27th …, 2019 - ieeexplore.ieee.org
Code clones are similar code fragments that share the same semantics but may differ
syntactically to various degrees. Detecting code clones helps reduce the cost of software …

Checking smart contracts with structural code embedding

Z Gao, L Jiang, X **a, D Lo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Smart contracts have been increasingly used together with blockchains to automate
financial and business transactions. However, many bugs and vulnerabilities have been …