While the majority of existing pre-trained models from code learn source...
For decades, much software engineering research has been dedicated to
de...
Learning-based techniques, especially advanced Large Language Models (LL...
Rust is an emerging programming language designed for the development of...
Proper naming of methods can make program code easier to understand, and...
Pre-trained language models of code are now widely used in various softw...
Large Language Models (LLMs) have significantly impacted numerous domain...
Large Language Models (LLMs) possess impressive capabilities to generate...
Duplicate bug report detection (DBRD) is a long-standing challenge in bo...
Software architecture has been an active research field for nearly four
...
The SZZ algorithm is used to connect bug-fixing commits to the earlier
c...
In this paper, we systematically study the quality of 4,066 ChatGPT-gene...
Stack Overflow, the world's largest software Q A (SQA) website, is fac...
Privacy policies have become the most critical approach to safeguarding
...
The increasingly popular adoption of source code in many critical tasks
...
Recent studies have proposed the use of Text-To-Speech (TTS) systems to
...
With the increasing reliance on Open Source Software, users are exposed ...
The Smart Contract Weakness Classification Registry (SWC Registry) is a
...
Pre-trained language models (PLMs) have become a prevalent technique in ...
Utilizing pre-existing software artifacts, such as libraries and Applica...
Using APIs to develop software applications is the norm. APIs help devel...
While having options could be liberating, too many options could lead to...
Code review is an effective software quality assurance activity; however...
The tremendous success of Stack Overflow has accumulated an extensive co...
Machine learning (ML) has gained much attention and been incorporated in...
Automated Program Repair (APR) techniques have shown more and more promi...
The increasing use of Machine Learning (ML) software can lead to unfair ...
Deep Reinforcement Learning (DRL) policies have been shown to be vulnera...
Recent years have witnessed wider adoption of Automated Speech Recogniti...
Tools that alert developers about library vulnerabilities depend on accu...
In this paper, we propose a novel technique, namely INVALIDATOR, to
auto...
The automation of an increasingly large number of software engineering t...
Many modern software systems are enabled by deep learning libraries such...
Many Duplicate Bug Report Detection (DBRD) techniques have been proposed...
Software developers have heavily used online question and answer platfor...
Stack Overflow has been heavily used by software developers to seek
prog...
Open-source software (OSS) vulnerability management process is important...
Constructing a static call graph requires trade-offs between soundness a...
Previous studies have demonstrated that code intelligence models are
sen...
Transformer-based models have demonstrated state-of-the-art performance ...
With the rise of the pull request mechanism in software development, the...
In both commercial and open-source software, bug reports or issues are u...
Pull Requests (PRs) are a mechanism on modern collaborative coding platf...
Automatically generated static code warnings suffer from a large number ...
A common cause of bugs and vulnerabilities are the violations of usage
c...
Video-based programming tutorials are a popular form of tutorial used by...
Just-In-Time defect prediction (JIT-DP) models can identify defect-induc...
Many recent models in software engineering introduced deep neural models...
A recent study by Ahmed and Devanbu reported that using a corpus of code...
Stack Overflow is often viewed as the most influential Software Question...