首页 > 最新文献

Automated Software Engineering最新文献

英文 中文
Evoattack: suppressive adversarial attacks against object detection models using evolutionary search Evoattack:利用进化搜索对物体检测模型进行压制性对抗攻击
IF 2 2区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-11-06 DOI: 10.1007/s10515-024-00470-9
Kenneth H. Chan, Betty H. C. Cheng

State-of-the-art deep neural networks are increasingly used in image classification, recognition, and detection tasks for a range of real-world applications. Moreover, many of these applications are safety-critical, where the failure of the system may cause serious harm, injuries, or even deaths. Adversarial examples are expected inputs that are maliciously modified, but difficult to detect, such that the machine learning models fail to classify them correctly. While a number of evolutionary search-based approaches have been developed to generate adversarial examples against image classification problems, evolutionary search-based attacks against object detection algorithms remain largely unexplored. This paper describes EvoAttack that demonstrates how evolutionary search-based techniques can be used as a black-box, model- and data-agnostic approach to attack state-of-the-art object detection algorithms (e.g., RetinaNet, Faster R-CNN, and YoloV5). A proof-of-concept implementation is provided to demonstrate how evolutionary search can generate adversarial examples that existing models fail to correctly process, which can be used to assess model robustness against such attacks. In contrast to other adversarial example approaches that cause misclassification or incorrect labeling of objects, EvoAttack applies minor perturbations to generate adversarial examples that suppress the ability of object detection algorithms to detect objects. We applied EvoAttack to popular benchmark datasets for autonomous terrestrial and aerial vehicles.

最先进的深度神经网络正越来越多地应用于图像分类、识别和检测任务中的一系列现实世界应用。此外,这些应用中有许多是安全关键型应用,系统故障可能会造成严重伤害、人员伤亡甚至死亡。对抗性示例是被恶意修改但难以检测的预期输入,因此机器学习模型无法对其进行正确分类。虽然针对图像分类问题已经开发了许多基于进化搜索的方法来生成对抗性示例,但针对物体检测算法的基于进化搜索的攻击在很大程度上仍未被探索。本文介绍了 EvoAttack,它展示了如何将基于进化搜索的技术用作黑盒、模型和数据无关的方法,来攻击最先进的物体检测算法(如 RetinaNet、Faster R-CNN 和 YoloV5)。本文提供了一个概念验证实现,以演示进化搜索如何生成现有模型无法正确处理的对抗性示例,这些示例可用于评估模型对此类攻击的鲁棒性。与其他会导致对象分类错误或标记错误的对抗性示例方法不同,EvoAttack 采用微小的扰动来生成对抗性示例,从而抑制对象检测算法检测对象的能力。我们将 EvoAttack 应用于陆地和空中自主飞行器的流行基准数据集。
{"title":"Evoattack: suppressive adversarial attacks against object detection models using evolutionary search","authors":"Kenneth H. Chan,&nbsp;Betty H. C. Cheng","doi":"10.1007/s10515-024-00470-9","DOIUrl":"10.1007/s10515-024-00470-9","url":null,"abstract":"<div><p>State-of-the-art deep neural networks are increasingly used in image classification, recognition, and detection tasks for a range of real-world applications. Moreover, many of these applications are safety-critical, where the failure of the system may cause serious harm, injuries, or even deaths. Adversarial examples are expected inputs that are maliciously modified, but difficult to detect, such that the machine learning models fail to classify them correctly. While a number of evolutionary search-based approaches have been developed to generate adversarial examples against image classification problems, evolutionary search-based attacks against <i>object detection</i> algorithms remain largely unexplored. This paper describes <span>EvoAttack</span> that demonstrates how evolutionary search-based techniques can be used as a black-box, model- and data-agnostic approach to attack state-of-the-art object detection algorithms (e.g., RetinaNet, Faster R-CNN, and YoloV5). A proof-of-concept implementation is provided to demonstrate how evolutionary search can generate adversarial examples that existing models fail to correctly process, which can be used to assess model robustness against such attacks. In contrast to other adversarial example approaches that cause misclassification or incorrect labeling of objects, <span>EvoAttack</span> applies minor perturbations to generate adversarial examples that <i>suppress</i> the ability of object detection algorithms to detect objects. We applied <span>EvoAttack</span> to popular benchmark datasets for autonomous terrestrial and aerial vehicles.</p></div>","PeriodicalId":55414,"journal":{"name":"Automated Software Engineering","volume":"32 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142595532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective improvement of Android applications 多目标改进安卓应用程序
IF 2 2区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-11-04 DOI: 10.1007/s10515-024-00472-7
James Callan, Justyna Petke

Non-functional properties, such as runtime or memory use, are important to mobile app users and developers, as they affect user experience. We propose a practical approach and the first open-source tool, GIDroid for multi-objective automated improvement of Android apps. In particular, we use Genetic Improvement, a search-based technique that navigates the space of software variants to find improved software. We use a simulation-based testing framework to greatly improve the speed of search. GIDroid contains three state-of-the-art multi-objective algorithms, and two new mutation operators, which cache the results of method calls. Genetic Improvement relies on testing to validate patches. Previous work showed that tests in open-source Android applications are scarce. We thus wrote tests for 21 versions of 7 Android apps, creating a new benchmark for performance improvements. We used GIDroid to improve versions of mobile apps where developers had previously found improvements to runtime, memory, and bandwidth use. Our technique automatically re-discovers 64% of existing improvements. We then applied our approach to current versions of software in which there were no known improvements. We were able to improve execution time by up to 35%, and memory use by up to 33% in these apps.

