An Empirical Study of the Imbalance Issue in Software Vulnerability Detection (English)
- New search for: Guo, Yuejun
- Further information on Guo, Yuejun:
- https://orcid.org/http://orcid.org/0000-0002-5535-2420
- New search for: Hu, Qiang
- Further information on Hu, Qiang:
- https://orcid.org/http://orcid.org/0000-0002-8251-1669
- New search for: Tang, Qiang
- Further information on Tang, Qiang:
- https://orcid.org/http://orcid.org/0000-0002-6153-4255
- New search for: Traon, Yves Le
- Further information on Traon, Yves Le:
- https://orcid.org/http://orcid.org/0000-0002-1045-4861
- New search for: Tsudik, Gene
- New search for: Conti, Mauro
- Further information on Conti, Mauro:
- https://orcid.org/https://orcid.org/0000-0002-3612-1934
- New search for: Liang, Kaitai
- Further information on Liang, Kaitai:
- https://orcid.org/https://orcid.org/0000-0003-0262-7678
- New search for: Smaragdakis, Georgios
- New search for: Guo, Yuejun
- Further information on Guo, Yuejun:
- https://orcid.org/http://orcid.org/0000-0002-5535-2420
- New search for: Hu, Qiang
- Further information on Hu, Qiang:
- https://orcid.org/http://orcid.org/0000-0002-8251-1669
- New search for: Tang, Qiang
- Further information on Tang, Qiang:
- https://orcid.org/http://orcid.org/0000-0002-6153-4255
- New search for: Traon, Yves Le
- Further information on Traon, Yves Le:
- https://orcid.org/http://orcid.org/0000-0002-1045-4861
In:
Computer Security – ESORICS 2023
: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part IV
;
Chapter: 19
;
371-390
;
2024
- Article/Chapter (Book) / Electronic Resource
-
Title:An Empirical Study of the Imbalance Issue in Software Vulnerability Detection
-
Additional title:Lect.Notes Computer
-
Contributors:Tsudik, Gene ( editor ) / Conti, Mauro ( editor ) / Liang, Kaitai ( editor ) / Smaragdakis, Georgios ( editor ) / Guo, Yuejun ( author ) / Hu, Qiang ( author ) / Tang, Qiang ( author ) / Traon, Yves Le ( author )
-
Conference:European Symposium on Research in Computer Security ; 2023 ; The Hague, The Netherlands
-
Published in:Computer Security – ESORICS 2023 : 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part IV ; Chapter: 19 ; 371-390Lecture Notes in Computer Science ; 14347 ; 371-390
-
Publisher:
- New search for: Springer Nature Switzerland
-
Place of publication:Cham
-
Publication date:2024-01-11
-
Size:20 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Reinforcement Learning Approach to Generate Zero-Dynamics Attacks on Control Systems Without State Space ModelsPaudel, Bipin / Amariucai, George et al. | 2024
- 2
-
Secure Split Learning Against Property Inference, Data Reconstruction, and Feature Space Hijacking AttacksMao, Yunlong / Xin, Zexi / Li, Zhenyu / Hong, Jue / Yang, Qingyou / Zhong, Sheng et al. | 2024
- 3
-
The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement LearningRigaki, Maria / Garcia, Sebastian et al. | 2024
- 4
-
FLGuard: Byzantine-Robust Federated Learning via Ensemble of Contrastive ModelsLee, Younghan / Cho, Yungi / Han, Woorim / Bae, Ho / Paek, Yunheung et al. | 2024
- 5
-
Machine Learning for SAST: A Lightweight and Adaptable ApproachHüther, Lorenz / Sohr, Karsten / Berger, Bernhard J. / Rothe, Hendrik / Edelkamp, Stefan et al. | 2024
- 6
-
Two Models are Better Than One: Federated Learning is Not Private for Google GBoard Next Word PredictionSuliman, Mohamed / Leith, Douglas et al. | 2024
- 7
-
Privacy-Preserving Split Learning via Pareto Optimal SearchYu, Xi / Xiang, Liyao / Wang, Shiming / Long, Chengnian et al. | 2024
- 8
-
Security of NVMe Offloaded Data in Large-Scale Machine LearningKrauß, Torsten / Götz, Raphael / Dmitrienko, Alexandra et al. | 2024
- 9
-
PassGPT: Password Modeling and (Guided) Generation with Large Language ModelsRando, Javier / Perez-Cruz, Fernando / Hitaj, Briland et al. | 2024
- 10
-
Learning Type Inference for Enhanced Dataflow AnalysisSeidel, Lukas / Baker Effendi, Sedick David / Pinho, Xavier / Rieck, Konrad / van der Merwe, Brink / Yamaguchi, Fabian et al. | 2024
- 11
-
Efficient Pruning for Machine Learning Under Homomorphic EncryptionAharoni, Ehud / Baruch, Moran / Bose, Pradip / Buyuktosunoglu, Alper / Drucker, Nir / Pal, Subhankar / Pelleg, Tomer / Sarpatwar, Kanthi / Shaul, Hayim / Soceanu, Omri et al. | 2024
- 12
-
SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their CompositionsAli, Muaz / Muzammil, Muhammad / Karim, Faraz / Naeem, Ayesha / Haroon, Rukhshan / Haris, Muhammad / Nadeem, Huzaifah / Sabir, Waseem / Shaon, Fahad / Zaffar, Fareed et al. | 2024
- 13
-
On the (In)Security of Manufacturer-Provided Remote Attestation Frameworks in AndroidZhou, Ziyi / Xiao, Xuangan / Hou, Tianxiao / Hu, Yikun / Gu, Dawu et al. | 2024
- 14
-
DScope: To Reliably and Securely Acquire Live Data from Kernel-Compromised ARM DevicesChen, Zhe / Qiu, Haiqing / Ding, Xuhua et al. | 2024
- 15
-
SplITS: Split Input-to-State Mapping for Effective Firmware FuzzingFarrelly, Guy / Quirk, Paul / Kanhere, Salil S. / Camtepe, Seyit / Ranasinghe, Damith C. et al. | 2024
- 16
-
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mu $$\end{document}IPS: Software-Based Intrusion Prevention for Bare-Metal Embedded SystemsDegani, Luca / Salehi, Majid / Martinelli, Fabio / Crispo, Bruno et al. | 2024
- 17
-
Aion: Secure Transaction Ordering Using TEEsZarbafian, Pouriya / Gramoli, Vincent et al. | 2024
- 18
-
Towards a Privacy-Preserving Attestation for Virtualized NetworksArfaoui, Ghada / Jacques, Thibaut / Lacoste, Marc / Onete, Cristina / Robert, Léo et al. | 2024
- 19
-
An Empirical Study of the Imbalance Issue in Software Vulnerability DetectionGuo, Yuejun / Hu, Qiang / Tang, Qiang / Traon, Yves Le et al. | 2024
- 20
-
AttnCall: Refining Indirect Call Targets in Binaries with AttentionSun, Rui / Guo, Yinggang / Wang, Zicheng / Zeng, Qingkai et al. | 2024
- 21
-
Acumen: Analysing the Impact of Organisational Change on Users’ Access EntitlementsKwashie, Selasi / Kang, Wei / Santhosh Kumar, Sandeep / Jarrad, Geoff / Camtepe, Seyit / Nepal, Surya et al. | 2024