Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

2022

Discipline
Keyword
Publication
Publication Type

Articles 31 - 60 of 488

Full-Text Articles in Physical Sciences and Mathematics

Understanding Sentiment Through Context, Richard M.Crowley, M.H. Franco Wong Dec 2022

Understanding Sentiment Through Context, Richard M.Crowley, M.H. Franco Wong

Research Collection School Of Accountancy

We examine whether empirical results using text-based sentiment of U.S. annual reports depend on the underlying context, within documents, from which sentiment is measured. We construct a clause-level measure of context, showing that sentiment is driven by many different contexts and that positive and negative sentiment are driven by different contexts. We then construct context-level sentiment measures and examine whether sentiment works as expected at the context-level across four prediction problems. Our results demonstrate that document-level sentiment exhibits significant noise in prediction and suggest that document-level aggregation of sentiment leads to missed empirical nuances. The contexts driving sentiment results vary …


The Effectiveness Of Using Python Programming Approach In Teaching Ffnancial Analytics, Clarence Goh, Yuanto Kusnadi, Gary Pan Dec 2022

The Effectiveness Of Using Python Programming Approach In Teaching Ffnancial Analytics, Clarence Goh, Yuanto Kusnadi, Gary Pan

Research Collection School Of Accountancy

This study presents a learning method and challenges regarding implementing a Python programming approach in teaching financial analytics to graduate accounting students. The advent of Big Data, as well as related applications and technologies, has significantly changed the process and practice of accounting. This has led to essential changes in the construction and teaching content of accounting education. While there have been several studies examining how data analytics is embedded in the accounting curriculum, the majority of the teaching cases in accounting focus on analysis and communication with Excel as the principal tool, with very few covering the necessary steps …


Segment-Wise Time-Varying Dynamic Bayesian Network With Graph Regularization, Xing Yang, Chen Zhang, Baihua Zheng Dec 2022

Segment-Wise Time-Varying Dynamic Bayesian Network With Graph Regularization, Xing Yang, Chen Zhang, Baihua Zheng

Research Collection School Of Computing and Information Systems

Time-varying dynamic Bayesian network (TVDBN) is essential for describing time-evolving directed conditional dependence structures in complex multivariate systems. In this article, we construct a TVDBN model, together with a score-based method for its structure learning. The model adopts a vector autoregressive (VAR) model to describe inter-slice and intra-slice relations between variables. By allowing VAR parameters to change segment-wisely over time, the time-varying dynamics of the network structure can be described. Furthermore, considering some external information can provide additional similarity information of variables. Graph Laplacian is further imposed to regularize similar nodes to have similar network structures. The regularized maximum a …


Conversation Disentanglement With Bi-Level Contrastive Learning, Chengyu Huang, Zheng Zhang, Hao Fei, Lizi Liao Dec 2022

Conversation Disentanglement With Bi-Level Contrastive Learning, Chengyu Huang, Zheng Zhang, Hao Fei, Lizi Liao

Research Collection School Of Computing and Information Systems

Conversation disentanglement aims to group utterances into detached sessions, which is a fundamental task in processing multi-party conversations. Existing methods have two main drawbacks. First, they overemphasize pairwise utterance relations but pay inadequate attention to the utterance-to-context relation modeling. Second, a huge amount of human annotated data is required for training, which is expensive to obtain in practice. To address these issues, we propose a general disentangle model based on bi-level contrastive learning. It brings closer utterances in the same session while encourages each utterance to be near its clustered session prototypes in the representation space. Unlike existing approaches, our …


A Unified Dialogue User Simulator For Few-Shot Data Augmentation, Dazhen Wan, Zheng Zhang, Qi Zhu, Lizi Liao, Minlie Huang Dec 2022

A Unified Dialogue User Simulator For Few-Shot Data Augmentation, Dazhen Wan, Zheng Zhang, Qi Zhu, Lizi Liao, Minlie Huang

