Skip to main content

Showing 1–26 of 26 results for author: Meng, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.14261  [pdf, other

    cs.CV

    Unleashing the Potential of Tracklets for Unsupervised Video Person Re-Identification

    Authors: Nanxing Meng, Qizao Wang, Bin Li, Xiangyang Xue

    Abstract: With rich temporal-spatial information, video-based person re-identification methods have shown broad prospects. Although tracklets can be easily obtained with ready-made tracking models, annotating identities is still expensive and impractical. Therefore, some video-based methods propose using only a few identity annotations or camera labels to facilitate feature learning. They also simply averag… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

    Comments: The first two authors contributed equally

  2. arXiv:2310.02104  [pdf, other

    cs.SE

    An empirical study of ChatGPT-3.5 on question answering and code maintenance

    Authors: Md Mahir Asef Kabir, Sk Adnan Hassan, Xiaoyin Wang, Ying Wang, Hai Yu, Na Meng

    Abstract: Ever since the launch of ChatGPT in 2022, a rising concern is whether ChatGPT will replace programmers and kill jobs. Motivated by this widespread concern, we conducted an empirical study to systematically compare ChatGPT against programmers in question-answering and software-maintaining. We reused a dataset introduced by prior work, which includes 130 StackOverflow (SO) discussion threads referre… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

  3. arXiv:2310.00710  [pdf, other

    cs.CR cs.SE

    How well does LLM generate security tests?

    Authors: Ying Zhang, Wenjia Song, Zhengjie Ji, Danfeng, Yao, Na Meng

    Abstract: Developers often build software on top of third-party libraries (Libs) to improve programmer productivity and software quality. The libraries may contain vulnerabilities exploitable by hackers to attack the applications (Apps) built on top of them. People refer to such attacks as supply chain attacks, the documented number of which has increased 742% in 2022. People created tools to mitigate such… ▽ More

    Submitted 2 October, 2023; v1 submitted 1 October, 2023; originally announced October 2023.

  4. arXiv:2308.09573  [pdf, other

    cs.SE

    How Do Java Developers Reuse StackOverflow Answers in Their GitHub Projects?

    Authors: Juntong Chen, Kulendra Kumar Kaushal, Rutwik Kulkarni, Na Meng

    Abstract: StackOverflow (SO) is a widely used question-and-answer (Q\&A) website for software developers and computer scientists. GitHub is an online development platform used for storing, tracking, and collaborating on software projects. Prior work relates the information mined from both platforms to link user accounts or compare developers' activities across platforms. However, not much work is done to ch… ▽ More

    Submitted 18 August, 2023; originally announced August 2023.

    Comments: 12 pages

  5. arXiv:2306.02270  [pdf, other

    cs.CR

    Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling

    Authors: Wenjia Song, Sanjula Karanam, Ya Xiao, **gyuan Qi, Nathan Dautenhahn, Na Meng, Elena Ferrari, Danfeng, Yao

    Abstract: Crypto-ransomware has caused an unprecedented scope of impact in recent years with an evolving level of sophistication. We are in urgent need to pinpoint the security gap and improve the effectiveness of defenses by identifying new detection approaches. In this paper, we quantitatively characterized the runtime behaviors of 54 ransomware samples from 35 distinct families, with a focus on the core… ▽ More

    Submitted 9 October, 2023; v1 submitted 4 June, 2023; originally announced June 2023.

  6. arXiv:2303.02604  [pdf

    cs.RO

    Two-Stage Gras**: A New Bin Picking Framework for Small Objects

    Authors: Hanwen Cao, Jianshu Zhou, Junda Huang, Yichuan Li, Ng Cheng Meng, Rui Cao, Qi Dou, Yunhui Liu

    Abstract: This paper proposes a novel bin picking framework, two-stage gras**, aiming at precise gras** of cluttered small objects. Object density estimation and rough gras** are conducted in the first stage. Fine segmentation, detection, gras**, and pushing are performed in the second stage. A small object bin picking system has been realized to exhibit the concept of two-stage gras**. Experiment… ▽ More

    Submitted 6 May, 2023; v1 submitted 5 March, 2023; originally announced March 2023.

    Comments: ICRA 2023

  7. Unsupervised Light Field Depth Estimation via Multi-view Feature Matching with Occlusion Prediction

    Authors: Shansi Zhang, Nan Meng, Edmund Y. Lam

    Abstract: Depth estimation from light field (LF) images is a fundamental step for numerous applications. Recently, learning-based methods have achieved higher accuracy and efficiency than the traditional methods. However, it is costly to obtain sufficient depth labels for supervised training. In this paper, we propose an unsupervised framework to estimate depth from LF images. First, we design a disparity e… ▽ More

    Submitted 18 August, 2023; v1 submitted 20 January, 2023; originally announced January 2023.

