关注
Chong Wang
标题
引用次数
引用次数
年份
A learning-based approach for automatic construction of domain glossary from source code and documentation
C Wang, X Peng, M Liu, Z Xing, X Bai, B Xie, T Wang
Proceedings of the 2019 27th ACM joint meeting on european software …, 2019
552019
Reducing bug triaging confusion by learning from mistakes with a bug tossing knowledge graph
Y Su, Z Xing, X Peng, X Xia, C Wang, X Xu, L Zhu
2021 36th IEEE/ACM International Conference on Automated Software …, 2021
232021
Xcos: Explainable code search based on query scoping and knowledge graph
C Wang, X Peng, Z Xing, Y Zhang, M Liu, R Luo, X Meng
ACM Transactions on Software Engineering and Methodology 32 (6), 1-28, 2023
92023
Deepanna: Deep learning based java annotation recommendation and misuse detection
Y Liu, Y Yan, C Sha, X Peng, B Chen, C Wang
2022 IEEE International Conference on Software Analysis, Evolution and …, 2022
72022
Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation
C Wang, J Zhang, Y Feng, T Li, W Sun, Y Liu, X Peng
arXiv preprint arXiv:2401.06391, 2024
52024
Beyond literal meaning: Uncover and explain implicit knowledge in code through wikipedia-based concept linking
C Wang, X Peng, Z Xing, X Meng
IEEE Transactions on Software Engineering 49 (5), 3226-3240, 2023
52023
Boosting Static Resource Leak Detection via LLM-based Resource-Oriented Intention Inference
C Wang, J Liu, X Peng, Y Liu, Y Lou
arXiv preprint arXiv:2311.04448, 2023
42023
Learning based and context aware non-informative comment detection
M Liu, Y Yang, X Peng, C Wang, C Zhao, X Wang, S Xing
2020 IEEE International Conference on Software Maintenance and Evolution …, 2020
42020
Generating variable explanations via zero-shot prompt learning
C Wang, Y Lou, J Liu, X Peng
2023 38th IEEE/ACM International Conference on Automated Software …, 2023
22023
Mining resource-operation knowledge to support resource leak detection
C Wang, Y Lou, X Peng, J Liu, B Zou
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
12023
Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence
J Zhang, K Huang, B Chen, C Wang, Z Tian, X Peng
arXiv preprint arXiv:2309.02637, 2023
12023
How and Why LLMs Use Deprecated APIs in Code Completion? An Empirical Study
C Wang, K Huang, J Zhang, Y Feng, L Zhang, Y Liu, X Peng
arXiv preprint arXiv:2406.09834, 2024
2024
An Empirical Study of Automated Vulnerability Localization with Large Language Models
J Zhang, C Wang, A Li, W Sun, C Zhang, W Ma, Y Liu
arXiv preprint arXiv:2404.00287, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–13