Research Collection School Of Computing and Information Systems

Pre-trained language models have shown superior performance in task-oriented dialogues. However, existing datasets are on limited scales, which cannot support large-scale pre-training. Fortunately, various data augmentation methods have been developed to augment largescale task-oriented dialogue corpora. However, they heavily rely on annotated data in the target domain, which require a tremendous amount of data collection and human labeling work. In this paper, we build a unified dialogue user simulation model by pre-training on several publicly available datasets. The model can then be tuned on a target domain with fewshot data. The experiments on a target dataset across multiple domains show …


Learning Generalizable Models For Vehicle Routing Problems Via Knowledge Distillation, Jieyi Bi, Yining Ma, Jiahai Wang, Zhiguang Cao, Jinbiao Chen, Yuan Sun, Yeow Meng Chee Dec 2022

Learning Generalizable Models For Vehicle Routing Problems Via Knowledge Distillation, Jieyi Bi, Yining Ma, Jiahai Wang, Zhiguang Cao, Jinbiao Chen, Yuan Sun, Yeow Meng Chee

Research Collection School Of Computing and Information Systems

Recent neural methods for vehicle routing problems always train and test the deep models on the same instance distribution (i.e., uniform). To tackle the consequent cross-distribution generalization concerns, we bring the knowledge distillation to this field and propose an Adaptive Multi-Distribution Knowledge Distillation (AMDKD) scheme for learning more generalizable deep models. Particularly, our AMDKD leverages various knowledge from multiple teachers trained on exemplar distributions to yield a light-weight yet generalist student model. Meanwhile, we equip AMDKD with an adaptive strategy that allows the student to concentrate on difficult distributions, so as to absorb hard-to-master knowledge more effectively. Extensive experimental results …


Gamified Online Industry Learning Platform For Teaching Of Foundational Computing Skills, Yi Meng Lau, Rafael Jose Barros Barrios, Gottipati Swapna, Kyong Jin Shim Dec 2022

Gamified Online Industry Learning Platform For Teaching Of Foundational Computing Skills, Yi Meng Lau, Rafael Jose Barros Barrios, Gottipati Swapna, Kyong Jin Shim

Research Collection School Of Computing and Information Systems

Online industry learning platforms are widely used by organizations for employee training and upskilling. Courses or lessons offered by these platforms can be generic or specific to an enterprise application. The increased demand of new hires to learn these platforms or who are already certified in some of these courses has led universities to look at the opportunities for integrating online industry learning platforms into their curricula. Universities hope to use these platforms to aid students in their learning of concepts and theories. At the same time, these platforms can equip students with industryrecognized certifications or digital badges. This paper …


Authentic Assessments For Digital Education: Learning Technologies Shaping Assessment Practices, Tristan Lim, Swapna Gottipati, Michelle L. F. Cheong Dec 2022

Authentic Assessments For Digital Education: Learning Technologies Shaping Assessment Practices, Tristan Lim, Swapna Gottipati, Michelle L. F. Cheong

Research Collection School Of Computing and Information Systems

Assessment is a powerful lever that affects learning. To better inform educators on authentic assessment practices within digital education in the higher education landscape, this paper takes us through a meta-analysis of existing literature between 2011 to 2021. The study evaluates the following research question: “How are emerging technologies shaping authentic assessment practices within digital education for higher education for the period between 2011 and 2023”. To aid with the forecasting, we utilize the EDUCAUSE Horizon Reports, which provide the predictions of emerging technology. This study affirms the importance of immersive learning technologies, followed by ubiquitous and adaptive learning technologies …


Forks Over Knives: Predictive Inconsistency In Criminal Justice Algorithmic Risk Assessment Tools, Travis Greene, Galit Shmueli, Jan Fell, Ching-Fu Lin, Han-Wei Liu Dec 2022

Forks Over Knives: Predictive Inconsistency In Criminal Justice Algorithmic Risk Assessment Tools, Travis Greene, Galit Shmueli, Jan Fell, Ching-Fu Lin, Han-Wei Liu

