Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Automating TODO-missed Methods Detection and Patching
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 34, Issue 1Article No.: 2, Pages 1–28https://doi.org/10.1145/3700793TODO comments are widely used by developers to remind themselves or others about incomplete tasks. In other words, TODO comments are usually associated with temporary or suboptimal solutions. In practice, all the equivalent suboptimal implementations ...
- research-articleOctober 2024JUST ACCEPTED
Less is More: Unlocking Semi-Supervised Deep Learning for Vulnerability Detection
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3699602Deep learning has demonstrated its effectiveness in software vulnerability detection, but acquiring a large number of labeled code snippets for training deep learning models is challenging due to labor-intensive annotation. With limited labeled data, ...
- research-articleOctober 2024
What Makes a High-Quality Training Dataset for Large Language Models: A Practitioners' Perspective
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 656–668https://doi.org/10.1145/3691620.3695061Large Language Models (LLMs) have demonstrated remarkable performance in various application domains, largely due to their self-supervised pre-training on extensive high-quality text datasets. However, despite the importance of constructing such datasets,...
- research-articleOctober 2024
REACT: IR-Level Patch Presence Test for Binary
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 381–392https://doi.org/10.1145/3691620.3695012Patch presence test is critical in software security to ensure that binary files have been patched for known vulnerabilities. It is challenging due to the semantic gap between the source code and the binary, and the small and subtle nature of patches. In ...
- research-articleOctober 2024JUST ACCEPTED
Automating Comment Generation for Smart Contract from Bytecode
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3699597Recently, smart contracts have played a vital role in automatic financial and business transactions. To help end users without programming background to better understand the logic of smart contracts, previous studies have proposed models for ...
-
- research-articleSeptember 2024
Practitioners’ Expectations on Automated Test Generation
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 1618–1630https://doi.org/10.1145/3650212.3680386Automated test generation can help developers craft high-quality software tests while mitigating the manual effort needed for writing test code. Despite significant research efforts in automated test generation for nearly 50 years, there is a lack of ...
- research-articleSeptember 2024
SelfPiCo: Self-Guided Partial Code Execution with LLMs
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 1389–1401https://doi.org/10.1145/3650212.3680368Code executability plays a vital role in software debugging and testing (e.g., detecting runtime exceptions or assertion violations). However, code execution, especially partial or arbitrary code execution, is a non-trivial task due to missing ...
- research-articleSeptember 2024
Silent Taint-Style Vulnerability Fixes Identification
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 428–439https://doi.org/10.1145/3650212.3652139The coordinated vulnerability disclosure model, widely adopted in open-source software (OSS) organizations, recommends the silent resolution of vulnerabilities without revealing vulnerability information until their public disclosure. However, the ...
- research-articleSeptember 2024
Automating Zero-Shot Patch Porting for Hard Forks
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 363–375https://doi.org/10.1145/3650212.3652134Forking is a typical way of code reuse, which provides a simple way for developers to create a variant software (denoted as hard fork) by copying and modifying an existing codebase. Despite of the benefits, forking also leads to duplicate efforts in ...
- ArticleAugust 2024
Enhancing Stock Similarity Analysis with Phase-Embedded Multivariate Similarity Measure
Advanced Intelligent Computing Technology and ApplicationsPages 90–101https://doi.org/10.1007/978-981-97-5666-7_8AbstractStock similarity analysis is essential for stock market prediction. However, existing measures of stock similarity often focus only on analyzing the magnitude differences of single stock feature, overlooking the impacts of multidimensionality, ...
- research-articleJuly 2024
Inside Bug Report Templates: An Empirical Study on Bug Report Templates in Open-Source Software
Internetware '24: Proceedings of the 15th Asia-Pacific Symposium on InternetwarePages 125–134https://doi.org/10.1145/3671016.3671401In open-source software development, bug report templates (BRTs) have emerged as a crucial tool for ensuring the quality of bug reports. Despite their widespread use, developers have little knowledge about designing personalized BRTs. Therefore, it is ...
