Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025
An empirical study of developers’ challenges in implementing Workflows as Code: A case study on Apache Airflow
Journal of Systems and Software (JSSO), Volume 219, Issue Chttps://doi.org/10.1016/j.jss.2024.112248AbstractThe Workflows as Code paradigm is becoming increasingly essential to streamline the design and management of complex processes within data-intensive software systems. These systems require robust capabilities to process, analyze, and extract ...
Highlights
- First study on “Workflows as Code” challenges in data-intensive Machine Learning systems using Airflow.
- Hierarchical taxonomy identifies 7 categories, 14 subcategories, and 10 root causes of challenges.
- Defining and executing ...
- research-articleDecember 2024
Insights into Natural Language Database Query Errors: from Attention Misalignment to User Handling Strategies
ACM Transactions on Interactive Intelligent Systems (TIIS), Volume 14, Issue 4Article No.: 25, Pages 1–32https://doi.org/10.1145/3650114Querying structured databases with natural language (NL2SQL) has remained a difficult problem for years. Recently, the advancement of machine learning (ML), natural language processing (NLP), and large language models (LLM) have led to significant ...
- research-articleDecember 2024
YOLO-SS: optimizing YOLO for enhanced small object detection in remote sensing imagery: YOLO-SS: optimizing YOLO for enhanced small object detection...
AbstractThe identification of minuscule objects in remote sensing data presents a formidable challenge in computer vision, where objects may occupy a mere handful of pixels. The lack of unique shape features in such small objects hinders the effectiveness ...
- research-articleDecember 2024
BadMerging: Backdoor Attacks Against Model Merging
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 4450–4464https://doi.org/10.1145/3658644.3690284Fine-tuning pre-trained models for downstream tasks has led to a proliferation of open-sourced task-specific models. Recently, Model Merging (MM) has emerged as an effective approach to facilitate knowledge transfer among these independently fine-tuned ...
- research-articleDecember 2024
AuthSaber: Automated Safety Verification of OpenID Connect Programs
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 2949–2962https://doi.org/10.1145/3658644.3670318Single Sign-On (SSO)-based authentication protocols, like OpenID Connect (OIDC), play a crucial role in enhancing security and privacy in today's interconnected digital world, gaining widespread adoption among the majority of prominent authentication ...
-
- research-articleDecember 2024
Multi-head self-attention mechanism combined with feedforward network for time-varying nonlinear digital self-interference cancellation
AbstractIn-band full duplex (IBFD) allows simultaneous communication in the same frequency band, thus significantly improving spectral efficiency. However, self-interference (SI) at the local transmitter affects decoding at the receiver, and SI intensity ...
- research-articleNovember 2024JUST ACCEPTED
ZS4C: Zero-Shot Synthesis of Compilable Code for Incomplete Code Snippets using LLMs
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3702979Technical Q&A sites are valuable for software developers seeking knowledge, but the code snippets they provide are often uncompilable and incomplete due to unresolved types and missing libraries. This poses a challenge for users who wish to reuse or ...
- short-paperOctober 2024
Engaging with AI: An Exploratory Study on Developers' Sharing and Reactions to ChatGPT in GitHub Pull Requests
ASEW '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering WorkshopsPages 156–160https://doi.org/10.1145/3691621.3694946ChatGPT, as a representative Foundation Model (FM)-powered tool, has demonstrated significant potential in assisting developers with various software engineering tasks, such as code generation, program repair, and test creation. However, the timing of ...
- research-articleOctober 2024
A First Look at Self-Admitted Miscommunications in GitHub Issues
ASEW '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering WorkshopsPages 118–127https://doi.org/10.1145/3691621.3694942Effective communication is crucial for the success of open-source software development, particularly within distributed and asynchronous working environments on collaborative coding supporting platforms like GitHub. However, these environments often ...
- research-articleOctober 2024
SQLucid: Grounding Natural Language Database Queries with Interactive Explanations
UIST '24: Proceedings of the 37th Annual ACM Symposium on User Interface Software and TechnologyArticle No.: 12, Pages 1–20https://doi.org/10.1145/3654777.3676368Though recent advances in machine learning have led to significant improvements in natural language interfaces for databases, the accuracy and reliability of these systems remain limited, especially in high-stakes domains. This paper introduces SQLucid, ...
