Distinguishing look-alike innocent and vulnerable code by subtle semantic representation learning and explanation C Ni, X Yin, K Yang, D Zhao, Z Xing, X Xia Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 20 | 2023 |
Multitask-based evaluation of open-source llm on software vulnerability X Yin, C Ni, S Wang IEEE Transactions on Software Engineering, 2024 | 12 | 2024 |
Rectifier: Code translation with corrector via llms X Yin, C Ni, TN Nguyen, S Wang, X Yang arXiv preprint arXiv:2407.07472, 2024 | 9 | 2024 |
Thinkrepair: Self-directed automated program repair X Yin, C Ni, S Wang, Z Li, L Zeng, X Yang Proceedings of the 33rd ACM SIGSOFT International Symposium on Software …, 2024 | 7 | 2024 |
FVA: Assessing Function-Level Vulnerability by Integrating Flow-Sensitive Structure and Code Statement Semantic C Ni, L Shen, W Wang, X Chen, X Yin, L Zhang 2023 IEEE/ACM 31st International Conference on Program Comprehension (ICPC …, 2023 | 4 | 2023 |
Learning-based models for vulnerability detection: An extensive study C Ni, L Shen, X Xu, X Yin, S Wang arXiv preprint arXiv:2408.07526, 2024 | 3 | 2024 |
Pros and Cons! Evaluating ChatGPT on Software Vulnerability X Yin arXiv preprint arXiv:2404.03994, 2024 | 2 | 2024 |
Spatio-temporal aware knowledge graph embedding for recommender systems L Yang, X Yin, J Long, T Chen, J Zhao, W Huang 2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2022 | 2 | 2022 |
Enhancing Discriminative Tasks by Guiding the Pre-trained Language Model with Large Language Model's Experience X Yin, C Ni, X Xu, X Li, X Yang arXiv preprint arXiv:2408.08553, 2024 | 1 | 2024 |
Reasoning to Attend: Try to Understand How< SEG> Token Works R Qian, X Yin, D Dou arXiv preprint arXiv:2412.17741, 2024 | | 2024 |
What You See Is What You Get: Attention-based Self-guided Automatic Unit Test Generation X Yin, C Ni, X Xu, X Yang 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE), 2024 | | 2024 |