Research Collection Yong Pung How School Of Law

Big data and algorithmic risk prediction tools promise to improve criminal justice systems by reducing human biases and inconsistencies in decision-making. Yet different, equally justifiable choices when developing, testing and deploying these socio-technical tools can lead to disparate predicted risk scores for the same individual. Synthesising diverse perspectives from machine learning, statistics, sociology, criminology, law, philosophy and economics, we conceptualise this phenomenon as predictive inconsistency. We describe sources of predictive inconsistency at different stages of algorithmic risk assessment tool development and deployment and consider how future technological developments may amplify predictive inconsistency. We argue, however, that in a diverse and …


Aspect Sentiment Triplet Extraction Incorporating Syntactic Constituency Parsing Tree And Commonsense Knowledge Graph, Zhenda Hu, Zhaoxia Wang, Yinglin Wang, Ah-Hwee Tan Dec 2022

Aspect Sentiment Triplet Extraction Incorporating Syntactic Constituency Parsing Tree And Commonsense Knowledge Graph, Zhenda Hu, Zhaoxia Wang, Yinglin Wang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

The aspect sentiment triplet extraction (ASTE) task aims to extract the target term and the opinion term, and simultaneously identify the sentiment polarity of target-opinion pairs from the given sentences. While syntactic constituency information and commonsense knowledge are both important and valuable for the ASTE task, only a few studies have explored how to integrate them via flexible graph convolutional networks (GCNs) for this task. To address this gap, this paper proposes a novel end-to-end model, namely GCN-EGTS, which is an enhanced Grid Tagging Scheme (GTS) for ASTE leveraging syntactic constituency parsing tree and a commonsense knowledge graph based on …


A Recommendation On How To Teach K-Means In Introductory Analytics Courses, Manoj Thulasidas Dec 2022

A Recommendation On How To Teach K-Means In Introductory Analytics Courses, Manoj Thulasidas

Research Collection School Of Computing and Information Systems

We teach K-Means clustering in introductory data analytics courses because it is one of the simplest and most widely used unsupervised machine learning algorithms. However, one drawback of this algorithm is that it does not offer a clear method to determine the appropriate number of clusters; it does not have a built-in mechanism for K selection. What is usually taught as the solution for the K Selection problem is the so-called elbow method, where we look at the incremental changes in some quality metric (usually, the sum of squared errors, SSE), trying to find a sudden change. In addition to …


Bank Error In Whose Favor? A Case Study Of Decentralized Finance Misgovernance, Ping Fan Ke, Ka Chung Boris Ng Dec 2022

Bank Error In Whose Favor? A Case Study Of Decentralized Finance Misgovernance, Ping Fan Ke, Ka Chung Boris Ng

Research Collection School Of Computing and Information Systems

Decentralized Finance (DeFi) emerged rapidly in recent years and provided open and transparent financial services to the public. Due to its popularity, it is not uncommon to see cybersecurity incidents in the DeFi landscape, yet the impact of such incidents is under-studied. In this paper, we examine two incidents in DeFi protocol that are mainly caused by misgovernance and mistake in the smart contract. By using the synthetic control method, we found that the incident in Alchemix did not have a significant effect on the total value locked (TVL) in the protocol, whereas the incident in Compound caused a 6.13% …


Forest Structure And Composition Alleviate Human Thermal Stress, Loïc Gillerot, Dries Landuyt, Rachel Oh, Winston T. L. Chow, Et Al Dec 2022

Forest Structure And Composition Alleviate Human Thermal Stress, Loïc Gillerot, Dries Landuyt, Rachel Oh, Winston T. L. Chow, Et Al

Research Collection College of Integrative Studies

Current climate change aggravates human health hazards posed by heat stress. Forests can locally mitigate this by acting as strong thermal buffers, yet potential mediation by forest ecological characteristics remains underexplored. We report over 14 months of hourly microclimate data from 131 forest plots across four European countries and compare these to open-field controls using physiologically equivalent temperature (PET) to reflect human thermal perception. Forests slightly tempered cold extremes, but the strongest buffering occurred under very hot conditions (PET >35°C), where forests reduced strong to extreme heat stress day occurrence by 84.1%. Mature forests cooled the microclimate by 12.1 to …


