Trung Le

ORCID: 0000-0003-0414-9067
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Anomaly Detection Techniques and Applications
  • Domain Adaptation and Few-Shot Learning
  • Adversarial Robustness in Machine Learning
  • Face and Expression Recognition
  • Machine Learning and ELM
  • Software Engineering Research
  • Generative Adversarial Networks and Image Synthesis
  • Topic Modeling
  • Multimodal Machine Learning Applications
  • Advanced Malware Detection Techniques
  • Software Reliability and Analysis Research
  • Advanced Neural Network Applications
  • Machine Learning and Data Classification
  • Neural Networks and Applications
  • Gaussian Processes and Bayesian Inference
  • Machine Learning and Algorithms
  • Natural Language Processing Techniques
  • Data-Driven Disease Surveillance
  • Explainable Artificial Intelligence (XAI)
  • Text and Document Classification Technologies
  • Network Security and Intrusion Detection
  • Advanced Clustering Algorithms Research
  • Time Series Analysis and Forecasting
  • COVID-19 diagnosis using AI
  • EEG and Brain-Computer Interfaces

Australian Regenerative Medicine Institute
2019-2024

Monash University
2018-2024

University of South Florida
2024

North Dakota State University
2024

ORCID
2024

North Carolina Agricultural and Technical State University
2024

Tufts University
2024

Deakin University
2016-2018

Ho Chi Minh City University of Education
2015-2016

Birla Institute of Technology and Science, Pilani
2016

As software vulnerabilities grow in volume and complexity, researchers proposed various Artificial Intelligence (AI)-based approaches to help under-resourced security analysts find, detect, localize vulnerabilities. However, still have spend a huge amount of effort manually fix or repair such vulnerable functions. Recent work an NMT-based Automated Vulnerability Repair, but it is far from perfect due limitations. In this paper, we propose VulRepair, T5-based automated vulnerability approach...

10.1145/3540250.3549098 article EN Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering 2022-11-07

We propose in this paper a novel approach to tackle the problem of mode collapse encountered generative adversarial network (GAN). Our idea is intuitive but proven be very effective, especially addressing some key limitations GAN. In essence, it combines Kullback-Leibler (KL) and reverse KL divergences into unified objective function, thus exploits complementary statistical properties from these effectively diversify estimated density capturing multi-modes. term our method dual discriminator...

10.48550/arxiv.1709.03831 preprint EN other-oa arXiv (Cornell University) 2017-01-01

Detecting anomalies in surveillance videos has long been an important but unsolved problem. In particular, many existing solutions are overly sensitive to (often ephemeral) visual artifacts the raw video data, resulting false positives and fragmented detection regions. To overcome such sensitivity capture true with semantic significance, one natural idea is seek validation from abstract representations of videos. This paper introduces a framework robust anomaly using multilevel both...

10.1609/aaai.v33i01.33015216 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2019-07-17

Identifying vulnerabilities in the source code is essential to protect software systems from cyber security attacks. It, however, also a challenging step that requires specialized expertise and representation. To this end, we aim develop general, practical, programming language-independent model capable of running on various codes libraries without difficulty. Therefore, consider vulnerability detection as an inductive text classification problem propose ReGVD, simple yet effective graph...

10.1145/3510454.3516865 article EN 2022-05-21

Knowledge distillation is an attractive approach for learning compact deep neural networks, which learns a lightweight student model by distilling knowledge from complex teacher model. Attention-based specific form of intermediate feature-based that uses attention mechanisms to encourage the better mimic teacher. However, most previous attention-based approaches perform in spatial domain, primarily affects local regions input image. This may not be sufficient when we need capture broader...

10.1109/wacv57701.2024.00227 article EN 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) 2024-01-03

Abstract Many Machine Learning(ML)-based approaches have been proposed to automatically detect, localize, and repair software vulnerabilities. While ML-based methods are more effective than program analysis-based vulnerability analysis tools, few integrated into modern Integrated Development Environments (IDEs), hindering practical adoption. To bridge this critical gap, we propose in article AIBugHunter , a novel Learning-based tool for C/C++ languages that is the Visual Studio Code (VS...

10.1007/s10664-023-10346-3 article EN cc-by Empirical Software Engineering 2023-11-20

Large language models (LLMs) like ChatGPT (i.e., gpt-3.5-turbo and gpt-4) exhibited remarkable advancement in a range of software engineering tasks associated with source code such as review generation. In this paper, we undertake comprehensive study by instructing for four prevalent vulnerability tasks: function line-level prediction, classification, severity estimation, repair. We compare state-of-the-art designed purposes. Through an empirical assessment employing extensive real-world...

10.1109/apsec60848.2023.00085 article EN 2023-12-04

Deep learning-based vulnerability prediction approaches are proposed to help under-resourced security practitioners detect vulnerable functions. However, still do not know what type of vulnerabilities correspond a given (aka CWE-ID). Thus, novel approach explain the for is imperative. In this paper, we propose <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">VulExplainer</i> , an vulnerabilities. We represent as classification task. have...

