default search action
Muhammad Ali Babar 0001
Ali Babar 0001
Person information
- affiliation: University of Adelaide, Australia
- affiliation (former): IT University of Copenhagen, Denmark
Other persons with the same name
- Ali Babar — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j108]Mingyu Guo, Diksha Goel, Guanhua Wang, Runqi Guo, Yuko Sakurai, Muhammad Ali Babar:
Mechanism design for public projects via three machine learning based approaches. Auton. Agents Multi Agent Syst. 38(1): 16 (2024) - [j107]Hang Thanh Bui, Hamed Aboutorab, Arash Mahboubi, Yansong Gao, Nazatul Haque Sultan, Aufeef Chauhan, Mohammad Zavid Parvez, Michael Bewong, Rafiqul Islam, Zahidul Islam, Seyit Ahmet Çamtepe, Praveen Gauravaram, Dineshkumar Singh, Muhammad Ali Babar, Shihao Yan:
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems. Comput. Secur. 140: 103754 (2024) - [j106]Xiaoyu Xia, Sheik Mohammad Mostakim Fattah, Muhammad Ali Babar:
A Survey on UAV-Enabled Edge Computing: Resource Management Perspective. ACM Comput. Surv. 56(3): 78:1-78:36 (2024) - [j105]Huaming Chen, Muhammad Ali Babar:
Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges. ACM Comput. Surv. 56(6): 151:1-151:38 (2024) - [j104]Muhammad Aufeef Chauhan, Muhammad Ali Babar, Haifeng Shen:
KRIOTA: A framework for Knowledge-management of dynamic Reference Information and Optimal Task Assignment in hybrid edge-cloud environments to support situation-aware robot-assisted operations. Future Gener. Comput. Syst. 160: 489-504 (2024) - [j103]Victor Prokhorenko, Muhammad Ali Babar:
Offloaded Data Processing Energy Efficiency Evaluation. Informatica 35(3): 649-669 (2024) - [j102]Faheem Ullah, Shagun Dhingra, Xiaoyu Xia, Muhammad Ali Babar:
Evaluation of distributed data processing frameworks in hybrid clouds. J. Netw. Comput. Appl. 224: 103837 (2024) - [j101]Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, Chelsea Liu, Muhammad Ali Babar:
A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness. J. Syst. Softw. 208: 111899 (2024) - [j100]Yongzheng Xie, Hongyu Zhang, Muhammad Ali Babar:
LogSD: Detecting Anomalies from System Logs through Self-Supervised Learning and Frequency-Based Masking. Proc. ACM Softw. Eng. 1(FSE): 2098-2120 (2024) - [j99]Chadni Islam, Muhammad Ali Babar, Surya Nepal:
Design and Generation of a Set of Declarative APIs for Security Orchestration. IEEE Trans. Serv. Comput. 17(1): 127-141 (2024) - [c211]Muhammad Ali Babar:
Evidence-Based Research for Supporting Software Security in Software Development: Methodological Challenges & Strategies. EASE 2024: 3 - [c210]Nguyen Khoi Tran, Samodha Pallewatta, Muhammad Ali Babar:
An Empirically Grounded Reference Architecture for Software Supply Chain Metadata Management. EASE 2024: 38-47 - [c209]Triet Huynh Minh Le, Muhammad Ali Babar, Tung Hoang Thai:
Software Vulnerability Prediction in Low-Resource Languages: An Empirical Study of CodeBERT and ChatGPT. EASE 2024: 679-685 - [c208]Samodha Pallewatta, Muhammad Ali Babar:
Towards Secure Management of Edge-Cloud IoT Microservices Using Policy as Code. ECSA 2024: 270-287 - [c207]Sangwon Hyun, Mingyu Guo, Muhammad Ali Babar:
METAL: Metamorphic Testing Framework for Analyzing Large-Language Model Qualities. ICST 2024: 117-128 - [c206]Yue Zhang, Rachel Meredith, Wilson Reeves, Julia Coriolano, Muhammad Ali Babar, Akond Rahman:
Does Generative AI Generate Smells Related to Container Orchestration?: An Exploratory Study with Kubernetes Manifests. MSR 2024: 192-196 - [c205]Triet Huynh Minh Le, Xiaoning Du, Muhammad Ali Babar:
Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study. MSR 2024: 716-727 - [c204]Pemsith Mendis, Wilson Reeves, Muhammad Ali Babar, Yue Zhang, Akond Rahman:
Evaluating the Quality of Open Source Ansible Playbooks: An Executability Perspective. SEA4DQ@SIGSOFT FSE 2024: 2-5 - [c203]Sajal Halder, Michael Bewong, Arash Mahboubi, Yinhao Jiang, Md. Rafiqul Islam, Md Zahidul Islam, Ryan H. L. Ip, Muhammad Ejaz Ahmed, Gowri Sankar Ramachandran, Muhammad Ali Babar:
Malicious Package Detection using Metadata Information. WWW 2024: 1779-1789 - [i105]Triet Huynh Minh Le, Xiaoning Du, Muhammad Ali Babar:
Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study. CoRR abs/2401.11105 (2024) - [i104]Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar:
Why People Still Fall for Phishing Emails: An Empirical Investigation into How Users Make Email Response Decisions. CoRR abs/2401.13199 (2024) - [i103]Sajal Halder, Michael Bewong, Arash Mahboubi, Yinhao Jiang, Md. Rafiqul Islam, Md Zahidul Islam, Ryan H. L. Ip, Muhammad Ejaz Ahmed, Gowri Sankar Ramachandran, Muhammad Ali Babar:
Malicious Package Detection using Metadata Information. CoRR abs/2402.07444 (2024) - [i102]Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar:
An Investigation into Misuse of Java Security APIs by Large Language Models. CoRR abs/2404.03823 (2024) - [i101]Yongzheng Xie, Hongyu Zhang, Muhammad Ali Babar:
LogSD: Detecting Anomalies from System Logs through Self-supervised Learning and Frequency-based Masking. CoRR abs/2404.11294 (2024) - [i100]Triet Huynh Minh Le, Muhammad Ali Babar, Tung Hoang Thai:
Software Vulnerability Prediction in Low-Resource Languages: An Empirical Study of CodeBERT and ChatGPT. CoRR abs/2404.17110 (2024) - [i99]Limeng Zhang, Rui Zhou, Qing Liu, Chengfei Liu, Muhammad Ali Babar:
Transaction Fee Estimation in the Bitcoin System. CoRR abs/2405.15293 (2024) - [i98]Ammar Sohail, Bojie Shen, Muhammad Aamir Cheema, Mohammed Eunus Ali, Anwaar Ulhaq, Muhammad Ali Babar, Asama Qureshi:
Beyond Data, Towards Sustainability: A Sydney Case Study on Urban Digital Twins. CoRR abs/2406.04902 (2024) - [i97]Beyza Eken, Samodha Pallewatta, Nguyen Khoi Tran, Ayse Tosun, Muhammad Ali Babar:
A Multivocal Review of MLOps Practices, Challenges and Open Issues. CoRR abs/2406.09737 (2024) - [i96]Samodha Pallewatta, Muhammad Ali Babar:
Towards Secure Management of Edge-Cloud IoT Microservices using Policy as Code. CoRR abs/2406.18813 (2024) - [i95]Ali Kazemi Arani, Triet Huynh Minh Le, Mansooreh Zahedi, Muhammad Ali Babar:
Systematic Literature Review on Application of Learning-based Approaches in Continuous Integration. CoRR abs/2406.19765 (2024) - [i94]Triet Huynh Minh Le, Muhammad Ali Babar:
Mitigating Data Imbalance for Software Vulnerability Assessment: Does Data Augmentation Help? CoRR abs/2407.10722 (2024) - [i93]Anh The Nguyen, Triet Huynh Minh Le, Muhammad Ali Babar:
Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++. CoRR abs/2407.17053 (2024) - [i92]M. Mehdi Kholoosi, Muhammad Ali Babar, Roland Croft:
A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality. CoRR abs/2408.00435 (2024) - [i91]Muhammad Aufeef Chauhan, Muhammad Ali Babar, Fethi Rabhi:
SecDOAR: A Software Reference Architecture for Security Data Orchestration, Analysis and Reporting. CoRR abs/2408.12904 (2024) - 2023
- [j98]Anh Tuan Phu, Bo Li, Faheem Ullah, Tanvir Ul Huque, Ranesh Naha, Muhammad Ali Babar, Hung Nguyen:
