A Formal Framework of Software Product Line Analyses; ; et al in ACM Transactions on Software Engineering and Methodology (in press) Detailed reference viewed: 32 (2 UL) Test Selection for Deep Learning SystemsMa, Wei ; Papadakis, Mike ; et alin ACM Transactions on Software Engineering and Methodology (in press) Detailed reference viewed: 123 (11 UL) Killing Stubborn Mutants with Symbolic ExecutionTitcheu Chekam, Thierry ; Papadakis, Mike ; Cordy, Maxime et alin ACM Transactions on Software Engineering and Methodology (in press) Detailed reference viewed: 107 (11 UL) Load approximation for uncertain topologies in the low-voltage gridMouline, Ludovic ; Cordy, Maxime ; Le Traon, Yves ![]() in INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS, 11-13 November 2020 (2020, November) Smart grids allow operators to monitor the grid continuously, detect occurring incidents, and trigger corrective actions. To perform that, they require a deep understanding of the effective situation ... [more ▼] Smart grids allow operators to monitor the grid continuously, detect occurring incidents, and trigger corrective actions. To perform that, they require a deep understanding of the effective situation within the grid. However, some parameters of the grid may not be known with absolute confidence. Reasoning over the grid despite uncertainty needs the consideration of all possible states. In this paper, we propose an approach to enumerate only valid potential grid states. Thereby, we allow discarding invalid assumptions that poison the results of a given computation procedure. We validate our approach based on a real-world topology from the power grid in Luxembourg. We show that the estimation of cable load is negatively affected by invalid fuse state combinations, in terms of computation time and accuracy. [less ▲] Detailed reference viewed: 75 (10 UL) Tackling the equivalent mutant problem in real-time systems: the 12 commandments of model-based mutation testing; ; Cordy, Maxime et alin SOFTWARE PRODUCT LINE CONFERENCE (2020, October) Detailed reference viewed: 22 (1 UL) Data-driven simulation and optimization for covid-19 exit strategiesGhamizi, Salah ; Rwemalika, Renaud ; Cordy, Maxime et alin Ghamizi, Salah; Rwemalika, Renaud; Cordy, Maxime (Eds.) et al Data-driven simulation and optimization for covid-19 exit strategies (2020, August) The rapid spread of the Coronavirus SARS-2 is a major challenge that led almost all governments worldwide to take drastic measures to respond to the tragedy. Chief among those measures is the massive ... [more ▼] The rapid spread of the Coronavirus SARS-2 is a major challenge that led almost all governments worldwide to take drastic measures to respond to the tragedy. Chief among those measures is the massive lockdown of entire countries and cities, which beyond its global economic impact has created some deep social and psychological tensions within populations. While the adopted mitigation measures (including the lockdown) have generally proven useful, policymakers are now facing a critical question: how and when to lift the mitigation measures? A carefully-planned exit strategy is indeed necessary to recover from the pandemic without risking a new outbreak. Classically, exit strategies rely on mathematical modeling to predict the effect of public health interventions. Such models are unfortunately known to be sensitive to some key parameters, which are usually set based on rules-of-thumb.In this paper, we propose to augment epidemiological forecasting with actual data-driven models that will learn to fine-tune predictions for different contexts (e.g., per country). We have therefore built a pandemic simulation and forecasting toolkit that combines a deep learning estimation of the epidemiological parameters of the disease in order to predict the cases and deaths, and a genetic algorithm component searching for optimal trade-offs/policies between constraints and objectives set by decision-makers.Replaying pandemic evolution in various countries, we experimentally show that our approach yields predictions with much lower error rates than pure epidemiological models in 75% of the cases and achieves a 95% R² score when the learning is transferred and tested on unseen countries. When used for forecasting, this approach provides actionable insights into the impact of individual measures and strategies. [less ▲] Detailed reference viewed: 64 (3 UL) Statistical Model Checking for Variability-Intensive SystemsCordy, Maxime ; Papadakis, Mike ; in FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, Dublin 22-25 April 2020 (2020, April) Detailed reference viewed: 32 (1 UL) Preventing Overloading Incidents on Smart Grids: A Multiobjective Combinatorial Optimization ApproachAntoniadis, Nikolaos ; Cordy, Maxime ; et alin Communications in Computer and Information Science (2020, February 15) Cable overloading is one of the most critical disturbances that may occur in smart grids, as it can cause damage to the distribution power lines. Therefore, the circuits are protected by fuses so that ... [more ▼] Cable overloading is one of the most critical disturbances that may occur in smart grids, as it can cause damage to the distribution power lines. Therefore, the circuits are protected by fuses so that, the overload could trip the fuse, opening the circuit, and stopping the flow and heating. However, sustained overloads, even if they are below the safety limits, could also damage the wires. To prevent overload, smart grid operators can switch the fuses on or off to protect the circuits, or remotely curtail the over-producing/over-consuming users. Nevertheless, making the most appropriate decision is a daunting decision-making task, notably due to contractual and technical obligations. In this paper, we define and formulate the overloading prevention problem as a Multiobjective Mixed Integer Quadratically Constrained Program. We also suggest a solution method using a combinatorial optimization approach with a state-of-the-art exact solver. We evaluate this approach for this real-world problem together with Creos Luxembourg S.A., the leading