Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
ERD-CQC : Enhanced Rule and Dependency Code Quality Check for Java
Internetware '24: Proceedings of the 15th Asia-Pacific Symposium on InternetwareJuly 2024, Pages 377–386https://doi.org/10.1145/3671016.3674820In the field of software development, the application of code quality check tools has become a key factor in improving product quality and development efficiency. While many existing tools are effective at detecting common problems in code, there are ...
- short-paperJuly 2024
LIReDroid: LLM-Enhanced Test Case Generation for Static Sensitive Behavior Replication
Internetware '24: Proceedings of the 15th Asia-Pacific Symposium on InternetwareJuly 2024, Pages 81–84https://doi.org/10.1145/3671016.3671404Malicious Android applications often employ covert behaviors to exfiltrate sensitive data, thereby compromising user privacy. Traditional detection techniques predominantly utilize static analysis of the source code to detect such sensitive behaviors, ...
- research-articleJuly 2024
Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We?
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 65, Pages 1447–1470https://doi.org/10.1145/3660772In recent years, the importance of smart contract security has been heightened by the increasing number of attacks against them. To address this issue, a multitude of static application security testing (SAST) tools have been proposed for detecting ...
- research-articleApril 2024
Research on the Application of Engine Mechanism in Secure Communication of Internet of Vehicles
EITCE '23: Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer EngineeringOctober 2023, Pages 574–578https://doi.org/10.1145/3650400.3650495In Internet of Vehicles communication, encryption technology is commonly used to ensure the safety of data transmission. OpenSSL provides encryption libraries, but there are certain risks in practical applications. Therefore, using third-party encryption ...
- research-articleApril 2024
GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringMay 2024, Article No.: 166, Pages 1–13https://doi.org/10.1145/3597503.3639117Smart contracts are prone to various vulnerabilities, leading to substantial financial losses over time. Current analysis tools mainly target vulnerabilities with fixed control- or data-flow patterns, such as re-entrancy and integer overflow. However, a ...
-
- research-articleApril 2024
Cross-Inlining Binary Function Similarity Detection
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringMay 2024, Article No.: 223, Pages 1–13https://doi.org/10.1145/3597503.3639080Binary function similarity detection plays an important role in a wide range of security applications. Existing works usually assume that the query function and target function share equal semantics and compare their full semantics to obtain the ...
- research-articleFebruary 2024
End-to-end wavelet block feature purification network for efficient and effective UAV object tracking
Journal of Visual Communication and Image Representation (JVCIR), Volume 97, Issue CDec 2023https://doi.org/10.1016/j.jvcir.2023.103950AbstractRecently, unmanned aerial vehicle (UAV) object tracking tasks have significantly improved with the emergence of deep learning. However, owing to the object feature pollution caused by motion blur, illumination variation, and occlusion, most of ...
Highlights- A real-time UAV tracking method using feature purification network is presented.
- The DWT downsampling operation can reduce inference information effectively.
- The IDWT upsamping operation can restore the scale and appearance ...
- research-articleNovember 2023
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks
IEEE Transactions on Software Engineering (ISOF), Volume 49, Issue 12Dec. 2023, Pages 5279–5294https://doi.org/10.1109/TSE.2023.3332732Software vulnerabilities are easily propagated through code reuses, which pose dire threats to software system security. Automatic patch presence test offers an effective way to detect whether vulnerabilities have been patched, which is significant for ...
- research-articleSeptember 2023
DAppHunter: Identifying Inconsistent Behaviors of Blockchain-Based Decentralized Applications
ICSE-SEIP '23: Proceedings of the 45th International Conference on Software Engineering: Software Engineering in PracticeMay 2023, Pages 24–35https://doi.org/10.1109/ICSE-SEIP58684.2023.00008A blockchain-based decentralized application (DApp) refers to an application typically using web pages or mobile applications as the front-end and smart contracts as the back-end. The front-end of the DApp helps users generate transactions and send ...
- research-articleSeptember 2023
Energy redistribution assisted charging of WRSNS with multiple mobile chargers having multiple base stations
AbstractThe utilization of mobile chargers (MCs) for charging the nodes in wireless rechargeable sensor networks (WRSNs) has been a significant research subject. However, existing works mainly focused on planning the moving paths of MCs ...