Differentiated Security Architecture For Secure And Efficient Infotainment Data Communication In Iov Networks, Jiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang, Dusit Niyato, Kwok-Yan Lam Dec 2022

Differentiated Security Architecture For Secure And Efficient Infotainment Data Communication In Iov Networks, Jiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang, Dusit Niyato, Kwok-Yan Lam

Research Collection School Of Computing and Information Systems

This paper aims to provide differentiated security protection for infotainment data commu- nication in Internet-of-Vehicle (IoV) networks. The IoV is a network of vehicles that uses various sensors, software, built-in hardware, and communication technologies to enable information exchange between pedestrians, cars, and urban infrastructure. Negligence on the security of infotainment data commu- nication in IoV networks can unintentionally open an easy access point for social engineering attacks. The attacker can spread false information about traffic conditions, mislead drivers in their directions, and interfere with traffic management. Such attacks can also cause distractions to the driver, which has a potential implication …


Vr Computing Lab: An Immersive Classroom For Computing Learning, Shawn Pang, Kyong Jin Shim, Yi Meng Lau, Swapna Gottipati Dec 2022

Vr Computing Lab: An Immersive Classroom For Computing Learning, Shawn Pang, Kyong Jin Shim, Yi Meng Lau, Swapna Gottipati

Research Collection School Of Computing and Information Systems

In recent years, virtual reality (VR) is gaining popularity amongst educators and learners. If a picture is worth a thousand words, a VR session is worth a trillion words. VR technology completely immerses users with an experience that transports them into a simulated world. Universities across the United States, United Kingdom, and other countries have already started using VR for higher education in areas such as medicine, business, architecture, vocational training, social work, virtual field trips, virtual campuses, helping students with special needs, and many more. In this paper, we propose a novel VR platform learning framework which maps elements …


Autonomous Vehicle Innovation And Implications On Adoption, Liability And Policy, Using Quantum Technologies And Artificial Wisdom, Chia Jie Jun Jeremy Nov 2022

Autonomous Vehicle Innovation And Implications On Adoption, Liability And Policy, Using Quantum Technologies And Artificial Wisdom, Chia Jie Jun Jeremy

Dissertations and Theses Collection (Open Access)

This paper will explore the use of two new innovations for the issues facing autonomous vehicles (AV), those of quantum technologies and artificial wisdom. The issue of delayed at-scale commercialization and adoption of autonomous vehicles due to the extensive dynamic capability required to derive an optimal process solution for any complex, dynamic and adaptive autonomous vehicle ecosystem is shown to be resolved by the use of these innovations, will be shown to be more widely applicable for other issues for AV and for any scenario where automated decision making is required.

QC might open up the door for the application …


Continual Learning With Neural Networks, Pham Hong Quang Nov 2022

Continual Learning With Neural Networks, Pham Hong Quang

Dissertations and Theses Collection (Open Access)

Recent years have witnessed tremendous successes of artificial neural networks in many applications, ranging from visual perception to language understanding. However, such achievements have been mostly demonstrated on a large amount of labeled data that is static throughout learning. In contrast, real-world environments are always evolving, where new patterns emerge and the older ones become inactive before reappearing in the future. In this respect, continual learning aims to achieve a higher level of intelligence by learning online on a data stream of several tasks. As it turns out, neural networks are not equipped to learn continually: they lack the ability …


Reinforcement Learning Approach To Coordinate Real-World Multi-Agent Dynamic Routing And Scheduling, Joe Waldy Nov 2022

Reinforcement Learning Approach To Coordinate Real-World Multi-Agent Dynamic Routing And Scheduling, Joe Waldy

Dissertations and Theses Collection (Open Access)

In this thesis, we study new variants of routing and scheduling problems motivated by real-world problems from the urban logistics and law enforcement domains. In particular, we focus on two key aspects: dynamic and multi-agent. While routing problems such as the Vehicle Routing Problem (VRP) is well-studied in the Operations Research (OR) community, we know that in real-world route planning today, initially-planned route plans and schedules may be disrupted by dynamically-occurring events. In addition, routing and scheduling plans cannot be done in silos due to the presence of other agents which may be independent and self-interested. These requirements create …


