Trustworthy and synergistic artificial intelligence for software engineering: Vision and roadmaps
D Lo - 2023 IEEE/ACM International Conference on Software …, 2023 - ieeexplore.ieee.org
For decades, much software engineering research has been dedicated to devising
automated solutions aimed at enhancing developer productivity and elevating software …
automated solutions aimed at enhancing developer productivity and elevating software …
[HTML][HTML] The current research status of AI-based network security situational awareness
M Wang, G Song, Y Yu, B Zhang - Electronics, 2023 - mdpi.com
Network security situational awareness is based on the extraction and analysis of big data,
and by understanding these data to evaluate the current network security status and predict …
and by understanding these data to evaluate the current network security status and predict …
[HTML][HTML] Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based …
Software vulnerabilities pose a significant threat to system security, necessitating effective
automatic detection methods. Current techniques face challenges such as dependency …
automatic detection methods. Current techniques face challenges such as dependency …
[HTML][HTML] Assessment of Software Vulnerability Contributing Factors by Model-Agnostic Explainable AI
D Li, Y Liu, J Huang - Machine Learning and Knowledge Extraction, 2024 - mdpi.com
Software vulnerability detection aims to proactively reduce the risk to software security and
reliability. Despite advancements in deep-learning-based detection, a semantic gap still …
reliability. Despite advancements in deep-learning-based detection, a semantic gap still …
Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code
GA McCully, JD Hastings, S Xu, A Fortier - arXiv preprint arXiv:2405.20611, 2024 - arxiv.org
Detecting vulnerabilities within compiled binaries is challenging due to lost high-level code
structures and other factors such as architectural dependencies, compilers, and optimization …
structures and other factors such as architectural dependencies, compilers, and optimization …
CSGraph2Vec: A Distributed Representation Learning Approach for Assembly Functions
W Alhashemi - 2023 - escholarship.mcgill.ca
Software reverse engineering is an essential yet time-consuming undertaking in the
identification of malware, software vulnerabilities, and plagiarism, especially when access to …
identification of malware, software vulnerabilities, and plagiarism, especially when access to …