SAIS: Self-Adaptive Identification of Security Bug Reports
暂无分享,去创建一个
[1] Jie Tian,et al. Text Clustering on National Vulnerability Database , 2010, 2010 Second International Conference on Computer Engineering and Applications.
[2] Siau-Cheng Khoo,et al. Towards more accurate retrieval of duplicate bug reports , 2011, 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011).
[3] Brian D. Davison,et al. Explorations in tag suggestion and query expansion , 2008, SSM '08.
[4] David Lo,et al. Active Semi-supervised Defect Categorization , 2015, 2015 IEEE 23rd International Conference on Program Comprehension.
[5] Xin Yao,et al. Using Class Imbalance Learning for Software Defect Prediction , 2013, IEEE Transactions on Reliability.
[6] Hong Qu,et al. Automated Blog Classification: Challenges and Pitfalls , 2006, AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs.
[7] Jian Su,et al. Supervised and Traditional Term Weighting Methods for Automatic Text Categorization , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] Massimiliano Di Penta,et al. An approach to classify software maintenance requests , 2002, International Conference on Software Maintenance, 2002. Proceedings..
[9] Chih-Jen Lin,et al. LIBLINEAR: A Library for Large Linear Classification , 2008, J. Mach. Learn. Res..
[10] Siau-Cheng Khoo,et al. A discriminative model approach for accurate duplicate bug report retrieval , 2010, 2010 ACM/IEEE 32nd International Conference on Software Engineering.
[11] Gail C. Murphy,et al. Coping with an open bug repository , 2005, eclipse '05.
[12] Tong Zhang,et al. A High-Performance Semi-Supervised Learning Method for Text Chunking , 2005, ACL.
[13] Bernardete Ribeiro,et al. The importance of stop word removal on recall values in text categorization , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[14] Mehran Bozorgi,et al. Beyond heuristics: learning to classify vulnerabilities and predict exploits , 2010, KDD.
[15] Ramesh Nallapati,et al. Discriminative models for information retrieval , 2004, SIGIR '04.
[16] Mladen A. Vouk,et al. On mining data across software repositories , 2009, 2009 6th IEEE International Working Conference on Mining Software Repositories.
[17] Tim Menzies,et al. Automated severity assessment of software defect reports , 2008, 2008 IEEE International Conference on Software Maintenance.
[18] Carey L. Williamson,et al. Offline/realtime traffic classification using semi-supervised learning , 2007, Perform. Evaluation.
[19] Dipankar Das,et al. Word to Sentence Level Emotion Tagging for Bengali Blogs , 2009, ACL/IJCNLP.
[20] Andreas Christmann,et al. Support vector machines , 2008, Data Mining and Knowledge Discovery Handbook.
[21] Charless C. Fowlkes,et al. Do We Need More Training Data or Better Models for Object Detection? , 2012, BMVC.
[22] Ron Kohavi,et al. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.
[23] Yang Song,et al. Real-time automatic tag recommendation , 2008, SIGIR '08.
[24] Taghi M. Khoshgoftaar,et al. Software quality estimation with limited fault data: a semi-supervised learning perspective , 2007, Software Quality Journal.
[25] Nello Cristianini,et al. Classification using String Kernels , 2000 .
[26] Yuzhong Qu,et al. A self-training approach for resolving object coreference on the semantic web , 2011, WWW.
[27] Per Runeson,et al. Detection of Duplicate Defect Reports Using Natural Language Processing , 2007, 29th International Conference on Software Engineering (ICSE'07).
[28] Jin Liu,et al. Dictionary learning based software defect prediction , 2014, ICSE.
[29] Gail C. Murphy,et al. Who should fix this bug? , 2006, ICSE.
[30] Geoff Holmes,et al. Multinomial Naive Bayes for Text Categorization Revisited , 2004, Australian Conference on Artificial Intelligence.
[31] Chris D. Paice. An evaluation method for stemming algorithms , 1994, SIGIR '94.
[32] Ahmed E. Hassan,et al. Security versus performance bugs: a case study on Firefox , 2011, MSR '11.
[33] Westley Weimer,et al. Modeling bug report quality , 2007, ASE '07.
[34] Daphne Koller,et al. Support Vector Machine Active Learning with Applications to Text Classification , 2000, J. Mach. Learn. Res..
[35] Xin Yao,et al. Online Class Imbalance Learning and its Applications in Fault Detection , 2013, Int. J. Comput. Intell. Appl..
[36] Dawn Xiaodong Song,et al. How Open Should Open Source Be? , 2011, ArXiv.
[37] Zhi-Hua Zhou,et al. Sample-based software defect prediction with active and semi-supervised learning , 2012, Automated Software Engineering.
[38] Xiaojin Zhu,et al. Semi-Supervised Learning , 2010, Encyclopedia of Machine Learning.
[39] Amit P. Sheth,et al. Managing Semantic Content for the Web , 2002, IEEE Internet Comput..
[40] Zhi-Hua Zhou,et al. Semi-supervised learning using label mean , 2009, ICML '09.
[41] Yan Liu,et al. Discriminative deep belief networks for visual data classification , 2011, Pattern Recognit..
[42] Eugene Charniak,et al. Effective Self-Training for Parsing , 2006, NAACL.
[43] Gail C. Murphy,et al. Automatic bug triage using text categorization , 2004, SEKE.
[44] Liangxiao Jiang,et al. Naive Bayes text classifiers: a locally weighted learning approach , 2013, J. Exp. Theor. Artif. Intell..
[45] Stan Szpakowicz,et al. Beyond Accuracy, F-Score and ROC: A Family of Discriminant Measures for Performance Evaluation , 2006, Australian Conference on Artificial Intelligence.
[46] Tao Xie,et al. Identifying security bug reports via text mining: An industrial case study , 2010, 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010).
[47] Claudio Carpineto,et al. Improving retrieval feedback with multiple term-ranking function combination , 2002, TOIS.
[48] Han Tong Loh,et al. Imbalanced text classification: A term weighting approach , 2009, Expert Syst. Appl..
[49] Anuja Arora,et al. A bug Mining tool to identify and analyze security bugs using Naive Bayes and TF-IDF , 2014, 2014 International Conference on Reliability Optimization and Information Technology (ICROIT).
[50] Jacob P. Tyo,et al. Empirical Analysis and Automated Classification of Security Bug Reports , 2016 .
[51] Tao Xie,et al. An approach to detecting duplicate bug reports using natural language and execution information , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.