运行时间或内存使用等非功能特性对移动应用程序用户和开发人员来说非常重要,因为它们会影响用户体验。我们提出了一种实用方法和首个开源工具 GIDroid,用于对安卓应用程序进行多目标自动改进。特别是,我们使用了基于搜索的 "遗传改进 "技术,该技术可在软件变体空间中进行导航,从而找到改进后的软件。我们使用基于模拟的测试框架来大大提高搜索速度。GIDroid 包含三种最先进的多目标算法和两种新的突变算子,可缓存方法调用的结果。遗传改进依靠测试来验证补丁。以前的工作表明,开源 Android 应用程序中的测试很少。因此,我们为 7 个 Android 应用程序的 21 个版本编写了测试,为性能改进创建了新的基准。我们使用 GIDroid 来改进移动应用程序的版本,在这些版本中,开发人员之前已经发现了运行时、内存和带宽使用方面的改进。我们的技术自动重新发现了 64% 的现有改进。然后,我们将我们的方法应用于没有已知改进的当前软件版本。在这些应用程序中,我们能够将执行时间提高 35%,内存使用提高 33%。
{"title":"Multi-objective improvement of Android applications","authors":"James Callan,&nbsp;Justyna Petke","doi":"10.1007/s10515-024-00472-7","DOIUrl":"10.1007/s10515-024-00472-7","url":null,"abstract":"<div><p>Non-functional properties, such as runtime or memory use, are important to mobile app users and developers, as they affect user experience. We propose a practical approach and the first open-source tool, GIDroid for multi-objective automated improvement of Android apps. In particular, we use Genetic Improvement, a search-based technique that navigates the space of software variants to find improved software. We use a simulation-based testing framework to greatly improve the speed of search. GIDroid contains three state-of-the-art multi-objective algorithms, and two new mutation operators, which cache the results of method calls. Genetic Improvement relies on testing to validate patches. Previous work showed that tests in open-source Android applications are scarce. We thus wrote tests for 21 versions of 7 Android apps, creating a new benchmark for performance improvements. We used GIDroid to improve versions of mobile apps where developers had previously found improvements to runtime, memory, and bandwidth use. Our technique automatically re-discovers 64% of existing improvements. We then applied our approach to current versions of software in which there were no known improvements. We were able to improve execution time by up to 35%, and memory use by up to 33% in these apps.\u0000</p></div>","PeriodicalId":55414,"journal":{"name":"Automated Software Engineering","volume":"32 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10515-024-00472-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142579515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contractsentry: a static analysis tool for smart contract vulnerability detection Contractsentry:智能合约漏洞检测静态分析工具
IF 2 2区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-23 DOI: 10.1007/s10515-024-00471-8
Shiji Wang, Xiangfu Zhao

Frequent smart contract security incidents pose a threat to the credibility of the Ethereum platform, making smart contract vulnerability detection a focal point of concern. Previous research has proposed vulnerability detection methods in smart contracts. Generally, these tools rely on predefined rules to detect vulnerable smart contracts. However, using out-of-date rules for vulnerability detection may lead to a significant number of false negatives and false positives due to the growing variety of smart contract vulnerability types and the ongoing enhancement of vulnerability defense mechanisms. In this paper, we propose ContractSentry, a tool for static analysis of smart contracts. First, we preprocess Solidity code to build critical contract information and transform it into an intermediate representation. Then, based on the intermediate representations, we propose composite rules for vulnerability detection by analyzing the characteristics of different types of vulnerabilities in smart contracts. Finally, we evaluate ContractSentry with two datasets and compare it with state-of-the-art vulnerability detection tools. Experimental results demonstrate that ContractSentry achieves superior detection effectiveness.

频繁发生的智能合约安全事件对以太坊平台的可信度构成威胁,因此智能合约漏洞检测成为人们关注的焦点。以往的研究提出了智能合约漏洞检测方法。一般来说,这些工具依靠预定义的规则来检测有漏洞的智能合约。然而,由于智能合约漏洞类型越来越多,漏洞防御机制也在不断增强,使用过时的规则进行漏洞检测可能会导致大量的假阴性和假阳性结果。在本文中,我们提出了一种用于智能合约静态分析的工具 ContractSentry。首先,我们对 Solidity 代码进行预处理,以构建关键的合约信息,并将其转换为中间表示。然后,基于中间表示法,我们通过分析智能合约中不同类型漏洞的特征,提出了漏洞检测的复合规则。最后,我们利用两个数据集对 ContractSentry 进行了评估,并将其与最先进的漏洞检测工具进行了比较。实验结果表明,ContractSentry 的检测效果更胜一筹。
{"title":"Contractsentry: a static analysis tool for smart contract vulnerability detection","authors":"Shiji Wang,&nbsp;Xiangfu Zhao","doi":"10.1007/s10515-024-00471-8","DOIUrl":"10.1007/s10515-024-00471-8","url":null,"abstract":"<div><p>Frequent smart contract security incidents pose a threat to the credibility of the Ethereum platform, making smart contract vulnerability detection a focal point of concern. Previous research has proposed vulnerability detection methods in smart contracts. Generally, these tools rely on predefined rules to detect vulnerable smart contracts. However, using out-of-date rules for vulnerability detection may lead to a significant number of false negatives and false positives due to the growing variety of smart contract vulnerability types and the ongoing enhancement of vulnerability defense mechanisms. In this paper, we propose ContractSentry, a tool for static analysis of smart contracts. First, we preprocess Solidity code to build critical contract information and transform it into an intermediate representation. Then, based on the intermediate representations, we propose composite rules for vulnerability detection by analyzing the characteristics of different types of vulnerabilities in smart contracts. Finally, we evaluate ContractSentry with two datasets and compare it with state-of-the-art vulnerability detection tools. Experimental results demonstrate that ContractSentry achieves superior detection effectiveness.\u0000</p></div>","PeriodicalId":55414,"journal":{"name":"Automated Software Engineering","volume":"32 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142518464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the impact of code review factors on the code review comment generation 探索代码审查因素对代码审查意见生成的影响
IF 2 2区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-01 DOI: 10.1007/s10515-024-00469-2
Junyi Lu, Zhangyi Li, Chenjie Shen, Li Yang, Chun Zuo