- ArticleOctober 2024
Interactive Design of Serious Game Based on Gesture for Transmission of Traditional Handicraft
AbstractTraditional handicraft making and display usually require fixed steps of hand operating. Gesture-based design is a considerable way when designing serious interactive games for traditional handicraft transmission . This paper developed a design ...
- research-articleOctober 2024
SCL-CVD: Supervised contrastive learning for code vulnerability detection via GraphCodeBERT
AbstractDetecting vulnerabilities in source code is crucial for protecting software systems from cyberattacks. Pre-trained language models such as CodeBERT and GraphCodeBERT have been applied in multiple code-related downstream tasks such as code search ...
- research-articleOctober 2024
An empirical study on the effectiveness of large language models for SATD identification and classification
Empirical Software Engineering (KLU-EMSE), Volume 29, Issue 6https://doi.org/10.1007/s10664-024-10548-3AbstractSelf-Admitted Technical Debt (SATD), a concept highlighting sub-optimal choices in software development documented in code comments or other project resources, poses challenges in the maintainability and evolution of software systems. Large ...
- ArticleNovember 2024
Free-VSC: Free Semantics from Visual Foundation Models for Unsupervised Video Semantic Compression
AbstractUnsupervised video semantic compression (UVSC), i.e., compressing videos to better support various analysis tasks, has recently garnered attention. However, the semantic richness of previous methods remains limited, due to the single semantic ...
- ArticleSeptember 2024
- research-articleSeptember 2024
An empirical study on developers’ shared conversations with ChatGPT in GitHub pull requests and issues
Empirical Software Engineering (KLU-EMSE), Volume 29, Issue 6https://doi.org/10.1007/s10664-024-10540-xAbstractChatGPT has significantly impacted software development practices, providing substantial assistance to developers in various tasks, including coding, testing, and debugging. Despite its widespread adoption, the impact of ChatGPT as an assistant in ...
- research-articleSeptember 2024
A cross-temporal multimodal fusion system based on deep learning for orthodontic monitoring
- Haiwen Chen,
- Zhiyuan Qu,
- Yuan Tian,
- Ning Jiang,
- Yuan Qin,
- Jie Gao,
- Ruoyan Zhang,
- Yanning Ma,
- Zuolin Jin,
- Guangtao Zhai
Computers in Biology and Medicine (CBIM), Volume 180, Issue Chttps://doi.org/10.1016/j.compbiomed.2024.109025Abstract IntroductionIn the treatment of malocclusion, continuous monitoring of the three-dimensional relationship between dental roots and the surrounding alveolar bone is essential for preventing complications from orthodontic procedures. Cone-beam ...
Graphical abstractDisplay Omitted
Highlights- The first deep learning based orthodontic system to continuous risk monitoring.
- Cross-temporal fusion framework for multimodal medical imaging registration.
- Novel registration method based on segmentation for internal structure ...
- research-articleAugust 2024
Where Have You Been? A Study of Privacy Risk for Point-of-Interest Recommendation
- Kunlin Cai,
- Jinghuai Zhang,
- Zhiqing Hong,
- William Shand,
- Guang Wang,
- Desheng Zhang,
- Jianfeng Chi,
- Yuan Tian
KDD '24: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 175–186https://doi.org/10.1145/3637528.3671758As location-based services (LBS) have grown in popularity, more human mobility data has been collected. The collected data can be used to build machine learning (ML) models for LBS to enhance their performance and improve overall experience for users. ...
- research-articleAugust 2024
Remote keylogging attacks in multi-user VR applications
- Zihao Su,
- Kunlin Cai,
- Reuben Beeler,
- Lukas Dresel,
- Allan Garcia,
- Ilya Grishchenko,
- Yuan Tian,
- Christopher Kruegel,
- Giovanni Vigna
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 154, Pages 2743–2760As Virtual Reality (VR) applications grow in popularity, they have bridged distances and brought users closer together. However, with this growth, there have been increasing concerns about security and privacy, especially related to the motion data used ...