Reinforcement learning has been successfully applied in various fields, such as games and robots. However, there are still some issues in the traditional reinforcement learning paradigm that involves one agent per env...
详细信息
This study presents the design, implementation, and evaluation of a Decision Support System (DSS) developed for Collective Building Management. Given the potential advantages of machinelearning techniques in this dom...
详细信息
The proceedings contain 72 papers. The topics discussed include: construction and application of knowledge graph for food therapy;determining the most significant metadata features to indicate defective software commi...
ISBN:
(纸本)9798350345889
The proceedings contain 72 papers. The topics discussed include: construction and application of knowledge graph for food therapy;determining the most significant metadata features to indicate defective software commits;documentation practices in agile software development: a systematic literature review;rule-based representation learning for traditional Chinese medicine knowledge graph;experimental evaluation of adversarial attacks against natural language machinelearning models;mobile user analysis considering collaboration with financial services;commit message can help: security patch detection in open source software via transformer;texture and orientation-based feature extraction for robust facial expression recognition;scientific organization of blood donation camp through lexicographic optimization and taxicab path computation;research and application of content-based image hash retrieval algorithm;and cloud-based digital twins storage in emergency healthcare.
The package recommendation has always been an important issue in the marketing of mobile operators, and machinelearning provides a new solution for operators. Aiming at the problem that too many training times of dir...
详细信息
The use of learning-based techniques to achieve automated software vulnerability detection has been of long-standing interest within the software security domain. These data-driven solutions are enabled by large softw...
详细信息
ISBN:
(纸本)9781665457019
The use of learning-based techniques to achieve automated software vulnerability detection has been of long-standing interest within the software security domain. These data-driven solutions are enabled by large software vulnerability datasets used for training and benchmarking. However, we observe that the quality of the data powering these solutions is currently ill-considered, hindering the reliability and value of produced outcomes. Whilst awareness of software vulnerability data preparation challenges is growing, there has been little investigation into the potential negative impacts of software vulnerability data quality. For instance, we lack confirmation that vulnerability labels are correct or consistent. Our study seeks to address such shortcomings by inspecting five inherent data quality attributes for four state-of-the-art software vulnerability datasets and the subsequent impacts that issues can have on software vulnerability prediction models. Surprisingly, we found that all the analyzed datasets exhibit some data quality problems. In particular, we found 20-71% of vulnerability labels to be inaccurate in real-world datasets, and 17-99% of data points were duplicated. We observed that these issues could cause significant impacts on downstream models, either preventing effective model training or inflating benchmark performance. We advocate for the need to overcome such challenges. Our findings will enable better consideration and assessment of software vulnerability data quality in the future.
The field of natural language processing (NLP), which aims to represent and analyze human language digitally, has recently attracted much interest. machinelearning has found several uses, including translation, spam ...
详细信息
machine translation software has been widely adopted in recent years. The recent advance in deep learning research has massively improved the accuracy and fluency of the translated output. However, incorrect translati...
详细信息
ISBN:
(纸本)9798350338126
machine translation software has been widely adopted in recent years. The recent advance in deep learning research has massively improved the accuracy and fluency of the translated output. However, incorrect translations may still occur, which causes misunderstandings, and even more detrimental consequences when applying these systems for crucial applications, such as translating legal and medical documents. This calls for methods that can test the correctness of machine translation software efficiently and effectively. In this paper, we propose a method that uses back-translation as a reference for machine translation testing, minimizing the knowledge and use of the NLP tools in the target language so that the same workflow can be applied to test systems translating English to multiple languages. We build a metamorphic testing method using our proposed concept called contextual referentially transparent input (CRTI). A CRTI is a piece of text that should have a similar meaning under a certain context in any given language. Our method detects inconsistency between a CRTI in the original sentence and the back-translation to report translation errors. To evaluate our method, we translate 200 sentences using Google Translate. Our method reports 57 suspicious issues with a precision of 74% in Chinese translation and 22 suspicious issues with a precision of 82% in Vietnamese translation.
software companies strive to create software projects of superior quality by leveraging the most optimal global resources at the most competitive cost. We implemented a methodology to attain global software developmen...
详细信息
Reliability engineering is distinguished from other fields by its focus on software. Models that forecast when things will go wrong are used to evaluate the reliability of a piece of software. Real-world issues might ...
详细信息
software vulnerabilities are prevalent in software systems and the unresolved vulnerable code may cause system failures or serious data breaches. To enhance security and prevent potential cyberattacks on software syst...
详细信息
ISBN:
(纸本)9798350322637
software vulnerabilities are prevalent in software systems and the unresolved vulnerable code may cause system failures or serious data breaches. To enhance security and prevent potential cyberattacks on software systems, it is critical to (1) early detect vulnerable code, (2) identify its vulnerability type, and (3) suggest corresponding repairs. Recently, deep learning-based approaches have been proposed to predict those tasks based on source code. In particular, software vulnerability prediction (SVP) detects vulnerable source code;software vulnerability classification (SVC) identifies vulnerability types to explain detected vulnerable programs;neural machine translation (NMT)-based automated vulnerability repair (AVR) generates patches to repair detected vulnerable programs. However, existing SVPs require much effort to inspect their coarse-grained predictions;SVCs encounter an unresolved data imbalance issue;AVRs are still inaccurate. I hypothesize that by addressing the limitations of existing SVPs, SVCs and AVRs, we can improve the accuracy and effectiveness of DL-based approaches for the aforementioned three prediction tasks. To test this hypothesis, I will propose (1) a finer-grained SVP approach that can point out vulnerabilities at the line level;(2) an SVC approach that mitigates the data imbalance issue;(3) NMT-based AVR approaches to address limitations of previous NMT-based approaches. Finally, I propose integrating these novel approaches into an open-source software security framework to promote the adoption of the DL-powered security tool in the industry.
暂无评论