A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks

B Casey, J Santos, G Perry - arxiv preprint arxiv:2403.10646, 2024 - arxiv.org
Machine learning techniques for cybersecurity-related software engineering tasks are
becoming increasingly popular. The representation of source code is a key portion of the …

ERFS: Efficient Feature Graph Representation for Intrusion Detection based on Flow Semantic Association

Y Luo, M He, X Wang - IEEE Transactions on Cognitive …, 2025 - ieeexplore.ieee.org
The detection of network threats remains a fundamental task in cyberspace defense. Graphs
are capable of capturing rich structural information and retaining content information. They …

Apicom: Automatic api completion via prompt learning and adversarial training-based data augmentation

Y Gu, Y Shen, X Chen, S Yang, Y Huang… - Proceedings of the 14th …, 2023 - dl.acm.org
Based on developer needs and usage scenarios, API (Application Programming Interface)
recommendation is the process of assisting developers in finding the required API among …

Interactive Cycle Model: The Linkage Combination among Automatic Speech Recognition, Large Language Models and Smart Glasses

L Wang - arxiv preprint arxiv:2411.10362, 2024 - arxiv.org
This research proposes the interaction loop model" ASR-LLMs-Smart Glasses", which model
combines automatic speech recognition, large language model and smart glasses to …

[CITA][C] Automating Data Preprocessing for Reliable Predictive Modeling

N Ramaraj, T Anil, G Murugan, R Arjun