- research-articleSeptember 2022
Unsupervised simple Siamese representation learning for blind super-resolution
Engineering Applications of Artificial Intelligence (EAAI), Volume 114, Issue CSep 2022https://doi.org/10.1016/j.engappai.2022.105092AbstractDeep convolutional neural networks have made unprecedented achievements in image super-resolution (SR) and dominated the field due to their remarkable performance. When the degradation pattern of the test images is inconsistent with ...
- research-articleSeptember 2022
A comparative study of Chinese named entity recognition with different segment representations
Applied Intelligence (KLU-APIN), Volume 52, Issue 11Sep 2022, Pages 12457–12469https://doi.org/10.1007/s10489-022-03274-0AbstractNamed entity recognition (NER) is a fundamental but crucial task in the field of natural language processing and has been widely studied. Nevertheless, little attention has been given to the segment representation (SR) schemes used to map multi-...
- research-articleJuly 2022
Low-resolution face recognition based on feature-mapping face hallucination
Computers and Electrical Engineering (CENG), Volume 101, Issue CJul 2022https://doi.org/10.1016/j.compeleceng.2022.108136AbstractThe image recognition approaches based on Convolutional Neural Network (CNN) have already achieved tremendous performance on super-resolution face images. However, there exist several challenges in face recognition field. For example, ...
- research-articleJune 2022
xFuzz: Machine Learning Guided Cross-Contract Fuzzing
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 2March-April 2024, Pages 515–529https://doi.org/10.1109/TDSC.2022.3182373Smart contract transactions are increasingly interleaved by cross-contract calls. While many tools have been developed to identify a common set of vulnerabilities, the cross-contract vulnerability is overlooked by existing tools. Cross-contract ...
- research-articleMarch 2022
Event‐based impulsive consensus for delayed multi‐agent systems
Asian Journal of Control (ASJC), Volume 24, Issue 2March 2022, Pages 771–781https://doi.org/10.1002/asjc.2646AbstractThis paper focuses on the average consensus problem for delayed nonlinear multi‐agent systems. To reduce unnecessary energy consumption, a novel event‐triggered impulsive control mechanism is adopted, in which the impulsive time series is ...
- research-articleJanuary 2022
Intelligent Dynamic Spectrum Allocation in MEC-Enabled Cognitive Networks: A Multiagent Reinforcement Learning Approach
Wireless Communications & Mobile Computing (WCMC), Volume 20222022https://doi.org/10.1155/2022/9391939Making effective use of scarce spectrum resources, along with efficient computational performance, is one of the key challenges for future wireless networks. To tackle this issue, in this paper, we focus on the intelligent dynamic spectrum allocation (DSA)...
- research-articleDecember 2021
Credibility Evaluation Method for Multidimensional Uncertain Interval Data based on the Evidence Theory
EITCE '21: Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer EngineeringOctober 2021, Pages 556–560https://doi.org/10.1145/3501409.3501511Aiming at the credibility of multi-dimensional uncertain interval data, an evaluation method based on evidence theory is established. Firstly, the subjective probability distribution and calculation method based on evidence theory are given. Then, the ...
- research-articleApril 2021
State Estimation for Markovian Coupled Neural Networks with Multiple Time Delays Via Event-Triggered Mechanism
Neural Processing Letters (NPLE), Volume 53, Issue 2Apr 2021, Pages 893–906https://doi.org/10.1007/s11063-020-10396-4AbstractThis paper focuses on the state estimation problem for a type of coupled neural networks with multiple time delays and markovian jumping communication topologies. To avoid unnecessary resources consuming, a novel state estimator is designed based ...
- research-articleJanuary 2021
Concise and Informative Article Title Throughput Maximization through Joint User Association and Power Allocation for a UAV-Integrated H-CRAN
Wireless Communications & Mobile Computing (WCMC), Volume 20212021https://doi.org/10.1155/2021/6668756The heterogeneous cloud radio access network (H-CRAN) is considered a promising solution to expand the coverage and capacity required by fifth-generation (5G) networks. UAV, also known as wireless aerial platforms, can be employed to improve both the ...