A Survey on Data-driven Software Vulnerability Assessment and Prioritization Authors: Triet H. M. Le, Huaming Chen, M. Ali Babar | Published: 2021-07-18 | Updated: 2022-04-04 Data-Driven Vulnerability AssessmentMulti-Class ClassificationVulnerability Assessment Method 2021.07.18 2025.05.28 Literature Database
Poisoning the Search Space in Neural Architecture Search Authors: Robert Wu, Nayan Saxena, Rohan Jain | Published: 2021-06-28 Data-Driven Vulnerability AssessmentEfficiency EvaluationMachine Learning Algorithm 2021.06.28 2025.05.28 Literature Database
Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification Authors: Anshuka Rangi, Long Tran-Thanh, Haifeng Xu, Massimo Franceschetti | Published: 2021-02-15 | Updated: 2022-05-03 WatermarkingData-Driven Vulnerability AssessmentTrust Evaluation Module 2021.02.15 2025.05.28 Literature Database
Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks Authors: Yaqin Zhou, Shangqing Liu, Jingkai Siow, Xiaoning Du, Yang Liu | Published: 2019-09-08 Graph ConstructionData-Driven Vulnerability AssessmentMachine Learning 2019.09.08 2025.05.28 Literature Database
A Practical Approach to the Automatic Classification of Security-Relevant Commits Authors: Antonino Sabetta, Michele Bezzi | Published: 2018-07-06 Automation of CybersecurityData-Driven Vulnerability AssessmentProgram Understanding 2018.07.06 2025.05.28 Literature Database
Automatic Classification of Object Code Using Machine Learning Authors: John Clemens | Published: 2018-05-06 Data-Driven Vulnerability AssessmentProgram AnalysisInformation Security 2018.05.06 2025.05.28 Literature Database