{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T04:11:02Z","timestamp":1748232662849,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031106835"},{"type":"electronic","value":"9783031106842"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10684-2_4","type":"book-chapter","created":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T07:05:06Z","timestamp":1657609506000},"page":"48-67","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["MCoM: A Semi-Supervised Method for\u00a0Imbalanced Tabular Security Data"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3675-3448","authenticated-orcid":false,"given":"Xiaodi","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9300-1576","authenticated-orcid":false,"given":"Latifur","family":"Khan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mahmoud","family":"Zamani","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shamila","family":"Wickramasuriya","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0479-6280","authenticated-orcid":false,"given":"Kevin W.","family":"Hamlen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4653-2080","authenticated-orcid":false,"given":"Bhavani","family":"Thuraisingham","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,7,13]]},"reference":[{"key":"4_CR1","unstructured":"Berthelot, D., Carlini, N., Goodfellow, I., Papernot, N., Oliver, A., Raffel, C.A.: MixMatch: a holistic approach to semi-supervised learning. Advances in Neural Information Processing Systems (NeurIPS), vol. 32 (2019)"},{"key":"4_CR2","unstructured":"Caron, M., Misra, I., Mairal, J., Goyal, P., Bojanowski, P., Joulin, A.: Unsupervised learning of visual features by contrasting cluster assignments. In: Advances in Neural Information Processing Systems (NeurIPS), vol. 33, pp. 9912\u20139924 (2020)"},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. (JAIR) 16(1), 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res. (JAIR)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDDM), pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"4_CR5","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.: A simple framework for contrastive learning of visual representations. In: Proceedings of the 37th IEEE International Conference on Machine Learning (ICML), pp. 1597\u20131607 (2020)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Cui, Y., Jia, M., Lin, T.Y., Song, Y., Belongie, S.: Class-balanced loss based on effective number of samples. In: Proceedings of the 37th IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9268\u20139277 (2019)","DOI":"10.1109\/CVPR.2019.00949"},{"key":"4_CR7","unstructured":"Darabi, S., Fazeli, S., Pazoki, A., Sankararaman, S., Sarrafzadeh, M.: Contrastive mixup: Self-and semi-supervised learning for tabular domain. arXiv Preprint arXiv:2108.12296 (2021)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: Proceedings of the 27th IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 248\u2013255 (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Doyle, M., Walden, J.: An empirical study of the evolution of PHP web application security. In: Proceedings of the 3rd International Workshop on Security Measurements and Metrics, pp. 11\u201320 (2011)","DOI":"10.1109\/Metrisec.2011.18"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Du, X., et al.: Leopard: identifying vulnerable code for vulnerability assessment through program metrics. In: Proceedings of the 41st International Conference on Software Engineering (ICSE), pp. 60\u201371 (2019)","DOI":"10.1109\/ICSE.2019.00024"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Feng, S.Y., et al.: A survey of data augmentation approaches for NLP. arXiv Preprint arXiv:2105.03075 (2021)","DOI":"10.18653\/v1\/2021.findings-acl.84"},{"key":"4_CR12","doi-asserted-by":"publisher","DOI":"10.1201\/b17461","volume-title":"Software Metrics: A Rigorous and Practical Approach","author":"N Fenton","year":"2014","unstructured":"Fenton, N., Bieman, J.: Software Metrics: A Rigorous and Practical Approach, 3rd edn. CRC Press, Boca Raton (2014)","edition":"3"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Gao, Y., Li, Y.F., Lin, Y., Aggarwal, C., Khan, L.: SetConv: a new approach for learning from imbalanced data. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1284\u20131294 (2021)","DOI":"10.18653\/v1\/2020.emnlp-main.98"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Gegick, M., Williams, L., Osborne, J., Vouk, M.: Prioritizing software security fortification through code-level metrics. In: Proceedings of the 4th ACM Workshop on Quality of Protection (QoP), pp. 31\u201338 (2008)","DOI":"10.1145\/1456362.1456370"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"He, K., Fan, H., Wu, Y., Xie, S., Girshick, R.: Momentum contrast for unsupervised visual representation learning. In: Proceedings of the 38th IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9729\u20139738 (2020)","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"4_CR16","unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. In: Proceedings of the 32nd International Conference on Machine Learning (ICML), pp. 448\u2013456 (2015)"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Iscen, A., Tolias, G., Avrithis, Y., Chum, O.: Label propagation for deep semi-supervised learning. In: Proceedings of the 37th IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 5070\u20135079 (2019)","DOI":"10.1109\/CVPR.2019.00521"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Kobayashi, S.: Contextual augmentation: data augmentation by words with paradigmatic relations. In: Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT), vol. 2, pp. 452\u2013457 (2018)","DOI":"10.18653\/v1\/N18-2072"},{"key":"4_CR19","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems (NeurIPS), vol. 25 (2012)"},{"issue":"1","key":"4_CR20","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s11042-007-0117-8","volume":"35","author":"G Lavee","year":"2007","unstructured":"Lavee, G., Khan, L., Thuraisingham, B.: A framework for a video analysis tool for suspicious event detection. Multimedia Tools Appl. 35(1), 109\u2013123 (2007)","journal-title":"Multimedia Tools Appl."},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Goyal, P., Girshick, R., He, K., Doll\u00e1r, P.: Focal loss for dense object detection. In: Proceedings of the IEEE International Conference on Computer Vision (ICCV), pp. 2980\u20132988 (2017)","DOI":"10.1109\/ICCV.2017.324"},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-642-13672-6_31","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"MM Masud","year":"2010","unstructured":"Masud, M.M., Gao, J., Khan, L., Han, J., Thuraisingham, B.: Classification and novel class detection in data streams with active mining. In: Zaki, M.J., Yu, J.X., Ravindran, B., Pudi, V. (eds.) PAKDD 2010. LNCS (LNAI), vol. 6119, pp. 311\u2013324. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13672-6_31"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Masud, M.M., Khan, L., Thuraisingham, B.: A hybrid model to detect malicious executables. In: 2007 IEEE International Conference on Communications, pp. 1443\u20131448. IEEE (2007)","DOI":"10.1109\/ICC.2007.242"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"McCabe, T.: A complexity measure. IEEE Trans. Softw. Eng. (TSE) SE-2(4), 308\u2013320 (1976)","DOI":"10.1109\/TSE.1976.233837"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Meneely, A., Williams, L.: Strengthening the empirical analysis of the relationship between Linus\u2019 Law and software security. In: Proceedings of the 4th ACM International Symposium on Empirical Software Engineering and Measurement (ESEM) (2010)","DOI":"10.1145\/1852786.1852798"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Misra, I., van der Maaten, L.: Self-supervised learning of pretext-invariant representations. In: Proceedings of the 38th IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6707\u20136717 (2020)","DOI":"10.1109\/CVPR42600.2020.00674"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Nagappan, N., Ball, T., Zeller, A.: Mining metrics to predict component failures. In: Proceedings of the 28th International Conference on Software Engineering (ICSE), pp. 452\u2013461 (2006)","DOI":"10.1145\/1134285.1134349"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Parveen, P., Weger, Z.R., Thuraisingham, B., Hamlen, K., Khan, L.: Supervised learning for insider threat detection using stream mining. In: 2011 IEEE 23rd International Conference on Tools with Artificial Intelligence, pp. 1032\u20131039. IEEE (2011)","DOI":"10.1109\/ICTAI.2011.176"},{"issue":"9","key":"4_CR29","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/947955.947960","volume":"17","author":"P Piwowarski","year":"1982","unstructured":"Piwowarski, P.: A nesting level complexity measure. ACM SIGPLAN Notices 17(9), 44\u201350 (1982)","journal-title":"ACM SIGPLAN Notices"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Sennrich, R., Haddow, B., Birch, A.: Improving neural machine translation models with monolingual data. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (ACL) (2016)","DOI":"10.18653\/v1\/P16-1009"},{"issue":"1","key":"4_CR31","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s10664-011-9190-8","volume":"18","author":"Y Shin","year":"2013","unstructured":"Shin, Y., Williams, L.: Can traditional fault prediction models be used for vulnerability prediction? Empir. Softw. Eng. 18(1), 25\u201359 (2013)","journal-title":"Empir. Softw. Eng."},{"key":"4_CR32","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: Proceedings of the 3rd International Conference on Learning Representations (ICLR) (2015)"},{"key":"4_CR33","unstructured":"Sohn, K., et al.: FixMatch: simplifying semi-supervised learning with consistency and confidence. In: Advances in Neural Information Processing Systems (NeurIPS), vol. 33, pp. 596\u2013608 (2020)"},{"issue":"1","key":"4_CR34","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. (JMLR) 15(1), 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res. (JMLR)"},{"key":"4_CR35","unstructured":"Tian, Y., Sun, C., Poole, B., Krishnan, D., Schmid, C., Isola, P.: What makes for good views for contrastive learning? In: Advances in Neural Information Processing Systems (NeurIPS), vol. 33, pp. 6827\u20136839 (2020)"},{"key":"4_CR36","unstructured":"Trinh, T.H., Luong, M.T., Le, Q.V.: Selfie: Self-supervised pretraining for image embedding. arXiv Preprint arXiv:1906.02940 (2019)"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Wang, Z., Dong, B., Lin, Y., Wang, Y., Islam, M.S., Khan, L.: Co-representation learning framework for the open-set data classification. In: IEEE International Conference on Big Data (BigData), pp. 239\u2013244 (2019)","DOI":"10.1109\/BigData47090.2019.9006177"},{"key":"4_CR38","doi-asserted-by":"crossref","unstructured":"Yamaguchi, F., Golde, N., Arp, D., Rieck, K.: Modeling and discovering vulnerabilities with code property graphs. In: Proceedings of the 35th IEEE Symposium on Security and Privacy (S &P) (2014)","DOI":"10.1109\/SP.2014.44"},{"key":"4_CR39","unstructured":"Yoon, J., Zhang, Y., Jordon, J., van der Schaar, M.: VIME: extending the success of self-and semi-supervised learning to tabular domain. In: Advances in Neural Information Processing Systems (NeurIPS), vol. 33, pp. 11033\u201311043 (2020)"},{"key":"4_CR40","doi-asserted-by":"crossref","unstructured":"Younis, A., Malaiya, Y., Anderson, C., Ray, I.: To fear or not to fear that is the question: code characteristics of a vulnerable function with an existing exploit. In: Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY), pp. 97\u2013104 (2016)","DOI":"10.1145\/2857705.2857750"},{"key":"4_CR41","doi-asserted-by":"crossref","unstructured":"Zeller, A., Zimmermann, T., Bird, C.: Failure is a four-letter word: a parody in empirical research. In: Proceedings of the 7th International Conference on Predictive Models in Software Engineering (Promise) (2011)","DOI":"10.1145\/2020390.2020395"},{"key":"4_CR42","unstructured":"Zhang, H., Cisse, M., Dauphin, Y.N., Lopez-Paz, D.: Mixup: beyond empirical risk minimization. arXiv Preprint arXiv:1710.09412 (2017)"},{"key":"4_CR43","unstructured":"Zhou, D., Bousquet, O., Lal, T., Weston, J., Sch\u00f6lkopf, B.: Learning with local and global consistency. In: Advances in Neural Information Processing Systems (NeurIPS), vol. 16 (2003)"},{"key":"4_CR44","unstructured":"Zhu, X.J.: Semi-supervised learning literature survey. Technical report, University of Wisconsin-Madison (2008)"},{"key":"4_CR45","doi-asserted-by":"crossref","unstructured":"Zimmermann, T., Nagappan, N.: Predicting defects using network analysis on dependency graphs. In: Proceedings of the 30th ACM\/IEEE International Conference on Software Engineering (ICSE), pp. 531\u2013540 (2008)","DOI":"10.1145\/1368088.1368161"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXVI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10684-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T07:08:39Z","timestamp":1657609719000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10684-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031106835","9783031106842"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10684-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"13 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Newark, NJ","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cs.iit.edu\/~dbsec2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}