|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 937 occurrences of 669 keywords
|
|
|
Results
Found 1012 publication records. Showing 1012 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
83 | Radu Marinescu 0001 |
Detecting Design Flaws via Metrics in Object-Oriented Systems. |
TOOLS (39) |
2001 |
DBLP DOI BibTeX RDF |
metrics, Reengineering, design flaws, problem detection |
78 | Laura Falk, Atul Prakash 0001, Kevin Borders |
Analyzing websites for user-visible security design flaws. |
SOUPS |
2008 |
DBLP DOI BibTeX RDF |
|
69 | Mazeiar Salehie, Shimin Li, Ladan Tahvildari |
A Metric-Based Heuristic Framework to Detect Object-Oriented Design Flaws. |
ICPC |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Mary Lou Soffa |
Path Sensitive Analysis for Security Flaws. |
HASE |
2008 |
DBLP DOI BibTeX RDF |
|
60 | Miguel Carrasco, Domingo Mery |
Automatic Multiple Visual Inspection on Non-calibrated Image Sequence with Intermediate Classifier Block. |
PSIVT |
2007 |
DBLP DOI BibTeX RDF |
computer vision, industrial applications, defect detection, multiple view geometry, automated visual inspection |
58 | Petru Florin Mihancea, Radu Marinescu 0001 |
Towards the Optimization of Automatic Detection of Design Flaws in Object-Oriented Software Systems. |
CSMR |
2005 |
DBLP DOI BibTeX RDF |
metrics, object-oriented design, threshold, design flaws |
58 | Raphael Chung-Wei Phan, Huo-Chong Ling |
Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs. |
IWDW |
2004 |
DBLP DOI BibTeX RDF |
Watermark detection protocol, flaws, generic, identification, zero knowledge proof |
53 | Dennis K. Nilsson, Phillip A. Porras, Erland Jonsson |
How to Secure Bluetooth-Based Pico Networks. |
SAFECOMP |
2007 |
DBLP DOI BibTeX RDF |
pico networks, security controls, implementation flaws, Bluetooth, design flaws |
52 | José Meseguer 0001, Ralf Sasse, Helen J. Wang, Yi-Min Wang |
A Systematic Approach to Uncover Security Flaws in GUI Logic. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Radu Marinescu 0001 |
Detection Strategies: Metrics-Based Rules for Detecting Design Flaws. |
ICSM |
2004 |
DBLP DOI BibTeX RDF |
metrics, object-oriented design, quality assurance, design heuristics, design flaws |
49 | Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi |
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
authentication protocol specifications, flaws, automatic formal algorithm, protocol roles, intruder communication abilities, intruder computational abilities, protocol instrumentations, formal verification, encryption, message authentication, decryption, attack scenarios, deductive system |
48 | Kyung-suk Lhee, Steve J. Chapin |
Detection of file-based race conditions. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Time-of-check-to-time-of-use (TOCTTOU) flaws, Security, Race condition |
48 | Sam Weber, Paul A. Karger, Amit M. Paradkar |
A software flaw taxonomy: aiming tools at security. |
ACM SIGSOFT Softw. Eng. Notes |
2005 |
DBLP DOI BibTeX RDF |
argument validation, asynchronous attacks, security taxonomies, testing, static analysis, buffer overflows, security flaws |
44 | Jörg P. Müller, Bernhard Bauer |
Agent-Oriented Software Technologies: Flaws and Remedies. |
AOSE |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Howard A. Sholl, Kevin Morris, James Norris |
A Multimicroprocessor System for Real-Time Classification of Railroad Track Flaws. |
IEEE Trans. Computers |
1982 |
DBLP DOI BibTeX RDF |
pipeline system, railroad track flaws, pattern recognition, real-time system, Multiple processor |
40 | Wenliang Du, Aditya P. Mathur |
Testing for Software Vulnerability Using Environment Perturbation. |
DSN |
2000 |
DBLP DOI BibTeX RDF |
environment perturbation, fault injection, Security testing, security flaws |
36 | François Plumerault, Baptiste David |
Exploiting flaws in Windbg: how to escape or fool debuggers from existing flaws. |
J. Comput. Virol. Hacking Tech. |
2020 |
DBLP DOI BibTeX RDF |
|
36 | Katja Tuma, Riccardo Scandariato, Musard Balliu |
Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis. |
ICSA |
2019 |
DBLP DOI BibTeX RDF |
|
35 | Marco Pistoia, Stephen J. Fink, Robert J. Flynn, Eran Yahav |
When Role Models Have Flaws: Static Validation of Enterprise Security Policies. |
ICSE |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Giuseppe Acciani, Gioacchino Brunetti, Ernesto Chiarantoni, Girolamo Fornarelli |