- research-articleJanuary 2025
Prompt-based visual alignment for zero-shot policy transfer
- Haihan Gao,
- Rui Zhang,
- Qi Yi,
- Hantao Yao,
- Haochen Li,
- Jiaming Guo,
- Shaohui Peng,
- Yunkai Gao,
- QiCheng Wang,
- Xing Hu,
- Yuanbo Wen,
- Zihao Zhang,
- Zidong Du,
- Ling Li,
- Qi Guo,
- Yunji Chen
ICML'24: Proceedings of the 41st International Conference on Machine LearningArticle No.: 599, Pages 14954–14968Overfitting in RL has become one of the main obstacles to applications in reinforcement learning (RL). Existing methods do not provide explicit semantic constrain for the feature extractor, hindering the agent from learning a unified cross-domain ...
- research-articleJuly 2024
Are Human Rules Necessary? Generating Reusable APIs with CoT Reasoning and In-Context Learning
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 104, Pages 2355–2377https://doi.org/10.1145/3660811Inspired by the great potential of Large Language Models (LLMs) for solving complex coding tasks, in this paper, we propose a novel approach, named Code2API, to automatically perform APIzation for Stack Overflow code snippets. Code2API does not require ...
- research-articleJuly 2024
Vulnerability Detection via Multiple-Graph-Based Code Representation
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 8Pages 2178–2199https://doi.org/10.1109/TSE.2024.3427815During software development and maintenance, vulnerability detection is an essential part of software quality assurance. Even though many program-analysis-based and machine-learning-based approaches have been proposed to automatically detect ...
- research-articleJuly 2024
Easy over Hard: A Simple Baseline for Test Failures Causes Prediction
FSE 2024: Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software EngineeringPages 306–317https://doi.org/10.1145/3663529.3663850The test failure causes analysis is critical since it determines the subsequent way of handling different types of bugs, which is the prerequisite to get the bugs properly analyzed and fixed. After a test case fails, software testers have to inspect the ...
- research-articleJuly 2024
Unveil the Mystery of Critical Software Vulnerabilities
FSE 2024: Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software EngineeringPages 138–149https://doi.org/10.1145/3663529.3663835Today’s software industry heavily relies on open source software (OSS). However, the rapidly increasing number of OSS software vulnerabilities (SVs) poses huge security risks to the software supply chain. Managing the SVs in the relied OSS components has ...
- research-articleNovember 2024
Revisiting Automatic Pipelining: Gate-level Forwarding and Speculation
DAC '24: Proceedings of the 61st ACM/IEEE Design Automation ConferenceArticle No.: 49, Pages 1–6https://doi.org/10.1145/3649329.3657352Pipelining is a widely applied micro-architectural performance optimization and requires non-trivial designs for better execution throughput. The key to pipeline throughput optimization is to resolve data hazards caused by read-after-write (RAW) ...
- research-articleNovember 2024
Alchemist: A Unified Accelerator Architecture for Cross-Scheme Fully Homomorphic Encryption
- Jianan Mu,
- Husheng Han,
- Shangyi Shi,
- Jing Ye,
- Zizhen Liu,
- Shengwen Liang,
- Meng Li,
- Mingzhe Zhang,
- Song Bian,
- Xing Hu,
- Huaiwei Li,
- Xiaowei Li
DAC '24: Proceedings of the 61st ACM/IEEE Design Automation ConferenceArticle No.: 26, Pages 1–6https://doi.org/10.1145/3649329.3657331The use of cross-scheme fully homomorphic encryption (FHE) in privacy-preserving applications present to be a new challenge to hardware accelerator design. Existing accelerator architectures with customized polynomial-level operator abstraction fail to ...
- research-articleJuly 2024
A Large-Scale Empirical Study of Open Source License Usage: Practices and Challenges
MSR '24: Proceedings of the 21st International Conference on Mining Software RepositoriesPages 595–606https://doi.org/10.1145/3643991.3644900The popularity of open source software (OSS) has led to a significant increase in the number of available licenses, each with their own set of terms and conditions. This proliferation of licenses has made it increasingly challenging for developers to ...