2 code implementations • NeurIPS 2019 • Yaqin Zhou, Shangqing Liu, JingKai Siow, Xiaoning Du, Yang Liu
Vulnerability identification is crucial to protect the software systems from attacks for cyber security.
no code implementations • 31 Jan 2019 • Xiaoning Du, Bihuan Chen, Yuekang Li, Jianmin Guo, Yaqin Zhou, Yang Liu, Yu Jiang
The latter needs the prior knowledge of known vulnerabilities and can only identify similar but not new types of vulnerabilities.
Software Engineering
no code implementations • 20 Mar 2015 • Shaojie Tang, Yaqin Zhou
In particular, we consider the setting of a decision maker over a networked bandits as follows: each time a combinatorial strategy, e. g., a group of arms, is chosen, and the decision maker receives a reward resulting from her strategy and also receives a side bonus resulting from that strategy for each arm's neighbor.
no code implementations • 20 Jul 2013 • Xiang-Yang Li, Shaojie Tang, Yaqin Zhou
At each decision epoch, we select a strategy, i. e., a subset of RVs, subject to arbitrary constraints on constituent RVs.