An efficient and scalable platform for Java source code analysis using overlaid graph representations

O Rodriguez-Prieto, A Mycroft, F Ortin - IEEE Access, 2020 - ieeexplore.ieee.org
Although source code programs are commonly written as textual information, they enclose
syntactic and semantic information that is usually represented as graphs. This information is …

Heterogeneous tree structure classification to label Java programmers according to their expertise level

F Ortin, O Rodriguez-Prieto, N Pascual… - Future Generation …, 2020 - Elsevier
Open-source code repositories are a valuable asset to creating different kinds of tools and
services, utilizing machine learning and probabilistic reasoning. Syntactic models process …

[HTML][HTML] Analyzing syntactic constructs of Java programs with machine learning

F Ortin, G Facundo, M Garcia - Expert Systems with Applications, 2023 - Elsevier
The massive number of open-source projects in public repositories has notably increased in
the last years. Such repositories represent valuable information to be mined for different …

[HTML][HTML] Cnerator: A Python application for the controlled stochastic generation of standard C source code

F Ortin, J Escalada - SoftwareX, 2021 - Elsevier
Abstract The Big Code and Mining Software Repositories research lines analyze large
amounts of source code to improve software engineering practices. Massive codebases are …

Improving type information inferred by decompilers with supervised machine learning

J Escalada, T Scully, F Ortin - arXiv preprint arXiv:2101.08116, 2021 - arxiv.org
In software reverse engineering, decompilation is the process of recovering source code
from binary files. Decompilers are used when it is necessary to understand or analyze …

An efficient platform for the automatic extraction of patterns in native code

J Escalada, F Ortin, T Scully - Scientific Programming, 2017 - Wiley Online Library
Different software tools, such as decompilers, code quality analyzers, recognizers of packed
executable files, authorship analyzers, and malware detectors, search for patterns in binary …

KDPII: A New Korean Dialogic Dataset for the Deidentification of Personally Identifiable Information

L Fei, Y Kang, S Park, Y Jang, J Lee, H Kim - IEEE Access, 2024 - ieeexplore.ieee.org
The rapid growth of social media in the era of big data and artificial intelligence has raised
significant safety concerns related to the communication of sensitive personal information. In …

Next-Gen Software Engineering: AI-Assisted Big Models

IK Schieferdecker - arXiv preprint arXiv:2409.18048, 2024 - arxiv.org
The effectiveness of model-driven software engineering (MDSE) has been demonstrated in
the context of complex software; however, it has not been widely adopted due to the …

Mining common syntactic patterns used by Java programmers

A Losada, G Facundo, M Garcia… - IEEE Latin America …, 2022 - ieeexplore.ieee.org
Open source code repositories provide massive data as programs that have been used to
develop different tools. These kinds of works have been included in the active Big Code and …

Graft: Static analysis of java bytecode with graph databases

W Keirsgieter, W Visser - Conference of the South African Institute of …, 2020 - dl.acm.org
This paper proposes a static analysis tool for finding security vulnerabilities in Java
programs. Security vulnerabilities are an ever-present concern for developers and …