|
|
|
Sergiu Zaharia, Traian Rebedea and Stefan Trausan-Matu
The research presented in the paper aims at increasing the capacity to identify security weaknesses in programming languages that are less supported by specialized security analysis tools, based on the knowledge gathered from securing the popular ones, f...
ver más
|
|
|
|
|
|
|
Andrei Konstantinov, Lev Utkin and Vladimir Muliukha
A new random forest-based model for solving the Multiple Instance Learning problem under small tabular data, called the Soft Tree Ensemble Multiple Instance Learning, is proposed. A new type of soft decision trees is considered, which is similar to the w...
ver más
|
|
|
|
|
|
|
Martina Saletta and Claudio Ferretti
Deep neural networks have proven to be able to learn rich internal representations, including for features that can also be used for different purposes than those the networks are originally developed for. In this paper, we are interested in exploring su...
ver más
|
|
|
|
|
|
|
Sergiu Zaharia, Traian Rebedea and Stefan Trausan-Matu
Software developers represent the bastion of application security against the overwhelming cyber-attacks which target all organizations and affect their resilience. As security weaknesses which may be introduced during the process of code writing are com...
ver más
|
|
|
|
|
|
|
Hongwei Wei, Guanjun Lin, Lin Li and Heming Jia
Exploitable vulnerabilities in software systems are major security concerns. To date, machine learning (ML) based solutions have been proposed to automate and accelerate the detection of vulnerabilities. Most ML techniques aim to isolate a unit of source...
ver más
|
|
|
|