Shang‐Wei Lin
YOU?
Author Swipe
View article: Research on Multi-source Place Name Data Integration and Update Methods
Research on Multi-source Place Name Data Integration and Update Methods Open
Place names are important basic geographic information resources for surveying and mapping. They play a significant role in maintaining national security, national defense construction, economic development, and other aspects. The construc…
SOSAE: Self-Organizing Sparse AutoEncoder Open
The process of tuning the size of the hidden layers for autoencoders has the benefit of providing optimally compressed representations for the input data. However, such hyper-parameter tuning process would take a lot of computation and tim…
Quenching Sensitivity Study of New High-Strength Aluminum Alloys Based on an Immersion End-Quenching and Step-Quenching Technique Open
Based on end-quenching and step-quenching experiments combined with scanning electron microscopy (SEM) and transmission electron microscopy (TEM), the quench sensitivity of a novel high-strength aluminum alloy was investigated and compared…
View article: Towards Universal & Efficient Model Compression via Exponential Torque Pruning
Towards Universal & Efficient Model Compression via Exponential Torque Pruning Open
The rapid growth in complexity and size of modern deep neural networks (DNNs) has increased challenges related to computational costs and memory usage, spurring a growing interest in efficient model compression techniques. Previous state-o…
Enhancing Vulnerability Detection via Inter-procedural Semantic Completion Open
Inspired by advances in deep learning, numerous learning-based approaches for vulnerability detection have emerged, primarily operating at the function level for scalability. However, this design choice has a critical limitation: many vuln…
Towards Calibration Enhanced Network by Inverse Adversarial Attack Open
Test automation has become increasingly important as the complexity of both design and content in Human Machine Interface (HMI) software continues to grow. Current standard practice uses Optical Character Recognition (OCR) techniques to au…
View article: Harnessing Biofilm Scaffold for Structurally Adaptative Slippery Surfaces with Integrated Antifouling and Anticorrosion Properties
Harnessing Biofilm Scaffold for Structurally Adaptative Slippery Surfaces with Integrated Antifouling and Anticorrosion Properties Open
Artificial liquid‐repellent surfaces are highly desirable to combat pervasive biofouling and corrosion in biological environments. However, existing strategies often suffer from slow binding kinetics and harsh fabrication conditions, hinde…
Development of a multifunctional testing platform for generator de-excitation switches Open
Generator de-excitation switches are crucial devices for generator protection. Proper maintenance and testing are essential to ensure their optimal working condition. This study focuses on the CEX series de-excitation switches from LENOIR,…
FineWAVE: Fine-Grained Warning Verification of Bugs for Automated Static Analysis Tools Open
Automated Static Analysis Tools (ASATs) have evolved over time to assist in detecting bugs. However, the excessive false warnings can impede developers' productivity and confidence in the tools. Previous research efforts have explored lear…
Pre-trained Model-based Actionable Warning Identification: A Feasibility Study Open
Actionable Warning Identification (AWI) plays a pivotal role in improving the usability of static code analyzers. Currently, Machine Learning (ML)-based AWI approaches, which mainly learn an AWI classifier from labeled warnings, are notabl…
View article: LLMs for Relational Reasoning: How Far are We?
LLMs for Relational Reasoning: How Far are We? Open
Large language models (LLMs) have revolutionized many areas (e.g. natural language processing, software engineering, etc.) by achieving state-of-the-art performance on extensive downstream tasks. Aiming to achieve robust and general artifi…
Machine Learning for Actionable Warning Identification: A Comprehensive Survey Open
Actionable Warning Identification (AWI) plays a crucial role in improving the usability of static code analyzers. With recent advances in Machine Learning (ML), various approaches have been proposed to incorporate ML techniques into AWI. T…
Learning Program Semantics for Vulnerability Detection via Vulnerability-Specific Inter-procedural Slicing Open
Learning-based approaches that learn code representations for software vulnerability detection have been proven to produce inspiring results. However, they still fail to capture complete and precise vulnerability semantics for code represe…
A Parallel and Distributed Quantum SAT Solver Based on Entanglement and Quantum Teleportation Open
Boolean satisfiability (SAT) solving is a fundamental problem in computer science. Finding efficient algorithms for SAT solving has broad implications in many areas of computer science and beyond. Quantum SAT solvers have been proposed in …
A Quantum SMT Solver for Bit-Vector Theory Open
Given a formula $F$ of satisfiability modulo theory (SMT), the classical SMT solver tries to (1) abstract $F$ as a Boolean formula $F_B$, (2) find a Boolean solution to $F_B$, and (3) check whether the Boolean solution is consistent with t…
Enhancing Security Patch Identification by Capturing Structures in Commits Open
With the rapid increasing number of open source software (OSS), the majority of the software vulnerabilities in the open source components are fixed silently, which leads to the deployed software that integrated them being unable to get a …
A Quantum interpretation of separating conjunction for local reasoning of Quantum programs based on separation logic Open
It is well-known that quantum programs are not only complicated to design but also challenging to verify because the quantum states can have exponential size and require sophisticated mathematics to encode and manipulate. To tackle the sta…
Formal Analysis of Composable DeFi Protocols Open
Decentralized finance (DeFi) has become one of the most successful applications of blockchain and smart contracts. The DeFi ecosystem enables a wide range of crypto-financial activities, while the underlying smart contracts often contain b…
<b>CSim</b> <sup> <i>2</i> </sup> Open
To make feasible and scalable the verification of large and complex concurrent systems, it is necessary the use of compositional techniques even at the highest abstraction layers. When focusing on the lowest software abstraction layers, su…
SeqMobile: A Sequence Based Efficient Android Malware Detection System Using RNN on Mobile Devices Open
With the proliferation of Android malware, the demand for an effective and efficient malware detection system is on the rise. The existing device-end learning based solutions tend to extract limited syntax features (e.g., permissions and A…
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices Open
Currently, Android malware detection is mostly performed on server side\nagainst the increasing number of malware. Powerful computing resource provides\nmore exhaustive protection for app markets than maintaining detection by a\nsingle use…
Adversarial Exposure Attack on Diabetic Retinopathy Imagery Grading Open
Diabetic Retinopathy (DR) is a leading cause of vision loss around the world. To help diagnose it, numerous cutting-edge works have built powerful deep neural networks (DNNs) to automatically grade DR via retinal fundus images (RFIs). Howe…
A Survey of Smart Contract Formal Specification and Verification Open
A smart contract is a computer program which allows users to automate their actions on the blockchain platform. Given the significance of smart contracts in supporting important activities across industry sectors including supply chain, fi…
Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack Open
Image denoising can remove natural noise that widely exists in images captured by multimedia devices due to low-quality imaging sensors, unstable image transmission processes, or low light conditions. Recent works also find that image deno…
Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity Open
Bitcoin has been a popular research topic recently. Ethereum (ETH), a second generation of cryptocurrency, extends Bitcoin's design by offering a Turing-complete programming language called Solidity to develop smart contracts. Smart contra…