James C. Davis

Orcid: 0000-0003-2495-686X

Affiliations:
  • Purdue University, West Lafayette, IN, USA


According to our database1, James C. Davis authored at least 72 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Challenges and practices of deep learning model reengineering: A case study on computer vision.
Empir. Softw. Eng., November, 2024

On the Contents and Utility of IoT Cybersecurity Guidelines.
Proc. ACM Softw. Eng., 2024

Token Turing Machines are Efficient Vision Models.
CoRR, 2024

Pruning One More Token is Enough: Leveraging Latency-Workload Non-Linearities for Vision Transformers on the Edge.
CoRR, 2024

Establishing Provenance Before Coding: Traditional and Next-Gen Signing.
CoRR, 2024

DiVerify: Diversifying Identity Verification in Next-Generation Software Signing.
CoRR, 2024

SoK: A Literature and Engineering Review of Regular Expression Denial of Service.
CoRR, 2024

Can Large Language Models Analyze Software Failures in the News? An End-to-End Automated Pipeline with FAIL.
CoRR, 2024

An Industry Interview Study of Software Signing for Supply Chain Security.
CoRR, 2024

A Partial Replication of MaskFormer in TensorFlow on TPUs for the TensorFlow Model Garden.
CoRR, 2024

Introducing Systems Thinking as a Framework for Teaching and Assessing Threat Modeling Competency.
CoRR, 2024

An Exploratory Study on Upper-Level Computing Students' Use of Large Language Models as Tools in a Semester-Long Project.
CoRR, 2024

Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors.
CoRR, 2024

An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland Security.
Proceedings of the 33rd USENIX Security Symposium, 2024

Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

PeaTMOSS: A Dataset and Initial Analysis of Pre-Trained Models in Open-Source Software.
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024

Interoperability in Deep Learning: A User Survey and Failure Analysis of ONNX Model Converters.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

A First Look at the General Data Protection Regulation (GDPR) in Open-Source Software.
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024

What do we know about Hugging Face? A systematic literature review and quantitative validation of qualitative claims.
Proceedings of the 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2024

An Exploratory Mixed-methods Study on General Data Protection Regulation (GDPR) Compliance in Open-Source Software.
Proceedings of the 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2024

2023
Evolution of Winning Solutions in the 2021 Low-Power Computer Vision Challenge.
Computer, August, 2023

Tree-Based Unidirectional Neural Networks for Low-Power Computer Vision.
IEEE Des. Test, June, 2023

Preventing Supply Chain Vulnerabilities in Java with a Fine-Grained Permission Manager.
CoRR, 2023

PeaTMOSS: Mining Pre-Trained Models in Open-Source Software.
CoRR, 2023

A Unified Taxonomy and Evaluation of IoT Security Guidelines.
CoRR, 2023

Exploring Naming Conventions (and Defects) of Pre-trained Deep Learning Models in Hugging Face and Other Model Hubs.
CoRR, 2023

An Empirical Study on the Use of Static Analysis Tools in Open Source Embedded Software.
CoRR, 2023

Analysis of Failures and Risks in Deep Learning Model Converters: A Case Study in the ONNX Ecosystem.
CoRR, 2023

Improving Developers' Understanding of Regex Denial of Service Tools through Anti-Patterns and Fix Strategies.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Reflecting on the Use of the Policy-Process-Product Theory in Empirical Software Engineering.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Incorporating Failure Knowledge into Design Decisions for IoT Systems: A Controlled Experiment on Novices.
Proceedings of the 5th IEEE/ACM International Workshop on Software Engineering Research and Practices for the IoT, 2023

An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures.
Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2023

PTMTorrent: A Dataset for Mining Open-source Pre-trained Model Packages.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

Towards Automated Identification of Layering Violations in Embedded Applications (WIP).
Proceedings of the 24th ACM SIGPLAN/SIGBED International Conference on Languages, 2023

Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Reusing Deep Learning Models: Challenges and Directions in Software Engineering.
Proceedings of the IEEE John Vincent Atanasoff International Symposium on Modern Computing, 2023

An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Towards Rehosting Embedded Applications as Linux Applications.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

2022
Replication package for paper "An Empirical Study on the Impact of Deep Parameters on Mobile App Energy Usage" (SANER 2022).
Dataset, January, 2022

Full results for paper "An Empirical Study on the Impact of Deep Parameters on Mobile App Energy Usage" (SANER 2022).
Dataset, January, 2022

Towards a Failure-Aware SDLC for Internet of Things.
CoRR, 2022

Establishing trust in vehicle-to-vehicle coordination: a sensor fusion approach.
Proceedings of the HotMobile '22: The 23rd International Workshop on Mobile Computing Systems and Applications, Tempe, Arizona, USA, March 9, 2022

An Empirical Study on the Impact of Deep Parameters on Mobile App Energy Usage.
Proceedings of the IEEE International Conference on Software Analysis, 2022

Discrepancies among pre-trained deep neural networks: a new threat to model zoo reliability.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Reflections on software failure analysis.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

"If security is required": Engineering and Security Practices for Machine Learning-based IoT Devices.
Proceedings of the 4th IEEE/ACM International Workshop on Software Engineering Research and Practices for the IoT, 2022

SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties.
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022

An Empirical Study of Artifacts and Security Risks in the Pre-trained Model Supply Chain.
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022

Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Reflecting on Recurring Failures in IoT Development.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Directed Acyclic Graph-based Neural Networks for Tunable Low-Power Computer Vision.
Proceedings of the ISLPED '22: ACM/IEEE International Symposium on Low Power Electronics and Design, Boston, MA, USA, August 1, 2022

Exploiting Input Sanitization for Regex Denial of Service.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Efficient Computer Vision on Edge Devices with Pipeline-Parallel Hierarchical Neural Networks.
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022

2021
Fast and accurate incremental feedback for students' software tests using selective mutation analysis.
J. Syst. Softw., 2021

An Experience Report on Machine Learning Reproducibility: Guidance for Practitioners and TensorFlow Model Garden Contributors.
CoRR, 2021

Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS).
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

A replication of 'DeepBugs: a learning approach to name-based bug detection'.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Low-Power Multi-Camera Object Re-Identification using Hierarchical Neural Networks.
Proceedings of the IEEE/ACM International Symposium on Low Power Electronics and Design, 2021

2020
On the Impact and Defeat of Regular Expression Denial of Service.
PhD thesis, 2020

Improving Reproducibility of Data Science Pipelines through Transparent Provenance Capture.
Proc. VLDB Endow., 2020

A principled approach to GraphQL query cost analysis.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

2019
EdgeWise: A Better Stream Processing Engine for the Edge.
Proceedings of the 2019 USENIX Annual Technical Conference, 2019

Why aren't regular expressions a lingua franca? an empirical study on the re-use and portability of regular expressions.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Rethinking Regex engines to address ReDoS.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Ursprung: Provenance for Large-Scale Analytics Environments.
Proceedings of the 2019 International Conference on Management of Data, 2019

Regexes are Hard: Decision-Making, Difficulties, and Risks in Programming Regular Expressions.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Testing Regex Generalizability And Its Implications: A Large-Scale Many-Language Measurement Study.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

An Empirical Study of GraphQL Schemas.
Proceedings of the Service-Oriented Computing - 17th International Conference, 2019

2018
A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler Poisoning.
Proceedings of the 27th USENIX Security Symposium, 2018

The impact of regular expression denial of service (ReDoS) in practice: an empirical study at the ecosystem scale.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

2017
Node.fz: Fuzzing the Server-Side Event-Driven Architecture.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

The Case of the Poisoned Event Handler: Weaknesses in the Node.js Event-Driven Architecture.
Proceedings of the 10th European Workshop on Systems Security, 2017


  Loading...