Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperJune 2024
Are Recent Deepfake Speech Generators Detectable?
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityJune 2024, pp 277–282https://doi.org/10.1145/3658664.3659658Deep learning methods can generate high-quality synthetic speech which is perceptually indistinguishable from real human speech. Synthetic speech can be maliciously used for fraud. Synthetic speech detection methods have been proposed which perform well ...
- research-articleJune 2024
Evaluating Large Language Models for Real-World Vulnerability Repair in C/C++ Code
IWSPA '24: Proceedings of the 10th ACM International Workshop on Security and Privacy AnalyticsJune 2024, pp 49–58https://doi.org/10.1145/3643651.3659892The advent of Large Language Models (LLMs) has enabled advancement in automated code generation, translation, and summarization. Despite their promise, evaluating the use of LLMs in repairing real-world code vulnerabilities remains underexplored. In this ...
- posterJune 2024
DroidDefender: An Image-based Android Antimalware Proof-of-Concept
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacyJune 2024, pp 139–141https://doi.org/10.1145/3626232.3658634Malware analysis researchers are currently focused on the design and development of innovative approaches to detect zero-day malware, with particular regard to mobile environments. It is widely recognized that existing free and commercial anti-malware ...
- research-articleJune 2024
Coherent Multi-Table Data Synthesis for Tabular and Time-Series Data with GANs
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacyJune 2024, pp 245–252https://doi.org/10.1145/3626232.3653255As the usage of user-private-data is increasingly monitored by regulatory institutions for security purposes, its transfer becomes more constrained. Synthetic data has recently emerged as a viable alternative to prevent the disclosure of user-protected ...
- research-articleJune 2024
SA2E-AD: A Stacked Attention Autoencoder for Anomaly Detection in Multivariate Time Series
ACM Transactions on Knowledge Discovery from Data (TKDD), Volume 18, Issue 7Article No.: 174, pp 1–15https://doi.org/10.1145/3653677Anomaly detection for multivariate time series is an essential task in the modern industrial field. Although several methods have been developed for anomaly detection, they usually fail to effectively exploit the metrical-temporal correlation and the ...
-
- research-articleJune 2024JUST ACCEPTED
Toward a Privacy-Preserving Face Recognition System: A Survey of Leakages and Solutions
Abstract Recent advancements in face recognition (FR) technology in surveillance systems make it possible to monitor a person as they move around. FR gathers a lot of information depending on the quantity and data sources. The most severe privacy concern ...
- research-articleJune 2024
Channel Extended Attention guided Multi-scale Network for HDR Imaging
AIPR '23: Proceedings of the 2023 6th International Conference on Artificial Intelligence and Pattern RecognitionSeptember 2023, pp 536–542https://doi.org/10.1145/3641584.3641664For high dynamic range (HDR) imaging, the processing of dynamic images is a tedious task. Motion artifacts, loss of detail and color distortion in the reconstructed results may occur due to foreground motion and camera shake. In this paper, a channel ...
- research-articleJune 2024
Cigarette Smoke Detection Based On YOLOV3
AIPR '23: Proceedings of the 2023 6th International Conference on Artificial Intelligence and Pattern RecognitionSeptember 2023, pp 512–516https://doi.org/10.1145/3641584.3641660In order to satisfy the real-time and accurate requirements of cigarette smoke detection in complex scenes, a cigarette smoke detection technology based on the combination of deep learning and color features was proposed. Firstly, based on the color ...
- research-articleJune 2024
Lung Tuberculosis Detection Based on Attention EfficientDet
AIPR '23: Proceedings of the 2023 6th International Conference on Artificial Intelligence and Pattern RecognitionSeptember 2023, pp 479–484https://doi.org/10.1145/3641584.3641655Tuberculosis is a highly contagious deadly disease. However, early detection and treatment can significantly improve the patient's survival rates. Currently, chest X-rays are the primary method used to diagnose TB, due to their convenience and speed. ...
- research-articleJune 2024
LDDNet: Lightweight Defect Detection Network based on Mixed Supervision
AIPR '23: Proceedings of the 2023 6th International Conference on Artificial Intelligence and Pattern RecognitionSeptember 2023, pp 260–266https://doi.org/10.1145/3641584.3641623Deep learning-based methods have been widely used in product surface defect detection tasks. Recently, end-to-end mixed supervision networks based on end-to-end have performed well in industrial surface defect detection tasks, achieving better results ...
