Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (129)
- Western University (13)
- Rochester Institute of Technology (10)
- City University of New York (CUNY) (8)
- Purdue University (7)
-
- California Polytechnic State University, San Luis Obispo (6)
- Kennesaw State University (5)
- University of Arkansas, Fayetteville (5)
- Air Force Institute of Technology (4)
- Louisiana State University (4)
- University of Massachusetts Amherst (4)
- Clemson University (3)
- Dakota State University (3)
- University of Nebraska - Lincoln (3)
- University of Tennessee, Knoxville (3)
- Bard College (2)
- California State University, San Bernardino (2)
- Loyola University Chicago (2)
- Old Dominion University (2)
- San Jose State University (2)
- United Arab Emirates University (2)
- University of Denver (2)
- University of Nevada, Las Vegas (2)
- Aga Khan University (1)
- Beirut Arab University (1)
- Belmont University (1)
- Bridgewater State University (1)
- Chapman University (1)
- Claremont Colleges (1)
- College of Saint Benedict and Saint John's University (1)
- Keyword
-
- Deep learning (12)
- Software (11)
- Software engineering (10)
- Machine Learning (9)
- Deep Learning (7)
-
- Machine learning (7)
- Software Engineering (7)
- Empirical software engineering (6)
- Stack Overflow (6)
- API (5)
- Virtual Reality (5)
- Empirical Study (4)
- Fault localization (4)
- GitHub (4)
- Vulnerability detection (4)
- Artificial Intelligence (3)
- Code search (3)
- Computer Science (3)
- Computer bugs (3)
- Empirical studies (3)
- Empirical study (3)
- Fault Localization (3)
- Information retrieval (3)
- Natural language processing (3)
- Neural networks (3)
- Optimization (3)
- Pre-trained models (3)
- Predictive models (3)
- Smart contracts (3)
- Software quality (3)
- Publication
-
- Research Collection School Of Computing and Information Systems (128)
- Theses and Dissertations (8)
- Electronic Thesis and Dissertation Repository (7)
- Frameless (7)
- Department of Electrical and Computer Engineering Faculty Publications (6)
-
- Master's Theses (5)
- Publications and Research (5)
- Articles (4)
- Electronic Theses and Dissertations (4)
- Symposium of Student Scholars (4)
- Computer Science and Computer Engineering Undergraduate Honors Theses (3)
- Doctoral Dissertations (3)
- Electrical and Computer Engineering Publications (3)
- Honors Theses (3)
- LSU Doctoral Dissertations (3)
- Masters Theses & Doctoral Dissertations (3)
- Publications (3)
- Undergraduate Student Research Internships Conference (3)
- All Theses (2)
- Computer Science: Faculty Publications and Other Works (2)
- Electronic Theses, Projects, and Dissertations (2)
- Open Educational Resources (2)
- Senior Projects Spring 2022 (2)
- All Dissertations (1)
- BAU Journal - Science and Technology (1)
- CMC Senior Theses (1)
- Chancellor’s Honors Program Projects (1)
- College of Engineering Faculty Research (1)
- Computational and Data Sciences (MS) Theses (1)
- Computer & Information Science: Research Experiences for Undergraduates in Disinformation Detection and Analytics (1)
- Publication Type
Articles 151 - 180 of 255
Full-Text Articles in Physical Sciences and Mathematics
Jet Of Blood Vr: First Playable Demo, Elizabeth Goins, Andy Head, Mason Hayes
Jet Of Blood Vr: First Playable Demo, Elizabeth Goins, Andy Head, Mason Hayes
Frameless
A VR staging of Anonin Artaud’s 1925 surrealist play, Jet of Blood. The project experiments with virtual reality as a means to reimagine performance and frame the player, the audience, as actor. Ideas from Artaud’s philosophy such as the Theatre of Cruelty are incorporated along with spatial storytelling and game design. The project also seeks to expand accessibility to deaf and hard of hearing audiences through use of particle and text effects to visually express audio and sound.