Defending SDN against packet injection attacks using deep learning. Comput. Networks 234: 109935 (2023) - [j97]Nathan Beu, Asangi Jayatilaka, Mansooreh Zahedi, Ali Babar, Laura Hartley, Winston Lewinsmith, Irina Baetu:
Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation. Comput. Secur. 131: 103313 (2023) - [j96]Triet Huynh Minh Le, Huaming Chen, Muhammad Ali Babar:
A Survey on Data-driven Software Vulnerability Assessment and Prioritization. ACM Comput. Surv. 55(5): 100:1-100:39 (2023) - [j95]Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, Muhammad Ali Babar:
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures. ACM Comput. Surv. 55(9): 192:1-192:38 (2023) - [j94]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid, Chamila Wijayarathna:
On the privacy of mental health apps. Empir. Softw. Eng. 28(1): 2 (2023) - [j93]Haifeng Shen, Othman Asiry, Muhammad Ali Babar, Tomasz Bednarz:
Evaluating the efficacy of using a novel gaze-based attentive user interface to extend ADHD children's attention span. Int. J. Hum. Comput. Stud. 169: 102927 (2023) - [j92]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
An empirical study on secure usage of mobile health apps: The attack simulation approach. Inf. Softw. Technol. 163: 107285 (2023) - [j91]Yaser Mansouri, Victor Prokhorenko, Faheem Ullah, Muhammad Ali Babar:
Resource Utilization of Distributed Databases in Edge-Cloud Environment. IEEE Internet Things J. 10(11): 9423-9437 (2023) - [j90]Zarrin Tasnim Sworna, Zahra Mousavi, Muhammad Ali Babar:
NLP methods in host-based intrusion detection systems: A systematic review and future directions. J. Netw. Comput. Appl. 220: 103761 (2023) - [j89]Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
End-users' knowledge and perception about security of clinical mobile health apps: A case study with two Saudi Arabian mHealth providers. J. Syst. Softw. 195: 111519 (2023) - [j88]Xin Zhou, Shanshan Li, Lingli Cao, He Zhang, Zijia Jia, Chenxing Zhong, Zhihao Shan, Muhammad Ali Babar:
Revisiting the practices and pains of microservice architecture in reality: An industrial inquiry. J. Syst. Softw. 195: 111521 (2023) - [j87]Chadni Islam, Victor Prokhorenko, Ali Babar:
Runtime software patching: Taxonomy, survey and future directions. J. Syst. Softw. 200: 111652 (2023) - [j86]Mojtaba Shahin, Ali Rezaei Nasab, Muhammad Ali Babar:
A qualitative study of architectural design issues in DevOps. J. Softw. Evol. Process. 35(5) (2023) - [j85]Zarrin Tasnim Sworna, Chadni Islam, Muhammad Ali Babar:
APIRO: A Framework for Automated Security Tools API Recommendation. ACM Trans. Softw. Eng. Methodol. 32(1): 24:1-24:42 (2023) - [j84]Roland Croft, Yongzheng Xie, Muhammad Ali Babar:
Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review. IEEE Trans. Software Eng. 49(3): 1044-1063 (2023) - [j83]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid:
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organizational Aspects, and Current Practices. IEEE Trans. Software Eng. 49(9): 4324-4348 (2023) - [j82]Limeng Zhang, Rui Zhou, Qing Liu, Jiajie Xu, Chengfei Liu, Muhammad Ali Babar:
Enhancing bitcoin transaction confirmation prediction: a hybrid model combining neural networks and XGBoost. World Wide Web (WWW) 26(6): 4173-4191 (2023) - [c202]Ahmed Dawoud, Geeta Mahala, Chadni Islam, Wolfgang Mayer, Aditya Ghose, Muhammad Ali Babar, Markus Stumptner, Georg Grossmann:
A Goal-Driven Approach to Support Decision-Making with Incomplete Information in Cyber Operations. CAiSE Forum 2023: 77-85 - [c201]M. Mehdi Kholoosi, Muhammad Ali Babar, Cemal Yilmaz:
Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels. CNS 2023: 1-9 - [c200]Faheem Ullah, Muhammad Ali Babar:
Guidance Models for Designing Big Data Cyber Security Analytics Systems. ECSA 2023: 70-80 - [c199]Nguyen Khoi Tran, Muhammad Ali Babar, Julian Thorpe, Seth Leslie, Andrew Walters:
An Experience Report on the Design and Implementation of an Ad-hoc Blockchain Platform for Tactical Edge Applications. ECSA 2023: 100-116 - [c198]Victor Prokhorenko, Chadni Islam, Muhammad Ali Babar:
Analyzing the Evolution of Inter-package Dependencies in Operating Systems: A Case Study of Ubuntu. ECSA 2023: 233-249 - [c197]Zarrin Tasnim Sworna, Anjitha Sreekumar, Chadni Islam, Muhammad Ali Babar:
Security Tools' API Recommendation Using Machine Learning. ENASE 2023: 27-38 - [c196]Mubin Ul Haque, Muhammad Ali Babar:
A Study on Early & Non-Intrusive Security Assessment for Container Images. ENASE 2023: 640-647 - [c195]Boyu Zhang, Hongyang Yang, Tianyu Zhou, Ali Babar, Xiao-Yang Liu:
Enhancing Financial Sentiment Analysis via Retrieval Augmented Large Language Models. ICAIF 2023: 349-356 - [c194]Ali Kazemi Arani, Mansooreh Zahedi, Triet Huynh Minh Le, Muhammad Ali Babar:
SoK: Machine Learning for Continuous Integration. AIOps@ICSE 2023: 8-13 - [c193]Roland Croft, Muhammad Ali Babar, M. Mehdi Kholoosi:
Data Quality for Software Vulnerability Datasets. ICSE 2023: 121-133 - [c192]Orvila Sarker, Hong Shen, Muhammad Ali Babar:
Reinforcement Learning Based Neighbour Selection for VANET with Adaptive Trust Management. TrustCom 2023: 585-594 - [c191]Zarrin Tasnim Sworna, Muhammad Ali Babar, Anjitha Sreekumar:
IRP2API: Automated Mapping of Cyber Security Incident Response Plan to Security Tools' APIs. SANER 2023: 546-557 - [i90]Roland Croft, Muhammad Ali Babar, M. Mehdi Kholoosi:
Data Quality for Software Vulnerability Datasets. CoRR abs/2301.05456 (2023) - [i89]Anh Tuan Phu, Bo Li, Faheem Ullah, Tanvir Ul Huque, Ranesh Naha, Ali Babar, Hung Nguyen:
Defending SDN against packet injection attacks using deep learning. CoRR abs/2301.08428 (2023) - [i88]Ali Kazemi Arani, Mansooreh Zahedi, Triet Huynh Minh Le, Muhammad Ali Babar:
SoK: Machine Learning for Continuous Integration. CoRR abs/2304.02829 (2023) - [i87]Mingyu Guo, Diksha Goel, Guanhua Wang, Yong Yang, Muhammad Ali Babar:
Cost Sharing Public Project with Minimum Release Delay. CoRR abs/2305.11657 (2023) - [i86]Mohammed Eunus Ali, Muhammad Aamir Cheema, Tanzima Hashem, Anwaar Ulhaq, Muhammad Ali Babar:
Enabling Spatial Digital Twins: Technologies, Challenges, and Future Research Directions. CoRR abs/2306.06600 (2023) - [i85]Zahra Mousavi, Chadni Islam, Muhammad Ali Babar, Alsharif Abuadbba, Kristen Moore:
Detecting Misuses of Security APIs: A Systematic Review. CoRR abs/2306.08869 (2023) - [i84]Bushra Sabir, Muhammad Ali Babar, Sharif Abuadbba:
Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT). CoRR abs/2307.01225 (2023) - [i83]Victor Prokhorenko, Chadni Islam, Muhammad Ali Babar:
Analyzing the Evolution of Inter-package Dependencies in Operating Systems: A Case Study of Ubuntu. CoRR abs/2307.04458 (2023) - [i82]M. Mehdi Kholoosi, Muhammad Ali Babar, Cemal Yilmaz:
Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels. CoRR abs/2308.11862 (2023) - [i81]Orvila Sarker, Hong Shen, Muhammad Ali Babar:
