Bojan Cukic

Orcid: 0000-0001-7130-9054

According to our database1, Bojan Cukic authored at least 150 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
AI Code Generators for Security: Friend or Foe?
CoRR, 2024

2023
Who evaluates the evaluators? On automatic metrics for assessing AI-based offensive code generators.
Expert Syst. Appl., September, 2023

Enhancing Robustness of AI Offensive Code Generators via Data Augmentation.
CoRR, 2023

2022
Can we generate shellcodes via natural language? An empirical study.
Autom. Softw. Eng., 2022

Can NMT Understand Me? Towards Perturbation-based Evaluation of NMT Models for Code Generation.
Proceedings of the 2022 IEEE/ACM 1st International Workshop on Natural Language-Based Software Engineering (NLBSE 2022), 2022

Message from the ISSRE 2022 General Co-Chairs.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

Message from the General Co-Chairs: ISSRE 2022.
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

2021
Shellcode_IA32: A Dataset for Automatic Shellcode Generation.
CoRR, 2021

EVIL: Exploiting Software via Natural Language.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

2020
An Innovative Interdisciplinary Undergraduate Data Science Program: Pathways and Experience.
Proceedings of the IEEE Frontiers in Education Conference, 2020

2019
Touch gesture-based authentication on mobile devices: The effects of user posture, device size, configuration, and inter-session variability.
J. Syst. Softw., 2019

2018
Sustainable Educational Innovation Through Engaged Pedagogy and Organizational Change.
Proceedings of the IEEE Frontiers in Education Conference, 2018

2017
Automated triaging of very large bug repositories.
Inf. Softw. Technol., 2017

2016
Normalizing variations in feature vector structure in keystroke dynamics authentication systems.
Softw. Qual. J., 2016

A Methodology for Prevention of Biometric Presentation Attacks.
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016

The Connected Learner: Engaging faculty to connect computing students to peers, profession and purpose.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

Trust-Based Development Framework for Distributed Systems and IoT.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Pointer-Based Recognition.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Iris Digital Watermarking.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Keystroke Recognition.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Why rank-level fusion? And what is the impact of image quality?
Int. J. Big Data Intell., 2015

On the Cost of Mining Very Large Open Source Repositories.
Proceedings of the 1st IEEE/ACM International Workshop on Big Data Software Engineering, 2015

Effect of User Posture and Device Size on the Performance of Touch-Based Authentication Systems.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

Eclipse vs. Mozilla: A Comparison of Two Large-Scale Open Source Problem Report Repositories.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

A preliminary study on identifying sensors from iris images.
Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2015

2014
Removing gender signature from fingerprints.
Proceedings of the 37th International Convention on Information and Communication Technology, 2014

Supporting Decision-Making for Biometric System Deployment through Visual Analysis.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

Defect Prediction between Software Versions with Active Learning and Dimensionality Reduction.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

On the Adequacy of Performance Models in an Adaptive Border Inspection Management System.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Fingerprint liveness detection based on histograms of invariant gradients.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

Leveraging Variations in Event Sequences in Keystroke-Dynamics Authentication Systems.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

Proactive Model-Based Performance Analysis and Security Tradeoffs in a Complex System.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

Interoperability between Fingerprint Biometric Systems: An Empirical Study.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

A Semi-supervised Approach to Software Defect Prediction.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Incremental Development of Fault Prediction Models.
Int. J. Softw. Eng. Knowl. Eng., 2013

High Consequence Systems and Semantic Computing.
Int. J. Semantic Comput., 2013

Building a second opinion: learning cross-company data.
Proceedings of the 9th International Conference on Predictive Models in Software Engineering, 2013

A fusion approach for classifying duplicate problem reports.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Predicting more from less: Synergies of learning.
Proceedings of the 2nd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering, 2013

Impact of Biometric Data Quality on Rank-Level Fusion Schemes.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013

Interoperability in fingerprint recognition: A large-scale empirical study.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

Minimizing the impact of low interoperability between optical fingerprints sensors.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

