Skip to main content

Showing 1–6 of 6 results for author: Bewong, M

Searching in archive cs. Search in all archives.
.
  1. Malicious Package Detection using Metadata Information

    Authors: S. Halder, M. Bewong, A. Mahboubi, Y. Jiang, R. Islam, Z. Islam, R. Ip, E. Ahmed, G. Ramachandran, A. Babar

    Abstract: Protecting software supply chains from malicious packages is paramount in the evolving landscape of software development. Attacks on the software supply chain involve attackers injecting harmful software into commonly used packages or libraries in a software repository. For instance, JavaScript uses Node Package Manager (NPM), and Python uses Python Package Index (PyPi) as their respective package… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

  2. arXiv:2305.06528  [pdf, other

    cs.DB

    A Semi-Automated Hybrid Schema Matching Framework for Vegetation Data Integration

    Authors: Md Asif-Ur-Rahman, Bayzid Ashik Hossain, Michael Bewong, Md Zahidul Islam, Yanchang Zhao, Jeremy Groves, Rory Judith

    Abstract: Integrating disparate and distributed vegetation data is critical for consistent and informed national policy development and management. Australia's National Vegetation Information System (NVIS) under the Department of Climate Change, Energy, the Environment and Water (DCCEEW) is the only nationally consistent vegetation database and hierarchical typology of vegetation types in different location… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

  3. arXiv:2304.10511  [pdf, other

    cs.CR cs.AI cs.LG

    OutCenTR: A novel semi-supervised framework for predicting exploits of vulnerabilities in high-dimensional datasets

    Authors: Hadi Eskandari, Michael Bewong, Sabih ur Rehman

    Abstract: An ever-growing number of vulnerabilities are reported every day. Yet these vulnerabilities are not all the same; Some are more targeted than others. Correctly estimating the likelihood of a vulnerability being exploited is a critical task for system administrators. This aids the system administrators in prioritizing and patching the right vulnerabilities. Our work makes use of outlier detection t… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

    Comments: 11 pages, 6 figures

  4. arXiv:2304.02323  [pdf, other

    cs.DB

    FASTAGEDS: Fast Approximate Graph Entity Dependency Discovery

    Authors: Guangtong Zhou, Selasi Kwashie, Yidi Zhang, Michael Bewong, Vincent M. Nofong, Debo Cheng, Keqing He, Zaiwen Feng

    Abstract: This paper studies the discovery of approximate rules in property graphs. We propose a semantically meaningful measure of error for mining graph entity dependencies (GEDs) at almost hold, to tolerate errors and inconsistencies that exist in real-world graphs. We present a new characterisation of GED satisfaction, and devise a depth-first search strategy to traverse the search space of candidate ru… ▽ More

    Submitted 8 April, 2023; v1 submitted 5 April, 2023; originally announced April 2023.

    Comments: 7 pages, 5 figures. arXiv admin note: text overlap with arXiv:2301.06264

  5. arXiv:2301.06264  [pdf, other

    cs.DB

    An Efficient Approach for Discovering Graph Entity Dependencies (GEDs)

    Authors: Dehua Liu, Selasi Kwashie, Yidi Zhang, Guangtong Zhou, Michael Bewong, Xiaoying Wu, Xi Guo, Keqing He, Zaiwen Feng

    Abstract: Graph entity dependencies (GEDs) are novel graph constraints, unifying keys and functional dependencies, for property graphs. They have been found useful in many real-world data quality and data management tasks, including fact checking on social media networks and entity resolution. In this paper, we study the discovery problem of GEDs -- finding a minimal cover of valid GEDs in a given graph dat… ▽ More

    Submitted 30 June, 2023; v1 submitted 16 January, 2023; originally announced January 2023.

  6. arXiv:1908.04464  [pdf, other

    cs.DB cs.IR

    Linking Graph Entities with Multiplicity and Provenance

    Authors: Jixue Liu, Selasi Kwashie, Jiuyong Li, Lin Liu, Michael Bewong

    Abstract: Entity linking and resolution is a fundamental database problem with applications in data integration, data cleansing, information retrieval, knowledge fusion, and knowledge-base population. It is the task of accurately identifying multiple, differing, and possibly contradicting representations of the same real-world entity in data. In this work, we propose an entity linking and resolution system… ▽ More

    Submitted 25 November, 2019; v1 submitted 12 August, 2019; originally announced August 2019.

    Comments: 7 pages, 5 figures