Trustworthy and synergistic artificial intelligence for software engineering: Vision and roadmaps

D Lo - 2023 IEEE/ACM International Conference on Software …, 2023 - ieeexplore.ieee.org
For decades, much software engineering research has been dedicated to devising
automated solutions aimed at enhancing developer productivity and elevating software …

[HTML][HTML] The current research status of AI-based network security situational awareness

M Wang, G Song, Y Yu, B Zhang - Electronics, 2023 - mdpi.com
Network security situational awareness is based on the extraction and analysis of big data,
and by understanding these data to evaluate the current network security status and predict …

[HTML][HTML] Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based …

S Hussain, M Nadeem, J Baber, M Hamdi, A Rajab… - Scientific Reports, 2024 - nature.com
Software vulnerabilities pose a significant threat to system security, necessitating effective
automatic detection methods. Current techniques face challenges such as dependency …

[HTML][HTML] Assessment of Software Vulnerability Contributing Factors by Model-Agnostic Explainable AI

D Li, Y Liu, J Huang - Machine Learning and Knowledge Extraction, 2024 - mdpi.com
Software vulnerability detection aims to proactively reduce the risk to software security and
reliability. Despite advancements in deep-learning-based detection, a semantic gap still …

Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code

GA McCully, JD Hastings, S Xu, A Fortier - arXiv preprint arXiv:2405.20611, 2024 - arxiv.org
Detecting vulnerabilities within compiled binaries is challenging due to lost high-level code
structures and other factors such as architectural dependencies, compilers, and optimization …

CSGraph2Vec: A Distributed Representation Learning Approach for Assembly Functions

W Alhashemi - 2023 - escholarship.mcgill.ca
Software reverse engineering is an essential yet time-consuming undertaking in the
identification of malware, software vulnerabilities, and plagiarism, especially when access to …

[引用][C] Shumaila Hussain, Muhammad Nadeem 3, Junaid Baber 2, 4, Mohammed Hamdi 5

A Rajab, MS Al Reshan, A Shaikh - Scientific Reports, 2024