This research tackles the challenge of detecting hate speech and offensive content in political discussions on social media. By employing natural language processing (NLP) techniques, the study aims to contribute to c...
详细信息
Estimation of classification evaluation metrics for small sample classification data is one of the most challenging task in Machine Learning model building process. The value of an evaluation metric based on the test ...
详细信息
The interest in machine learning (ML) research and its potential applications in many fields has also led to several studies on its use in Indian Regional Navigation Satellite Systems (IRNSS). The traditional IRNSS su...
详细信息
Traditional Neural Networks can solve problems with normal 1-dimensional and 2-dimensional Euclidean data such as image and text classification. However, most real-life problems are relationship-based and the correspo...
详细信息
This paper introduces the Indexed Quad-Tree Summary (IQTS) algorithm, along with its concepts, models, and 'philosophy'. IQTS allows us to compress multidimensional OLAP views derived from big OLAP data cubes ...
详细信息
Recent advancements in generative AI technology have made it possible to generate art pieces for traditional Korean painting as well. Visual image generation through generative AI can occur autonomously as well as thr...
详细信息
Smart contracts are self-executing programs on blockchains that manage complex business logic with transparency and ***,their immutability after deployment makes programming errors particularly critical,as such errors...
详细信息
Smart contracts are self-executing programs on blockchains that manage complex business logic with transparency and ***,their immutability after deployment makes programming errors particularly critical,as such errors can be exploited to compromise blockchain *** vulnerability detection methods often rely on fixed rules or target specific vulnerabilities,limiting their scalability and adaptability to diverse smart contract ***,natural language processing approaches for source code analysis frequently fail to capture program flow,which is essential for identifying structural *** address these limitations,we propose a novel model that integrates textual and structural information for smart contract vulnerability *** approach employs the CodeBERT NLP model for textual analysis,augmented with structural insights derived from control flow graphs created using the abstract syntax tree and opcode of smart *** graph node is embedded using Sent2Vec,and centrality analysis is applied to highlight critical paths and nodes within the *** extracted features are normalized and combined into a prompt for a large language model to detect vulnerabilities *** results demonstrate the superiority of our model,achieving an accuracy of 86.70%,a recall of 84.87%,a precision of 85.24%,and an F1-score of 84.46%.These outcomes surpass existing methods,including CodeBERT alone(accuracy:81.26%,F1-score:79.84%)and CodeBERT combined with abstract syntax tree analysis(accuracy:83.48%,F1-score:79.65%).The findings underscore the effectiveness of incorporating graph structural information alongside text-based analysis,offering improved scalability and performance in detecting diverse vulnerabilities.
Automated Algorithm Configuration (AAC) usually takes a global perspective: it identifies a parameter configuration for an (optimization) algorithm that maximizes a performance metric over a set of instances. However,...
详细信息
暂无评论