| 151 |
How Reliable is the Crowdsourced Knowledge of Security Implementation?
Mengsu Chen, Felix Fischer, ... (+3 more)
|
👻
Ghosted
|
cs.SE
|
58 |
7 years ago |
| 152 |
Towards Improved Testing For Deep Learning
Jasmine Sekhon, Cody Fleming
|
👻
Ghosted
|
cs.SE
|
58 |
7 years ago |
| 153 |
We Don't Need Another Hero? The Impact of "Heroes" on Software Development
Amritanshu Agrawal, Akond Rahman, ... (+3 more)
|
👻
Ghosted
|
cs.SE
|
58 |
8 years ago |
| 154 |
CoderEval: A Benchmark of Pragmatic Code Generation with Generative Pre-trained Models
Hao Yu, Bo Shen, ... (+8 more)
|
👻
Ghosted
|
cs.SE
|
58 |
3 years ago |
| 155 |
RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation
Zhen Li, Guenevere, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
58 |
4 years ago |
| 156 |
DeepFD: Automated Fault Diagnosis and Localization for Deep Learning Programs
Jialun Cao, Meiziniu Li, ... (+5 more)
|
👻
Ghosted
|
cs.SE
|
58 |
3 years ago |
| 157 |
DeCaf: Diagnosing and Triaging Performance Issues in Large-Scale Cloud Services
Chetan Bansal, Sundararajan Renganathan, ... (+3 more)
|
👻
Ghosted
|
cs.DC
|
57 |
6 years ago |
| 158 |
DockerizeMe: Automatic Inference of Environment Dependencies for Python Code Snippets
Eric Horton, Chris Parnin
|
👻
Ghosted
|
cs.SE
|
57 |
6 years ago |
| 159 |
TRACED: Execution-aware Pre-training for Source Code
Yangruibo Ding, Ben Steenhoek, ... (+4 more)
|
👻
Ghosted
|
cs.SE
|
57 |
2 years ago |
| 160 |
Domain Knowledge Matters: Improving Prompts with Fix Templates for Repairing Python Type Errors
Yun Peng, Shuzheng Gao, ... (+3 more)
|
👻
Ghosted
|
cs.SE
|
57 |
2 years ago |
| 161 |
Testing DNN Image Classifiers for Confusion & Bias Errors
Yuchi Tian, Ziyuan Zhong, ... (+3 more)
|
👻
Ghosted
|
cs.SE
|
56 |
6 years ago |
| 162 |
Recognizing Developers' Emotions while Programming
Daniela Girardi, Nicole Novielli, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
55 |
6 years ago |
| 163 |
Practices and Challenges of Using GitHub Copilot: An Empirical Study
Beiqi Zhang, Peng Liang, ... (+3 more)
|
👻
Ghosted
|
cs.SE
|
55 |
3 years ago |
| 164 |
KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair
Nan Jiang, Thibaud Lutellier, ... (+4 more)
|
👻
Ghosted
|
cs.SE
|
54 |
3 years ago |
| 165 |
Adaptive Performance Anomaly Detection for Online Service Systems via Pattern Sketching
Zhuangbin Chen, Jinyang Liu, ... (+5 more)
|
👻
Ghosted
|
cs.SE
|
54 |
4 years ago |
| 166 |
What It Would Take to Use Mutation Testing in Industry--A Study at Facebook
Moritz Beller, Chu-Pan Wong, ... (+5 more)
|
👻
Ghosted
|
cs.SE
|
53 |
5 years ago |
| 167 |
One Adapter for All Programming Languages? Adapter Tuning for Code Search and Summarization
Deze Wang, Boxing Chen, ... (+5 more)
|
👻
Ghosted
|
cs.SE
|
53 |
3 years ago |
| 168 |
MorphQ: Metamorphic Testing of the Qiskit Quantum Computing Platform
Matteo Paltenghi, Michael Pradel
|
👻
Ghosted
|
cs.SE
|
53 |
3 years ago |
| 169 |
A Hybrid ACO Algorithm for the Next Release Problem
He Jiang, Jingyuan Zhang, ... (+3 more)
|
👻
Ghosted
|
cs.NE
|
52 |
9 years ago |
| 170 |
Improving Smart Contract Security with Contrastive Learning-based Vulnerability Detection
Yizhou Chen, Zeyu Sun, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
52 |
1 year ago |
| 171 |
ReposVul: A Repository-Level High-Quality Vulnerability Dataset
Xinchen Wang, Ruida Hu, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
52 |
2 years ago |
| 172 |
Evaluating Code Summarization Techniques: A New Metric and an Empirical Characterization
Antonio Mastropaolo, Matteo Ciniselli, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
52 |
2 years ago |
| 173 |
$μ$AFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware
Wenqiang Li, Jiameng Shi, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
52 |
4 years ago |
| 174 |
An Empirical Investigation on the Challenges Faced by Women in the Software Industry: A Case Study
Bianca Trinkenreich, Ricardo Britto, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
52 |
4 years ago |
| 175 |
Learning to Reduce False Positives in Analytic Bug Detectors