Reinforcement Learning Based Neighbour Selection for VANET with Adaptive Trust Management. CoRR abs/2310.00635 (2023) - [i80]Boyu Zhang, Hongyang Yang, Tianyu Zhou, Ali Babar, Xiao-Yang Liu:
Enhancing Financial Sentiment Analysis via Retrieval Augmented Large Language Models. CoRR abs/2310.04027 (2023) - [i79]Nguyen Khoi Tran, Samodha Pallewatta, Muhammad Ali Babar:
Toward a Reference Architecture for Software Supply Chain Metadata Management. CoRR abs/2310.06300 (2023) - [i78]Sangwon Hyun, Mingyu Guo, Muhammad Ali Babar:
METAL: Metamorphic Testing Framework for Analyzing Large-Language Model Qualities. CoRR abs/2312.06056 (2023) - 2022
- [j81]Liuyue Jiang, Asangi Jayatilaka, Mehwish Nasim, Marthie Grobler, Mansooreh Zahedi, Muhammad Ali Babar:
Systematic Literature Review on Cyber Situational Awareness Visualizations. IEEE Access 10: 57525-57554 (2022) - [j80]Bushra Sabir, Faheem Ullah, Muhammad Ali Babar, Raj Gaire:
Machine Learning for Detecting Data Exfiltration: A Review. ACM Comput. Surv. 54(3): 50:1-50:47 (2022) - [j79]Roland Croft, Yongzheng Xie, Mansooreh Zahedi, Muhammad Ali Babar, Christoph Treude:
An empirical study of developers' discussions about security challenges of different programming languages. Empir. Softw. Eng. 27(1): 27 (2022) - [j78]Faheem Ullah, Muhammad Ali Babar, Aldeida Aleti:
Design and evaluation of adaptive system for big data cyber security analytics. Expert Syst. Appl. 207: 117948 (2022) - [j77]Roshan Namal Rajapakse, Mansooreh Zahedi, Muhammad Ali Babar, Haifeng Shen:
Challenges and solutions when adopting DevSecOps: A systematic review. Inf. Softw. Technol. 141: 106700 (2022) - [j76]Fangchao Tian, Peng Liang, Muhammad Ali Babar:
Relationships between software architecture and source code in practice: An exploratory survey and interview. Inf. Softw. Technol. 141: 106705 (2022) - [j75]Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, Muhammad Ali Babar:
Software security patch management - A systematic literature review of challenges, approaches, tools and practices. Inf. Softw. Technol. 144: 106771 (2022) - [j74]Faheem Ullah, Muhammad Ali Babar:
On the scalability of Big Data Cyber Security Analytics systems. J. Netw. Comput. Appl. 198: 103294 (2022) - [j73]Chadni Islam, Muhammad Ali Babar, Roland Croft, Helge Janicke:
SmartValidator: A framework for automatic identification and classification of cyber threat data. J. Netw. Comput. Appl. 202: 103370 (2022) - [j72]Nguyen Khoi Tran, Muhammad Ali Babar, Andrew Walters:
A framework for automating deployment and evaluation of blockchain networks. J. Netw. Comput. Appl. 206: 103460 (2022) - [j71]Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar:
Why, How and Where of Delays in Software Security Patch Management: An Empirical Investigation in the Healthcare Sector. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-29 (2022) - [j70]Liuyue Jiang, Nguyen Khoi Tran, Muhammad Ali Babar:
Mod2Dash: A Framework for Model-Driven Dashboards Generation. Proc. ACM Hum. Comput. Interact. 6(EICS): 172:1-172:28 (2022) - [c190]Nguyen Khoi Tran, Bushra Sabir, Muhammad Ali Babar, Nini Cui, Mehran Abolhasan, Justin Lipman:
ProML: A Decentralised Platform for Provenance Management of Machine Learning Software Systems. ECSA 2022: 49-65 - [c189]Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study of Automation in Software Security Patch Management. ASE 2022: 7:1-7:13 - [c188]Roland Croft, Muhammad Ali Babar, Huaming Chen:
Noisy Label Learning for Security Defects. MSR 2022: 435-447 - [c187]David Hin, Andrey Kan, Huaming Chen, Muhammad Ali Babar:
LineVD: Statement-level Vulnerability Detection using Graph Neural Networks. MSR 2022: 596-607 - [c186]Triet Huynh Minh Le, Muhammad Ali Babar:
On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models. MSR 2022: 621-633 - [c185]Yongzheng Xie, Hongyu Zhang, Muhammad Ali Babar:
LogGD: Detecting Anomalies from System Logs with Graph Neural Networks. QRS 2022: 299-310 - [c184]Roland Croft, Muhammad Ali Babar, Li Li:
An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources. SANER 2022: 338-348 - [c183]Mubin Ul Haque, M. Mehdi Kholoosi, Muhammad Ali Babar:
KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration. SANER 2022: 420-431 - [c182]Mubin Ul Haque, Muhammad Ali Babar:
Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities. SANER 2022: 1066-1077 - [i77]Faheem Ullah, Shagun Dhingra, Xiaoyu Xia, Muhammad Ali Babar:
Evaluation of Distributed Data Processing Frameworks in Hybrid Clouds. CoRR abs/2201.01948 (2022) - [i76]Faheem Ullah, Imaduddin Mohammed, Muhammad Ali Babar:
A Framework for Energy-aware Evaluation of Distributed Data Processing Platforms in Edge-Cloud Environment. CoRR abs/2201.01972 (2022) - [i75]Huaming Chen, Muhammad Ali Babar:
Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges. CoRR abs/2201.04736 (2022) - [i74]Zarrin Tasnim Sworna, Chadni Islam, Muhammad Ali Babar:
APIRO: A Framework for Automated Security Tools API Recommendation. CoRR abs/2201.07959 (2022) - [i73]Zarrin Tasnim Sworna, Zahra Mousavi, Muhammad Ali Babar:
NLP Methods in Host-based Intrusion Detection Systems: A Systematic Review and Future Directions. CoRR abs/2201.08066 (2022) - [i72]Leonardo Horn Iwaya, Muhammad Ali Babar, Awais Rashid, Chamila Wijayarathna:
On the Privacy of Mental Health Apps: An Empirical Investigation and its Implications for Apps Development. CoRR abs/2201.09006 (2022) - [i71]Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar:
Why, How and Where of Delays in Software Security Patch Management: An Empirical Investigation in the Healthcare Sector. CoRR abs/2202.09016 (2022) - [i70]Roland Croft, Muhammad Ali Babar, Huaming Chen:
Noisy Label Learning for Security Defects. CoRR abs/2203.04468 (2022) - [i69]David Hin, Andrey Kan, Huaming Chen, Muhammad Ali Babar:
LineVD: Statement-level Vulnerability Detection using Graph Neural Networks. CoRR abs/2203.05181 (2022) - [i68]Chadni Islam, Muhammad Ali Babar, Roland Croft, Helge Janicke:
SmartValidator: A Framework for Automatic Identification and Classification of Cyber Threat Data. CoRR abs/2203.07603 (2022) - [i67]Triet Huynh Minh Le, Muhammad Ali Babar:
On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models. CoRR abs/2203.08417 (2022) - [i66]Nguyen Khoi Tran, Muhammad Ali Babar, Andrew Walters:
A Framework for Automating Deployment and Evaluation of Blockchain Network. CoRR abs/2203.10647 (2022) - [i65]Chadni Islam, Victor Prokhorenko, Muhammad Ali Babar:
Runtime Software Patching: Taxonomy, Survey and Future Directions. CoRR abs/2203.12132 (2022) - [i64]Liuyue Jiang, Nguyen Khoi Tran, Muhammad Ali Babar:
Mod2Dash: A Framework for Model-Driven Dashboards Generation. CoRR abs/2205.07204 (2022) - [i63]Nguyen Khoi Tran, Bushra Sabir, Muhammad Ali Babar, Nini Cui, Mehran Abolhasan, Justin Lipman:
ProML: A Decentralised Platform for Provenance Management of Machine Learning Software Systems. CoRR abs/2206.10110 (2022) - [i62]