Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Machine/deep learning for software engineering: A systematic literature review
Since 2009, the deep learning revolution, which was triggered by the introduction of
ImageNet, has stimulated the synergy between Software Engineering (SE) and Machine …
ImageNet, has stimulated the synergy between Software Engineering (SE) and Machine …
Data preparation for software vulnerability prediction: A systematic literature review
R Croft, Y **: Artificial intelligence techniques in software engineering
Artificial Intelligence (AI) has become a core feature of today's real-world applications,
making it a trending topic within the software engineering (SE) community. The rise in the …
making it a trending topic within the software engineering (SE) community. The rise in the …
Automatic Data Labeling for Software Vulnerability Prediction Models: How Far Are We?
Background: Software Vulnerability (SV) prediction needs large-sized and high-quality data
to perform well. Current SV datasets mostly require expensive labeling efforts by experts …
to perform well. Current SV datasets mostly require expensive labeling efforts by experts …
A multiclass hybrid approach to estimating software vulnerability vectors and severity score
Classifying detected software vulnerabilities is an important process. However, the metric
values of security vectors are manually determined by humans, which takes time and may …
values of security vectors are manually determined by humans, which takes time and may …
Learning from what we know: How to perform vulnerability prediction using noisy historical data
Vulnerability prediction refers to the problem of identifying system components that are most
likely to be vulnerable. Typically, this problem is tackled by training binary classifiers on …
likely to be vulnerable. Typically, this problem is tackled by training binary classifiers on …
Early and Realistic Exploitability Prediction of Just-Disclosed Software Vulnerabilities: How Reliable Can It Be?
With the rate of discovered and disclosed vulnerabilities escalating, researchers have been
experimenting with machine learning to predict whether a vulnerability will be exploited …
experimenting with machine learning to predict whether a vulnerability will be exploited …
Leveraging developer information for efficient effort-aware bug prediction
Context: Software bug prediction techniques can provide informative guidance in software
engineering practices. Over the past 15 years, developer information has been intensively …
engineering practices. Over the past 15 years, developer information has been intensively …
Estimating vulnerability metrics with word embedding and multiclass classification methods
Cyber security has an increasing importance since the day when information technologies
are an invariable part of modern human life. One of the fundamental areas of cyber security …
are an invariable part of modern human life. One of the fundamental areas of cyber security …