James C. Davis
Orcid: 0000-0003-2495-686XAffiliations:
- Purdue University, West Lafayette, IN, USA
According to our database1,
James C. Davis
authored at least 72 papers
between 2017 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Challenges and practices of deep learning model reengineering: A case study on computer vision.
Empir. Softw. Eng., November, 2024
Proc. ACM Softw. Eng., 2024
Pruning One More Token is Enough: Leveraging Latency-Workload Non-Linearities for Vision Transformers on the Edge.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Can Large Language Models Analyze Software Failures in the News? An End-to-End Automated Pipeline with FAIL.
CoRR, 2024
CoRR, 2024
A Partial Replication of MaskFormer in TensorFlow on TPUs for the TensorFlow Model Garden.
CoRR, 2024
Introducing Systems Thinking as a Framework for Teaching and Assessing Threat Modeling Competency.
CoRR, 2024
An Exploratory Study on Upper-Level Computing Students' Use of Large Language Models as Tools in a Semester-Long Project.
CoRR, 2024
Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors.
CoRR, 2024
An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland Security.
Proceedings of the 33rd USENIX Security Symposium, 2024
Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
PeaTMOSS: A Dataset and Initial Analysis of Pre-Trained Models in Open-Source Software.
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024
Interoperability in Deep Learning: A User Survey and Failure Analysis of ONNX Model Converters.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
A First Look at the General Data Protection Regulation (GDPR) in Open-Source Software.
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024
What do we know about Hugging Face? A systematic literature review and quantitative validation of qualitative claims.
Proceedings of the 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2024
An Exploratory Mixed-methods Study on General Data Protection Regulation (GDPR) Compliance in Open-Source Software.
Proceedings of the 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2024
2023
Computer, August, 2023
IEEE Des. Test, June, 2023
Preventing Supply Chain Vulnerabilities in Java with a Fine-Grained Permission Manager.
CoRR, 2023
Exploring Naming Conventions (and Defects) of Pre-trained Deep Learning Models in Hugging Face and Other Model Hubs.
CoRR, 2023
An Empirical Study on the Use of Static Analysis Tools in Open Source Embedded Software.
CoRR, 2023
Analysis of Failures and Risks in Deep Learning Model Converters: A Case Study in the ONNX Ecosystem.
CoRR, 2023
Improving Developers' Understanding of Regex Denial of Service Tools through Anti-Patterns and Fix Strategies.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Reflecting on the Use of the Policy-Process-Product Theory in Empirical Software Engineering.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Incorporating Failure Knowledge into Design Decisions for IoT Systems: A Controlled Experiment on Novices.
Proceedings of the 5th IEEE/ACM International Workshop on Software Engineering Research and Practices for the IoT, 2023
An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures.
Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2023
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023
Towards Automated Identification of Layering Violations in Embedded Applications (WIP).
Proceedings of the 24th ACM SIGPLAN/SIGBED International Conference on Languages, 2023
Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the IEEE John Vincent Atanasoff International Symposium on Modern Computing, 2023
An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
2022
Replication package for paper "An Empirical Study on the Impact of Deep Parameters on Mobile App Energy Usage" (SANER 2022).
Dataset, January, 2022
Full results for paper "An Empirical Study on the Impact of Deep Parameters on Mobile App Energy Usage" (SANER 2022).
Dataset, January, 2022
Proceedings of the HotMobile '22: The 23rd International Workshop on Mobile Computing Systems and Applications, Tempe, Arizona, USA, March 9, 2022
Proceedings of the IEEE International Conference on Software Analysis, 2022
Discrepancies among pre-trained deep neural networks: a new threat to model zoo reliability.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
"If security is required": Engineering and Security Practices for Machine Learning-based IoT Devices.
Proceedings of the 4th IEEE/ACM International Workshop on Software Engineering Research and Practices for the IoT, 2022
SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties.
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022
An Empirical Study of Artifacts and Security Risks in the Pre-trained Model Supply Chain.
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022
Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the ISLPED '22: ACM/IEEE International Symposium on Low Power Electronics and Design, Boston, MA, USA, August 1, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Efficient Computer Vision on Edge Devices with Pipeline-Parallel Hierarchical Neural Networks.
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022
2021
Fast and accurate incremental feedback for students' software tests using selective mutation analysis.
J. Syst. Softw., 2021
An Experience Report on Machine Learning Reproducibility: Guidance for Practitioners and TensorFlow Model Garden Contributors.
CoRR, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021
Proceedings of the IEEE/ACM International Symposium on Low Power Electronics and Design, 2021
2020
Improving Reproducibility of Data Science Pipelines through Transparent Provenance Capture.
Proc. VLDB Endow., 2020
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
2019
Proceedings of the 2019 USENIX Annual Technical Conference, 2019
Why aren't regular expressions a lingua franca? an empirical study on the re-use and portability of regular expressions.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019
Proceedings of the 2019 International Conference on Management of Data, 2019
Regexes are Hard: Decision-Making, Difficulties, and Risks in Programming Regular Expressions.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Testing Regex Generalizability And Its Implications: A Large-Scale Many-Language Measurement Study.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the Service-Oriented Computing - 17th International Conference, 2019
2018
A Sense of Time for JavaScript and Node.js: First-Class Timeouts as a Cure for Event Handler Poisoning.
Proceedings of the 27th USENIX Security Symposium, 2018
The impact of regular expression denial of service (ReDoS) in practice: an empirical study at the ecosystem scale.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
2017
Proceedings of the Twelfth European Conference on Computer Systems, 2017
The Case of the Poisoned Event Handler: Weaknesses in the Node.js Event-Driven Architecture.
Proceedings of the 10th European Workshop on Systems Security, 2017