Kevin Leach

Orcid: 0000-0002-4001-3442

According to our database1, Kevin Leach authored at least 52 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Generating Hard-Negative Out-of-Scope Data with ChatGPT for Intent Classification.
CoRR, 2024

Do Machines and Humans Focus on Similar Code? Exploring Explainability of Large Language Models in Code Summarization.
CoRR, 2024

EyeTrans: Merging Human and Machine Attention for Neural Code Summarization.
CoRR, 2024

2023
On Evaluation of Document Classification using RVL-CDIP.
CoRR, 2023

A Four-Year Study of Student Contributions to OSS vs. OSS4SG with a Lightweight Intervention.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Revisiting Lightweight Compiler Provenance Recovery on ARM Binaries.
Proceedings of the 31st IEEE/ACM International Conference on Program Comprehension, 2023

Revisiting Deep Learning for Variable Type Recovery.
Proceedings of the 31st IEEE/ACM International Conference on Program Comprehension, 2023

Leveraging Evidence Theory to Improve Fault Localization: An Exploratory Study.
Proceedings of the ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2023

On Evaluation of Document Classifiers using RVL-CDIP.
Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics, 2023

2022
Augmenting Task-Oriented Dialogue Systems with Relation Extraction.
CoRR, 2022

COMBO: Pre-Training Representations of Binary Code Using Contrastive Learning.
CoRR, 2022

ASTRO: An AST-Assisted Approach for Generalizable Neural Clone Detection.
CoRR, 2022

A Survey of Intent Classification and Slot-Filling Datasets for Task-Oriented Dialog.
CoRR, 2022

Redwood: Using Collision Detection to Grow a Large-Scale Intent Classification Dataset.
Proceedings of the 23rd Annual Meeting of the Special Interest Group on Discourse and Dialogue, 2022

Evaluating Out-of-Distribution Performance on Document Image Classifiers.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report).
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

StrongBox: A GPU TEE on Arm Endpoints.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

One Agent To Rule Them All: Towards Multi-agent Conversational AI.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022

2021
Toward an Objective Measure of Developers' Cognitive Activities.
ACM Trans. Softw. Eng. Methodol., 2021

A Coprocessor-Based Introspection Framework Via Intel Management Engine.
IEEE Trans. Dependable Secur. Comput., 2021

MIMOSA: Reducing Malware Analysis Overhead with Coverings.
CoRR, 2021

2020
Biases and differences in code review using medical imaging and eye-tracking: genders, humans, and machines.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Data Query Language and Corpus Tools for Slot-Filling and Intent Classification Data.
Proceedings of The 12th Language Resources and Evaluation Conference, 2020

A Human Study of Comprehension and Code Summarization.
Proceedings of the ICPC '20: 28th International Conference on Program Comprehension, 2020

Neurological divide: an fMRI study of prose and code writing.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Selective Symbolic Type-Guided Checkpointing and Restoration for Autonomous Vehicle Repair.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020

Iterative Feature Mining for Constraint-Based Data Collection to Increase Data Diversity and Model Robustness.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020

KShot: Live Kernel Patching with SMM and SGX.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Inconsistencies in Crowdsourced Slot-Filling Annotations: A Typology and Identification Methods.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

MARTINI: Memory Access Traces to Detect Attacks.
Proceedings of the CCSW'20, 2020

2019
The State and Future of Genetic Improvement.
ACM SIGSOFT Softw. Eng. Notes, 2019

Open Source Vulnerability Notification.
Proceedings of the Open Source Systems - 15th IFIP WG 2.13 International Conference, 2019

Evolutionary computation for improving malware analysis.
Proceedings of the 6th International Workshop on Genetic Improvement, 2019

Distilling neural representations of data structure manipulation using fMRI and fNIRS.
Proceedings of the 41st International Conference on Software Engineering, 2019

Nighthawk: Transparent System Introspection from Ring -3.
Proceedings of the Computer Security - ESORICS 2019, 2019

An Evaluation Dataset for Intent Classification and Out-of-Scope Prediction.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

2018
Towards Transparent Debugging.
IEEE Trans. Dependable Secur. Comput., 2018

2017
<i>Daehr</i>: A Discriminant Analysis Framework for Electronic Health Record Data and an Application to Early Detection of Mental Health Disorders.
ACM Trans. Intell. Syst. Technol., 2017

Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

A 4.4 nW lossless sensor data compression accelerator for 2.9x system power reduction in wireless body sensors.
Proceedings of the IEEE 60th International Midwest Symposium on Circuits and Systems, 2017

2016
Towards Transparent Introspection.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Assessing social anxiety using gps trajectories and point-of-interest data.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

A MapReduce framework to improve template matching uncertainty.
Proceedings of the 2016 International Conference on Big Data and Smart Computing, 2016

2015
Using Hardware Features for Increased Debugging Transparency.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

TrustLogin: Securing Password-Login on Commodity Operating Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

M-SEQ: Early detection of anxiety and depression via temporal orders of diagnoses in electronic health data.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
A Framework to Secure Peripherals at Runtime.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
SPECTRE: A dependable introspection framework via System Management Mode.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

BARLEY: Modelling program behavior with resource usage.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013


  Loading...