The Studio X Karp Library Fellows: Peer-To-Peer Xr Learning & Engagement, Ayiana Crabtree, Muhammed El-Sayed, Nefle N. Oruç
The Studio X Karp Library Fellows: Peer-To-Peer Xr Learning & Engagement, Ayiana Crabtree, Muhammed El-Sayed, Nefle N. Oruç
Frameless
No abstract provided.
Creating A Virtual Reality Experience In Service To A Non-Profit Agency, Frank Deese, Susan Lakin, Isabelle Anderson
Creating A Virtual Reality Experience In Service To A Non-Profit Agency, Frank Deese, Susan Lakin, Isabelle Anderson
Frameless
In the summer of 2018, RIT Professors Susan Lakin and Frank Deese discussed with the principal officers of the Society for the Protection and Care of Children (SPCC) in Rochester how the new technology of Virtual Reality might be used to not only impart information to viewers, but generate empathy for those receiving services from the organization as well as those performing those services. Their ultimate goal was to create an experience that could be viewed with VR headsets at fundraising events and on a website using low-cost Google Cardboard.
Machine Learning-Oriented Predictive Maintenance (Pdm) Framework For Autonomous Vehicles (Avs): Adopting Blockchain For Pdm Solution, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero
Machine Learning-Oriented Predictive Maintenance (Pdm) Framework For Autonomous Vehicles (Avs): Adopting Blockchain For Pdm Solution, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero
Symposium of Student Scholars
Autonomous Vehicles (AVs) refers to smart, connected and multimedia cars with technological megatrends of the fourth industrial revolution (Industry 4.0) and have gained huge strive in today's world. AVs adopt automated driving systems (ADS) technique that permits the vehicle to manage and control driving points without human drivers by utilizing advanced equipment including a combination of sensors, controllers, onboard computers, actuators, algorithms, and advanced software embedded in the different parts of the vehicle. These advanced sensors provide unique inputs to the ADS to generate a path from point A to point B. Ensuring the safety of sensors by limiting maintenance …
Students Certification Management (Scm): Hyperledger Fabric-Based Digital Repository, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero
Students Certification Management (Scm): Hyperledger Fabric-Based Digital Repository, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero
Symposium of Student Scholars
The higher education sector has been heavily impacted financially by the economic downturn caused by the pandemic that has resulted a decline in student enrollments. Finding cost-effective novel technology for storing and sharing student's credentials among academic institutions and potential employers is a demand. Within the current conventional approach, ensuring authentication of a candidate’s credentials is costly and time-consuming which gives burdens to thousands of prospective students and potential employees. As a result, candidates fail to secure opportunities for either delay or non-submission of credentials all over the world. Blockchain technology has the potential for students' control over their credentials; …
A Review Of Dark Web: Crawling And Discovery Of Information, Timothy Williams, Edwin Matthew, Juanjose Rodriguez-Cardenas, Jack Wright, Hossain Shahriar
A Review Of Dark Web: Crawling And Discovery Of Information, Timothy Williams, Edwin Matthew, Juanjose Rodriguez-Cardenas, Jack Wright, Hossain Shahriar
Symposium of Student Scholars
The dark web is often discussed in taboo by many who are unfamiliar with the subject. However, this essay takes a dive into the skeleton of what constructs the dark web by compiling the research of published essays. TOR and other discussed browsers are specialized web browsers that provide anonymity by going through multiple servers and encrypted networks between the host and client, hiding the IP address of both ends. This provides difficulty in terms of controlling or monitoring the dark web, leading to its popularity in criminal underworlds.