  8. arXiv:2211.10085  [pdf, ps, other

    cs.AI

    Identifying Unique Causal Network from Nonstationary Time Series

    Authors: Mingyu Kang, Duxin Chen, Ning Meng, Gang Yan, Wenwu Yu

    Abstract: Identifying causality is a challenging task in many data-intensive scenarios. Many algorithms have been proposed for this critical task. However, most of them consider the learning algorithms for directed acyclic graph (DAG) of Bayesian network (BN). These BN-based models only have limited causal explainability because of the issue of Markov equivalence class. Moreover, they are dependent on the a… ▽ More

    Submitted 29 August, 2023; v1 submitted 18 November, 2022; originally announced November 2022.

    Comments: This manuscript are submitted so that other researchers can follow. The code of this work is available at: https://github.com/KMY-SEU/HCE. Many thanks for supports!

  9. LRT: An Efficient Low-Light Restoration Transformer for Dark Light Field Images

    Authors: Shansi Zhang, Nan Meng, Edmund Y. Lam

    Abstract: Light field (LF) images containing information for multiple views have numerous applications, which can be severely affected by low-light imaging. Recent learning-based methods for low-light enhancement have some disadvantages, such as a lack of noise suppression, complex training process and poor performance in extremely low-light conditions. To tackle these deficiencies while fully utilizing the… ▽ More

    Submitted 15 March, 2023; v1 submitted 5 September, 2022; originally announced September 2022.

  10. arXiv:2207.11239  [pdf, other

    cs.LG cs.HC

    Machine learning approach in the development of building occupant personas

    Authors: Sheik Murad Hassan Anik, Xinghua Gao, Na Meng

    Abstract: The user persona is a communication tool for designers to generate a mental model that describes the archetype of users. Develo** building occupant personas is proven to be an effective method for human-centered smart building design, which considers occupant comfort, behavior, and energy consumption. Optimization of building energy consumption also requires a deep understanding of occupants' pr… ▽ More

    Submitted 19 July, 2022; originally announced July 2022.

    Comments: 12 pages, 4 figures

  11. arXiv:2204.09300  [pdf, ps, other

    cs.IT

    Heavy-Ball-Based Hard Thresholding Algorithms for Sparse Signal Recovery

    Authors: Zhong-Feng Sun, **-Chuan Zhou, Yun-Bin Zhao, Nan Meng

    Abstract: The hard thresholding technique plays a vital role in the development of algorithms for sparse signal recovery. By merging this technique and heavy-ball acceleration method which is a multi-step extension of the traditional gradient descent method, we propose the so-called heavy-ball-based hard thresholding (HBHT) and heavy-ball-based hard thresholding pursuit (HBHTP) algorithms for signal recover… ▽ More

    Submitted 20 April, 2022; originally announced April 2022.

  12. arXiv:2203.09009  [pdf, other

    cs.CR cs.SE

    Example-Based Vulnerability Detection and Repair in Java Code

    Authors: Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Danfeng, Yao, Na Meng

    Abstract: The Java libraries JCA and JSSE offer cryptographic APIs to facilitate secure coding. When developers misuse some of the APIs, their code becomes vulnerable to cyber-attacks. To eliminate such vulnerabilities, people built tools to detect security-API misuses via pattern matching. However, most tools do not (1) fix misuses or (2) allow users to extend tools' pattern sets. To overcome both limitati… ▽ More

    Submitted 28 April, 2022; v1 submitted 16 March, 2022; originally announced March 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2102.06994

  13. arXiv:2107.06550  [pdf, other

    cs.SE

    FAPR: Fast and Accurate Program Repair for Introductory Programming Courses

    Authors: Yunlong Lu, Na Meng, Wenxin Li

    Abstract: In introductory programming courses, it is challenging for instructors to provide debugging feedback on students' incorrect programs. Some recent tools automatically offer program repair feedback by identifying any differences between incorrect and correct programs, but suffer from issues related to scalability, accuracy, and cross-language portability. This paper presents FAPR -- our novel approa… ▽ More

    Submitted 14 July, 2021; originally announced July 2021.