The pursuit of efficiency in code review has intensified, prompting a wave of research focused on automating code review comment generation. However, the existing body of research is fragmented, characterized by disparate approaches to task formats, factor selection, and dataset processing. Such variability often leads to an emphasis on refining model structures, overshadowing the critical roles of factor selection and representation. To bridge these gaps, we have assembled a comprehensive dataset that includes not only the primary factors identified in previous studies but also additional pertinent data. Utilizing this dataset, we assessed the impact of various factors and their representations on two leading computational approaches: fine-tuning pre-trained models and using prompts in large language models. Our investigation also examines the potential benefits and drawbacks of incorporating abstract syntax trees to represent code change structures. Our results reveal that: (1) the impact of factors varies between computational paradigms and their representations can have complex interactions; (2) integrating a code structure graph can enhance the graphing of code content, yet potentially impair the understanding capabilities of language models; and (3) strategically combining factors can elevate basic models to outperform those specifically pre-trained for tasks. These insights are pivotal for steering future research in code review automation.

随着人们对代码审查效率的追求不断提高,催生了一波专注于代码审查注释自动生成的研究热潮。然而,现有的研究成果支离破碎,任务格式、因素选择和数据集处理的方法各不相同。这种差异性往往导致研究重点放在完善模型结构上,而忽略了因素选择和表示的关键作用。为了弥补这些不足,我们建立了一个综合数据集,其中不仅包括以往研究中确定的主要因素,还包括其他相关数据。利用这个数据集,我们评估了各种因素及其表征对两种主要计算方法的影响:微调预训练模型和在大型语言模型中使用提示。我们的调查还研究了采用抽象语法树来表示代码变化结构的潜在好处和缺点。我们的研究结果表明(1) 各种因素对不同计算范式的影响各不相同,而且它们的表现形式可能会产生复杂的交互作用;(2) 整合代码结构图可以增强代码内容的图表化,但却有可能损害语言模型的理解能力;(3) 有策略地组合各种因素可以提升基本模型的性能,使其优于专门针对任务预先训练的模型。这些见解对于指导未来的代码审查自动化研究至关重要。
{"title":"Exploring the impact of code review factors on the code review comment generation","authors":"Junyi Lu,&nbsp;Zhangyi Li,&nbsp;Chenjie Shen,&nbsp;Li Yang,&nbsp;Chun Zuo","doi":"10.1007/s10515-024-00469-2","DOIUrl":"10.1007/s10515-024-00469-2","url":null,"abstract":"<div><p>The pursuit of efficiency in code review has intensified, prompting a wave of research focused on automating code review comment generation. However, the existing body of research is fragmented, characterized by disparate approaches to task formats, factor selection, and dataset processing. Such variability often leads to an emphasis on refining model structures, overshadowing the critical roles of factor selection and representation. To bridge these gaps, we have assembled a comprehensive dataset that includes not only the primary factors identified in previous studies but also additional pertinent data. Utilizing this dataset, we assessed the impact of various factors and their representations on two leading computational approaches: fine-tuning pre-trained models and using prompts in large language models. Our investigation also examines the potential benefits and drawbacks of incorporating abstract syntax trees to represent code change structures. Our results reveal that: (1) the impact of factors varies between computational paradigms and their representations can have complex interactions; (2) integrating a code structure graph can enhance the graphing of code content, yet potentially impair the understanding capabilities of language models; and (3) strategically combining factors can elevate basic models to outperform those specifically pre-trained for tasks. These insights are pivotal for steering future research in code review automation.</p></div>","PeriodicalId":55414,"journal":{"name":"Automated Software Engineering","volume":"31 2","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142409361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A holistic approach to software fault prediction with dynamic classification 利用动态分类进行软件故障预测的整体方法
IF 2 2区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-04 DOI: 10.1007/s10515-024-00467-4
S. Kaliraj, Velisetti Geetha Pavan Sahasranth, V. Sivakumar

Software Fault Prediction is a critical domain in machine learning aimed at pre-emptively identifying and mitigating software faults. This study addresses challenges related to imbalanced datasets and feature selection, significantly enhancing the effectiveness of fault prediction models. We mitigate class imbalance in the Unified Dataset using the Random-Over Sampling technique, resulting in superior accuracy for minority-class predictions. Additionally, we employ the innovative Ant-Colony Optimization algorithm (ACO) for feature selection, extracting pertinent features to amplify model performance. Recognizing the limitations of individual machine learning models, we introduce the Dynamic Classifier, a ground-breaking ensemble that combines predictions from multiple algorithms, elevating fault prediction precision. Model parameters are fine-tuned using the Grid-Search Method, achieving an accuracy of 94.129% and superior overall performance compared to random forest, decision tree and other standard machine learning algorithms. The core contribution of this study lies in the comparative analysis, pitting our Dynamic Classifier against Standard Algorithms using diverse performance metrics. The results unequivocally establish the Dynamic Classifier as a frontrunner, highlighting its prowess in fault prediction. In conclusion, this research introduces a comprehensive and innovative approach to software fault prediction. It pioneers the resolution of class imbalance, employs cutting-edge feature selection, and introduces dynamic ensemble classifiers. The proposed methodology, showcasing a significant advancement in performance over existing methods, illuminates the path toward developing more accurate and efficient fault prediction models.