Photovoltaic Cells For Energy Harvesting And Indoor Positioning, Hamada Rizk, Dong Ma, Mahbub Hassan, Moustafa Youssef Nov 2022

Photovoltaic Cells For Energy Harvesting And Indoor Positioning, Hamada Rizk, Dong Ma, Mahbub Hassan, Moustafa Youssef

Research Collection School Of Computing and Information Systems

We propose SoLoc, a lightweight probabilistic fingerprinting-based technique for energy-free device-free indoor localization. The system harnesses photovoltaic currents harvested by the photovoltaic cells in smart environments for simultaneously powering digital devices and user positioning. The basic principle is that the location of the human interferes with the lighting received by the photovoltaic cells, thus producing a location fingerprint on the generated photocurrents. To ensure resilience to noisy measurements, SoLoc constructs probability distributions as a photovoltaic fingerprint at each location. Then, we employ a probabilistic graphical model for estimating the user location in the continuous space. Results show that SoLoc can …


Adaptive Fairness Improvement Based Causality Analysis, Mengdi Zhang, Jun Sun Nov 2022

Adaptive Fairness Improvement Based Causality Analysis, Mengdi Zhang, Jun Sun

Research Collection School Of Computing and Information Systems

Given a discriminating neural network, the problem of fairness improvement is to systematically reduce discrimination without significantly scarifies its performance (i.e., accuracy). Multiple categories of fairness improving methods have been proposed for neural networks, including pre-processing, in-processing and postprocessing. Our empirical study however shows that these methods are not always effective (e.g., they may improve fairness by paying the price of huge accuracy drop) or even not helpful (e.g., they may even worsen both fairness and accuracy). In this work, we propose an approach which adaptively chooses the fairness improving method based on causality analysis. That is, we choose the …


Towards Automated Safety Vetting Of Smart Contracts In Decentralized Applications, Yue Duan, Xin Zhao, Yu Pan, Shucheng Li, Minghao Li, Fengyuan Xu, Mu Zhang Nov 2022

Towards Automated Safety Vetting Of Smart Contracts In Decentralized Applications, Yue Duan, Xin Zhao, Yu Pan, Shucheng Li, Minghao Li, Fengyuan Xu, Mu Zhang

Research Collection School Of Computing and Information Systems

We propose VetSC, a novel UI-driven, program analysis guided model checking technique that can automatically extract contract semantics in DApps so as to enable targeted safety vetting. To facilitate model checking, we extract business model graphs from contract code that capture its intrinsic business and safety logic. To automatically determine what safety specifications to check, we retrieve textual semantics from DApp user interfaces. To exclude untrusted UI text, we also validate the UI-logic consistency and detect any discrepancies. We have implemented VetSC and applied it to 34 real-world DApps. Experiments have demonstrated that VetSC can accurately interpret smart contract code, …


Daot: Domain-Agnostically Aligned Optimal Transport For Domain-Adaptive Crowd Counting, Huilin Zhu, Jingling Yuan, Xian Zhong, Zhengwei Yang, Zheng Wang, Shengfeng He Nov 2022

Daot: Domain-Agnostically Aligned Optimal Transport For Domain-Adaptive Crowd Counting, Huilin Zhu, Jingling Yuan, Xian Zhong, Zhengwei Yang, Zheng Wang, Shengfeng He

Research Collection School Of Computing and Information Systems

Domain adaptation is commonly employed in crowd counting to bridge the domain gaps between different datasets. However, existing domain adaptation methods tend to focus on inter-dataset differences while overlooking the intra-differences within the same dataset, leading to additional learning ambiguities. These domain-agnostic factors,e.g., density, surveillance perspective, and scale, can cause significant in-domain variations, and the misalignment of these factors across domains can lead to a drop in performance in cross-domain crowd counting. To address this issue, we propose a Domain-agnostically Aligned Optimal Transport (DAOT) strategy that aligns domain-agnostic factors between domains. The DAOT consists of three steps. First, individual-level differences …