In this work, we provide an overview of data mining and …
Rethinking The Design Of Online Professor Reputation Systems, Haley Tatum
Rethinking The Design Of Online Professor Reputation Systems, Haley Tatum
LSU Master's Theses
Online Professor Reputation (OPR) systems, such as RateMyProfessors.com (RMP), are frequently used by college students to post and access peer evaluations of their pro- fessors. However, recent evidence has shown that these platforms suffer from major bias problems. Failing to address bias in online professor ratings not only leads to negative expectations and experiences in class, but also poor performance on exams. To address these concerns, in this thesis, we study bias in OPR systems from a software design point of view. At the first phase of our analysis, we conduct a systematic literature review of 23 interdisciplinary studies on …
Multi-Device Data Analysis For Fault Localization In Electrical Distribution Grids, Jacob D L Hunte
Multi-Device Data Analysis For Fault Localization In Electrical Distribution Grids, Jacob D L Hunte
Electronic Thesis and Dissertation Repository
The work presented in this dissertation represents work which addresses some of the main challenges of fault localization methods in electrical distribution grids. The methods developed largely assume access to sophisticated data sources that may not be available and that any data sets recorded by devices are synchronized. These issues have created a barrier to the adoption of many solutions by industry. The goal of the research presented in this dissertation is to address these challenges through the development of three elements. These elements are a synchronization protocol, a fault localization technique, and a sensor placement algorithm.
The synchronization protocol …
Leaderboard Design Principles Influencing User Engagement In An Online Discussion, Brian S. Bovee
Leaderboard Design Principles Influencing User Engagement In An Online Discussion, Brian S. Bovee
Masters Theses & Doctoral Dissertations
Along with the popularity of gamification, there has been increased interest in using leaderboards to promote engagement with online learning systems. The existing literature suggests that when leaderboards are designed well they have the potential to improve learning, but qualitative investigations are required in order to reveal design principles that will improve engagement. In order to address this gap, this qualitative study aims to explore students' overall perceptions of popular leaderboard designs in a gamified, online discussion. Using two leaderboards reflecting performance in an online discussion, this study evaluated multiple leaderboard designs from student interviews and other data sources regarding …
Interactive Sc Historical Map Application By Capistonsker, Joseph Cammarata, James Davis, Matt Duggan, Lauren Hodges, Ian Urton
Interactive Sc Historical Map Application By Capistonsker, Joseph Cammarata, James Davis, Matt Duggan, Lauren Hodges, Ian Urton
Senior Theses
The Interactive SC Historical Map Application by CapiStonsker, hereby known as CapiStonsker, is an android application that creates a comprehensive user experience for individuals and groups to engage with their local Columbia history. Users of this application can discover local historical landmarks by scrolling through the interactive map on the home screen, searching for markers by name using the search bar, filtering by county, or scrolling through a list of markers sorted by proximity. If a marker catches a user's attention, he or she can tap it to learn more information, get directions, or save it for later by adding …
Comai: Enabling Lightweight, Collaborative Intelligence By Retrofitting Vision Dnns, Kasthuri Jayarajah, Dhanuja Wanniarachchige, Tarek Abdelzaher, Archan Misra
Comai: Enabling Lightweight, Collaborative Intelligence By Retrofitting Vision Dnns, Kasthuri Jayarajah, Dhanuja Wanniarachchige, Tarek Abdelzaher, Archan Misra
Research Collection School Of Computing and Information Systems
While Deep Neural Network (DNN) models have transformed machine vision capabilities, their extremely high computational complexity and model sizes present a formidable deployment roadblock for AIoT applications. We show that the complexity-vs-accuracy-vs-communication tradeoffs for such DNN models can be significantly addressed via a novel, lightweight form of “collaborative machine intelligence” that requires only runtime changes to the inference process. In our proposed approach, called ComAI, the DNN pipelines of different vision sensors share intermediate processing state with one another, effectively providing hints about objects located within their mutually-overlapping Field-of-Views (FoVs). CoMAI uses two novel techniques: (a) a secondary shallow ML …
Data Source Selection In Federated Learning: A Submodular Optimization Approach, Ruisheng Zhang, Yansheng Wang, Zimu Zhou, Ziyao Ren, Yongxin Tong, Ke Xu
