Works (8)
2022 article
Dazzle
Shu, R., Xia, T., Williams, L., & Menzies, T. (2022, May 23). 2022 MINING SOFTWARE REPOSITORIES CONFERENCE (MSR 2022), pp. 144–155.
2022 article
Do I really need all this work to find vulnerabilities?
Zahan, N., Shu, R., Metro, M., Kozarev, V., Menzies, T., & Williams, L. (2022, August 6). Empirical Software Engineering, Vol. 27.
2022 article
Predicting health indicators for open source projects (using hyperparameter optimization)
Xia, T., Fu, W., Shu, R., Agrawal, R., & Menzies, T. (2022, June 22). Empirical Software Engineering, Vol. 27.
2021 article
How to Better Distinguish Security Bug Reports (Using Dual Hyperparameter Optimization)
Shu, R., Xia, T., Chen, J., Williams, L., & Menzies, T. (2021, April 5). Empirical Software Engineering, Vol. 26.
2021 article
Omni: automated ensemble with unexpected models against adversarial evasion attack
Shu, R., Xia, T., Williams, L., & Menzies, T. (2021, November 30). Empirical Software Engineering, Vol. 27.
2021 article
Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard
E., S., Zahan, N., Kozarev, V., Shu, R., Menzies, T., & Williams, L. (2021, May 1). 2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: JOINT TRACK ON SOFTWARE ENGINEERING EDUCATION AND TRAINING (ICSE-JSEET 2021), pp. 95–104.
2020 article
Sequential Model Optimization for Software Effort Estimation
Xia, T., Shu, R., Shen, X., & Menzies, T. (2020, December 24). IEEE Transactions on Software Engineering, Vol. 48, pp. 1994–2009.
2016 article
A Study of Security Isolation Techniques
Shu, R., Wang, P., Gorski, S. A., III, Andow, B., Nadkarni, A., Deshotels, L., … Gu, X. (2016, October 12). ACM Computing Surveys, Vol. 49, p. 50.