    Comments: 12 pages, 5 figures for main text; 3 pages, 5 figures for appendix

  14. arXiv:2105.02389  [pdf, other

    cs.SE

    Migrating Client Code without Change Examples

    Authors: Hao Zhong, Na Meng

    Abstract: API developers evolve software libraries to fix bugs, add new features, or refactor code. To benefit from such library evolution, the programmers of client projects have to repetitively upgrade their library usages and adapt their codebases to any library API breaking changes (e.g., API renaming). Such adaptive changes can be tedious and error-prone. Existing tools provide limited support to help… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

    ACM Class: D.2.3; D.2.7

  15. arXiv:2102.13026  [pdf

    cs.SE

    A Lightweight Approach of Human-Like Playtesting

    Authors: Yan Zhao, Weihao Zhang, Enyi Tang, Haipeng Cai, Xi Guo, Na Meng

    Abstract: A playtest is the process in which human testers are recruited to play video games and to reveal software bugs. Manual testing is expensive and time-consuming, especially when there are many mobile games to test and every software version requires for extensive testing before being released. Existing testing frameworks (e.g., Android Monkey) are limited because they adopt no domain knowledge to pl… ▽ More

    Submitted 25 February, 2021; originally announced February 2021.

    Comments: 12 pages, 15 figures

  16. arXiv:2102.12105  [pdf, other

    cs.SE

    Hero: On the Chaos When PATH Meets Modules

    Authors: Ying Wang, Liang Qiao, Chang Xu, Yepang Liu, Shing-Chi Cheung, Na Meng, Hai Yu, Zhiliang Zhu

    Abstract: Ever since its first release in 2009, the Go programming language (Golang) has been well received by software communities. A major reason for its success is the powerful support of library-based development, where a Golang project can be conveniently built on top of other projects by referencing them as libraries. As Golang evolves, it recommends the use of a new library-referencing mode to overco… ▽ More

    Submitted 24 February, 2021; v1 submitted 24 February, 2021; originally announced February 2021.

    Comments: Accepted by ICSE 2021

  17. arXiv:2102.11307  [pdf, other

    cs.SE

    Automatic Detection and Resolution of Software Merge Conflicts: Are We There Yet?

    Authors: Bowen Shen, Cihan Xiao, Na Meng, Fei He

    Abstract: Developers create software branches for tentative feature addition and bug fixing, and periodically merge branches to release software with new features or repairing patches. When the program edits from different branches textually overlap (i.e., textual conflicts), or the co-application of those edits lead to compilation or runtime errors (i.e., compiling or dynamic conflicts), it is challenging… ▽ More

    Submitted 2 March, 2021; v1 submitted 22 February, 2021; originally announced February 2021.

  18. arXiv:2102.07877  [pdf, other

    cs.SE cs.PL

    Investigating and Recommending Co-Changed Entities for JavaScript Programs

    Authors: Zijian Jiang, Hao Zhong, Na Meng

    Abstract: JavaScript (JS) is one of the most popular programming languages due to its flexibility and versatility, but maintaining JS code is tedious and error-prone. In our research, we conducted an empirical study to characterize the relationship between co-changed software entities (e.g., functions and variables), and built a machine learning (ML)-based approach to recommend additional entity to edit giv… ▽ More

    Submitted 17 February, 2021; v1 submitted 15 February, 2021; originally announced February 2021.

  19. arXiv:2102.06994  [pdf, other

    cs.CR cs.SE

    Data-Driven Vulnerability Detection and Repair in Java Code

    Authors: Ying Zhang, Mahir Kabir, Ya Xiao, Danfeng, Yao, Na Meng

    Abstract: Java platform provides various APIs to facilitate secure coding. However, correctly using security APIs is usually challenging for developers who lack cybersecurity training. Prior work shows that many developers misuse security APIs; such misuses can introduce vulnerabilities into software, void security protections, and present security exploits to hackers. To eliminate such API-related vulnerab… ▽ More

    Submitted 13 February, 2021; originally announced February 2021.

  20. Light Field View Synthesis via Aperture Disparity and War** Confidence Map

    Authors: Nan Meng, Kai Li, Jianzhuang Liu, Edmund Y. Lam

    Abstract: This paper presents a learning-based approach to synthesize the view from an arbitrary camera position given a sparse set of images. A key challenge for this novel view synthesis arises from the reconstruction process, when the views from different input images may not be consistent due to obstruction in the light path. We overcome this by jointly modeling the epipolar property and occlusion in de… ▽ More

    Submitted 3 April, 2021; v1 submitted 7 September, 2020; originally announced September 2020.

