As the boom of mobile devices,Android mobile apps play an irreplaceable roles in people’s daily life,which have the characteristics of frequent updates involving in many code commits to meet new ***-in-Time(JIT)defec...
详细信息
As the boom of mobile devices,Android mobile apps play an irreplaceable roles in people’s daily life,which have the characteristics of frequent updates involving in many code commits to meet new ***-in-Time(JIT)defect prediction aims to identify whether the commit instances will bring defects into the new release of apps and provides immediate feedback to developers,which is more suitable to mobile *** the within-app defect prediction needs sufficient historical data to label the commit instances,which is inadequate in practice,one alternative method is to use the cross-project *** this work,we propose a novel method,called KAL,for cross-project JIT defect prediction task in the context of Android mobile *** specifically,KAL first transforms the commit instances into a high-dimensional feature space using kernel-based principal component analysis technique to obtain the representative ***,the adversarial learning technique is used to extract the common feature embedding for the model *** conduct experiments on 14 Android mobile apps and employ four effort-aware indicators for performance *** results on 182 cross-project pairs demonstrate that our proposed KAL method obtains better performance than 20 comparative methods.
Large-scale tabular data classification is a critical task and the complexity arises from the vast amount of structured data generated in these fields, coupled with the challenges of high dimensionality and limited sa...
详细信息
Genetic programming hyperheuristic (GPHH) has recently become a promising methodology for large-scale dynamic path planning (LDPP) since it can produce reusable heuristics rather than disposable solutions. However, in...
详细信息
Nowadays online news websites are one of the quickest ways to get information. However, the credibility of news from these sources is sometimes questioned. One common problem with online news is the prevalence of clic...
详细信息
Nowadays online news websites are one of the quickest ways to get information. However, the credibility of news from these sources is sometimes questioned. One common problem with online news is the prevalence of clickbait. Clickbait uses exaggerated headlines to lure people to click the suspected link, but the content often disappoints the reader and degrades user experience it may also hamper public emotions. The proposed work aims to examine diverse set of models for clickbait detection. The models are formed by integration of Machine learning (ML) and Ensemble learning methods (EL) with Term Frequency and Inverse Document Frequency (TF-IDF) & Embedding technique. Five ML and three EL are analysed &compared. Random Forest along with TF-IDF gave the best results of 85%. The resultant model shows significant improvements with a minimal false-positives.
In this era of big data, a lot of data is produced in various forms every second through various sources. Text data is one of those types that is produced mainly through social media like Twitter, Facebook, YouTube co...
详细信息
Background: Software vulnerabilities are flaws in application source code that can be exploited to cause harm, hence companies must devise strategies to manage ***: We want to understand how software vulnerabilities a...
详细信息
Mental disorders are a prevalent issue among teenagers. The widespread use of smartphones and social media has revolutionized the way individuals communicate and exchange information with millions of people using thes...
详细信息
Crowdsourcing has become a popular paradigm for collecting large-scale labeled datasets by leveraging numerous annotators. However, these annotators often provide noisy labels due to varying expertise. Truth inference...
详细信息
Offline Signature Authentication is a critical task in the field of document authentication, and its accuracy is essential for ensuring security while transactions. This research proposes two approaches: Initially Pre...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral *** characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in ***,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate ***,we review the literature on the use of AI in physiological characteristics recognition pub-lished after *** use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their *** also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.
暂无评论