Automatic Evaluation of Flaws in Pipes by means of Ultrasonic Waveforms and Neural Networks. |
IJCNN |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Guilin Wang, Sihan Qing |
Security Flaws in Several Group Signatures Proposed by Popescu. |
ICCSA (3) |
2005 |
DBLP DOI BibTeX RDF |
digital signature, information security, group signature |
35 | Thierry Miceli, Houari A. Sahraoui, Robert Godin |
A Metric Based Technique for Design Flaws Detection and Correction. |
ASE |
1999 |
DBLP DOI BibTeX RDF |
OO Metric, OO Reengineering, Quality estimation models |
35 | Keishi Tajima |
Static Detection of Security Flaws in Object-Oriented Databases. |
SIGMOD Conference |
1996 |
DBLP DOI BibTeX RDF |
|
34 | Matt Bishop |
About Penetration Testing. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Ching-Liang Su |
Robotic Intelligence for Industrial Automation: Object Flaw Auto Detection and Pattern Recognition by Object Location Searching, Object Alignment, and Geometry Comparison. |
J. Intell. Robotic Syst. |
2002 |
DBLP DOI BibTeX RDF |
image inspection, image movement, image subtraction, geometry matching |
34 | Richard E. Smith |
Cost profile of a highly assured, secure operating system. |
ACM Trans. Inf. Syst. Secur. |
2001 |
DBLP DOI BibTeX RDF |
LOCK (Logical Coprocessing Kernel), security kernels |
31 | Herbert H. Thompson |
Application Penetration Testing. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
software testing, QA, security vulnerabilities, security flaws |
31 | Richard E. Smith |
Mandatory Protection for Internet Server Software. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
multilevel security applications, Internet server software, server overrun, attack code, server host, mandatory protection mechanisms, commercial systems, Unix chroot isolation, type enforcement, server protection, Internet, MLS, security flaws |
27 | Guoqiang Shu, Yating Hsu, David Lee 0001 |
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning. |
FORTE |
2008 |
DBLP DOI BibTeX RDF |
Fuzz testing, Security Testing, Protocol Synthesis |
27 | Angela Lozano |
A methodology to assess the impact of source code flaws in changeability, and its application to clones. |
ICSM |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Toshinori Araki, Satoshi Obana |
Flaws in Some Secret Sharing Schemes Against Cheating. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Rafael Bailón-Moreno, Encarnación Jurado-Alameda, Rosario Ruiz-Baños, Jean Pierre Courtial |
Bibliometric laws: Empirical flaws of fit. |
Scientometrics |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Michael C. Martin, V. Benjamin Livshits, Monica S. Lam |
Finding application errors and security flaws using PQL: a program query language. |
OOPSLA |
2005 |
DBLP DOI BibTeX RDF |
resource leaks, web applications, pattern matching, SQL injection, bug finding, program traces |
27 | Patrick Baudisch, Desney S. Tan, Drew Steedly, Eric Rudolph, Matthew Uyttendaele, Chris Pal, Richard Szeliski |
Panoramic viewfinder: providing a real-time preview to help users avoid flaws in panoramic pictures. |
OZCHI |
2005 |
DBLP DOI BibTeX RDF |
user interface, real-time, interactive, panorama, stitching, preview |
27 | Greg Goth |
IE Security Flaws Spike Interest in Alternative Browsers. |
IEEE Internet Comput. |
2004 |
DBLP DOI BibTeX RDF |
Opera, alternative browsers, IE, Firefox, browser security |
27 | Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, T. J. Jankun-Kelly |
Detecting Flaws and Intruders with Visual Data Analysis. |
IEEE Computer Graphics and Applications |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Phong Q. Nguyen |
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
GnuPG, GPG, Cryptanalysis, Implementation, RSA, Public-key cryptography, ElGamal, OpenPGP |
27 | Heikki Verta, Titos Saridakis |
Detection of Heap Management Flaws in Component-Based Software. |
EUROMICRO |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Nick L. Petroni Jr., William A. Arbaugh |
The Dangers of Mitigating Security Design Flaws: A Wireless Case Study. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
Wireless Network Security |
27 | Masayuki Abe, Hideki Imai |
Flaws in Some Robust Optimistic Mix-Nets. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Tetsuo Asano, Hiro Ito, Souichi Kimura, Shigeaki Shimazu |
Repairing Flaws in a Picture Based on a Geometric Representation of a Digital Image. |
ISAAC |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Siliang Li, Gang Tan |