2012
Performance Evaluation of Recent Windows Operating Systems.
J. Univers. Comput. Sci., 2012

An adaptive approach with active learning in software fault prediction.
Proceedings of the 8th International Conference on Predictive Models in Software Engineering, 2012

Software defect prediction using semi-supervised learning with dimension reduction.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Handling Language Variations in Open Source Bug Reporting Systems.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012

Multi-spectral face recognition: Identification of people in difficult environments.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Automated Duplicate Bug Report Classification Using Subsequence Matching.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

Performance and Risk Analysis for Border Management Applications: A Model-Driven Approach and a Perspective View.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

2011
Detecting bug duplicate reports through local references.
Proceedings of the 7th International Conference on Predictive Models in Software Engineering, 2011

An iterative semi-supervised approach to software fault prediction.
Proceedings of the 7th International Conference on Predictive Models in Software Engineering, 2011

Challenges for Creating Highly Dependable Service Based Systems.
Proceedings of the 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2011

Cross-spectral face recognition in heterogeneous environments: A case study on matching visible to short-wave infrared imagery.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

Effects of User Habituation in Keystroke Dynamics on Password Security Policy.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

2010
Dynamic Allocation in Neural Networks for Adaptive Controllers.
Proceedings of the Applications of Neural Networks in High Assurance Systems, 2010

Estimating and Fusing Quality Factors for Iris Biometric Images.
IEEE Trans. Syst. Man Cybern. Part A, 2010

Defect prediction from static code features: current results, limitations, new approaches.
Autom. Softw. Eng., 2010

Log-Based Reliability Analysis of Software as a Service (SaaS).
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

Optimal method for growth in dynamic self organizing learning systems.
Proceedings of the International Joint Conference on Neural Networks, 2010

Cross-Spectral Face Verification in the Short Wave Infrared (SWIR) Band.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Combined performance and risk analysis for border management applications.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010


2009
Iris Digital Watermarking.
Proceedings of the Encyclopedia of Biometrics, 2009

Misclassification cost-sensitive fault prediction models.
Proceedings of the 5th International Workshop on Predictive Models in Software Engineering, 2009

How to build repeatable experiments.
Proceedings of the 5th International Workshop on Predictive Models in Software Engineering, 2009

Variance Analysis in Software Fault Prediction Models.
Proceedings of the ISSRE 2009, 2009


Identifying sensors from fingerprint images.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2009

Decision dependability and its application to identity management.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Keystroke Dynamics-Based Credential Hardening Systems.
Proceedings of the Handbook of Remote Biometrics, 2009

2008
Techniques for evaluating fault prediction models.
Empir. Softw. Eng., 2008

Implications of ceiling effects in defect predictors.
Proceedings of the 4th International Workshop on Predictor Models in Software Engineering, 2008

Comparing design and code metrics for software quality prediction.
Proceedings of the 4th International Workshop on Predictor Models in Software Engineering, 2008

Can data transformation help in the detection of fault-prone modules?
Proceedings of the 2008 Workshop on Defects in Large Software Systems, 2008

Cost Curve Evaluation of Fault Prediction Models.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

2007
Performance Analysis of Dynamic Cell Structures.
Proceedings of the Trends in Neural Computation, 2007

Validating neural network-based online adaptive systems: a case study.
Softw. Qual. J., 2007

Adequate and Precise Evaluation of Quality Models in Software Engineering Studies.
Proceedings of the Third International Workshop on Predictor Models in Software Engineering, 2007

Fault Prediction using Early Lifecycle Data.
Proceedings of the ISSRE 2007, 2007

Protecting Iris Images through Asymmetric Digital Watermarking.
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007

2006
Performance analysis of iris-based identification system at the matching score level.
IEEE Trans. Inf. Forensics Secur., 2006

A validation approach for neural network-based online adaptive systems.
Softw. Pract. Exp., 2006

Monitoring techniques for an online neuro-adaptive controller.
J. Syst. Softw., 2006

