Rep2vec: Repository embedding via heterogeneous graph adversarial contrastive learning

Y Qian, Y Zhang, Q Wen, Y Ye, C Zhang - Proceedings of the 28th ACM …, 2022 - dl.acm.org
Driven by the exponential increase of software and the advent of the pull-based
development system Git, a large amount of open-source software has emerged on various …

Mimicking pain-perceptual sensitization and pattern recognition based on capacitance-and conductance-regulated neuroplasticity in neural network

KT Chen, LC Shih, SC Mao… - ACS Applied Materials & …, 2023 - ACS Publications
Neuromorphic computing, inspired by the biological neuronal system, is a high potential
approach to substantially alleviate the cost of computational latency and energy for massive …

HyperMan: Detecting misbehavior in online forums based on hyperlink posting behavior

R Islam, B Treves, MOF Rokon, M Faloutsos - Social Network Analysis and …, 2022 - Springer
How can we detect and analyze hyperlink-driven misbehavior in online forums? Online
forums contain enormous amounts of user-generated contents, with threads and comments …

Super-additive interaction of homo-and heterosynaptic plasticity in a hot electron transfer optosynapse for visual sensing memory and logic operations

LC Shih, KT Chen, SC Mao, YC Huang… - Journal of Materials …, 2023 - pubs.rsc.org
In the realm of cognitive neuroscience, the coupling of homosynaptic activation and
heterosynaptic modulation plays a crucial role in enhancing consolidation and sharpening …

Qualitative clustering of software repositories based on software metrics

Y Bugayenko, K Daniakin, M Farina… - Ieee …, 2023 - ieeexplore.ieee.org
Software repositories contain a wealth of information about the aspects related to software
development process. For this reason, many studies analyze software repositories using …

“Paper, Meet Code”: A Deep Learning Approach to Linking Scholarly Articles with GitHub Repositories

P Puangjaktha, M Choetkiertikul, S Tuarob - IEEE Access, 2024 - ieeexplore.ieee.org
Computer scientists often publish their source code accompanying their publications,
prominently using code repositories across various domains. Despite the concurrent …

Multi-granular software annotation using file-level weak labelling

C Sas, A Capiluppi - Empirical Software Engineering, 2024 - Springer
Context One of the most time-consuming tasks for developers is the comprehension of new
code bases. An effective approach to aid this process is to label source code files with …

Tenfor: Tool to mine interesting events from security forums leveraging tensor decomposition

R Islam, MOF Rokon, EE Papalexakis… - Social Media Analysis for …, 2022 - Springer
How can we have a security forum to “tell” us its activities and events of interest? We take a
unique perspective which is to identify these activities without any a priori knowledge. This is …

Building deduplicated model repositories to assess domain-specific languages evolution

A Lachance, S Mosser - Proceedings of the ACM/IEEE 27th International …, 2024 - dl.acm.org
Software evolution and maintenance is a real challenge in modern software engineering. In
the context of model-driven development, which heavily rely on interconnected (meta-) …

Towards Enhancing Sequence-Optimized Malware Representation With Context-Separated Bi-Directional Long Short-Term Memory and Proximal Policy Optimization

Y Xie, X Luo, J Sun - IEEE Transactions on Dependable and …, 2024 - ieeexplore.ieee.org
Malware proliferation is a major threat to computer systems, and malware classification
techniques are effective for analyzing and identifying malware. Recent intelligent malware …