Alert button
Picture for Tim Menzies

Tim Menzies

Alert button

SMOOTHIE: A Theory of Hyper-parameter Optimization for Software Analytics

Jan 17, 2024
Rahul Yedida, Tim Menzies

Viaarxiv icon

Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports

Jan 03, 2024
Md Rayhanur Rahman, Brandon Wroblewski, Quinn Matthews, Brantley Morgan, Tim Menzies, Laurie Williams

Viaarxiv icon

Less, but Stronger: On the Value of Strong Heuristics in Semi-supervised Learning for Software Analytics

Feb 03, 2023
Huy Tu, Tim Menzies

Figure 1 for Less, but Stronger: On the Value of Strong Heuristics in Semi-supervised Learning for Software Analytics
Figure 2 for Less, but Stronger: On the Value of Strong Heuristics in Semi-supervised Learning for Software Analytics
Figure 3 for Less, but Stronger: On the Value of Strong Heuristics in Semi-supervised Learning for Software Analytics
Figure 4 for Less, but Stronger: On the Value of Strong Heuristics in Semi-supervised Learning for Software Analytics
Viaarxiv icon

Don't Lie to Me: Avoiding Malicious Explanations with STEALTH

Jan 25, 2023
Lauren Alvarez, Tim Menzies

Figure 1 for Don't Lie to Me: Avoiding Malicious Explanations with STEALTH
Figure 2 for Don't Lie to Me: Avoiding Malicious Explanations with STEALTH
Figure 3 for Don't Lie to Me: Avoiding Malicious Explanations with STEALTH
Figure 4 for Don't Lie to Me: Avoiding Malicious Explanations with STEALTH
Viaarxiv icon

Optimizing Predictions for Very Small Data Sets: a case study on Open-Source Project Health Prediction

Jan 16, 2023
Andre Lustosa, Tim Menzies

Figure 1 for Optimizing Predictions for Very Small Data Sets: a case study on Open-Source Project Health Prediction
Figure 2 for Optimizing Predictions for Very Small Data Sets: a case study on Open-Source Project Health Prediction
Figure 3 for Optimizing Predictions for Very Small Data Sets: a case study on Open-Source Project Health Prediction
Figure 4 for Optimizing Predictions for Very Small Data Sets: a case study on Open-Source Project Health Prediction
Viaarxiv icon

A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning

Nov 25, 2022
Guanqin Zhang, Jiankun Sun, Feng Xu, H. M. N. Dilum Bandara, Shiping Chen, Yulei Sui, Tim Menzies

Figure 1 for A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning
Figure 2 for A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning
Figure 3 for A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning
Figure 4 for A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning
Viaarxiv icon

When Less is More: On the Value of "Co-training" for Semi-Supervised Software Defect Predictors

Nov 10, 2022
Suvodeep Majumder, Joymallya Chakraborty, Tim Menzies

Figure 1 for When Less is More: On the Value of "Co-training" for Semi-Supervised Software Defect Predictors
Figure 2 for When Less is More: On the Value of "Co-training" for Semi-Supervised Software Defect Predictors
Figure 3 for When Less is More: On the Value of "Co-training" for Semi-Supervised Software Defect Predictors
Figure 4 for When Less is More: On the Value of "Co-training" for Semi-Supervised Software Defect Predictors
Viaarxiv icon

How to Find Actionable Static Analysis Warnings

May 21, 2022
Rahul Yedida, Hong Jin Kang, Huy Tu, Xueqi Yang, David Lo, Tim Menzies

Figure 1 for How to Find Actionable Static Analysis Warnings
Figure 2 for How to Find Actionable Static Analysis Warnings
Figure 3 for How to Find Actionable Static Analysis Warnings
Figure 4 for How to Find Actionable Static Analysis Warnings
Viaarxiv icon

Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue

Mar 22, 2022
Rui Shu, Tianpei Xia, Laurie Williams, Tim Menzies

Figure 1 for Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue
Figure 2 for Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue
Figure 3 for Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue
Figure 4 for Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue
Viaarxiv icon