Finding bugs in exceptional situations of JNI programs. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
static analysis, taint analysis, java native interface |
26 | Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao 0001 |
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Designated Confirmer Signature, Digital Signature, Fair Exchange |
26 | Bin Zhang 0003, Dengguo Feng |
Security analysis of a new stream cipher. |
Sci. China Ser. F Inf. Sci. |
2006 |
DBLP DOI BibTeX RDF |
divide-and-conquer attack, non-linear feedback shift registers (NLFSR), stream cipher, chaotic sequence |
26 | Sen Xu, Manton M. Matthews, Chin-Tser Huang |
Security issues in privacy and key management protocols of IEEE 802.16. |
ACM Southeast Regional Conference |
2006 |
DBLP DOI BibTeX RDF |
authentication, key management, IEEE 802.16, roaming |
26 | Adrian Trifu, Olaf Seng, Thomas Genssler |
Automated Design Flaw Correction in Object-Oriented Systems. |
CSMR |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Hiroaki Chujo, Yuji Shono, Yoshitomo Ikkai, Norihisa Komoda |
A rapid scheduling method with resource selection by flaw analysis for a rectangular cutting stock problem against flawed and connectable resources. |
SMC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Matthew R. McLaughlin, Jonathan L. Herlocker |
A collaborative filtering algorithm and evaluation metric that accurately model the user experience. |
SIGIR |
2004 |
DBLP DOI BibTeX RDF |
mean absolute error, machine learning, evaluation, algorithms, recommender systems, collaborative filtering, nearest neighbor, precision |
26 | Olivier Pereira, Jean-Jacques Quisquater |
A Security Analysis of the Cliques Protocols Suites. |
CSFW |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Nikita Borisov, Ian Goldberg, David A. Wagner 0001 |
Intercepting mobile communications: the insecurity of 802.11. |
MobiCom |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Wenli Wang, Zoltán Hidvégi, Andrew D. Bailey Jr., Andrew B. Whinston |
E-Process Design and Assurance Using Model Checking. |
Computer |
2000 |
DBLP DOI BibTeX RDF |
|
26 | George J. Mamic, Mohammed Bennamoun |
Automatic Flaw Detection in Textiles Using a Neyman-Pearson Detector. |
ICPR |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Reiner Dojen, Anca Jurcut, Tom Coffey, Cornelia Györödi |
On Establishing and Fixing a Parallel Session Attack in a Security Protocol. |
IDC |
2008 |
DBLP DOI BibTeX RDF |
protocol flaws, parallel session attack, Security protocols |
22 | Angela Lozano, Michel Wermelinger, Bashar Nuseibeh |
Assessing the impact of bad smells using historical information. |
IWPSE |
2007 |
DBLP DOI BibTeX RDF |
bad smells, source cede, empirical study, software maintenance, software quality, software evolution, design defects, design flaws |
22 | Richard Wettel, Radu Marinescu 0001 |
Archeology of Code Duplication: Recovering Duplication Chains from Small Duplication Fragments. |
SYNASC |
2005 |
DBLP DOI BibTeX RDF |
quality assurance, code duplication, design flaws |
22 | V. Benjamin Livshits, Monica S. Lam |
Tracking pointers with path and context sensitivity for bug detection in C programs. |
ESEC / SIGSOFT FSE |
2003 |
DBLP DOI BibTeX RDF |
SSA representation, program analysis, error detection, software security, pointer analysis, program representation, context-sensitive analysis, buffer overruns, path-sensitive analysis, security flaws |
22 | Adriana Bodnarova, Mohammed Bennamoun, Kurt Kubik |
Suitability Analysis of Techniques for Flaw Detection in Textiles using Texture Analysis. |
Pattern Anal. Appl. |
2000 |
DBLP DOI BibTeX RDF |
Flaw detection techniques, Textile quality control, Weaving flaws, Texture analysis, Case study, Visual inspection |
22 | Takeshi Nakajo, Hitoshi Kume |
A Case History Analysis of Software Error Cause-Effect Relationships. |
IEEE Trans. Software Eng. |
1991 |
DBLP DOI BibTeX RDF |
cause-effect relationships, case-based error analysis, program faults, process flaws, structured analysis and structured design, Software development, human errors, Fault Tree Analysis |
18 | Nerla Jean-Louis, Yunqi Li 0002, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller 0001 |
SGXonerate:Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE. |
Proc. Priv. Enhancing Technol. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Zhaoyang Yin, Mingjun Chen, Linjie Zhao, Jian Cheng, Chao Tan, Xiaotao Li, Zhiyu Lin, Yankang Chen |
