Skip to main content

Showing 1–8 of 8 results for author: Le, B D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.11161  [pdf, other

    cs.SE

    Adversarial Attacks on Code Models with Discriminative Graph Patterns

    Authors: Thanh-Dat Nguyen, Yang Zhou, Xuan Bach D. Le, Patanamon, Thongtanunam, David Lo

    Abstract: Pre-trained language models of code are now widely used in various software engineering tasks such as code generation, code completion, vulnerability detection, etc. This, in turn, poses security and reliability risks to these models. One of the important threats is \textit{adversarial attacks}, which can lead to erroneous predictions and largely affect model performance on downstream tasks. Curre… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

  2. Invalidator: Automated Patch Correctness Assessment via Semantic and Syntactic Reasoning

    Authors: Thanh Le-Cong, Duc-Minh Luong, Xuan Bach D. Le, David Lo, Nhat-Hoa Tran, Bui Quang-Huy, Quyet-Thang Huynh

    Abstract: Automated program repair (APR) faces the challenge of test overfitting, where generated patches pass validation tests but fail to generalize. Existing methods for patch assessment involve generating new tests or manual inspection, which can be time-consuming or biased. In this paper, we propose a novel technique, INVALIDATOR, to automatically assess the correctness of APR-generated patches via sem… ▽ More

    Submitted 17 March, 2023; v1 submitted 3 January, 2023; originally announced January 2023.

    Journal ref: IEEE Transactions on Software Engineering, 2023

  3. arXiv:2202.04313  [pdf, other

    cs.CR cs.SI

    Privacy Concerns Raised by Pervasive User Data Collection From Cyberspace and Their Countermeasures

    Authors: Yinhao Jiang, Ba Dung Le, Tanveer Zia, Praveen Gauravaram

    Abstract: The virtual dimension called `Cyberspace' built on internet technologies has served people's daily lives for decades. Now it offers advanced services and connected experiences with the develo** pervasive computing technologies that digitise, collect, and analyse users' activity data. This changes how user information gets collected and impacts user privacy at traditional cyberspace gateways, inc… ▽ More

    Submitted 9 February, 2022; originally announced February 2022.

    Comments: 32 pages, 3 figures

  4. Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges

    Authors: Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, MD Zahidul Islam, Leo Yu Zhang, MD Rafiqul Islam, Warren Armstrong

    Abstract: Advances of emerging Information and Communications Technology (ICT) technologies push the boundaries of what is possible and open up new markets for innovative ICT products and services. The adoption of ICT products and systems with security properties depends on consumers' confidence and markets' trust in the security functionalities and whether the assurance measures applied to these products m… ▽ More

    Submitted 2 April, 2022; v1 submitted 19 January, 2022; originally announced January 2022.

  5. arXiv:2201.00117  [pdf, other

    cs.SE cs.NE

    Usability and Aesthetics: Better Together for Automated Repair of Web Pages

    Authors: Thanh Le-Cong, Xuan Bach D. Le, Quyet-Thang Huynh, Phi-Le Nguyen

    Abstract: With the recent explosive growth of mobile devices such as smartphones or tablets, guaranteeing consistent web appearance across all environments has become a significant problem. This happens simply because it is hard to keep track of the web appearance on different sizes and types of devices that render the web pages. Therefore, fixing the inconsistent appearance of web pages can be difficult, a… ▽ More

    Submitted 1 January, 2022; originally announced January 2022.

    Comments: Accepted to ISSRE 2021, Research Track

    Journal ref: 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE 2021)

  6. arXiv:2102.12621  [pdf, other

    cs.CR

    Discrete Distribution Estimation with Local Differential Privacy: A Comparative Analysis

    Authors: Ba Dung Le, Tanveer Zia

    Abstract: Local differential privacy is a promising privacy-preserving model for statistical aggregation of user data that prevents user privacy leakage from the data aggregator. This paper focuses on the problem of estimating the distribution of discrete user values with Local differential privacy. We review and present a comparative analysis on the performance of the existing discrete distribution estimat… ▽ More

    Submitted 24 February, 2021; originally announced February 2021.

    Comments: Accepted for publication to SPT-IoT 2021: The Fifth Workshop on Security, Privacy and Trust in the Internet of Things

  7. arXiv:1907.01755  [pdf, other

    cs.CR cs.LG stat.ML

    Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification

    Authors: Ba Dung Le, Guanhua Wang, Mehwish Nasim, Ali Babar

    Abstract: Preventing organizations from Cyber exploits needs timely intelligence about Cyber vulnerabilities and attacks, referred as threats. Cyber threat intelligence can be extracted from various sources including social media platforms where users publish the threat information in real time. Gathering Cyber threat intelligence from social media sites is a time consuming task for security analysts that c… ▽ More

    Submitted 4 September, 2019; v1 submitted 3 July, 2019; originally announced July 2019.

    Comments: ACCEPTED by the 2019 International Conference on Cyberworlds (CW2019)

  8. arXiv:1805.05983  [pdf, other

    cs.SE

    On Reliability of Patch Correctness Assessment

    Authors: Xuan Bach D. Le, Lingfeng Bao, David Lo, Xin Xia, Shan** Li

    Abstract: Current state-of-the-art automatic software repair (ASR) techniques rely heavily on incomplete specifications, e.g., test suites, to generate repairs. This, however, may render ASR tools to generate incorrect repairs that do not generalize. To assess patch correctness, researchers have been following two typical ways separately: (1) Automated annotation, wherein patches are automatically labeled b… ▽ More

    Submitted 27 June, 2018; v1 submitted 15 May, 2018; originally announced May 2018.