Baidu
map
筛选条件 共查询到47条结果
排序方式
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection

期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (3)

Malware detection at scale in the Android realm is often carried out using machine learning techniques. State-of-the-art approaches such as DREBIN and......

Speeding Up Data Manipulation Tasks with Alternative Implementations: An Exploratory Study

期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (4)

As data volume and complexity grow at an unprecedented rate, the performance of data manipulation programs is becoming a major concern for developers.......

A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs

期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (3)

Side-channel attacks, which are capable of breaking secrecy via side-channel information, pose a growing threat to the implementation of cryptographic......

DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network

期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (3)

Static bug detection has shown its effectiveness in detecting well-defined memory errors, e.g., memory leaks, buffer overflows, and null dereference. ......

Leveraging Control Flow Knowledge in SMT Solving of Program Verification

期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (4)

Satisfiability modulo theories (SMT) solvers have been widely applied as the reasoning engine for diverse software analysis and verification technolog......

IntDroid: Android Malware Detection Based on API Intimacy Analysis

期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (3)

Android, the most popular mobile operating system, has attracted millions of users around the world. Meanwhile, the number of new Android malware inst......

Architecting Internet of Things Systems with Blockchain: A Catalog of Tactics

期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (3)

Blockchain offers a distributed ledger to record data collected from Internet of Thing (IoT) devices as immutable and tamper-proof transactions and se......

How Should I Improve the UI of My App?: A Study of User Reviews of Popular Apps in the Google Play

期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (3)

UI (User Interface) is an essential factor influencing users' perception of an app. However, it is hard for even professional designers to determine i......

Context-aware Retrieval-based Deep Commit Message Generation

期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (4)

Commit messages recorded in version control systems contain valuable information for software development, maintenance, and comprehension. Unfortunate......

Recommending Faulty Configurations for Interacting Systems Under Test Using Multi-objective Search

期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (4)

Modern systems, such as cyber-physical systems, often consist of multiple products within/across product lines communicating with each other through i......

How Far Have We Progressed in Identifying Self-admitted Technical Debts? A Comprehensive Empirical Study

期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (4)

Background. Self-admitted technical debt (SATD) is a special kind of technical debt that is intentionally introduced and remarked by code comments. Th......

Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching

期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (2)

Detecting software vulnerabilities is an important problem and a recent development in tackling the problem is the use of deep learning models to dete......

Are Comments on Stack Overflow Well Organized for Easy Retrieval by Developers?

期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (2)

Many Stack Overflow answers have associated informative comments that can strengthen them and assist developers. A prior study found that comments can......

Why an Android App Is Classified as Malware: Toward Malware Classification Interpretation

期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (2)

Machine learning-(ML) based approach is considered as one of the most promising techniques for Android malware detection and has achieved high accurac......

Test Data Generation for Path Coverage of MPI Programs Using SAEO

期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (2)

Message-passing interface (MPI) programs, a typical kind of parallel programs, have been commonly used in various applications. However, it generally ......

共47条页码: 1/4页15条/页
Baidu
map
Baidu
map
Baidu
map