Works Published in 2023

search works

Displaying works 121 - 140 of 233 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2023 article

Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis

2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, pp. 489–505.

By: T. Dunlap n, S. Thorn n, W. Enck n & B. Reaves n

Event: IEEE Computer Society

TL;DR: Differential Alert Analysis is introduced to discover vulnerability fixes in software projects and provides a powerful, accurate primitive for software projects, code analysis tools, vulnerability databases, and researchers to characterize and enhance the security of software supply chains. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: September 11, 2023

2023 journal article

Performance Bug Analysis and Detection for Distributed Storage and Computing Systems

ACM TRANSACTIONS ON STORAGE, 19(3).

author keywords: Storage and computing systems performance; blocking bugs
TL;DR: An automatic detection tool called PCatch is designed and performed to identify code regions whose execution time can potentially increase dramatically with the workload size, and adapts the traditional happens-before model to reason about software resource contention and performance dependency relationship. (via Semantic Scholar)
Source: Web Of Science
Added: September 11, 2023

2023 journal article

Assessing the Early Bird Heuristic (for Predicting ProjectQuality)

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 32(5).

By: N. Shrikanth n & T. Menzies n

author keywords: Quality prediction; defects; early; data-lite
TL;DR: A case study with 240 projects finds that the information in those projects “clumps” towards the earliest parts of the project, and it is shown that a simple model (with just a few features) generalizes to hundreds of projects. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: September 11, 2023

2023 article

Speaker Orientation-Aware Privacy Control to Thwart Misactivation of Voice Assistants

2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, DSN, pp. 597–610.

By: S. Zhang n, A. Sabir n & A. Das n

author keywords: Voice assistant; Privacy control; Signal processing
TL;DR: This paper proposes a device-free, non-obtrusive acoustic sensing system called HeadTalk, which leverages the user's head direction information and verifies that a human generates the sound to minimize accidental activations of VAs. (via Semantic Scholar)
Source: Web Of Science
Added: September 11, 2023

2023 article

A Case Study on When and How Novices Use Code Examples in Open-Ended Programming

PROCEEDINGS OF THE 2023 CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, ITICSE 2023, VOL 1, pp. 82–88.

author keywords: open-ended programming; code examples; block-based programming; novice programming
TL;DR: This study conducts a study with 12 pairs of high school students working on open-ended game design projects, using a system that allows students to browse examples based on their functionality, and to view and copy the example code. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science; OpenAlex)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: September 11, 2023

2023 article

"AI teaches itself": Exploring Young Learners' Perspectives on Artificial Intelligence for Instrument Development

PROCEEDINGS OF THE 2023 CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, ITICSE 2023, VOL 1, pp. 485–490.

author keywords: K-12 students; artificial intelligence; instrument design; cognitive interviews
TL;DR: A brief survey on students' self-efficacy for AI, interest and motivation toward AI, and attitudes toward AI is designed, using cognitive interviewing processes to ensure the items in the survey were readable and understandable by young students. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science; OpenAlex)
Source: Web Of Science
Added: September 11, 2023

2023 article

Investigating the Impact of On-Demand Code Examples on Novices' Open-Ended Programming Projects

PROCEEDINGS OF THE 2023 ACM CONFERENCE ON INTERNATIONAL COMPUTING EDUCATION RESEARCH V.1, ICER 2023 V1, pp. 464–475.

By: W. Wang*, J. Bacher n, A. Isvik n, A. Limke n, S. Sthapit n, Y. Shi n, B. Tabarsi n, K. Tran n ...

author keywords: open-ended programming; code examples; block-based programming; novice programming
TL;DR: It was found that students who had access to all 37 code examples used a significantly larger variety of code APIs, perceived the programming as relatively more creative, but also experienced a higher task load. (via Semantic Scholar)
Sources: ORCID, Web Of Science, NC State University Libraries
Added: September 11, 2023

2023 article

What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?

2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, pp. 1635–1647.

TL;DR: The findings indicate that the same solution has been mentioned to mitigate multiple challenges, and an increasing trend in questions lacking accepted solutions substantiating the need for future research and tool automation on managing secrets. (via Semantic Scholar)
Source: Web Of Science
Added: September 5, 2023

2023 article

SecretBench: A Dataset of Software Secrets

2023 IEEE/ACM 20TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR, pp. 347–351.

TL;DR: The goal of this paper is to aid researchers and tool developers in evaluating and improving secret detection tools by curating a benchmark dataset of secrets through a systematic collection of secrets from open-source repositories. (via Semantic Scholar)
Source: Web Of Science
Added: September 5, 2023

2023 article

It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security

2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, pp. 1527–1544.

By: M. Fourne, D. Wermke, W. Enck, S. Fahl & Y. Acar

Sources: Web Of Science, NC State University Libraries
Added: September 5, 2023

2023 article

Investigating the Impact of Backward Strategy Learning in a Logic Tutor: Aiding Subgoal Learning Towards Improved Problem Solving

Shabrina, P., Mostafavi, B., Abdelshiheed, M., Chi, M., & Barnes, T. (2023, August 21). INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE IN EDUCATION.

author keywords: Subgoal; Logic tutor; Intelligent tutor systems; Backward strategy; Forward strategy
UN Sustainable Development Goal Categories
4. Quality Education (OpenAlex)
Source: Web Of Science
Added: September 5, 2023

2023 journal article

What Not to Test (For Cyber-Physical Systems)

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 49(7), 3811–3826.