软件故障预测是机器学习中的一个重要领域,旨在先发制人地识别和缓解软件故障。本研究解决了与不平衡数据集和特征选择相关的难题,显著提高了故障预测模型的有效性。我们利用随机抽样技术缓解了统一数据集中的类不平衡问题,从而提高了少数类预测的准确性。此外,我们还采用创新的蚁群优化算法(ACO)进行特征选择,提取相关特征以提高模型性能。由于认识到单个机器学习模型的局限性,我们引入了动态分类器,这是一种开创性的集合,它结合了多种算法的预测结果,提高了故障预测精度。模型参数通过网格搜索法进行微调,准确率达到 94.129%,整体性能优于随机森林、决策树和其他标准机器学习算法。本研究的核心贡献在于对比分析,使用各种性能指标将我们的动态分类器与标准算法进行对比。结果毫不含糊地确立了动态分类器的领先地位,凸显了其在故障预测方面的优势。总之,这项研究为软件故障预测引入了一种全面的创新方法。它率先解决了类不平衡问题,采用了最先进的特征选择技术,并引入了动态集合分类器。与现有方法相比,所提出的方法在性能上有了显著提高,为开发更准确、更高效的故障预测模型指明了方向。
{"title":"A holistic approach to software fault prediction with dynamic classification","authors":"S. Kaliraj,&nbsp;Velisetti Geetha Pavan Sahasranth,&nbsp;V. Sivakumar","doi":"10.1007/s10515-024-00467-4","DOIUrl":"10.1007/s10515-024-00467-4","url":null,"abstract":"<div><p>Software Fault Prediction is a critical domain in machine learning aimed at pre-emptively identifying and mitigating software faults. This study addresses challenges related to imbalanced datasets and feature selection, significantly enhancing the effectiveness of fault prediction models. We mitigate class imbalance in the Unified Dataset using the Random-Over Sampling technique, resulting in superior accuracy for minority-class predictions. Additionally, we employ the innovative Ant-Colony Optimization algorithm (ACO) for feature selection, extracting pertinent features to amplify model performance. Recognizing the limitations of individual machine learning models, we introduce the Dynamic Classifier, a ground-breaking ensemble that combines predictions from multiple algorithms, elevating fault prediction precision. Model parameters are fine-tuned using the Grid-Search Method, achieving an accuracy of 94.129% and superior overall performance compared to random forest, decision tree and other standard machine learning algorithms. The core contribution of this study lies in the comparative analysis, pitting our Dynamic Classifier against Standard Algorithms using diverse performance metrics. The results unequivocally establish the Dynamic Classifier as a frontrunner, highlighting its prowess in fault prediction. In conclusion, this research introduces a comprehensive and innovative approach to software fault prediction. It pioneers the resolution of class imbalance, employs cutting-edge feature selection, and introduces dynamic ensemble classifiers. The proposed methodology, showcasing a significant advancement in performance over existing methods, illuminates the path toward developing more accurate and efficient fault prediction models.</p></div>","PeriodicalId":55414,"journal":{"name":"Automated Software Engineering","volume":"31 2","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10515-024-00467-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142198465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An exploratory and automated study of sarcasm detection and classification in app stores using fine-tuned deep learning classifiers 使用微调深度学习分类器对应用商店中讽刺语言的检测和分类进行探索性自动研究
IF 2 2区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-27 DOI: 10.1007/s10515-024-00468-3
Eman Fatima, Hira Kanwal, Javed Ali Khan, Nek Dil Khan

App stores enable users to provide insightful feedback on apps, which developers can use for future software application enhancement and evolution. However, finding user reviews that are valuable and relevant for quality improvement and app enhancement is challenging because of increasing end-user feedback. Also, to date, according to our knowledge, the existing sentiment analysis approaches lack in considering sarcasm and its types when identifying sentiments of end-user reviews for requirements decision-making. Moreover, no work has been reported on detecting sarcasm by analyzing app reviews. This paper proposes an automated approach by detecting sarcasm and its types in end-user reviews and identifying valuable requirements-related information using natural language processing (NLP) and deep learning (DL) algorithms to help software engineers better understand end-user sentiments. For this purpose, we crawled 55,000 end-user comments on seven software apps in the Play Store. Then, a novel sarcasm coding guideline is developed by critically analyzing end-user reviews and recovering frequently used sarcastic types such as Irony, Humor, Flattery, Self-Deprecation, and Passive Aggression. Next, using coding guidelines and the content analysis approach, we annotated the 10,000 user comments and made them parsable for the state-of-the-art DL algorithms. We conducted a survey at two different universities in Pakistan to identify participants’ accuracy in manually identifying sarcasm in the end-user reviews. We developed a ground truth to compare the results of DL algorithms. We then applied various fine-tuned DL classifiers to first detect sarcasm in the end-user feedback and then further classified the sarcastic reviews into more fine-grained sarcastic types. For this, end-user comments are first pre-processed and balanced with the instances in the dataset. Then, feature engineering is applied to fine-tune the DL classifiers. We obtain an average accuracy of 97%, 96%, 96%, 96%, 96%, 86%, and 90% with binary classification and 90%, 91%, 92%, 91%, 91%, 75%, and 89% with CNN, LSTM, BiLSTM, GRU, BiGRU, RNN, and BiRNN classifiers, respectively. Such information would help improve the performance of sentiment analysis approaches to understand better the associated sentiments with the identified new features or issues.

