Alzheimer's disease (AD) is a widespread neurolog-ical condition affecting millions globally. It gradually advances, leading to memory loss, cognitive deterioration, and a substantial decline in overall quality of...
详细信息
Twitter is one of Indonesia's most widely used social media to express positive and negative emotions. Negative emotions are referred to as emotional reactivity, an example of which is depression. To detect emotio...
详细信息
Open Government data (OGD) refers to the provision of data produced by the government to the general public, in a format that is readily readable and can be used by machines with ease. It can also promote transparency...
详细信息
A fundamental issue with machine learning is that the training data must contain sufficient examples of every data pattern of interest for the essentially statistical techniques of machine learning to derive a model t...
详细信息
This paper studies the fixed-time consensus tracking problem of nonlinear multi-agent systems, where communication links are subjected to denial-of-service (DoS) attacks. The DoS attacks make the communication network...
详细信息
Appropriate selection of search operators plays a critical role in meta-heuristic algorithm design. Adaptive selection of suitable operators to the characteristics of different optimization stages is an important task...
详细信息
Spatial transcriptomics (ST) offers insights into gene expression patterns within tumor microenvironments, but its widespread application is impeded by cost constraints. To address this, predicting ST from Histology e...
详细信息
Wireless sensor networks have great potential for use in flood control, weather forecasting systems, the military, and the healthcare industry. A WSN's nodes are connected to one another and share information. Whe...
详细信息
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities a...
详细信息
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities at a single granularity (i.e., slice-level or function-level). In practice, slice-level vulnerability detection is fine-grained but may contain incomplete vulnerability details. Function-level vulnerability detection includes full vulnerability semantics but may contain vulnerability-unrelated statements. Meanwhile, they pay more attention to predicting whether the source code is vulnerable and cannot pinpoint which statements are more likely to be vulnerable. In this paper, we design mVulPreter, a multi-granularity vulnerability detector that can provide interpretations of detection results. Specifically, we propose a novel technique to effectively blend the advantages of function-level and slice-level vulnerability detection models and output the detection results' interpretation only by the model itself. We evaluate mVulPreter on a dataset containing 5,310 vulnerable functions and 7,601 non-vulnerable functions. The experimental results indicate that mVulPreter outperforms existing state-of-the-art vulnerability detection approaches (i.e., Checkmarx, FlawFinder, RATS, TokenCNN, StatementLSTM, SySeVR, and Devign). IEEE
Mobile prices play a pivotal role in determining their popularity amongst consumers and their competitive standing within the market. As customers consider their budget while evaluating a mobile phone's specificat...
详细信息
暂无评论