Picture for Triet H. M. Le

Triet H. M. Le

Automatic Data Labeling for Software Vulnerability Prediction Models: How Far Are We?

Add code
Jul 25, 2024
Viaarxiv icon

Mitigating Data Imbalance for Software Vulnerability Assessment: Does Data Augmentation Help?

Add code
Jul 15, 2024
Viaarxiv icon

Software Vulnerability Prediction in Low-Resource Languages: An Empirical Study of CodeBERT and ChatGPT

Add code
Apr 26, 2024
Viaarxiv icon

Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study

Add code
Jan 20, 2024
Viaarxiv icon

Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches

Add code
Jul 24, 2022
Figure 1 for Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches
Figure 2 for Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches
Figure 3 for Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches
Figure 4 for Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches
Viaarxiv icon

On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models

Add code
Mar 16, 2022
Figure 1 for On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models
Figure 2 for On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models
Figure 3 for On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models
Figure 4 for On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models
Viaarxiv icon

Automated Security Assessment for the Internet of Things

Add code
Sep 09, 2021
Figure 1 for Automated Security Assessment for the Internet of Things
Figure 2 for Automated Security Assessment for the Internet of Things
Figure 3 for Automated Security Assessment for the Internet of Things
Figure 4 for Automated Security Assessment for the Internet of Things
Viaarxiv icon

DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning

Add code
Aug 18, 2021
Figure 1 for DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning
Figure 2 for DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning
Figure 3 for DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning
Figure 4 for DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning
Viaarxiv icon

A Survey on Data-driven Software Vulnerability Assessment and Prioritization

Add code
Jul 25, 2021
Figure 1 for A Survey on Data-driven Software Vulnerability Assessment and Prioritization
Figure 2 for A Survey on Data-driven Software Vulnerability Assessment and Prioritization
Figure 3 for A Survey on Data-driven Software Vulnerability Assessment and Prioritization
Figure 4 for A Survey on Data-driven Software Vulnerability Assessment and Prioritization
Viaarxiv icon

PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning

Add code
Mar 08, 2020
Figure 1 for PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning
Figure 2 for PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning
Figure 3 for PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning
Figure 4 for PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning
Viaarxiv icon