通过应用程序商店,用户可以对应用程序提出有见地的反馈意见,开发人员可以利用这些意见来改进软件应用程序并使其不断发展。然而,由于终端用户的反馈越来越多,要找到对质量改进和应用程序增强有价值且相关的用户评论具有挑战性。此外,据我们所知,迄今为止,现有的情感分析方法在识别最终用户评论的情感以用于需求决策时,缺乏对讽刺及其类型的考虑。此外,还没有关于通过分析应用程序评论来检测讽刺的工作报道。本文提出了一种自动方法,通过自然语言处理(NLP)和深度学习(DL)算法检测最终用户评论中的讽刺及其类型,并识别有价值的需求相关信息,从而帮助软件工程师更好地理解最终用户的情绪。为此,我们抓取了 Play Store 中七个软件应用程序的 55,000 条最终用户评论。然后,通过对最终用户评论进行批判性分析,并恢复常用的讽刺类型(如讽刺、幽默、奉承、自嘲和被动攻击),开发出一种新颖的讽刺编码指南。接下来,我们利用编码指南和内容分析方法,对 10,000 条用户评论进行了注释,并使其可以被最先进的 DL 算法解析。我们在巴基斯坦两所不同的大学进行了一项调查,以确定参与者手动识别最终用户评论中讽刺语言的准确性。我们开发了一个基本事实来比较 DL 算法的结果。然后,我们应用各种经过微调的 DL 分类器,首先检测最终用户反馈中的讽刺,然后进一步将讽刺性评论分类为更精细的讽刺类型。为此,首先要对最终用户评论进行预处理,并与数据集中的实例进行平衡。然后,应用特征工程对 DL 分类器进行微调。二元分类的平均准确率分别为 97%、96%、96%、96%、96%、86% 和 90%,CNN、LSTM、BiLSTM、GRU、BiGRU、RNN 和 BiRNN 分类器的平均准确率分别为 90%、91%、92%、91%、91%、75% 和 89%。这些信息将有助于提高情感分析方法的性能,从而更好地理解与已识别的新特征或问题相关的情感。
{"title":"An exploratory and automated study of sarcasm detection and classification in app stores using fine-tuned deep learning classifiers","authors":"Eman Fatima,&nbsp;Hira Kanwal,&nbsp;Javed Ali Khan,&nbsp;Nek Dil Khan","doi":"10.1007/s10515-024-00468-3","DOIUrl":"10.1007/s10515-024-00468-3","url":null,"abstract":"<div><p>App stores enable users to provide insightful feedback on apps, which developers can use for future software application enhancement and evolution. However, finding user reviews that are valuable and relevant for quality improvement and app enhancement is challenging because of increasing end-user feedback. Also, to date, according to our knowledge, the existing sentiment analysis approaches lack in considering sarcasm and its types when identifying sentiments of end-user reviews for requirements decision-making. Moreover, no work has been reported on detecting sarcasm by analyzing app reviews. This paper proposes an automated approach by detecting sarcasm and its types in end-user reviews and identifying valuable requirements-related information using natural language processing (NLP) and deep learning (DL) algorithms to help software engineers better understand end-user sentiments. For this purpose, we crawled 55,000 end-user comments on seven software apps in the Play Store. Then, a novel sarcasm coding guideline is developed by critically analyzing end-user reviews and recovering frequently used sarcastic types such as Irony, Humor, Flattery, Self-Deprecation, and Passive Aggression. Next, using coding guidelines and the content analysis approach, we annotated the 10,000 user comments and made them parsable for the state-of-the-art DL algorithms. We conducted a survey at two different universities in Pakistan to identify participants’ accuracy in manually identifying sarcasm in the end-user reviews. We developed a ground truth to compare the results of DL algorithms. We then applied various fine-tuned DL classifiers to first detect sarcasm in the end-user feedback and then further classified the sarcastic reviews into more fine-grained sarcastic types. For this, end-user comments are first pre-processed and balanced with the instances in the dataset. Then, feature engineering is applied to fine-tune the DL classifiers. We obtain an average accuracy of 97%, 96%, 96%, 96%, 96%, 86%, and 90% with binary classification and 90%, 91%, 92%, 91%, 91%, 75%, and 89% with CNN, LSTM, BiLSTM, GRU, BiGRU, RNN, and BiRNN classifiers, respectively. Such information would help improve the performance of sentiment analysis approaches to understand better the associated sentiments with the identified new features or issues.</p></div>","PeriodicalId":55414,"journal":{"name":"Automated Software Engineering","volume":"31 2","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142198466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic context based coincidental correct test cases detection for fault localization 基于语义上下文的故障定位重合正确测试用例检测
IF 2 2区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-18 DOI: 10.1007/s10515-024-00466-5
Jian Hu

Fault localization is a process that aims to identify the potentially faulty statements responsible for program failures by analyzing runtime information. Therefore, the input code coverage matrix plays a crucial role in FL. However, the effectiveness of fault localization is compromised by the presence of coincidental correct test cases (CCTC) in the coverage matrix. These CCTC execute faulty code but do not result in program failures. To address this issue, many existing methods focus on identifying CCTC through cluster analysis. However, these methods have three problems. Firstly, identifying the optimal cluster count poses a considerable challenge in CCTC detection. Secondly, the effectiveness of CCTC detection is heavily influenced by the initial centroid selection. Thirdly, the presence of abundant fault-irrelevant statements within the raw coverage matrix introduces substantial noise for CCTC detection. To overcome these challenges, we propose SCD4FL: a semantic context-based CCTC detection method to enhance the coverage matrix for fault localization. SCD4FL incorporates and implements two key ideas: (1) SCD4FL uses the intersection of execution slices to construct a semantic context from the raw coverage matrix, effectively reducing noise during CCTC detection. (2) SCD4FL employs an expert-knowledge-based K-nearest neighbors (KNN) algorithm to detect the CCTC, effectively eliminating the requirement of determining the cluster number and initial centroid. To evaluate the effectiveness of SCD4FL, we conducted extensive experiments on 420 faulty versions of nine benchmarks using six state-of-the-art fault localization methods and two representative CCTC detection methods. The experimental results validate the effectiveness of our method in enhancing the performance of the six fault localization methods and two CCTC detection methods, e.g., the RNN method can be improved by 53.09% under the MFR metric.