Towards Automated Safety Vetting Of Smart Contracts In Decentralized Applications, Yue Duan, Xin Zhao, Yu Pan, Shucheng Li, Minghao Li, Fengyuan Xu, Mu Zhang Nov 2022

Towards Automated Safety Vetting Of Smart Contracts In Decentralized Applications, Yue Duan, Xin Zhao, Yu Pan, Shucheng Li, Minghao Li, Fengyuan Xu, Mu Zhang

Research Collection School Of Computing and Information Systems

We propose VetSC, a novel UI-driven, program analysis guided model checking technique that can automatically extract contract semantics in DApps so as to enable targeted safety vetting. To facilitate model checking, we extract business model graphs from contract code that capture its intrinsic business and safety logic. To automatically determine what safety specifications to check, we retrieve textual semantics from DApp user interfaces. To exclude untrusted UI text, we also validate the UI-logic consistency and detect any discrepancies. We have implemented VetSC and applied it to 34 real-world DApps. Experiments have demonstrated that VetSC can accurately interpret smart contract code, …


An Empirical Study Of Blockchain System Vulnerabilities: Modules, Types, And Patterns, Xiao Yi, Daoyuan Wu, Lingxiao Jiang, Yuzhou Fang, Kehuan Zhang, Wei Zhang Nov 2022

An Empirical Study Of Blockchain System Vulnerabilities: Modules, Types, And Patterns, Xiao Yi, Daoyuan Wu, Lingxiao Jiang, Yuzhou Fang, Kehuan Zhang, Wei Zhang

Research Collection School Of Computing and Information Systems

Blockchain, as a distributed ledger technology, becomes increasingly popular, especially for enabling valuable cryptocurrencies and smart contracts. However, the blockchain software systems inevitably have many bugs. Although bugs in smart contracts have been extensively investigated, security bugs of the underlying blockchain systems are much less explored. In this paper, we conduct an empirical study on blockchain’s system vulnerabilities from four representative blockchains, Bitcoin, Ethereum, Monero, and Stellar. Specifically, we first design a systematic filtering process to effectively identify 1,037 vulnerabilities and their 2,317 patches from 34,245 issues/PRs (pull requests) and 85,164 commits on GitHub. We thus build the first blockchain …


Recipegen++: An Automated Trigger Action Programs Generator, Imam Nur Bani Yusuf, Diyanah Abdul Jamal, Lingxiao Jiang, David Lo Nov 2022

Recipegen++: An Automated Trigger Action Programs Generator, Imam Nur Bani Yusuf, Diyanah Abdul Jamal, Lingxiao Jiang, David Lo

Research Collection School Of Computing and Information Systems

Trigger Action Programs (TAPs) are event-driven rules that allow users to automate smart-devices and internet services. Users can write TAPs by specifying triggers and actions from a set of predefined channels and functions. Despite its simplicity, composing TAPs can still be challenging for users due to the enormous search space of available triggers and actions. The growing popularity of TAPs is followed by the increasing number of supported devices and services, resulting in a huge number of possible combinations between triggers and actions. Motivated by such a fact, we improve our prior work and propose RecipeGen++, a deep-learning-based approach that …


Mando-Guru: Vulnerability Detection For Smart Contract Source Code By Heterogeneous Graph Embeddings, Huu Hoang Nguyen, Nhat Minh Nguyen, Hong-Phuc Doan, Zahrai Ahmadi, Thanh Nam Doan, Lingxiao Jiang Nov 2022

Mando-Guru: Vulnerability Detection For Smart Contract Source Code By Heterogeneous Graph Embeddings, Huu Hoang Nguyen, Nhat Minh Nguyen, Hong-Phuc Doan, Zahrai Ahmadi, Thanh Nam Doan, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