Verification and Validation of a Fingerprint Image Registration Software.
EURASIP J. Adv. Signal Process., 2006

High Assurance Software Systems.
Comput. J., 2006

A Strategy for Verification of Decomposable SCR Models.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

Random testing of formal software models and induced coverage.
Proceedings of the 1st International Workshop on Random Testing, 2006

Effectively Combining Software Verification Strategies: Understanding Different Assumptions.
Proceedings of the 17th International Symposium on Software Reliability Engineering (ISSRE 2006), 2006

Modeling the Performance of Border Inspections with Electronic Travel Documents.
Proceedings of the 17th International Symposium on Software Reliability Engineering (ISSRE 2006), 2006

Evaluating the Reliability of Credential Hardening through Keystroke Dynamics.
Proceedings of the 17th International Symposium on Software Reliability Engineering (ISSRE 2006), 2006

A Component-Based Approach to Verification and Validation of Formal Software Models.
Proceedings of the Architecting Dependable Systems IV [the book is a result of DSN 2006 workshops, 2006

2005
Guest Editor's Introduction: The Promise of Public Software Engineering Data Repositories.
IEEE Softw., 2005

The Virtues of Assessing Software Reliability Early.
IEEE Softw., 2005

Real-Time Data Fusion Technique for Validation of an Autonomous System.
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005), 2005

Error Propagation in the Reliability Analysis of Component Based Systems.
Proceedings of the 16th International Symposium on Software Reliability Engineering (ISSRE 2005), 2005

Predicting with Confidence - An Improved Dynamic Cell Structure.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Linear Randomized Voting Algorithm for Fault Tolerant Sensor Fusion and the Corresponding Reliability Model.
Proceedings of the Ninth IEEE International Symposium on High Assurance Systems Engineering (HASE 2005), 2005

Stability Monitoring and Analysis of Learning in an Adaptive System.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Novelty Detection for a Neural Network-Based Online Adaptive System.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

A Classification Approach to Multi-biometric Score Fusion.
Proceedings of the Audio- and Video-Based Biometric Person Authentication, 2005

Guidelines for Appropriate Use of Simulated Data for Bio-Authentication Research.
Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005), 2005

2004
A scenario-based reliability analysis approach for component-based software.
IEEE Trans. Reliab., 2004

RETNA: From Requirements to Testing in a Natural Way.
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE 2004), 2004

Validation of a Methodology for Assessing Software Reliability.
Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2004

Robust Prediction of Fault-Proneness by Random Forests.
Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2004

Validation and Reliability Estimation of a Fingerprint Image Registration Software.
Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2004

Performability Modeling of Mobile Software Systems.
Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2004

Towards the Verification and Validation of Online Learning Systems: General Framework and Applications.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

An Approach to V&V of Embedded Adaptive Systems.
Proceedings of the Formal Approaches to Agent-Based Systems, Third InternationalWorkshop, 2004

Does Your Result Checker Really Check?
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Adaptive Control Software: Can We Guarantee Safety?
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

2003
Comparing Partition and Random Testing via Majorization and Schur Functions.
IEEE Trans. Software Eng., 2003

Lyapunov Analysis of Neural Network Stability in an Adaptive Flight Control System.
Proceedings of the Self-Stabilizing Systems, 6th International Symposium, SSS 2003, 2003

Predicting Fault Prone Modules by the Dempster-Shafer Belief Networks.
Proceedings of the 18th IEEE International Conference on Automated Software Engineering (ASE 2003), 2003

Validating an Online Adaptive System Using SVDD.
Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2003), 2003

Software Aging and Multifractality of Memory Resources.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

2002
Predicting Fault-Prone Modules in Embedded Systems Using Analogy-Based Classification Models.
Int. J. Softw. Eng. Knowl. Eng., 2002

Automated Generation of Test Trajectories for Embedded Flight Control Systems.
Int. J. Softw. Eng. Knowl. Eng., 2002

