Modern computer systems are highly-configurable, with hundreds of
config...
Most existing pre-trained language models for source code focus on learn...
Code editing is essential in evolving software development. Many automat...
Realistic and controllable traffic simulation is a core capability that ...
Deep Learning (DL) models to analyze source code have shown immense prom...
Large language models trained on code have shown great potential to incr...
When debugging unintended program behavior, developers can often identif...
We introduce a framework to measure how biases change before and after
f...
ML-powered code generation aims to assist developers to write code in a ...
With the advent of new and advanced programming languages, it becomes
im...
Code generation models have achieved impressive performance. However, th...
Controllable and realistic traffic simulation is critical for developing...
We present MBXP, an execution-based code completion benchmark in 10+
pro...
Determining whether multiple instructions can access the same memory loc...
Despite exciting progress in large-scale language generation, the
expres...
We present IvySyn: the first fully-automated framework for vulnerability...
Microservices Architecture (MSA) has become a de-facto standard for desi...
Pre-trained Generative Language models (e.g. PLBART, CodeT5, SPT-Code) f...
Back-translation is widely known for its effectiveness for neural machin...
Deep Neural Networks (DNNs) have been widely used in software making
dec...
Modern computer systems are highly configurable, with the total variabil...
Today's programmers, especially data science practitioners, make heavy u...
Automatically locating vulnerable statements in source code is crucial t...
Understanding the functional (dis)-similarity of source code is signific...
Autonomous driving (AD) systems have been thriving in recent years. In
g...
Self-driving cars and trucks, autonomous vehicles (AVs), should not be
a...
Software developers write a lot of source code and documentation during
...
In recent years, Neural Machine Translator (NMT) has shown promise in
au...
Code summarization and generation empower conversion between programming...
Detecting semantically similar functions – a crucial analysis capability...
Modern computing platforms are highly-configurable with thousands of
int...
Deep Neural Networks (DNNs) are being deployed in a wide range of settin...
Given the current transformative potential of research that sits at the
...
Automated detection of software vulnerabilities is a fundamental problem...
Machine Learning models from other fields, like Computational Linguistic...
Although deep networks achieve strong accuracy on a range of computer vi...
Fuzzing is a widely used technique for detecting software bugs and
vulne...
This paper introduces Pythia, the first fuzzer that augments grammar-bas...
Generating a readable summary that describes the functionality of a prog...
Berger et al., published in TOPLAS 2019, is a critique of our 2014 FSE
c...
Configuration space complexity makes the big-data software systems hard ...
Semantic segmentation is one of the most impactful applications of machi...
Deep networks are well-known to be fragile to adversarial attacks. Using...
Dynamic taint analysis (DTA) is widely used by various applications to t...
Image classification is an important task in today's world with many
app...
The way developers edit day-to-day code tend to be repetitive and often ...
Information Retrieval (IR) plays a pivotal role in diverse Software
Engi...
Fuzzing has become the de facto standard technique for finding software
...
Android applications are usually obfuscated before release, making it
di...
Android applications are usually obfuscated before release, making it
di...