The role of cyber security in facing risks and damages is an essential task. The aim of study is first to the effect of a sabotage sample in security on the power market, this is the unavailability of the production o...
详细信息
software Defect Prediction (SDP) employs resources to identify defects and improve quality. This study investigates machinelearning (ML) techniques in SDP and associated performance measures. Three research questions...
详细信息
A code smell is a measurable indicator that highlights significant issues in the software development process caused by inadequate programming practices. These are usually introduced in a software program during the d...
详细信息
Non-Functional Requirements (NFR) are a set of quality attributes that software must have, such as security, reliability, and performance. Extracting NFR from software requirement specifications can help developers de...
详细信息
Heartbeats can be recorded in the form of electrical signals using a machine called an electrocardiogram. The cardiovascular system's performance can be tracked using an electrocardiogram (ECG), which can also be ...
详细信息
software bugs cost the global economy billions of dollars each year and take up approximate to 50% of the development time. Once a bug is reported, the assigned developer attempts to identify and understand the source...
详细信息
ISBN:
(纸本)9798350327830
software bugs cost the global economy billions of dollars each year and take up approximate to 50% of the development time. Once a bug is reported, the assigned developer attempts to identify and understand the source code responsible for the bug and then corrects the code. Over the last five decades, there has been significant research on automatically finding or correcting software bugs. However, there has been little research on automatically explaining the bugs to the developers, which is essential but a highly challenging task. In this paper, we propose Bugsplainer, a novel web-based debugging solution that generates natural language explanations for software bugs by learning from a large corpus of bug-fix commits. Bugsplainer leverages code structures to reason about a bug and employs the fine-tuned version of a text generation model - CodeT5 - to generate the explanations. Tool video: https://***/xga-ScvULpk
Support Vector machine (SVM) is a most widely used classification technique in machinelearning as it gives a better accuracy than most of the existing techniques. These days, users frequently run across glitches and ...
详细信息
The Internet of Vehicles (IoV) has replaced vehicular networks as the preferred paradigm as a result of the enormous expansion in computer and network capabilities. Because of the dynamic IoV's diverse nature nece...
详细信息
Federated learning is a machinelearning methodology that emphasizes data privacy, involving minimal interaction with each other's systems, primarily exchanging model parameters. However, this approach can introdu...
详细信息
ISBN:
(纸本)9798350339826
Federated learning is a machinelearning methodology that emphasizes data privacy, involving minimal interaction with each other's systems, primarily exchanging model parameters. However, this approach can introduce challenges in system development and operation because it inherently faces statistical and system heterogeneity issues. The diverse data storage formats and system environments across clients limit the feasibility of training with a uniform code. To distribute a new code to each environment, active participation of Federated learning collaborators is necessary, incurring time and cost. Moreover, it impedes adopting modern automated development and deployment paradigms such as DevOps or MLOps. This study investigates how Large Language Models (LLMs) can automatically tailor a single code to individual client environments in heterogeneous scenarios without human intervention. Moreover, to enable the automatic adaptation of the deployed code for conducting new experiments within the system, it is imperative to assess the presence of potentially malicious code that could jeopardize data security. To address this challenge, we introduce a novel prompt engineering technique to enhance LLMs' detection capabilities, thereby bolstering our ability to detect malicious code effectively.
The rapid development of deep learning has significantly transformed the ecology of the softwareengineering field. As new data continues to grow and evolve at an explosive rate, the challenge of iteratively updating ...
详细信息
ISBN:
(纸本)9798350329964
The rapid development of deep learning has significantly transformed the ecology of the softwareengineering field. As new data continues to grow and evolve at an explosive rate, the challenge of iteratively updating software built on neural networks has become a critical issue. While the continuous learning paradigm enables networks to incorporate new data and update accordingly without losing previous memories, resulting in a batch of new networks as candidates for software updating, these approaches merely select from these networks by empirically testing their accuracy;they lack formal guarantees for such a batch of networks, especially in the presence of adversarial samples. Existing verification techniques, based on constraint solving, interval propagation, and linear approximation, provide formal guarantees but are designed to verify the properties of individual networks rather than a batch of networks. To address this issue, we analyze the batch verification problem corresponding to several non-traditional machinelearning paradigms and further propose a framework named HOBAT (BATch verification for HOmogeneous structural neural networks) to enhance batch verification under reasonable assumptions about the representation of homogeneous structure neural networks, increasing scalability in practical applications. Our method involves abstracting the neurons at the same position in a batch of networks into a single neuron, followed by an iterative refinement process on the abstracted neuron to restore the precision until the desired properties for verification are met. Our method is orthogonal to boundary propagation verification on a single neural network. To assess our methodology, we integrate it with boundary propagation verification and observe significant improvements compared to the vanilla approach. Our experiments demonstrate the enormous potential for verifying large batches of networks in the era of big data.
暂无评论