grid operator in Luxembourg, and show that our method can suggest optimal countermeasures to operators facing potential overloading incidents. [less ▲] Detailed reference viewed: 272 (35 UL) FeatureNET: Diversity-driven Generation of Deep Learning ModelsGhamizi, Salah ; Cordy, Maxime ; Papadakis, Mike et alin International Conference on Software Engineering (ICSE) (2020) Detailed reference viewed: 39 (4 UL) Learning To Predict Vulnerabilities From Vulnerability-Fixes: A Machine Translation ApproachGarg, Aayush ; Degiovanni, Renzo Gaston ; Jimenez, Matthieu et alE-print/Working paper (2020) Detailed reference viewed: 41 (11 UL) Adversarial Embedding: A robust and elusive Steganography and Watermarking techniqueGhamizi, Salah ; Cordy, Maxime ; Papadakis, Mike et alScientific Conference (2020) We propose adversarial embedding, a new steganography and watermarking technique that embeds secret information within images. The key idea of our method is to use deep neural networks for image ... [more ▼] We propose adversarial embedding, a new steganography and watermarking technique that embeds secret information within images. The key idea of our method is to use deep neural networks for image classification and adversarial attacks to embed secret information within images. Thus, we use the attacks to embed an encoding of the message within images and the related deep neural network outputs to extract it. The key properties of adversarial attacks (invisible perturbations, nontransferability, resilience to tampering) offer guarantees regarding the confidentiality and the integrity of the hidden messages. We empirically evaluate adversarial embedding using more than 100 models and 1,000 messages. Our results confirm that our embedding passes unnoticed by both humans and steganalysis methods, while at the same time impedes illicit retrieval of the message (less than 13% recovery rate when the interceptor has some knowledge about our model), and is resilient to soft and (to some extent) aggressive image tampering (up to 100% recovery rate under jpeg compression). We further develop our method by proposing a new type of adversarial attack which improves the embedding density (amount of hidden information) of our method to up to 10 bits per pixel. [less ▲] Detailed reference viewed: 338 (38 UL) Pandemic Simulation and Forecasting of exit strategies:Convergence of Machine Learning and EpidemiologicalModelsGhamizi, Salah ; Rwemalika, Renaud ; Cordy, Maxime et alReport (2020) The COVID-19 pandemic has created a public health emergency unprecedented in this century. The lack ofaccurate knowledge regarding the outcomes of the virus has made it challenging for policymakers to ... [more ▼] The COVID-19 pandemic has created a public health emergency unprecedented in this century. The lack ofaccurate knowledge regarding the outcomes of the virus has made it challenging for policymakers to decideon appropriate countermeasures to mitigate its impact on society, in particular the public health and the veryhealthcare system.While the mitigation strategies (including the lockdown) are getting lifted, understanding the current im-pacts of the outbreak remains challenging. This impedes any analysis and scheduling of measures requiredfor the different countries to recover from the pandemic without risking a new outbreak.Therefore, we propose a novel approach to build realistic data-driven pandemic simulation and forecastingmodels to support policymakers. Our models allow the investigation of mitigation/recovery measures andtheir impact. Thereby, they enable appropriate planning of those measures, with the aim to optimize theirsocietal benefits.Our approach relies on a combination of machine learning and classical epidemiological models, circum-venting the respective limitations of these techniques to allow a policy-making based on established knowl-edge, yet driven by factual data, and tailored to each country’s specific context. [less ▲] Detailed reference viewed: 188 (17 UL) Search-based adversarial testing and improvement of constrained credit scoring systemsGhamizi, Salah ; Cordy, Maxime ; Gubri, Martin et alin ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '20), November 8-13, 2020 (2020) Detailed reference viewed: 54 (6 UL) Verification and abstraction of real-time variability-intensive systemsCordy, Maxime ; in International Journal on Software Tools for Technology Transfer (2019), 21(6), 635-649 Detailed reference viewed: 33 (0 UL) Automated evaluation of embedded-system design alternativesCordy, Maxime ; in Proceedings of the 23rd International Systems and Software Product Line Conference, SPLC 2019, Volume A, Paris, France, September 9-13, 2019 (2019, September) Detailed reference viewed: 28 (2 UL) Towards context-aware automated writing evaluation systems; Cordy, Maxime ![]() in Proceedings of the 1st ACM SIGSOFT International Workshop on Education through Advanced Software Engineering and Artificial Intelligence, EASEAI@ESEC/SIGSOFT FSE 2019, Tallinn, Estonia, August 26, 2019 (2019, August 26) Detailed reference viewed: 24 (0 UL) Towards sampling and simulation-based analysis of featured weighted automataCordy, Maxime ; ; et alin Proceedings of the 7th International Workshop on Formal Methods in Software Engineering (2019, May) Detailed reference viewed: 31 (0 UL) Multifaceted automated analyses for variability-intensive embedded systems; Cordy, Maxime ; et alin Proceedings of the 41st International Conference on Software Engineering, ICSE 2019, Montreal, QC, Canada, May 25-31, 2019 (2019, May) Detailed reference viewed: 38 (1 UL) Towards Learning-Aided Configuration in 3D Printing: Feasibility Study and Application to Defect Prediction; Cordy, Maxime ; et alin Proceedings of the 13th International Workshop on Variability Modelling of Software-Intensive Systems, VAMOS 2019, Leuven, Belgium, February 06-08, 2019 (2019, February) Detailed reference viewed: 19 (0 UL) Proceedings of the 3rd ACM SIGSOFT International Workshop on Machine Learning Techniques for Software Quality Evaluation; ; et al Book published by ACM (2019) Detailed reference viewed: 30 (2 UL) |
||