故障定位的目的是通过分析运行时信息,找出造成程序故障的潜在错误语句。因此,输入代码覆盖矩阵在 FL 中起着至关重要的作用。然而,覆盖矩阵中存在的巧合正确测试用例(CCTC)会影响故障定位的效果。这些 CCTC 会执行有问题的代码,但不会导致程序故障。为解决这一问题,许多现有方法都侧重于通过聚类分析来识别 CCTC。然而,这些方法存在三个问题。首先,在 CCTC 检测中,确定最佳聚类数是一个相当大的挑战。其次,CCTC 检测的有效性在很大程度上受初始中心点选择的影响。第三,原始覆盖矩阵中存在大量与故障无关的语句,这为 CCTC 检测带来了大量噪声。为了克服这些挑战,我们提出了 SCD4FL:一种基于语义上下文的 CCTC 检测方法,用于增强故障定位的覆盖矩阵。SCD4FL 融合并实现了两个关键理念:(1) SCD4FL 利用执行片段的交集从原始覆盖矩阵中构建语义上下文,从而有效降低 CCTC 检测过程中的噪声。(2) SCD4FL 采用基于专家知识的 K-nearest neighbors (KNN) 算法来检测 CCTC,从而有效消除了确定聚类数和初始中心点的要求。为了评估 SCD4FL 的有效性,我们使用六种最先进的故障定位方法和两种有代表性的 CCTC 检测方法,对九种基准的 420 个故障版本进行了大量实验。实验结果验证了我们的方法在提高六种故障定位方法和两种 CCTC 检测方法性能方面的有效性,例如,在 MFR 指标下,RNN 方法的性能提高了 53.09%。
{"title":"Semantic context based coincidental correct test cases detection for fault localization","authors":"Jian Hu","doi":"10.1007/s10515-024-00466-5","DOIUrl":"10.1007/s10515-024-00466-5","url":null,"abstract":"<div><p>Fault localization is a process that aims to identify the potentially faulty statements responsible for program failures by analyzing runtime information. Therefore, the input code coverage matrix plays a crucial role in FL. However, the effectiveness of fault localization is compromised by the presence of coincidental correct test cases (CCTC) in the coverage matrix. These CCTC execute faulty code but do not result in program failures. To address this issue, many existing methods focus on identifying CCTC through cluster analysis. However, these methods have three problems. Firstly, identifying the optimal cluster count poses a considerable challenge in CCTC detection. Secondly, the effectiveness of CCTC detection is heavily influenced by the initial centroid selection. Thirdly, the presence of abundant fault-irrelevant statements within the raw coverage matrix introduces substantial noise for CCTC detection. To overcome these challenges, we propose SCD4FL: a semantic context-based CCTC detection method to enhance the coverage matrix for fault localization. SCD4FL incorporates and implements two key ideas: (1) SCD4FL uses the intersection of execution slices to construct a semantic context from the raw coverage matrix, effectively reducing noise during CCTC detection. (2) SCD4FL employs an expert-knowledge-based K-nearest neighbors (KNN) algorithm to detect the CCTC, effectively eliminating the requirement of determining the cluster number and initial centroid. To evaluate the effectiveness of SCD4FL, we conducted extensive experiments on 420 faulty versions of nine benchmarks using six state-of-the-art fault localization methods and two representative CCTC detection methods. The experimental results validate the effectiveness of our method in enhancing the performance of the six fault localization methods and two CCTC detection methods, e.g., the RNN method can be improved by 53.09% under the MFR metric.</p></div>","PeriodicalId":55414,"journal":{"name":"Automated Software Engineering","volume":"31 2","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142198469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study on cross-project fault prediction through resampling and feature reduction along with source projects selection 通过重采样和特征缩减以及源项目选择进行跨项目故障预测的研究
IF 2 2区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-16 DOI: 10.1007/s10515-024-00465-6
Pravali Manchala, Manjubala Bisi

Software Fault Prediction is an efficient strategy to improve the quality of software systems. In reality, there won’t be adequate software fault data for a recently established project where the Cross-Project Fault Prediction (CPFP) model plays an important role. CPFP model utilizes other finished projects data to predict faults in ongoing projects. Existing CPFP methods concentrate on discrepancies in distribution between projects without exploring relevant source projects selection combined with distribution gap minimizing methods. Additionally, performing imbalance learning and feature extraction in software projects only balances the data and reduces features by eliminating redundant and unrelated features. This paper proposes a novel SRES method called Similarity and applicability based source projects selection, REsampling, and Stacked autoencoder (SRES) model. To analyze the performance of relevant source projects over CPFP, we proposed a new similarity and applicability based source projects selection method to automatically select sources for the target project. In addition, we introduced a new resampling method that balances source project data by generating data related to the target project, eliminating unrelated data, and reducing the distribution gap. Then, SRES uses the stacked autoencoder to extract informative intermediate feature data to further improve the prediction accuracy of the CPFP. SRES performs comparable to or superior to the conventional CPFP model on six different performance indicators over 24 projects by effectively addressing the issues of CPFP. In conclusion, we can ensure that resampling and feature reduction techniques, along with source projects selection can improve cross-project prediction performance.

