Works (8)

Updated: July 5th, 2023 15:37

2022 article

Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue

2022 MINING SOFTWARE REPOSITORIES CONFERENCE (MSR 2022), pp. 144–155.

By: R. Shu n, T. Xia n, L. Williams n & T. Menzies n

author keywords: Security Vulnerability Prediction; Class Imbalance; Hyperparameter Optimization; Generative Adversarial Networks
Source: Web Of Science
Added: September 19, 2022

2022 journal article

Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application

EMPIRICAL SOFTWARE ENGINEERING, 27(6).

By: S. Elder n, N. Zahan n, R. Shu n, M. Metro n, V. Kozarev n, T. Menzies n, L. Williams n

author keywords: Vulnerability Management; Web Application Security; Penetration Testing; Vulnerability Scanners
Source: Web Of Science
Added: August 22, 2022

2022 journal article

Omni: automated ensemble with unexpected models against adversarial evasion attack

EMPIRICAL SOFTWARE ENGINEERING, 27(1).

By: R. Shu n, T. Xia n, L. Williams n & T. Menzies n

author keywords: Hyperparameter optimization; Ensemble defense; Adversarial evasion attack
Source: Web Of Science
Added: December 6, 2021

2022 journal article

Predicting health indicators for open source projects (using hyperparameter optimization)

EMPIRICAL SOFTWARE ENGINEERING, 27(6).

By: T. Xia n, W. Fu n, R. Shu n, R. Agrawal n & T. Menzies n

author keywords: Hyperparameter optimization; Project health; Machine learning
Source: Web Of Science
Added: July 5, 2022

2022 journal article

Sequential Model Optimization for Software Effort Estimation

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 48(6), 1994–2009.

By: T. Xia n, R. Shu n, X. Shen n & T. Menzies n

author keywords: Estimation; Software; Tools; Optimization; Data models; Task analysis; Mathematical model; Effort estimation; COCOMO; hyperparameter tuning; regression trees; sequential model optimization
Sources: Web Of Science, ORCID
Added: June 15, 2022

2021 journal article

How to Better Distinguish Security Bug Reports (Using Dual Hyperparameter Optimization)

EMPIRICAL SOFTWARE ENGINEERING, 26(3).

author keywords: Hyperparameter Optimization; Data pre-processing; Security bug report
Source: Web Of Science
Added: May 3, 2021

2021 article

Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard

2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: JOINT TRACK ON SOFTWARE ENGINEERING EDUCATION AND TRAINING (ICSE-JSEET 2021), pp. 95–104.

By: S. Elder n, N. Zahan n, V. Kozarev n, R. Shu n, T. Menzies n & L. Williams n

author keywords: Security and Protection; Computer and Information Science Education; Industry-Standards
Source: Web Of Science
Added: November 1, 2021

2016 journal article

A Study of Security Isolation Techniques

ACM COMPUTING SURVEYS, 49(3).

By: R. Shu n, P. Wang n, S. Gorski n, B. Andow n, A. Nadkarni n, L. Deshotels n, J. Gionta n, W. Enck n, X. Gu n

author keywords: Security isolation; access control; resilient architectures
Source: Web Of Science
Added: August 6, 2018