Data Source Selection In Federated Learning: A Submodular Optimization Approach, Ruisheng Zhang, Yansheng Wang, Zimu Zhou, Ziyao Ren, Yongxin Tong, Ke Xu
Research Collection School Of Computing and Information Systems
Federated learning is a new learning paradigm that jointly trains a model from multiple data sources without sharing raw data. For the practical deployment of federated learning, data source selection is compulsory due to the limited communication cost and budget in real-world applications. The necessity of data source selection is further amplified in presence of data heterogeneity among clients. Prior solutions are either low in efficiency with exponential time cost or lack theoretical guarantees. Inspired by the diminishing marginal accuracy phenomenon in federated learning, we study the problem from the perspective of submodular optimization. In this paper, we aim at …
Chatbot4qr: Interactive Query Refinement For Technical Question Retrieval, Neng Zhang, Qiao Huang, Xin Xia, Ying Zou, David Lo, Zhenchang Xing
Chatbot4qr: Interactive Query Refinement For Technical Question Retrieval, Neng Zhang, Qiao Huang, Xin Xia, Ying Zou, David Lo, Zhenchang Xing
Research Collection School Of Computing and Information Systems
Technical Q&A sites (e.g., Stack Overflow(SO)) are important resources for developers to search for knowledge about technical problems. Search engines provided in Q&A sites and information retrieval approaches have limited capabilities to retrieve relevant questions when queries are imprecisely specified, such as missing important technical details (e.g., the user's preferred programming languages). Although many automatic query expansion approaches have been proposed to improve the quality of queries by expanding queries with relevant terms, the information missed is not identified. Moreover, without user involvement, the existing query expansion approaches may introduce unexpected terms and lead to undesired results. In this paper, …
Performance Analysis And Improvement For Scalable And Distributed Applications Based On Asynchronous Many-Task Systems, Nanmiao Wu
LSU Doctoral Dissertations
As the complexity of recent and future large-scale data and exascale systems architectures grows, so do productivity, portability, software scalability, and efficient utilization of system resources challenges presented to both industry and the research community. Software solutions and applications are expected to scale in performance on such complex systems. Asynchronous many-task (AMT) systems, taking advantage of multi-core architectures with light-weight threads, asynchronous executions, and smart scheduling, are showing promise in addressing these challenges.
In this research, we implement several scalable and distributed applications based on HPX, an exemplar AMT runtime system. First, a distributed HPX implementation for a parameterized benchmark …
The Impact Of Dynamic Difficulty Adjustment On Player Experience In Video Games, Chineng Vang
The Impact Of Dynamic Difficulty Adjustment On Player Experience In Video Games, Chineng Vang
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Dynamic Difficulty Adjustment (DDA) is a process by which a video game adjusts its level of challenge to match a player’s skill level. Its popularity in the video game industry continues to grow as it has the ability to keep players continuously engaged in a game, a concept referred to as Flow. However, the influence of DDA on games has received mixed responses, specifically that it can enhance player experience as well as hinder it. This paper explores DDA through the Monte Carlo Tree Search algorithm and Reinforcement Learning, gathering feedback from players seeking to understand what about DDA is …
Design And Development Of Software With A Graphical User Interface To Display And Convert Multiple Microscopic Histology Images, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy
Design And Development Of Software With A Graphical User Interface To Display And Convert Multiple Microscopic Histology Images, Sayed Ahmadreza Razian, Majid Jadidi, Alexey Kamenskiy
UNO Student Research and Creative Activity Fair
Histological images are widely used to assess the microscopic anatomy of biological tissues. Recent advancements in image analysis allow the identification of structural features on histological sections that can help advance medical device development, brain and cancer research, drug discovery, vascular mechanobiology, and many other fields. Histological slide scanners create images in SVS and TIFF formats that were designed to archive image blocks and high-resolution textual information. Because these formats were primarily intended for storage, they are often not compatible with conventional image analysis software and require conversion before they can be used in research. We have developed a user-friendly …
Ad-Corre: Adaptive Correlation-Based Loss For Facial Expression Recognition In The Wild, Ali Pourramezan Fard, Mohammad H. Mahoor