    Comments: 14 pages, 14 figures

    Journal ref: IEEE Transactions on Image Processing 30 (2021): 3908-3921

  21. arXiv:2007.14319  [pdf, other

    cs.CR

    Coding Practices and Recommendations of Spring Security for Enterprise Applications

    Authors: Mazharul Islam, Sazzadur Rahaman, Na Meng, Behnaz Hassanshahi, Padmanabhan Krishnan, Danfeng, Yao

    Abstract: Spring security is tremendously popular among practitioners for its ease of use to secure enterprise applications. In this paper, we study the application framework misconfiguration vulnerabilities in the light of Spring security, which is relatively understudied in the existing literature. Towards that goal, we identify 6 types of security anti-patterns and 4 insecure vulnerable defaults by condu… ▽ More

    Submitted 28 July, 2020; originally announced July 2020.

    Journal ref: IEEE Secure Development Conference. Atlanta, GA, September 2020

  22. arXiv:2003.13094  [pdf, other

    eess.IV cs.CV

    High-Order Residual Network for Light Field Super-Resolution

    Authors: Nan Meng, Xiaofei Wu, Jianzhuang Liu, Edmund Y. Lam

    Abstract: Plenoptic cameras usually sacrifice the spatial resolution of their SAIs to acquire geometry information from different viewpoints. Several methods have been proposed to mitigate such spatio-angular trade-off, but seldom make use of the structural properties of the light field (LF) data efficiently. In this paper, we propose a novel high-order residual network to learn the geometric features hiera… ▽ More

    Submitted 29 March, 2020; originally announced March 2020.

    Comments: 9 pages, 14 figures, accepted by the thirty-fourth AAAI Conference on Artificial Intelligence

  23. High-dimensional Dense Residual Convolutional Neural Network for Light Field Reconstruction

    Authors: Nan Meng, Hayden K. -H. So, Xing Sun, Edmund Y. Lam

    Abstract: We consider the problem of high-dimensional light field reconstruction and develop a learning-based framework for spatial and angular super-resolution. Many current approaches either require disparity clues or restore the spatial and angular details separately. Such methods have difficulties with non-Lambertian surfaces or occlusions. In contrast, we formulate light field super-resolution (LFSR) a… ▽ More

    Submitted 17 September, 2020; v1 submitted 3 October, 2019; originally announced October 2019.

    Comments: 14 pages. IEEE Transactions on Pattern Analysis and Machine Intelligence (2019)

  24. arXiv:1901.01327  [pdf, other

    cs.SE cs.CR

    How Reliable is the Crowdsourced Knowledge of Security Implementation?

    Authors: Mengsu Chen, Felix Fischer, Na Meng, Xiaoyin Wang, Jens Grossklags

    Abstract: Stack Overflow (SO) is the most popular online Q&A site for developers to share their expertise in solving programming issues. Given multiple answers to certain questions, developers may take the accepted answer, the answer from a person with high reputation, or the one frequently suggested. However, researchers recently observed exploitable security vulnerabilities in popular SO answers. This obs… ▽ More

    Submitted 4 January, 2019; originally announced January 2019.

  25. arXiv:1807.11184  [pdf, other

    cs.SE

    Automatic Clone Recommendation for Refactoring Based on the Present and the Past

    Authors: Ruru Yue, Zhe Gao, Na Meng, Yingfei Xiong, Xiaoyin Wang, J. David Morgenthaler

    Abstract: When many clones are detected in software programs, not all clones are equally important to developers. To help developers refactor code and improve software quality, various tools were built to recommend clone-removal refactorings based on the past and the present information, such as the cohesion degree of individual clones or the co-evolution relations of clone peers. The existence of these too… ▽ More

    Submitted 30 July, 2018; originally announced July 2018.

    Comments: Accepted by ICSME 2018

  26. arXiv:1709.09970  [pdf, other

    cs.CR

    Secure Coding Practices in Java: Challenges and Vulnerabilities

    Authors: Na Meng, Stefan Nagy, Daphne Yao, Wenjie Zhuang, Gustavo Arango Argoty

    Abstract: Java platform and third-party libraries provide various security features to facilitate secure coding. However, misusing these features can cost tremendous time and effort of developers or cause security vulnerabilities in software. Prior research was focused on the misuse of cryptography and SSL APIs, but did not explore the key fundamental research question: what are the biggest challenges and v… ▽ More

    Submitted 28 September, 2017; originally announced September 2017.