Smart contracts are increasingly used with blockchain systems for high-value applications. It is highly desired to ensure the quality of smart contract source code before they are deployed. This paper proposes a new deep learning-based tool, MANDO-GURU, that aims to accurately detect vulnerabilities in smart contracts at both coarse-grained contract-level and fine-grained line-level. Using a combination of control-flow graphs and call graphs of Solidity code, we design new heterogeneous graph attention neural networks to encode more structural and potentially semantic relations among different types of nodes and edges of such graphs and use the encoded embeddings of the graphs and …


Vulcurator: A Vulnerability-Fixing Commit Detector, Truong Giang Nguyen, Cong Thanh Le, Hong Jin Kang, Xuan-Bach D. Le, David Lo Nov 2022

Vulcurator: A Vulnerability-Fixing Commit Detector, Truong Giang Nguyen, Cong Thanh Le, Hong Jin Kang, Xuan-Bach D. Le, David Lo

Research Collection School Of Computing and Information Systems

Open-source software (OSS) vulnerability management process is important nowadays, as the number of discovered OSS vulnerabilities is increasing over time. Monitoring vulnerability-fixing commits is a part of the standard process to prevent vulnerability exploitation. Manually detecting vulnerability-fixing commits is, however, time-consuming due to the possibly large number of commits to review. Recently, many techniques have been proposed to automatically detect vulnerability-fixing commits using machine learning. These solutions either: (1) did not use deep learning, or (2) use deep learning on only limited sources of information. This paper proposes VulCurator, a tool that leverages deep learning on richer sources of information, …


Autopruner: Transformer-Based Call Graph Pruning, Cong Thanh Le, Hong Jin Kang, Truong Giang Nguyen, Stefanus Agus Haryono, David Lo, Xuan-Bach D. Le, Huynh Quyet Thang Nov 2022

Autopruner: Transformer-Based Call Graph Pruning, Cong Thanh Le, Hong Jin Kang, Truong Giang Nguyen, Stefanus Agus Haryono, David Lo, Xuan-Bach D. Le, Huynh Quyet Thang

Research Collection School Of Computing and Information Systems

Constructing a static call graph requires trade-offs between soundness and precision. Program analysis techniques for constructing call graphs are unfortunately usually imprecise. To address this problem, researchers have recently proposed call graph pruning empowered by machine learning to post-process call graphs constructed by static analysis. A machine learning model is built to capture information from the call graph by extracting structural features for use in a random forest classifier. It then removes edges that are predicted to be false positives. Despite the improvements shown by machine learning models, they are still limited as they do not consider the source code …


Artificial Intelligence For Natural Disaster Management, Guansong Pang Nov 2022

Artificial Intelligence For Natural Disaster Management, Guansong Pang

Research Collection School Of Computing and Information Systems

Artificial intelligence (AI) can leverage massive amount of diverse types of data, such as geospatial data, social media data, and wireless network sensor data, to enhance our understanding of natural disasters, their forecasting and detection, and humanitarian assistance in natural disaster management (NDM). Due to this potential, different communities have been dedicating enormous efforts to the development and/or adoption of AI technologies for NDM. This article provides an overview of these efforts and discusses major challenges and opportunities in this topic.


Investigating Bloom's Cognitive Skills In Foundation And Advanced Programming Courses From Students' Discussions, Joel Jer Wei Lim, Gottipati Swapna, Kyong Jin Shim Nov 2022

Investigating Bloom's Cognitive Skills In Foundation And Advanced Programming Courses From Students' Discussions, Joel Jer Wei Lim, Gottipati Swapna, Kyong Jin Shim

Research Collection School Of Computing and Information Systems

Programming courses provide students with the skills to develop complex business applications. Teaching and learning programming is challenging, and collaborative learning is proposed to help with this challenge. Online discussion forums promote networking with other learners such that they can build knowledge collaboratively. It aids students open their horizons of thought processes to acquire cognitive skills. Cognitive analysis of discussion is critical to understand students' learning process. In this paper, we propose Bloom's taxonomy based cognitive model for programming discussion forums. We present machine learning (ML) based solution to extract students' cognitive skills. Our evaluations on compupting courses show that …