Ad-Corre: Adaptive Correlation-Based Loss For Facial Expression Recognition In The Wild, Ali Pourramezan Fard, Mohammad H. Mahoor
Electrical and Computer Engineering: Faculty Scholarship
Automated Facial Expression Recognition (FER) in the wild using deep neural networks is still challenging due to intra-class variations and inter-class similarities in facial images. Deep Metric Learning (DML) is among the widely used methods to deal with these issues by improving the discriminative power of the learned embedded features. This paper proposes an Adaptive Correlation (Ad-Corre) Loss to guide the network towards generating embedded feature vectors with high correlation for within-class samples and less correlation for between-class samples. Ad-Corre consists of 3 components called Feature Discriminator, Mean Discriminator, and Embedding Discriminator. We design the Feature Discriminator component to guide …
Digital Discrimination In The Sharing Economy: Evidence, Policy, And Feature Analysis, Miroslav Tushev
Digital Discrimination In The Sharing Economy: Evidence, Policy, And Feature Analysis, Miroslav Tushev
LSU Doctoral Dissertations
Applications (apps) of the Digital Sharing Economy (DSE), such as Uber, Airbnb, and TaskRabbit, have become a main facilitator of economic growth and shared prosperity in modern-day societies. However, recent research has revealed that the participation of minority groups in DSE activities is often hindered by different forms of bias and discrimination. Evidence of such behavior has been documented across almost all domains of DSE, including ridesharing, lodging, and freelancing. However, little is known about the under- lying design decisions of DSE systems which allow certain demographics of the market to gain unfair advantage over others. To bridge this knowledge …
Improving Adversarial Attacks Against Malconv, Justin Burr
Improving Adversarial Attacks Against Malconv, Justin Burr
Masters Theses & Doctoral Dissertations
This dissertation proposes several improvements to existing adversarial attacks against MalConv, a raw-byte malware classifier for Windows PE files. The included contributions greatly improve the success rates and performance of gradient-based file overlay attacks. All improvements are included in a new open-source attack utility called BitCamo.
Several new payload initialization strategies for use with gradient-based attacks are proposed and evaluated as potential replacements for the randomized initialization method used by current attacks. An algorithm for determining the optimal payload size is also proposed. The resulting improvements achieve a 100% evasion rate against eligible target executables using an average payload size …
Learning Program Semantics With Code Representations: An Empirical Study, Jing Kai Siow, Shangqing Liu, Xiaofei Xie, Guozhu Meng, Yang Liu
Learning Program Semantics With Code Representations: An Empirical Study, Jing Kai Siow, Shangqing Liu, Xiaofei Xie, Guozhu Meng, Yang Liu
Research Collection School Of Computing and Information Systems
Program semantics learning is the core and fundamental for various code intelligent tasks e.g., vulnerability detection, clone detection. A considerable amount of existing works propose diverse approaches to learn the program semantics for different tasks and these works have achieved state-of-the-art performance. However, currently, a comprehensive and systematic study on evaluating different program representation techniques across diverse tasks is still missed. From this starting point, in this paper, we conduct an empirical study to evaluate different program representation techniques. Specifically, we categorize current mainstream code representation techniques into four categories i.e., Feature-based, Sequence-based, Tree-based, and Graph-based program representation technique and …
Analyzing The Impact Of Digital Payment On Efficiency And Productivity Of Commercial Banks: A Case Study In China, Haopeng Wang, Aldy Gunawan
Analyzing The Impact Of Digital Payment On Efficiency And Productivity Of Commercial Banks: A Case Study In China, Haopeng Wang, Aldy Gunawan
Research Collection School Of Computing and Information Systems
Digital payment has become one of the most popular payment methods all around the world, especially in countries that witnessed the rapid development of internet. As a traditional financial institution, commercial banks have been impacted by newly developed payment technology since third payment platforms have attracted customers to use the digital payment for daily consumption, transferring, and even investment. This paper focuses on analyzing whether and how the commercial banks in China have been affected by digital payment by using empirical methods. Systematic Generalized Method of Moments (SYS-GMM) is used to test the relationship between the productivity of commercial banks …
Bug Triage Automation Approaches: A Comparative Study, Dr Khaled Nagaty, Madonna Mayez, Khaled Ahmed Nagay Dr.
