no code implementations • 17 Jun 2024 • Xueying Du, Geng Zheng, Kaixin Wang, Jiayi Feng, Wentai Deng, Mingwei Liu, Bihuan Chen, Xin Peng, Tao Ma, Yiling Lou
In addition, our user study shows that the vulnerability knowledge generated by Vul-RAG can serve as high-quality explanations which can improve the manual detection accuracy from 0. 60 to 0. 77.
1 code implementation • 5 Mar 2024 • Yufei Zhao, Dingji Wang, Bihuan Chen, Ziqian Chen, Xin Peng
One of the mainstream backdoor defenses is model reconstruction-based.
no code implementations • 10 Jan 2023 • Junming Cao, Bihuan Chen, Longjie Hu, Jie Gao, Kaifeng Huang, Xin Peng
Machine learning (ML) enabled systems are emerging with recent breakthroughs in ML.
no code implementations • 3 Dec 2021 • Junming Cao, Bihuan Chen, Chao Sun, Longjie Hu, Shuaihong Wu, Xin Peng
To bridge this gap, we present the first comprehensive study to i) characterize symptoms, root causes, and introducing and exposing stages of PPs in DL systems developed in TensorFLow and Keras, with 224 PPs collected from 210 StackOverflow posts, and to ii) assess the capability of existing performance analysis approaches in tackling PPs, with a constructed benchmark of 58 PPs in DL systems.
no code implementations • 31 Jan 2019 • Xiaoning Du, Bihuan Chen, Yuekang Li, Jianmin Guo, Yaqin Zhou, Yang Liu, Yu Jiang
The latter needs the prior knowledge of known vulnerabilities and can only identify similar but not new types of vulnerabilities.
Software Engineering