[PDF][PDF] Unifying the perspectives of nlp and software engineering: A survey on language models for code

Z Zhang, C Chen, B Liu, C Liao, Z Gong… - arXiv preprint arXiv …, 2023 - simg.baai.ac.cn
In this work we systematically review the recent advancements in code processing with
language models, covering 50+ models, 30+ evaluation tasks, 170+ datasets, and 700 …

A survey of neural code intelligence: Paradigms, advances and beyond

Q Sun, Z Chen, F Xu, K Cheng, C Ma, Z Yin… - arXiv preprint arXiv …, 2024 - arxiv.org
Neural Code Intelligence--leveraging deep learning to understand, generate, and optimize
code--holds immense potential for transformative impacts on the whole society. Bridging the …

Cross-project clone consistent-defect prediction via transfer-learning method

W Jiang, S Qiu, T Liang, F Zhang - Information Sciences, 2023 - Elsevier
Code clones are comparable code snippets that are introduced into software by developers
in order to increase software development productivity. A change to code clone may result in …

A code centric evaluation of c/c++ vulnerability datasets for deep learning based vulnerability detection techniques

R Jain, N Gervasoni, M Ndhlovu, S Rawat - Proceedings of the 16th …, 2023 - dl.acm.org
Recent years have witnessed tremendous progress in NLP-based code comprehension via
deep neural networks (DNN) learning, especially Large Language Models (LLMs). While the …

Exploring security procedures in secure software engineering: a systematic mapping study

RA Khan, SU Khan, M Ilyas - … of the 26th International Conference on …, 2022 - dl.acm.org
Various new technologies have developed as software security solutions have become
more critical. One of the essential parts of software quality is the product's security. Though …

HiddenCPG: large-scale vulnerable clone detection using subgraph isomorphism of code property graphs

S Wi, S Woo, JJ Whang, S Son - … of the ACM Web Conference 2022, 2022 - dl.acm.org
A code property graph (CPG) is a joint representation of syntax, control flows, and data flows
of a target application. Recent studies have demonstrated the promising efficacy of …

Graph-of-code: Semantic clone detection using graph fingerprints

EA Alhazami, AM Sheneamer - IEEE Transactions on Software …, 2023 - ieeexplore.ieee.org
The code clone detection issue has been researched using a number of explicit factors
based on the tokens and contents and found effective results. However, exposing code …

Security challenges and recommendations in 5G-IoT scenarios

DCG Valadares, NC Will, ÁÁCC Sobrinho… - International Conference …, 2023 - Springer
Abstract The fifth-generation (5G) mobile communication systems are already a reality. This
communication technology can increase and simplify the adoption of the Internet of Things …

SJBCD: A Java Code Clone Detection Method Based on Bytecode Using Siamese Neural Network

B Wan, S Dong, J Zhou, Y Qian - Applied Sciences, 2023 - mdpi.com
Code clone detection is an important research topic in the field of software engineering. It is
significant in developing software and solving software infringement disputes to discover …

Pareco: patched clones and missed patches among the divergent variants of a software family

PK Ramkisoen, J Businge, B Van Bladel… - Proceedings of the 30th …, 2022 - dl.acm.org
Re-using whole repositories as a starting point for new projects is often done by maintaining
a variant fork parallel to the original. However, the common artifacts between both are not …