Bug Triage Automation Approaches: A Comparative Study, Dr Khaled Nagaty, Madonna Mayez, Khaled Ahmed Nagay Dr.
Computer Science
Bug triage is an essential task in the software maintenance phase. It is the process of assigning a developer (fixer) to bug report. Triaging process is performed by the triager, who has to analyze developers’ profiles and bug reports for the purpose of making a suitable assignment. Manual assignment consumes time, financial resources and human resources; to get a high-quality software with minimum cost, automating this process is necessary. Previous researchers tackled this problem as a classification problem from different perspectives, either information retrieval approach or machine learning algorithms, some researchers handled it as an optimization problem using optimization and …
Formal Spark Verification Of Various Resampling Methods In Particle Filters, Osiris J. Terry
Formal Spark Verification Of Various Resampling Methods In Particle Filters, Osiris J. Terry
Theses and Dissertations
The software verification in this thesis concentrates on verifying a particle filter for use in tracking and estimation, a key application area for the Air Force. The development and verification process described in this thesis is a demonstration of the power, limitation, and compromises involved in applying automated software verification tools to critical embedded software applications.
Classifying Dead Code In Software Development, Arman Alavizadeh
Classifying Dead Code In Software Development, Arman Alavizadeh
University Honors Theses
Dead code pervades as an issue in the world of software development as a source of many famous software disasters such as the ARIANE 5 rocket failure and chemical bank withdrawal error. Defining dead code on narrow levels of granularity has not been fully explored, yet is crucial to better our understanding of dead code. Here we will be starting a discussion on how to approach classifying dead code via comparing dead code research specific to an industry segment. Research will be compared primarily by methodology and limitations. Dead code subtype classifications are gleaned from research comparisons and can serve …
Strangan: Adversarially-Learnt Spatial Transformer For Scalable Human Activity Recognition, Abu Zaher Md Faridee, Avijoy Chakma, Archan Misra, Nirmalya Roy
Strangan: Adversarially-Learnt Spatial Transformer For Scalable Human Activity Recognition, Abu Zaher Md Faridee, Avijoy Chakma, Archan Misra, Nirmalya Roy
Research Collection School Of Computing and Information Systems
We tackle the problem of domain adaptation for inertial sensing-based human activity recognition (HAR) applications -i.e., in developing mechanisms that allow a classifier trained on sensor samples collected under a certain narrow context to continue to achieve high activity recognition accuracy even when applied to other contexts. This is a problem of high practical importance as the current requirement of labeled training data for adapting such classifiers to every new individual, device, or on-body location is a major roadblock to community-scale adoption of HAR-based applications. We particularly investigate the possibility of ensuring robust classifier operation, without requiring any new labeled …
Jscsp: A Novel Policy-Based Xss Defense Mechanism For Browsers, Guangquan Xu, Xiaofei Xie, Shuhan Huang, Jun Zhang, Lei Pan, Wei Lou, Kaitai Liang
Jscsp: A Novel Policy-Based Xss Defense Mechanism For Browsers, Guangquan Xu, Xiaofei Xie, Shuhan Huang, Jun Zhang, Lei Pan, Wei Lou, Kaitai Liang
Research Collection School Of Computing and Information Systems
To mitigate cross-site scripting attacks (XSS), the W3C group recommends web service providers to employ a computer security standard called Content Security Policy (CSP). However, less than 3.7 percent of real-world websites are equipped with CSP according to Google’s survey. The low scalability of CSP is incurred by the difficulty of deployment and non-compatibility for state-of-art browsers. To explore the scalability of CSP, in this article, we propose JavaScript based CSP (JSCSP), which is able to support most of real-world browsers but also to generate security policies automatically. Specifically, JSCSP offers a novel self-defined security policy which enforces essential confinements …
