Search Results - "Ge, Xiuting"
-
1
A Systematic Literature Review of Android Malware Detection Using Static Analysis
Published in IEEE access (2020)“…Android malware has been in an increasing trend in recent years due to the pervasiveness of Android operating system. Android malware is installed and run on…”
Get full text
Journal Article -
2
Improving actionable warning identification via the refined warning-inducing context representation
Published in Science China. Information sciences (01-05-2024)“…Conclusion We improve AWI via the refined warning-inducing context representation, which captures both lexical and structural information for AWI from the…”
Get full text
Journal Article -
3
An Empirical Study of Class Rebalancing Methods for Actionable Warning Identification
Published in IEEE transactions on reliability (01-12-2023)“…Actionable warning identification (AWI) is crucial for improving the usability of static analysis tools. Currently, machine learning (ML)-based AWI approaches…”
Get full text
Journal Article -
4
Leveraging Android Automated Testing to Assist Crowdsourced Testing
Published in IEEE transactions on software engineering (01-04-2023)“…Crowdsourced testing is an emerging trend in mobile application testing. The openness of crowdsourced testing provides a promising way to conduct large-scale…”
Get full text
Journal Article -
5
Test case classification via few-shot learning
Published in Information and software technology (01-08-2023)“…Crowdsourced testing can reduce testing costs and improve testing efficiency. However, crowdsourced testing generates massive test cases, requiring testers to…”
Get full text
Journal Article -
6
An unsupervised feature selection approach for actionable warning identification
Published in Expert systems with applications (01-10-2023)“…Static Analysis Tools (SATs) are widely applied to detect defects in software projects. However, SATs are overshadowed by a large number of unactionable…”
Get full text
Journal Article -
7
Locality-based security bug report identification via active learning
Published in Information and software technology (01-07-2022)“…Security bug report (SBR) identification is a crucial way to eliminate security-critical vulnerabilities during software development. In recent years, many…”
Get full text
Journal Article -
8
A Large-Scale Empirical Study of Actionable Warning Distribution within Projects
Published in IEEE transactions on dependable and secure computing (07-10-2024)“…Static Analysis Tools (SATs) show potential defect detection ability while their usability is severely hindered by massive unactionable warnings. To improve…”
Get full text
Journal Article -
9
Reducing Label Errors for Actionable Warning Identification
Published in 2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security Companion (QRS-C) (22-10-2023)“…Machine Learning-based Actionable Warning Identification (ML-based AWI) has attracted a great deal of research work in recent years. A reliable warning dataset…”
Get full text
Conference Proceeding -
10
CooTest: An Automated Testing Approach for V2X Communication Systems
Published 29-08-2024“…Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA '24), September 16--20, 2024, Vienna, Austria Perceiving…”
Get full text
Journal Article -
11
Impact of datasets on machine learning based methods in Android malware detection: an empirical study
Published in 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS) (01-12-2021)“…For Android malware detection, machine learning-based (ML-based) methods show promising performance. However, limited studies are performed to investigate the…”
Get full text
Conference Proceeding -
12
AMDroid: Android Malware Detection Using Function Call Graphs
Published in 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C) (01-07-2019)“…With the rapid development of the mobile Internet, Android has been the most popular mobile operating system. Due to the open nature of Android, c countless…”
Get full text
Conference Proceeding -
13
Machine Learning for Actionable Warning Identification: A Comprehensive Survey
Published 30-11-2023“…Actionable Warning Identification (AWI) plays a crucial role in improving the usability of static code analyzers. With recent advances in Machine Learning…”
Get full text
Journal Article -
14
A Survey of Source Code Search: A 3-Dimensional Perspective
Published 13-11-2023“…(Source) code search is widely concerned by software engineering researchers because it can improve the productivity and quality of software development. Given…”
Get full text
Journal Article -
15
Pre-trained Model-based Actionable Warning Identification: A Feasibility Study
Published 05-03-2024“…Actionable Warning Identification (AWI) plays a pivotal role in improving the usability of static code analyzers. Currently, Machine Learning (ML)-based AWI…”
Get full text
Journal Article -
16
Semantic-based false alarm detection approach via machine learning
Published in 2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C) (01-12-2021)“…Many automated vulnerability detection tools are widely used to detect potential security vulnerabilities in software systems. However, these tools suffer from…”
Get full text
Conference Proceeding -
17
An Empirical Study on Spectral Clustering-based Software Defect Detection
Published in 2021 8th International Conference on Dependable Systems and Their Applications (DSA) (01-08-2021)“…Software defect detection is essential in software development. Most existing approaches often apply Supervised Machine Learning (SML) techniques for software…”
Get full text
Conference Proceeding -
18
A machine learning-based static analysis warning prioritization
Published in 2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C) (01-12-2021)“…Static analysis tools (SATs) can automatically detect software defects by analyzing the software source code. However, there are a large number of false…”
Get full text
Conference Proceeding