软件故障预测是提高软件系统质量的有效策略。在现实中,一个新近建立的项目不会有足够的软件故障数据,这时跨项目故障预测(CPFP)模型就发挥了重要作用。CPFP 模型利用其他已完成项目的数据来预测正在进行的项目中的故障。现有的 CPFP 方法只关注项目间分布的差异,而没有结合分布差距最小化方法探索相关源项目的选择。此外,在软件项目中进行不平衡学习和特征提取只会平衡数据,并通过消除冗余和不相关的特征来减少特征。本文提出了一种新颖的 SRES 方法,称为基于相似性和适用性的源项目选择、REsampling 和堆叠自动编码器(SRES)模型。为了分析相关源项目相对于 CPFP 的性能,我们提出了一种新的基于相似性和适用性的源项目选择方法,以自动为目标项目选择源。此外,我们还引入了一种新的重采样方法,通过生成与目标项目相关的数据来平衡源项目数据,剔除不相关的数据并缩小分布差距。然后,SRES 利用堆叠自动编码器提取信息量大的中间特征数据,进一步提高 CPFP 的预测精度。通过有效解决 CPFP 存在的问题,SRES 在 24 个项目的 6 个不同性能指标上的表现与传统 CPFP 模型相当或更胜一筹。总之,我们可以确保重采样和特征缩减技术以及源项目选择能够提高跨项目预测性能。
{"title":"A study on cross-project fault prediction through resampling and feature reduction along with source projects selection","authors":"Pravali Manchala,&nbsp;Manjubala Bisi","doi":"10.1007/s10515-024-00465-6","DOIUrl":"10.1007/s10515-024-00465-6","url":null,"abstract":"<div><p>Software Fault Prediction is an efficient strategy to improve the quality of software systems. In reality, there won’t be adequate software fault data for a recently established project where the Cross-Project Fault Prediction (CPFP) model plays an important role. CPFP model utilizes other finished projects data to predict faults in ongoing projects. Existing CPFP methods concentrate on discrepancies in distribution between projects without exploring relevant source projects selection combined with distribution gap minimizing methods. Additionally, performing imbalance learning and feature extraction in software projects only balances the data and reduces features by eliminating redundant and unrelated features. This paper proposes a novel SRES method called Similarity and applicability based source projects selection, REsampling, and Stacked autoencoder (SRES) model. To analyze the performance of relevant source projects over CPFP, we proposed a new similarity and applicability based source projects selection method to automatically select sources for the target project. In addition, we introduced a new resampling method that balances source project data by generating data related to the target project, eliminating unrelated data, and reducing the distribution gap. Then, SRES uses the stacked autoencoder to extract informative intermediate feature data to further improve the prediction accuracy of the CPFP. SRES performs comparable to or superior to the conventional CPFP model on six different performance indicators over 24 projects by effectively addressing the issues of CPFP. In conclusion, we can ensure that resampling and feature reduction techniques, along with source projects selection can improve cross-project prediction performance.</p></div>","PeriodicalId":55414,"journal":{"name":"Automated Software Engineering","volume":"31 2","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142198467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficient resource allocation based on virtual network embedding for IoT data generation 基于虚拟网络嵌入的节能资源分配,用于物联网数据生成
IF 2 2区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-12 DOI: 10.1007/s10515-024-00463-8
Lizhuang Tan, Amjad Aldweesh, Ning Chen, Jian Wang, Jianyong Zhang, Yi Zhang, Konstantin Igorevich Kostromitin, Peiying Zhang

The Internet of Things (IoT) has become a core driver leading technological advancements and social transformations. Furthermore, data generation plays multiple roles in IoT, such as driving decision-making, achieving intelligence, promoting innovation, improving user experience, and ensuring security, making it a critical factor in promoting the development and application of IoT. Due to the vast scale of the network and the complexity of device interconnection, effective resource allocation has become crucial. Leveraging the flexibility of Network Virtualization technology in decoupling network functions and resources, this work proposes a Multi-Domain Virtual Network Embedding algorithm based on Deep Reinforcement Learning to provide energy-efficient resource allocation decision-making for IoT data generation. Specifically, we deploy a four-layer structured agent to calculate candidate IoT nodes and links that meet data generation requirements. Moreover, the agent is guided by the reward mechanism and gradient back-propagation algorithm for optimization. Finally, the effectiveness of the proposed method is validated through simulation experiments. Compared with other methods, our method improves the long-term revenue, long-term resource utilization, and allocation success rate by 15.78%, 15.56%, and 6.78%, respectively.

