[HTML][HTML] AlexNet architecture based convolutional neural network for toxic comments classification

I Singh, G Goyal, A Chandel - Journal of King Saud University-Computer …, 2022 - Elsevier
Today online networking has become an indispensable part of life for people all over the
world. It is difficult for users to reduce their internet/online communications, as the flow of …

Ai-assisted programming tasks using code embeddings and transformers

S Kotsiantis, V Verykios, M Tzagarakis - Electronics, 2024 - mdpi.com
This review article provides an in-depth analysis of the growing field of AI-assisted
programming tasks, specifically focusing on the use of code embeddings and transformers …

Mitigating false positive static analysis warnings: Progress, challenges, and opportunities

Z Guo, T Tan, S Liu, X Liu, W Lai, Y Yang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Static analysis (SA) tools can generate useful static warnings to reveal the problematic code
snippets in a software system without dynamically executing the corresponding source code …

Improving bert model accuracy for uni-modal aspect-based sentiment analysis task

A Chauhan, R Mohana - Scalable Computing: Practice and Experience, 2023 - scpe.org
Techniques and methods for examining users' feelings, emotions, and views in text or other
media are known as” sentiment analysis,” this phrase is used frequently. In many areas …

LoGenText-Plus: Improving Neural Machine Translation Based Logging Texts Generation with Syntactic Templates

Z Ding, Y Tang, X Cheng, H Li, W Shang - ACM Transactions on …, 2023 - dl.acm.org
Developers insert logging statements in the source code to collect important runtime
information about software systems. The textual descriptions in logging statements (ie …

Can an old fashioned feature extraction and a light-weight model improve vulnerability type identification performance?

HD Vo, S Nguyen - Information and Software Technology, 2023 - Elsevier
Recent advances in automated vulnerability detection have achieved potential results in
helping developers determine vulnerable components. However, after detecting …

Code-centric learning-based just-in-time vulnerability detection

S Nguyen, TT Nguyen, TT Vu, TD Do, KT Ngo… - Journal of Systems and …, 2024 - Elsevier
Attacks against computer systems exploiting software vulnerabilities can cause substantial
damage to the cyber infrastructure of our modern society and economy. To minimize the …

CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking

Z Su, X Xu, Z Huang, Z Zhang, Y Ye, J Huang… - arXiv preprint arXiv …, 2024 - arxiv.org
Transformer based code models have impressive performance in many software
engineering tasks. However, their effectiveness degrades when symbols are missing or not …

VFFINDER: A Graph-based Approach for Automated Silent Vulnerability-Fix Identification

S Nguyen, TT Vu, HD Vo - 2023 15th International Conference …, 2023 - ieeexplore.ieee.org
The increasing reliance of software projects on third-party libraries has raised concerns
about the security of these libraries due to hidden vulnerabilities. Managing these vul …

On the temporal relations between logging and code

Z Ding, Y Tang, Y Li, H Li… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Prior work shows that misleading logging texts (ie, the textual descriptions in logging
statements) can be counterproductive for developers during their use of logs. One of the …