Author:
Zhou Jiayuan,Pacheco Michael,Wan Zhiyuan,Xia Xin,Lo David,Wang Yuan,Hassan Ahmed E.
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Vulnerability discovery based on source code patch commit mining: a systematic literature review;International Journal of Information Security;2024-01-06
2. VFFINDER: A Graph-Based Approach for Automated Silent Vulnerability-Fix Identification;2023 15th International Conference on Knowledge and Systems Engineering (KSE);2023-10-18
3. Exploring Security Commits in Python;2023 IEEE International Conference on Software Maintenance and Evolution (ICSME);2023-10-01
4. The Devil is in the Tails: How Long-Tailed Code Distributions Impact Large Language Models;2023 38th IEEE/ACM International Conference on Automated Software Engineering (ASE);2023-09-11
5. Neural SZZ Algorithm;2023 38th IEEE/ACM International Conference on Automated Software Engineering (ASE);2023-09-11