物联网(IoT)已成为引领技术进步和社会变革的核心驱动力。此外,数据生成在物联网中发挥着推动决策、实现智能、促进创新、改善用户体验和确保安全等多重作用,是促进物联网发展和应用的关键因素。由于网络规模庞大、设备互连复杂,有效的资源分配变得至关重要。本研究利用网络虚拟化技术在解耦网络功能和资源方面的灵活性,提出了一种基于深度强化学习的多域虚拟网络嵌入算法,为物联网数据生成提供高能效的资源分配决策。具体来说,我们部署了一个四层结构的代理来计算符合数据生成要求的候选物联网节点和链路。此外,代理在奖励机制和梯度反向传播算法的指导下进行优化。最后,通过模拟实验验证了所提方法的有效性。与其他方法相比,我们的方法在长期收入、长期资源利用率和分配成功率方面分别提高了 15.78%、15.56% 和 6.78%。
{"title":"Energy efficient resource allocation based on virtual network embedding for IoT data generation","authors":"Lizhuang Tan,&nbsp;Amjad Aldweesh,&nbsp;Ning Chen,&nbsp;Jian Wang,&nbsp;Jianyong Zhang,&nbsp;Yi Zhang,&nbsp;Konstantin Igorevich Kostromitin,&nbsp;Peiying Zhang","doi":"10.1007/s10515-024-00463-8","DOIUrl":"10.1007/s10515-024-00463-8","url":null,"abstract":"<div><p>The Internet of Things (IoT) has become a core driver leading technological advancements and social transformations. Furthermore, data generation plays multiple roles in IoT, such as driving decision-making, achieving intelligence, promoting innovation, improving user experience, and ensuring security, making it a critical factor in promoting the development and application of IoT. Due to the vast scale of the network and the complexity of device interconnection, effective resource allocation has become crucial. Leveraging the flexibility of Network Virtualization technology in decoupling network functions and resources, this work proposes a Multi-Domain Virtual Network Embedding algorithm based on Deep Reinforcement Learning to provide energy-efficient resource allocation decision-making for IoT data generation. Specifically, we deploy a four-layer structured agent to calculate candidate IoT nodes and links that meet data generation requirements. Moreover, the agent is guided by the reward mechanism and gradient back-propagation algorithm for optimization. Finally, the effectiveness of the proposed method is validated through simulation experiments. Compared with other methods, our method improves the long-term revenue, long-term resource utilization, and allocation success rate by 15.78%, 15.56%, and 6.78%, respectively.</p></div>","PeriodicalId":55414,"journal":{"name":"Automated Software Engineering","volume":"31 2","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142198468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on robustness attacks for deep code models 深度代码模型鲁棒性攻击调查
IF 2 2区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-08-09 DOI: 10.1007/s10515-024-00464-7
Yubin Qu, Song Huang, Yongming Yao

With the widespread application of deep learning in software engineering, deep code models have played an important role in improving code quality and development efficiency, promoting the intelligence and industrialization of software engineering. In recent years, the fragility of deep code models has been constantly exposed, with various attack methods emerging against deep code models and robustness attacks being a new attack paradigm. Adversarial samples after model deployment are generated to evade the predictions of deep code models, making robustness attacks a hot research direction. Therefore, to provide a comprehensive survey of robustness attacks on deep code models and their implications, this paper comprehensively analyzes the robustness attack methods in deep code models. Firstly, it analyzes the differences between robustness attacks and other attack paradigms, defines basic attack methods and processes, and then summarizes robustness attacks’ threat model, evaluation metrics, attack settings, etc. Furthermore, existing attack methods are classified from multiple dimensions, such as attacker knowledge and attack scenarios. In addition, common tasks, datasets, and deep learning models in robustness attack research are also summarized, introducing beneficial applications of robustness attacks in data augmentation, adversarial training, etc., and finally, looking forward to future key research directions.

随着深度学习在软件工程中的广泛应用,深度代码模型在提高代码质量和开发效率、促进软件工程智能化和产业化方面发挥了重要作用。近年来,深度代码模型的脆弱性不断暴露,针对深度代码模型的各种攻击方法层出不穷,鲁棒性攻击成为一种新的攻击范式。模型部署后会产生对抗样本,以规避深度代码模型的预测,这使得鲁棒性攻击成为一个热门的研究方向。因此,为了全面考察深度代码模型的鲁棒性攻击及其影响,本文全面分析了深度代码模型的鲁棒性攻击方法。首先分析了鲁棒性攻击与其他攻击范式的区别,定义了基本的攻击方法和流程,然后总结了鲁棒性攻击的威胁模型、评估指标、攻击设置等。此外,还从攻击者知识和攻击场景等多个维度对现有攻击方法进行了分类。此外,还总结了鲁棒性攻击研究中常见的任务、数据集和深度学习模型,介绍了鲁棒性攻击在数据增强、对抗训练等方面的有益应用,最后展望了未来的重点研究方向。
{"title":"A survey on robustness attacks for deep code models","authors":"Yubin Qu,&nbsp;Song Huang,&nbsp;Yongming Yao","doi":"10.1007/s10515-024-00464-7","DOIUrl":"10.1007/s10515-024-00464-7","url":null,"abstract":"<div><p>With the widespread application of deep learning in software engineering, deep code models have played an important role in improving code quality and development efficiency, promoting the intelligence and industrialization of software engineering. In recent years, the fragility of deep code models has been constantly exposed, with various attack methods emerging against deep code models and robustness attacks being a new attack paradigm. Adversarial samples after model deployment are generated to evade the predictions of deep code models, making robustness attacks a hot research direction. Therefore, to provide a comprehensive survey of robustness attacks on deep code models and their implications, this paper comprehensively analyzes the robustness attack methods in deep code models. Firstly, it analyzes the differences between robustness attacks and other attack paradigms, defines basic attack methods and processes, and then summarizes robustness attacks’ threat model, evaluation metrics, attack settings, etc. Furthermore, existing attack methods are classified from multiple dimensions, such as attacker knowledge and attack scenarios. In addition, common tasks, datasets, and deep learning models in robustness attack research are also summarized, introducing beneficial applications of robustness attacks in data augmentation, adversarial training, etc., and finally, looking forward to future key research directions.</p></div>","PeriodicalId":55414,"journal":{"name":"Automated Software Engineering","volume":"31 2","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141921312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Automated Software Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1