A novel automatic classification approach for micro-flaws on the large-aperture optics surface based on multi-light source fusion and integrated deep learning architecture. |
J. Intell. Manuf. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Qiao Jin 0001, Fangyuan Chen, Yiliang Zhou, Ziyang Xu, Justin M. Cheung, Robert Chen, Ronald M. Summers, Justin F. Rousseau, Peiyun Ni, Marc J. Landsman, Sally L. Baxter, Subhi J. Al'Aref, Yijia Li, Michael F. Chiang, Yifan Peng, Zhiyong Lu |
Hidden Flaws Behind Expert-Level Accuracy of GPT-4 Vision in Medicine. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Jakob Svennevik Notland, Jingyue Li, Mariusz Nowostawski, Peter Halland Haro |
SoK: Cross-Chain Bridging Architectural Design Flaws and Mitigations. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Lucas Castillo, Pablo León-Villagrá, Nick Chater, Adam Sanborn |
Explaining the flaws in human random generation as local sampling with momentum. |
PLoS Comput. Biol. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Andreas Park |
The Conceptual Flaws of Decentralized Automated Market Making. |
Manag. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Zhiliang Liu, Liyuan Ren |
Shaking Noise Exploration and Elimination for Detecting Local Flaws of Steel Wire Ropes Based on Magnetic Flux Leakages. |
IEEE Trans. Ind. Electron. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | João Pedro Costa Barnabé, Lenin Patricio Jiménez Jiménez, Gustavo Fraidenraich, Eduardo Rodrigues de Lima, Harrison Franca Dos Santos |
Quantification of Damages and Classification of Flaws in Mono-Crystalline Photovoltaic Cells Through the Application of Vision Transformers. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Prashanth Baskaran, Artur Lopes Ribeiro, Helena Maria Geirinhas Ramos |
Theoretical Predictions of Perturbed Magnetic Flux Density Components Due to Narrow Flaws in ECT. |
IEEE Trans. Instrum. Meas. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hal Berghel |
Fatal Flaws in ChatAI as a Content Generator. |
Computer |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Louis Mahon, Lei Shah, Thomas Lukasiewicz |
Correcting Flaws in Common Disentanglement Metrics. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Anya Belz, Craig Thomson, Ehud Reiter, Gavin Abercrombie, Jose Maria Alonso-Moral, Mohammad Arvan, Jackie Chi Kit Cheung, Mark Cieliebak, Elizabeth Clark, Kees van Deemter, Tanvi Dinkar, Ondrej Dusek, Steffen Eger, Qixiang Fang, Albert Gatt, Dimitra Gkatzia, Javier González-Corbelle, Dirk Hovy, Manuela Hürlimann, Takumi Ito, John D. Kelleher, Filip Klubicka, Huiyuan Lai, Chris van der Lee, Emiel van Miltenburg, Yiru Li, Saad Mahamood, Margot Mieskes, Malvina Nissim, Natalie Parde, Ondrej Plátek, Verena Rieser, Pablo Mosteiro Romero, Joel R. Tetreault, Antonio Toral, Xiaojun Wan 0001, Leo Wanner, Lewis Watson, Diyi Yang |
Missing Information, Unresponsive Authors, Experimental Flaws: The Impossibility of Assessing the Reproducibility of Previous Human Evaluations in NLP. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Balázs Hidasi, Ádám Tibor Czapp |
Widespread Flaws in Offline Evaluation of Recommender Systems. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Minghui Hu 0001, Jianbin Zheng, Chuanxia Zheng, Chaoyue Wang, Dacheng Tao, Tat-Jen Cham |
One More Step: A Versatile Plug-and-Play Module for Rectifying Diffusion Schedule Flaws and Enhancing Low-Frequency Controls. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | George Stein, Jesse C. Cresswell, Rasa Hosseinzadeh, Yi Sui, Brendan Leigh Ross, Valentin Villecroze, Zhaoyan Liu, Anthony L. Caterini, J. Eric T. Taylor, Gabriel Loaiza-Ganem |
Exposing flaws of generative model evaluation metrics and their unfair treatment of diffusion models. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mustafa Shukor, Alexandre Ramé, Corentin Dancette, Matthieu Cord |
Beyond Task Performance: Evaluating and Reducing the Flaws of Large Multimodal Models with In-Context Learning. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Alireza Sadeghi-Nasab, Vahid Rafe |
A comprehensive review of the security flaws of hashing algorithms. |
J. Comput. Virol. Hacking Tech. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | David Fifield |
Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
18 | Nerla Jean-Louis, Yunqi Li 0002, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller 0001 |
SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
