Alert button
Picture for Triet H. M. Le

Triet H. M. Le

Alert button

Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study

Add code
Bookmark button
Alert button
Jan 20, 2024
Triet H. M. Le, Xiaoning Du, M. Ali Babar

Viaarxiv icon

Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches

Add code
Bookmark button
Alert button
Jul 24, 2022
Triet H. M. Le

Figure 1 for Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches
Figure 2 for Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches
Figure 3 for Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches
Figure 4 for Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches
Viaarxiv icon

On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models

Add code
Bookmark button
Alert button
Mar 16, 2022
Triet H. M. Le, M. Ali Babar

Figure 1 for On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models
Figure 2 for On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models
Figure 3 for On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models
Figure 4 for On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models
Viaarxiv icon

Automated Security Assessment for the Internet of Things

Add code
Bookmark button
Alert button
Sep 09, 2021
Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar

Figure 1 for Automated Security Assessment for the Internet of Things
Figure 2 for Automated Security Assessment for the Internet of Things
Figure 3 for Automated Security Assessment for the Internet of Things
Figure 4 for Automated Security Assessment for the Internet of Things
Viaarxiv icon

DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning

Add code
Bookmark button
Alert button
Aug 18, 2021
Triet H. M. Le, David Hin, Roland Croft, M. Ali Babar

Figure 1 for DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning
Figure 2 for DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning
Figure 3 for DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning
Figure 4 for DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning
Viaarxiv icon

A Survey on Data-driven Software Vulnerability Assessment and Prioritization

Add code
Bookmark button
Alert button
Jul 25, 2021
Triet H. M. Le, Huaming Chen, M. Ali Babar

Figure 1 for A Survey on Data-driven Software Vulnerability Assessment and Prioritization
Figure 2 for A Survey on Data-driven Software Vulnerability Assessment and Prioritization
Figure 3 for A Survey on Data-driven Software Vulnerability Assessment and Prioritization
Figure 4 for A Survey on Data-driven Software Vulnerability Assessment and Prioritization
Viaarxiv icon

PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning

Add code
Bookmark button
Alert button
Mar 08, 2020
Triet H. M. Le, David Hin, Roland Croft, M. Ali Babar

Figure 1 for PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning
Figure 2 for PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning
Figure 3 for PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning
Figure 4 for PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning
Viaarxiv icon

Deep Learning for Source Code Modeling and Generation: Models, Applications and Challenges

Add code
Bookmark button
Alert button
Feb 13, 2020
Triet H. M. Le, Hao Chen, M. Ali Babar

Figure 1 for Deep Learning for Source Code Modeling and Generation: Models, Applications and Challenges
Figure 2 for Deep Learning for Source Code Modeling and Generation: Models, Applications and Challenges
Figure 3 for Deep Learning for Source Code Modeling and Generation: Models, Applications and Challenges
Figure 4 for Deep Learning for Source Code Modeling and Generation: Models, Applications and Challenges
Viaarxiv icon