10.1109/tse.2023.3305244 article EN IEEE Transactions on Software Engineering 2023-08-16

We propose a new approach to train the Generative Adversarial Nets (GANs) with mixture of generators overcome mode collapsing problem. The main intuition is employ multiple generators, instead using single one as in original GAN. idea simple, yet proven be extremely effective at covering diverse data modes, easily overcoming collapse and delivering state-of-the-art results. A minimax formulation able establish among classifier, discriminator, set similar spirit Generators create samples that...

10.48550/arxiv.1708.02556 preprint EN other-oa arXiv (Cornell University) 2017-01-01

A typical online kernel learning method faces two fundamental issues: the complexity in dealing with a huge number of observed data points (a.k.a curse kernelization) and difficulty parameters, which often assumed to be fixed. Random Fourier feature is recent effective approach address former by approximating shift-invariant function via Bocher's theorem, allows model maintained directly random space fixed dimension, hence size remains constant w.r.t. size. We further introduce this paper...

10.24963/ijcai.2017/354 article EN 2017-07-28

Identifying vulnerabilities in the source code is essential to protect software systems from cyber security attacks. It, however, also a challenging step that requires specialized expertise and representation. To this end, we aim develop general, practical, programming language-independent model capable of running on various codes libraries without difficulty. Therefore, consider vulnerability detection as an inductive text classification problem propose ReGVD, simple yet effective graph...

10.1109/icse-companion55297.2022.9793807 article EN 2022 IEEE/ACM 44th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) 2022-05-01

Multi-source Domain Adaptation (MSDA) is more practical but challenging than the conventional unsupervised domain adaptation due to involvement of diverse multiple data sources. Two fundamental challenges MSDA are: (i) how deal with diversity in source domains and (ii) cope shift between target domains. In this paper, address first challenge, we propose a theoretical-guaranteed approach combine experts locally trained on its own achieve combined multi-source teacher that globally predicts...

10.1109/iccv48922.2021.00922 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2021-10-01

Due to the ubiquity of computer software, software vulnerability detection (SVD) has become crucial in industry and field security. Two significant issues SVD arise when using machine learning, namely: i) how learn automatic features that can help improve predictive performance ii) overcome scarcity labeled vulnerabilities projects require laborious labeling code by security experts. In this paper, we address these two concerns proposing a novel architecture which leverages deep domain...

10.1109/ijcnn.2019.8851923 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2019-07-01

Recently, automated vulnerability repair approaches have been widely adopted to combat increasing software security issues. In particular, transformer-based encoder-decoder models achieve competitive results. Whereas vulnerable programs may only consist of a few code areas that need repair, existing AVR lack mechanism guiding their model pay more attention during generation. this article, we propose novel framework inspired by the Vision Transformer based for object detection in computer...

10.1145/3632746 article EN ACM Transactions on Software Engineering and Methodology 2023-11-13

We introduce a new model to deal with imbalanced data sets for novelty detection problems where the normal class of training set can be majority or minority class. The key idea is construct an optimal hypersphere such that inside margin between surface this sphere and outside abnormal are as large possible. Depending on specific real application detection, two margins adjusted achieve best true positive false rates. Experimental results number showed proposed provide better performance...

10.1109/ijcnn.2010.5596456 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2010-07-01

Recently, Neural Topic Models (NTMs) inspired by variational autoencoders have obtained increasingly research interest due to their promising results on text analysis. However, it is usually hard for existing NTMs achieve good document representation and coherent/diverse topics at the same time. Moreover, they often degrade performance severely short documents. The requirement of reparameterisation could also comprise training quality model flexibility. To address these shortcomings, we...

10.48550/arxiv.2008.13537 preprint EN cc-by-nc-sa arXiv (Cornell University) 2020-01-01

Using the principle of imitation learning and theory optimal transport we propose in this paper a novel model for unsupervised domain adaptation named Teacher Imitation Domain Adaptation with Optimal Transport (TIDOT). Our includes two cooperative agents: teacher student. The former agent is trained to be an expert on labeled data source domain, whilst latter one aims work unlabeled target domain. More specifically, applied quantify total distance between embedded distributions joint space,...

10.24963/ijcai.2021/394 article EN 2021-08-01

One of the most current challenging problems in Gaussian process regression (GPR) is to handle large-scale datasets and accommodate an online learning setting where data arrive irregularly on fly. In this paper, we introduce a novel model that could scale with massive datasets. Our approach formulated based alternative representation under geometric optimization views, hence termed geometric-based GP (GoGP). We developed theory guarantee good convergence rate our proposed algorithm always...

10.1109/icdm.2017.35 article EN 2021 IEEE International Conference on Data Mining (ICDM) 2017-11-01
Coming Soon ...