Showing 21–40 of 79 results
/ Date/ Name
Oct 21, 2023ZTD$_{JAVA}$: Mitigating Software Supply Chain Vulnerabilities via Zero-Trust DependenciesOct 2, 2023On the Contents and Utility of IoT Cybersecurity GuidelinesAug 21, 2023Systematically Detecting Packet Validation Vulnerabilities in Embedded Network StacksMar 13, 2023Challenges and Practices of Deep Learning Model Reengineering: A Case Study on Computer VisionJul 2, 2021An Experience Report on Machine Learning Reproducibility: Guidance for Practitioners and TensorFlow Model Garden ContributorsJun 17, 2024SoK: A Literature and Engineering Review of Regular Expression Denial of Service (ReDoS)Jun 21, 2024DiVerify: Hardening Identity-Based Software Signing with Diverse-Context ScopesMay 24, 2025ARMS: A Vision for Actor Reputation Metric Systems in the Open-Source Software Supply ChainFeb 25, 2026Regular Expression Denial of Service Induced by BackreferencesJan 1, 2026Towards a Benchmark for Dependency Decision-MakingFeb 27, 2026Towards the Systematic Testing of Regular Expression EnginesMar 13, 2026An Empirical Investigation of Pre-Trained Deep Learning Model Reuse in the Scientific ProcessMar 1, 2025Why Johnny Adopts Identity-Based Software Signing: A Usability Case Study of SigstoreSep 7, 2022Reflections on Software Failure AnalysisMar 5, 2023Discrepancies among Pre-trained Deep Neural Networks: A New Threat to Model Zoo ReliabilityMar 5, 2023An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model RegistryJun 19, 2021Low-Power Multi-Camera Object Re-Identification using Hierarchical Neural NetworksMar 30, 2023Analysis of Failures and Risks in Deep Learning Model Converters: A Case Study in the ONNX EcosystemJun 20, 2024An Exploratory Mixed-Methods Study on General Data Protection Regulation (GDPR) Compliance in Open-Source SoftwareSep 3, 2025Reactive Bottom-Up Testing