Androevolve: Automated Android Api Update With Data Flow Analysis And Variable Denormalization, Stefanus A. Haryono, Ferdian Thung, David Lo, Lingxiao Jiang, Julia Lawall, Hong Jin Kang, Lucas Serrano, Gilles Muller
Androevolve: Automated Android Api Update With Data Flow Analysis And Variable Denormalization, Stefanus A. Haryono, Ferdian Thung, David Lo, Lingxiao Jiang, Julia Lawall, Hong Jin Kang, Lucas Serrano, Gilles Muller
Research Collection School Of Computing and Information Systems
The Android operating system is frequently updated, with each version bringing a new set of APIs. New versions may involve API deprecation; Android apps using deprecated APIs need to be updated to ensure the apps’ compatibility with old and new Android versions. Updating deprecated APIs is a time-consuming endeavor. Hence, automating the updates of Android APIs can be beneficial for developers. CocciEvolve is the state-of-the-art approach for this automation. However, it has several limitations, including its inability to resolve out-of-method variables and the low code readability of its updates due to the addition of temporary variables. In an attempt to …
Revisiting Neuron Coverage Metrics And Quality Of Deep Neural Networks, Zhou Yang, Jieke Shi, Muhammad Hilmi Asyrofi, David Lo
Revisiting Neuron Coverage Metrics And Quality Of Deep Neural Networks, Zhou Yang, Jieke Shi, Muhammad Hilmi Asyrofi, David Lo
Research Collection School Of Computing and Information Systems
Deep neural networks (DNN) have been widely applied in modern life, including critical domains like autonomous driving, making it essential to ensure the reliability and robustness of DNN-powered systems. As an analogy to code coverage metrics for testing conventional software, researchers have proposed neuron coverage metrics and coverage-driven methods to generate DNN test cases. However, Yan et al. doubt the usefulness of existing coverage criteria in DNN testing. They show that a coverage-driven method is less effective than a gradient-based method in terms of both uncovering defects and improving model robustness. In this paper, we conduct a replication study of …
Aspect-Based Api Review Classification: How Far Can Pre-Trained Transformer Model Go?, Chengran Yang, Bowen Xu, Junaed Younus Khan, Gias Uddin, Donggyun Han, Zhou Yang, David Lo
Aspect-Based Api Review Classification: How Far Can Pre-Trained Transformer Model Go?, Chengran Yang, Bowen Xu, Junaed Younus Khan, Gias Uddin, Donggyun Han, Zhou Yang, David Lo
Research Collection School Of Computing and Information Systems
APIs (Application Programming Interfaces) are reusable software libraries and are building blocks for modern rapid software development. Previous research shows that programmers frequently share and search for reviews of APIs on the mainstream software question and answer (Q&A) platforms like Stack Overflow, which motivates researchers to design tasks and approaches related to process API reviews automatically. Among these tasks, classifying API reviews into different aspects (e.g., performance or security), which is called the aspect-based API review classification, is of great importance. The current state-of-the-art (SOTA) solution to this task is based on the traditional machine learning algorithm. Inspired by the …
Match In My Way: Fine-Grained Bilateral Access Control For Secure Cloud-Fog Computing, Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng
Match In My Way: Fine-Grained Bilateral Access Control For Secure Cloud-Fog Computing, Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng
Research Collection School Of Computing and Information Systems
Cloud-fog computing is a novel paradigm to extend the functionality of cloud computing to provide a variety of on demand data services via the edge network. Many cryptographic tools have been introduced to preserve data confidentiality against the untrustworthy network and cloud servers. However, how to efficiently identify and retrieve useful data from a large number of ciphertexts without a costly decryption mechanism remains a challenging problem. In this paper, we introduce a cloud fog-device data sharing system (CFDS) with data confidentiality and data source identification simultaneously based on a new cryptographic primitive named matchmaking attribute-based encryption (MABE) by extending …