Anant Kharkar, Roshanak Zilouchian Moghaddam, ... (+5 more)
|
👻
Ghosted
|
cs.SE
|
52 |
4 years ago |
| 176 |
SpecuSym: Speculative Symbolic Execution for Cache Timing Leak Detection
Shengjian Guo, Yueqi Chen, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
51 |
6 years ago |
| 177 |
Developer Reading Behavior While Summarizing Java Methods: Size and Context Matters
Nahla J. Abid, Bonita Sharif, ... (+3 more)
|
👻
Ghosted
|
cs.SE
|
51 |
7 years ago |
| 178 |
Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal Attention
Cheryl Lee, Tianyi Yang, ... (+4 more)
|
👻
Ghosted
|
cs.SE
|
51 |
3 years ago |
| 179 |
Towards using Few-Shot Prompt Learning for Automating Model Completion
Meriem Ben Chaaben, Lola Burgueño, Houari Sahraoui
|
👻
Ghosted
|
cs.SE
|
51 |
3 years ago |
| 180 |
Search-Based LLMs for Code Optimization
Shuzheng Gao, Cuiyun Gao, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
50 |
1 year ago |
| 181 |
BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code Matching
Ling Jiang, Junwen An, ... (+5 more)
|
👻
Ghosted
|
cs.SE
|
50 |
2 years ago |
| 182 |
Towards Training Reproducible Deep Learning Models
Boyuan Chen, Mingzhi Wen, ... (+5 more)
|
👻
Ghosted
|
cs.LG
|
50 |
4 years ago |
| 183 |
A First Look at Human Values-Violation in App Reviews
Humphrey O. Obie, Waqar Hussain, ... (+6 more)
|
👻
Ghosted
|
cs.SE
|
49 |
5 years ago |
| 184 |
Automated Localization for Unreproducible Builds
Zhilei Ren, He Jiang, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
49 |
8 years ago |
| 185 |
Unhappy Developers: Bad for Themselves, Bad for Process, and Bad for Software Product
Daniel Graziotin, Fabian Fagerholm, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
49 |
9 years ago |
| 186 |
Fuzzing Automatic Differentiation in Deep-Learning Libraries
Chenyuan Yang, Yinlin Deng, ... (+4 more)
|
👻
Ghosted
|
cs.SE
|
49 |
3 years ago |
| 187 |
Many-Objective Reinforcement Learning for Online Testing of DNN-Enabled Systems
Fitash Ul Haq, Donghwan Shin, Lionel Briand
|
👻
Ghosted
|
cs.LG
|
49 |
3 years ago |
| 188 |
LLM4PLC: Harnessing Large Language Models for Verifiable Programming of PLCs in Industrial Control Systems
Mohamad Fakih, Rahul Dharmaji, ... (+4 more)
|
👻
Ghosted
|
cs.SE
|
48 |
2 years ago |
| 189 |
Is Your Quantum Program Bug-Free?
Andriy Miranskyy, Lei Zhang, Javad Doliskani
|
👻
Ghosted
|
cs.SE
|
48 |
6 years ago |
| 190 |
Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Edwin Dauber, Aylin Caliskan, ... (+5 more)
|
👻
Ghosted
|
cs.LG
|
48 |
9 years ago |
| 191 |
DoubleTake: Fast and Precise Error Detection via Evidence-Based Dynamic Analysis
Tongping Liu, Charlie Curtsinger, Emery D. Berger
|
👻
Ghosted
|
cs.SE
|
48 |
10 years ago |
| 192 |
SOEN-101: Code Generation by Emulating Software Process Models Using Large Language Model Agents
Feng Lin, Dong Jae Kim, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
48 |
2 years ago |
| 193 |
ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning
Shangqing Liu, Bozhi Wu, ... (+3 more)
|
👻
Ghosted
|
cs.SE
|
48 |
3 years ago |
| 194 |
Layout and Image Recognition Driving Cross-Platform Automated Mobile Testing
Shengcheng Yu, Chunrong Fang, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
47 |
5 years ago |
| 195 |
Assessing AI Detectors in Identifying AI-Generated Code: Implications for Education
Wei Hung Pan, Ming Jie Chok, ... (+7 more)
|
👻
Ghosted
|
cs.SE
|
47 |
2 years ago |
| 196 |
Developer-Intent Driven Code Comment Generation
Fangwen Mu, Xiao Chen, ... (+3 more)
|
👻
Ghosted
|
cs.SE
|
47 |
3 years ago |
| 197 |
Cross-Domain Deep Code Search with Meta Learning
Yitian Chai, Hongyu Zhang, ... (+2 more)
|
👻
Ghosted
|
cs.SE
|
47 |
4 years ago |
| 198 |
The Internet of Hackable Things
Nicola Dragoni, Alberto Giaretta, Manuel Mazzara
|
👻
Ghosted
|
cs.CR
|
46 |
8 years ago |
| 199 |
Unveiling Memorization in Code Models
Zhou Yang, Zhipeng Zhao, ... (+5 more)
|
👻
Ghosted
|
cs.SE
|
46 |
2 years ago |
| 200 |
FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons
Xuanqi Gao, Juan Zhai, ... (+4 more)
|
👻
Ghosted
|
cs.LG
|
46 |
4 years ago |