Zobrazeno 1 - 10
of 343
pro vyhledávání: '"Fung, Benjamin"'
Software vulnerabilities are a challenge in cybersecurity. Manual security patches are often difficult and slow to be deployed, while new vulnerabilities are created. Binary code vulnerability detection is less studied and more complex compared to so
Externí odkaz:
http://arxiv.org/abs/2404.08562
For a state or non-state actor whose credibility is bankrupt, relying on bots to conduct non-attributable, non-accountable, and seemingly-grassroots-but-decentralized-in-actuality influence/information operations (info ops) on social media can help c
Externí odkaz:
http://arxiv.org/abs/2402.01905
The practice of code reuse is crucial in software development for a faster and more efficient development lifecycle. In reality, however, code reuse practices lack proper control, resulting in issues such as vulnerability propagation and intellectual
Externí odkaz:
http://arxiv.org/abs/2307.10631
Deep learning models have achieved state-of-the-art performance in many classification tasks. However, most of them cannot provide an interpretation for their classification results. Machine learning models that are interpretable are usually linear o
Externí odkaz:
http://arxiv.org/abs/2111.02303
Publikováno v:
In Expert Systems With Applications 1 December 2024 255 Part C
Publikováno v:
In Knowledge-Based Systems 7 June 2024 293
Publikováno v:
In Journal of Energy Storage 15 May 2024 87
Authorship attribution is the problem of identifying the most plausible author of an anonymous text from a set of candidate authors. Researchers have investigated same-topic and cross-topic scenarios of authorship attribution, which differ according
Externí odkaz:
http://arxiv.org/abs/2104.08530
Non-negative tensor factorization has been shown a practical solution to automatically discover phenotypes from the electronic health records (EHR) with minimal human supervision. Such methods generally require an input tensor describing the inter-mo
Externí odkaz:
http://arxiv.org/abs/2011.06301