18 | Issam Hammad, Matthew Poloni, Andrew Isherwood, Ryan Simpson |
Auto Sizing of CANDU Nuclear Reactor Fuel Channel Flaws from UT Scans. |
Sensors |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Reza Sepahvand, Reza Akbari, Behnaz Jamasb, Sattar Hashemi, Omid Boushehrian |
Using word embedding and convolution neural network for bug triaging by considering design flaws. |
Sci. Comput. Program. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Oskar Sjögren, Gustav Grund Pihlgren, Fredrik Sandin, Marcus Liwicki |
Identifying and Mitigating Flaws of Deep Perceptual Similarity Metrics. |
NLDL |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Meinhard Kissich, Marcel Baunach |
Formal Property Verification for Early Discovery of Functional Flaws in Digital Designs: A Designer's Guide. |
DSD |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Wenhao Li, Yongqing He, Zhimin Wang, Saleh Mansor Alqahtani, Priyadarsi Nanda |
Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques. |
SECRYPT |
2023 |
DBLP DOI BibTeX RDF |
|
18 | João Inácio, Ibéria Medeiros |
CorCA: An Automatic Program Repair Tool for Checking and Removing Effectively C Flaws. |
ICST |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Balázs Hidasi, Ádám Tibor Czapp |
Widespread Flaws in Offline Evaluation of Recommender Systems. |
RecSys |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Steven Moore, Ellen Fang, Huy Anh Nguyen, John C. Stamper |
Crowdsourcing the Evaluation of Multiple-Choice Questions Using Item-Writing Flaws and Bloom's Taxonomy. |
L@S |
2023 |
DBLP DOI BibTeX RDF |
|
18 | George Stein, Jesse C. Cresswell, Rasa Hosseinzadeh, Yi Sui, Brendan Leigh Ross, Valentin Villecroze, Zhaoyan Liu, Anthony L. Caterini, J. Eric T. Taylor, Gabriel Loaiza-Ganem |
Exposing flaws of generative model evaluation metrics and their unfair treatment of diffusion models. |
NeurIPS |
2023 |
DBLP BibTeX RDF |
|
18 | Koji Noshiro, Koji Hasebe |
Flaws of Termination and Optimality in ADOPT-based Algorithms. |
IJCAI |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hongjian Cao, Lin Huang, Shuwei Hu, Shangcheng Shi, Yujia Liu |
Owfuzz: Discovering Wi-Fi Flaws in Modern Devices through Over-The-Air Fuzzing. |
WISEC |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Annika Reinke |
Eliminating flaws in biomedical image analysis validation (PDF / PS) |
|
2023 |
RDF |
|
18 | Saher Ghayyad, Shengzhi Du, Anish Mathew Kurien |
The flaws of Internet of Things (IoT) intrusion detection and prevention schemes. |
Int. J. Sens. Networks |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Carlos Nkuba Kayembe, Seulbae Kim, Sven Dietrich, Heejo Lee |
Riding the IoT Wave With VFuzz: Discovering Security Flaws in Smart Homes. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Sijun Niu, Vikas Srivastava |
Ultrasound classification of interacting flaws using finite element simulations and convolutional neural network. |
Eng. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Christian Hugo Hoffmann |
Technological Brave New World? Eschatological Narratives on Digitalization and their Flaws. |
J. Artif. Intell. Conscious. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Oskar Sjögren, Gustav Grund Pihlgren, Fredrik Sandin, Marcus Liwicki |
Identifying and Mitigating Flaws of Deep Perceptual Similarity Metrics. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Hadas Orgad, Yonatan Belinkov |
Choose Your Lenses: Flaws in Gender Bias Evaluation. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Royi Rassin, Shauli Ravfogel, Yoav Goldberg |
DALLE-2 is Seeing Double: Flaws in Word-to-Concept Mapping in Text2Image Models. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Reza Sepahvand, Reza Akbari, Behnaz Jamasb, Sattar Hashemi, Omid Boushehrian |
Using Word Embedding and Convolution Neural Network for Bug Triaging by Considering Design Flaws. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Joakim Misund, Bob Briscoe |
Disentangling Flaws in Linux DCTCP. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Chinedu I. Ossai, Nilmini Wickramasinghe |
Crowdsourcing Operational and Design Flaws of Diabetes Mobile Apps. |
J. Medical Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Ben Green 0002 |
The flaws of policies requiring human oversight of government algorithms. |
Comput. Law Secur. Rev. |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1012 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|