By: X. Ling n & T. Menzies n

author keywords: Search-based software engineering; modeling and model-driven engineering; validation and verification; software testing; simulation-based testing; multi-goal optimization
TL;DR: DoLesS (Domination with Least Squares Approximation) that selects the minimal and effective test cases by averaging over a coarse-grained grid of the information gained from multiple optimizations goals to find a minimal set of tests that can distinguish better from worse parts of the optimization goals. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 28, 2023

2023 article

Towards Simultaneous Attacks on Multiple Cellular Networks

2023 IEEE SECURITY AND PRIVACY WORKSHOPS, SPW, pp. 394–405.

By: A. Ross n & B. Reaves n

author keywords: Cellular Networks; Cellular Network Attacks
TL;DR: A preliminary analysis of the feasibility of using a single software defined radio to surveil multiple networks simultaneously is presented, demonstrating that radio tuning time is quite low, radio clocks are sufficiently stable to skip synchronization when retuning, and that even when monitoring multiple cells a radio can quite accurately count the devices served by all cells under observation. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 28, 2023

2023 article

Bot With Interactions: Improving GitHub Pull-Request Feedback Through Two-Way Communication

2023 IEEE/ACM 5TH INTERNATIONAL WORKSHOP ON BOTS IN SOFTWARE ENGINEERING, BOTSE, pp. 28–32.

By: Z. Hu & E. Gehringer n

author keywords: bot; open-source software; software engineering; open-source curriculum; automated feedback
TL;DR: This paper introduces the Danger Bot 2.0 (hereinafter, ”the bot”) with two-way communication between humans and the bot, which was associated with a significant 70% decrease of unresolved guideline violations and the elimination of 100% false positives in them. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 28, 2023

2023 article

Software Supply Chain Risk Assessment Framework

2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS, ICSE-COMPANION, pp. 251–255.

By: N. Zahan n

author keywords: Software supply chain security; security metrics; weak link signal; risk assessment framework
TL;DR: The thesis presents research on software security metrics evaluation in different ecosystems by leveraging software security frameworks, malicious attack vectors, and the OpenSSF Scorecard project to detect the implementation of secure practices and their significance to security outcomes. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 28, 2023

2023 article

VoicePM: A Robust Privacy Measurement on Voice Anonymity

PROCEEDINGS OF THE 16TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2023, pp. 215–226.

By: S. Zhang n, Z. Li n & A. Das n

author keywords: Voice assistant; Voice anonymity; Privacy control
TL;DR: This study develops a tradeoff metric to capture voice biometrics as well as different voice attributes and proposes VoicePM, a robust Voice Privacy Measurement framework, to study the feasibility of applying different state-of-the-art voice anonymization solutions to achieve the optimum tradeoff between privacy and utility. (via Semantic Scholar)
Source: Web Of Science
Added: August 21, 2023

2023 article

Improving Grading Outcomes in Software Engineering Projects Through Automated Contributions Summaries

2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING-SOFTWARE ENGINEERING EDUCATION AND TRAINING, ICSE-SEET, pp. 259–270.

author keywords: grading consistency; program analysis; software engineering teams
TL;DR: Improvements to grading practises in the context of a CS1.5 introductory software engineering course, where assessing individual students’ contributions to weekly lab assignments is done manually by teaching assistants (TAs), is studied. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 21, 2023

2023 journal article

Performance Implication of Tensor Irregularity and Optimization for Distributed Tensor Decomposition

ACM TRANSACTIONS ON PARALLEL COMPUTING, 10(2).

By: Z. Miao*, J. Calhoun*, R. Ge* & J. Li n

author keywords: Sparse tensor; tensor decomposition; CPD; irregularity
TL;DR: This work proposes irregularity-aware distributed Cpd that leverages the sparsity and irregularity information to identify the best tradeoff between different imbalances with low time overhead and materializes the idea with two optimization methods. (via Semantic Scholar)
Source: Web Of Science
Added: August 21, 2023

2023 article

GLARE: A Dataset for Traffic Sign Detection in Sun Glare

Gray, N., Moraes, M., Bian, J., Wang, A., Tian, A., Wilson, K., … Guo, Z. (2023, July 28). IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, Vol. 7.

author keywords: Traffic sign detection; public data set; sun glare
TL;DR: The experimental study shows that although several state-of-the-art baseline architectures have demonstrated good performance on traffic sign detection in conditions without sun glare in the past, they performed poorly when tested against GLARE, a collection of images with U.S-based traffic signs under heavy visual interference by sunlight. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: August 21, 2023

2023 article

Do Software Security Practices Yield Fewer Vulnerabilities?

2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING IN PRACTICE, ICSE-SEIP, pp. 292–303.

By: N. Zahan n, S. Shohan n, D. Harris n & L. Williams n

TL;DR: Five supervised machine learning models for npm and PyPI packages were developed using the OpenSSF Scorecard security practices scores and aggregate security scores as predictors and the number of externally-reported vulnerabilities as a target variable, finding that four security practices were the most important practices influencing vulnerability count. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 21, 2023

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.