Early reliability assessment of UML based software models.
Proceedings of the Third International Workshop on Software and Performance, 2002

What Makes Finite-State Models More (or Less) Testable?
Proceedings of the 17th IEEE International Conference on Automated Software Engineering (ASE 2002), 2002

Saturation Effects in Testing of Formal Models.
Proceedings of the 13th International Symposium on Software Reliability Engineering (ISSRE 2002), 2002

Data Sniffing - Monitoring of Machine Learning for Online Adaptive Systems.
Proceedings of the 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002

An Alternative to Model Checking: Verification by Random Search of AND-OR Graphs Representing Finite-State Models.
Proceedings of the 7th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2002), 2002

You Seem Friendly, But Can I Trust You?
Proceedings of the Formal Approaches to Agent-Based Systems, Second International Workshop, 2002

2001
Virtual Environment Modeling for Requirements Validation of High Consequence Systems.
Proceedings of the 5th IEEE International Symposium on Requirements Engineering (RE 2001), 2001

A Bayesian Approach to Reliability Prediction and Assessment of Component Based Systems.
Proceedings of the 12th International Symposium on Software Reliability Engineering (ISSRE 2001), 2001

The Need for Verification and Validation Techniques for Adaptive Control System.
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, 2001

Automating Techniques for Inspecting High Assurance Systems.
Proceedings of the 6th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2001), 2001

2000
When to Test Less.
IEEE Softw., 2000

Adequacy of Limited Testing for Knowledge Based Systems.
Int. J. Artif. Intell. Tools, 2000

A comparative analysis of hardware and software fault tolerance: Impact on software reliability engineering.
Ann. Softw. Eng., 2000

Evaluation of Regressive Methods for Automated Generation of Test Trajectories.
Proceedings of the 11th International Symposium on Software Reliability Engineering (ISSRE 2000), 2000

Testing Nondeterminate Systems.
Proceedings of the 11th International Symposium on Software Reliability Engineering (ISSRE 2000), 2000

Bayesian framework for reliability assurance of a deployed safety critical system.
Proceedings of the 5th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2000), 2000

Agents Talking Faster.
Proceedings of the Formal Approaches to Agent-Based Systems, First International Workshop, 2000

1999
A Component-based Approach to Reliability Analysis of Distributed Systems.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Combining Fault Avoidance, Fault Removal and Fault Tolerance: An Integrated Model.
Proceedings of the 14th IEEE International Conference on Automated Software Engineering, 1999

Scenario-based reliability analysis of component-based software.
Proceedings of the 10th International Symposium on Software Reliability Engineering, 1999

On the Sufficiency of Limited Testing for Knowledge Based Systems.
Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence, 1999

Fault Detectability Analysis for Requirements Validation of Fault Tolerant Systems.
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999

On Two Types of L<sup>M</sup> Fuzzy Lattices.
Proceedings of the Computational Intelligence, 1999

1998
Identifying high-risk scenarios of complex systems using input domain partitioning.
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998

Experience in Developing System Requirements Specification for a Sensor Failure Detection and Identification Scheme.
Proceedings of the 3rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 1998

1997
Diversity in the software development process.
Proceedings of the 3rd Workshop on Object-Oriented Real-Time Dependable Systems (WORDS '97), 1997

Combining Testing and Correctness Verification in Software Reliability Assessment.
Proceedings of the 2nd High-Assurance Systems Engineering Workshop (HASE '97), 1997

EH* - Extendible Hashing in a Distributed Environment.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997

1996
Toward dependable safety-critical software.
Proceedings of WORDS'96. The Second Workshop on Object-Oriented Real-Time Dependable Systems, 1996

On reducing the sensitivity of software reliability to variations in the operational profile.
Proceedings of the Seventh International Symposium on Software Reliability Engineering, 1996

Impact of program transformation on software reliability assessment.
Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996

1994
Automatic Array Alignment as a Step in Hierarchical Program Transformation.
Proceedings of the 8th International Symposium on Parallel Processing, 1994


  Loading...