- research-articleJune 2024
How do Hugging Face Models Document Datasets, Bias, and Licenses? An Empirical Study
- Federica Pepe,
- Vittoria Nardone,
- Antonio Mastropaolo,
- Gabriele Bavota,
- Gerardo Canfora,
- Massimiliano Di Penta
ICPC '24: Proceedings of the 32nd IEEE/ACM International Conference on Program ComprehensionApril 2024, pp 370–381https://doi.org/10.1145/3643916.3644412Pre-trained Machine Learning (ML) models help to create ML-intensive systems without having to spend conspicuous resources on training a new model from the ground up. However, the lack of transparency for such models could lead to undesired consequences ...
- research-articleJune 2024
ASKDetector: An AST-Semantic and Key Features Fusion based Code Comment Mismatch Detector
ICPC '24: Proceedings of the 32nd IEEE/ACM International Conference on Program ComprehensionApril 2024, pp 392–402https://doi.org/10.1145/3643916.3644405Code comments are essential for programming comprehension. Nevertheless, developers often neglect to update comments after modifying the source code. Wrong code comments may lead to bugs in the maintenance process, thus affecting the reliability of the ...
- research-articleJune 2024
MESIA: Understanding and Leveraging Supplementary Nature of Method-level Comments for Automatic Comment Generation
ICPC '24: Proceedings of the 32nd IEEE/ACM International Conference on Program ComprehensionApril 2024, pp 74–86https://doi.org/10.1145/3643916.3644401Code comments are important for developers in program comprehension. In scenarios of comprehending and reusing a method, developers expect code comments to provide supplementary information beyond the method signature. However, the extent of such ...
- research-articleJune 2024
Enhancing Source Code Representations for Deep Learning with Static Analysis
ICPC '24: Proceedings of the 32nd IEEE/ACM International Conference on Program ComprehensionApril 2024, pp 64–68https://doi.org/10.1145/3643916.3644396Deep learning techniques applied to program analysis tasks such as code classification, summarization, and bug detection have seen widespread interest. Traditional approaches, however, treat programming source code as natural language text, which may ...
- research-articleJune 2024JUST ACCEPTED
GIST: Generated Inputs Sets Transferability in Deep Learning
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3672457To foster the verifiability and testability of Deep Neural Networks (DNN), an increasing number of methods for test case generation techniques are being developed.
When confronted with testing DNN models, the user can apply any existing test generation ...
- research-articleJune 2024
Deep Multiple Assertions Generation
FORGE '24: Proceedings of the 2024 IEEE/ACM First International Conference on AI Foundation Models and Software EngineeringApril 2024, pp 1–11https://doi.org/10.1145/3650105.3652293Software testing is one of the most crucial parts of the software development life cycle. Developers spend substantial amount of time and efforts on software testing. Recently, there has been a growing scholarly interest in the automation of software ...
- research-articleJune 2024
A Deep Multimodal Representation Learning Framework for Accurate Molecular Properties Prediction
GLSVLSI '24: Proceedings of the Great Lakes Symposium on VLSI 2024June 2024, pp 760–765https://doi.org/10.1145/3649476.3660377Drug discovery is a challenging process, requiring the optimization of compounds to become safe and effective. Predicting molecular properties is an indispensable step in the drug discovery pipeline. Traditionally, this process is costly, involving ...
- research-articleJune 2024
A Dynamic Beam Tracing Based Channel Model for Underwater MIMO-OFDM Channel Estimation under Impacts of ICI
WUWNet '23: Proceedings of the 17th International Conference on Underwater Networks & SystemsNovember 2023, Article No.: 3, pp 1–8https://doi.org/10.1145/3631726.3631751High-speed and robust Multiple-Input Multiple-Output (MIMO)-Orthogonal Frequency-Division Multiplexing (OFDM) communication in time-varying Underwater Acoustics (UWAs) remains a challenging puzzle. Time-varying channels and moving transceivers cause ...
- research-articleJune 2024
Mining Multimorbidity Trajectories and Co-Medication Effects from Patient Data to Predict Post–Hip Fracture Outcomes
ACM Transactions on Management Information Systems (TMIS), Volume 15, Issue 2Article No.: 10, pp 1–24https://doi.org/10.1145/3665250Hip fractures have profound impacts on patients’ conditions and quality of life, even when they receive therapeutic treatments. Many patients face the risk of poor prognosis, physical impairment, and even mortality, especially older patients. Accurate ...
- research-articleJune 2024
Towards a Task-agnostic Distillation Methodology for Creating Edge Foundation Models
EdgeFM '24: Proceedings of the Workshop on Edge and Mobile Foundation ModelsJune 2024, pp 10–15https://doi.org/10.1145/3662006.3662061In recent years, AI has undergone significant changes. Firstly, there is a growing recognition of the need to deploy inference models based on Deep Neural Networks (DNNs) on edge devices. Secondly, there is an increasing demand for low-energy inferencing ...