Works (8)

2022 article

Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue

2022 MINING SOFTWARE REPOSITORIES CONFERENCE (MSR 2022).

By: R. Shu, T. Xia, L. Williams & T. Menzies

Source: Web Of Science
Added: September 19, 2022

2022 journal article

Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application

EMPIRICAL SOFTWARE ENGINEERING.

By: S. Elder, N. Zahan, R. Shu, M. Metro, V. Kozarev, T. Menzies, L. Williams

Source: Web Of Science
Added: August 22, 2022

2022 journal article

Omni: automated ensemble with unexpected models against adversarial evasion attack

EMPIRICAL SOFTWARE ENGINEERING.

By: R. Shu, T. Xia, L. Williams & T. Menzies

Source: Web Of Science
Added: December 6, 2021

2022 journal article

Predicting health indicators for open source projects (using hyperparameter optimization)

EMPIRICAL SOFTWARE ENGINEERING.

By: T. Xia, W. Fu, R. Shu, R. Agrawal & T. Menzies

Source: Web Of Science
Added: July 5, 2022

2022 journal article

Sequential Model Optimization for Software Effort Estimation

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING.

By: T. Xia, R. Shu, X. Shen & T. Menzies

Source: Web Of Science
Added: July 11, 2022

2021 journal article

How to Better Distinguish Security Bug Reports (Using Dual Hyperparameter Optimization)

EMPIRICAL SOFTWARE ENGINEERING, 26(3).

Source: Web Of Science
Added: May 3, 2021

2021 article

Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard

2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: JOINT TRACK ON SOFTWARE ENGINEERING EDUCATION AND TRAINING (ICSE-JSEET 2021).

By: S. Elder, N. Zahan, V. Kozarev, R. Shu, T. Menzies & L. Williams

Source: Web Of Science
Added: November 1, 2021

2016 journal article

A Study of security isolation techniques

ACM Computing Surveys, 49(3).

Source: NC State University Libraries
Added: August 6, 2018