A learning-based approach for automatic construction of domain glossary from source code and documentation C Wang, X Peng, M Liu, Z Xing, X Bai, B Xie, T Wang Proceedings of the 2019 27th ACM joint meeting on european software …, 2019 | 55 | 2019 |
Reducing bug triaging confusion by learning from mistakes with a bug tossing knowledge graph Y Su, Z Xing, X Peng, X Xia, C Wang, X Xu, L Zhu 2021 36th IEEE/ACM International Conference on Automated Software …, 2021 | 23 | 2021 |
Xcos: Explainable code search based on query scoping and knowledge graph C Wang, X Peng, Z Xing, Y Zhang, M Liu, R Luo, X Meng ACM Transactions on Software Engineering and Methodology 32 (6), 1-28, 2023 | 9 | 2023 |
Deepanna: Deep learning based java annotation recommendation and misuse detection Y Liu, Y Yan, C Sha, X Peng, B Chen, C Wang 2022 IEEE International Conference on Software Analysis, Evolution and …, 2022 | 7 | 2022 |
Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation C Wang, J Zhang, Y Feng, T Li, W Sun, Y Liu, X Peng arXiv preprint arXiv:2401.06391, 2024 | 5 | 2024 |
Beyond literal meaning: Uncover and explain implicit knowledge in code through wikipedia-based concept linking C Wang, X Peng, Z Xing, X Meng IEEE Transactions on Software Engineering 49 (5), 3226-3240, 2023 | 5 | 2023 |
Boosting Static Resource Leak Detection via LLM-based Resource-Oriented Intention Inference C Wang, J Liu, X Peng, Y Liu, Y Lou arXiv preprint arXiv:2311.04448, 2023 | 4 | 2023 |
Learning based and context aware non-informative comment detection M Liu, Y Yang, X Peng, C Wang, C Zhao, X Wang, S Xing 2020 IEEE International Conference on Software Maintenance and Evolution …, 2020 | 4 | 2020 |
Generating variable explanations via zero-shot prompt learning C Wang, Y Lou, J Liu, X Peng 2023 38th IEEE/ACM International Conference on Automated Software …, 2023 | 2 | 2023 |
Mining resource-operation knowledge to support resource leak detection C Wang, Y Lou, X Peng, J Liu, B Zou Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 1 | 2023 |
Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence J Zhang, K Huang, B Chen, C Wang, Z Tian, X Peng arXiv preprint arXiv:2309.02637, 2023 | 1 | 2023 |
How and Why LLMs Use Deprecated APIs in Code Completion? An Empirical Study C Wang, K Huang, J Zhang, Y Feng, L Zhang, Y Liu, X Peng arXiv preprint arXiv:2406.09834, 2024 | | 2024 |
An Empirical Study of Automated Vulnerability Localization with Large Language Models J Zhang, C Wang, A Li, W Sun, C Zhang, W Ma, Y Liu arXiv preprint arXiv:2404.00287, 2024 | | 2024 |