|
|
|
Xie He, Arash Habibi Lashkari, Nikhill Vombatkere and Dilli Prasad Sharma
Over the past few decades, researchers have put their effort and paid significant attention to the authorship attribution field, as it plays an important role in software forensics analysis, plagiarism detection, security attack detection, and protection...
ver más
|
|
|
|
|
|
|
Zoltán Szabó and Vilmos Bilicki
Due to the proliferation of large language models (LLMs) and their widespread use in applications such as ChatGPT, there has been a significant increase in interest in AI over the past year. Multiple researchers have raised the question: how will AI be a...
ver más
|
|
|
|
|
|
|
Valeria Mercuri, Martina Saletta and Claudio Ferretti
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential...
ver más
|
|
|
|
|
|
|
Martina Saletta and Claudio Ferretti
Deep neural networks have proven to be able to learn rich internal representations, including for features that can also be used for different purposes than those the networks are originally developed for. In this paper, we are interested in exploring su...
ver más
|
|
|
|
|
|
|
Marko Jevtic, Sa?a Mladenovic and Andrina Granic
Due to the everchanging and evergrowing nature of programming technologies, the gap between the programming industry?s needs and the educational capabilities of both formal and informal educational environments has never been wider. However, the need to ...
ver más
|
|
|
|
|
|
|
Francesco Barchi, Emanuele Parisi, Andrea Bartolini and Andrea Acquaviva
To cope with the increasing complexity of digital systems programming, deep learning techniques have recently been proposed to enhance software deployment by analysing source code for different purposes, ranging from performance and energy improvement to...
ver más
|
|
|
|
|
|
|
Andrew Walker, Dipta Das and Tomas Cerny
Microservice Architecture (MSA) is becoming the predominant direction of new cloud-based applications. There are many advantages to using microservices, but also downsides to using a more complex architecture than a typical monolithic enterprise applicat...
ver más
|
|
|
|
|
|
|
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio...
ver más
|
|
|
|
|
|
|
Elena Fedorchenko, Evgenia Novikova, Andrey Fedorchenko and Sergei Verevkin
Currently, enhancing the efficiency of vulnerability detection and assessment remains relevant. We investigate a new approach for the detection of vulnerabilities that can be used in cyber attacks and assess their severity for further effective responses...
ver más
|
|
|
|
|
|
|
Artyom V. Gorchakov, Liliya A. Demidova and Peter N. Sovietov
In this paper we consider the research and development of classifiers that are trained to predict the task solved by source code. Possible applications of such task detection algorithms include method name prediction, hardware?software partitioning, prog...
ver más
|
|
|
|
|
|
|
Claudio Ferretti and Martina Saletta
State-of-the-art neural networks build an internal model of the training data, tailored to a given classification task. The study of such a model is of interest, and therefore, research on explainable artificial intelligence (XAI) aims at investigating i...
ver más
|
|
|
|
|
|
|
Julian Hornich,Julian Hammer,Georg Hager,Thomas Gruber,Gerhard Wellein
Pág. 4 - 25
Stencil algorithms have been receiving considerable interest in HPC research for decades. The techniques used to approach multi-core stencil performance modeling and engineering span basic runtime measurements, elaborate performance models, detailed hard...
ver más
|
|
|
|
|
|
|
Marwa Ziadia, Jaouhar Fattahi, Mohamed Mejri and Emil Pricop
Today, Android accounts for more than 80% of the global market share. Such a high rate makes Android applications an important topic that raises serious questions about its security, privacy, misbehavior and correctness. Application code analysis is obvi...
ver más
|
|
|
|