Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Le, Xuan Bach D."'
Pre-trained language models of code are now widely used in various software engineering tasks such as code generation, code completion, vulnerability detection, etc. This, in turn, poses security and reliability risks to these models. One of the impo
Externí odkaz:
http://arxiv.org/abs/2308.11161
Autor:
Liu, Yue, Le-Cong, Thanh, Widyasari, Ratnadira, Tantithamthavorn, Chakkrit, Li, Li, Le, Xuan-Bach D., Lo, David
We systematically study the quality of 4,066 ChatGPT-generated code implemented in two popular programming languages, i.e., Java and Python, for 2,033 programming tasks. The goal of this work is three folds. First, we analyze the correctness of ChatG
Externí odkaz:
http://arxiv.org/abs/2307.12596
Autor:
Nguyen, Truong Giang, Le-Cong, Thanh, Kang, Hong Jin, Widyasari, Ratnadira, Yang, Chengran, Zhao, Zhipeng, Xu, Bowen, Zhou, Jiayuan, Xia, Xin, Hassan, Ahmed E., Le, Xuan-Bach D., Lo, David
Publikováno v:
IEEE Transactions on Software Engineering, 2023
With the increasing reliance on Open Source Software, users are exposed to third-party library vulnerabilities. Software Composition Analysis (SCA) tools have been created to alert users of such vulnerabilities. SCA requires the identification of vul
Externí odkaz:
http://arxiv.org/abs/2305.13884
Autor:
Lyu, Yunbo, Le-Cong, Thanh, Kang, Hong Jin, Widyasari, Ratnadira, Zhao, Zhipeng, Le, Xuan-Bach D., Li, Ming, Lo, David
Tools that alert developers about library vulnerabilities depend on accurate, up-to-date vulnerability databases which are maintained by security researchers. These databases record the libraries related to each vulnerability. However, the vulnerabil
Externí odkaz:
http://arxiv.org/abs/2301.03944
Autor:
Le-Cong, Thanh, Luong, Duc-Minh, Le, Xuan Bach D., Lo, David, Tran, Nhat-Hoa, Quang-Huy, Bui, Huynh, Quyet-Thang
Publikováno v:
IEEE Transactions on Software Engineering, 2023
Automated program repair (APR) faces the challenge of test overfitting, where generated patches pass validation tests but fail to generalize. Existing methods for patch assessment involve generating new tests or manual inspection, which can be time-c
Externí odkaz:
http://arxiv.org/abs/2301.01113
Autor:
Le, Quang Loc, Le, Xuan-Bach D.
An efficient entailment proof system is essential to compositional verification using separation logic. Unfortunately, existing decision procedures are either inexpressive or inefficient. For example, Smallfoot is an efficient procedure but only work
Externí odkaz:
http://arxiv.org/abs/2210.00616
Open-source software (OSS) vulnerability management process is important nowadays, as the number of discovered OSS vulnerabilities is increasing over time. Monitoring vulnerability-fixing commits is a part of the standard process to prevent vulnerabi
Externí odkaz:
http://arxiv.org/abs/2209.03260
Autor:
Le-Cong, Thanh, Kang, Hong Jin, Nguyen, Truong Giang, Haryono, Stefanus Agus, Lo, David, Le, Xuan-Bach D., Thang, Huynh Quyet
Constructing a static call graph requires trade-offs between soundness and precision. Program analysis techniques for constructing call graphs are unfortunately usually imprecise. To address this problem, researchers have recently proposed call graph
Externí odkaz:
http://arxiv.org/abs/2209.03230
Publikováno v:
2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE 2021)
With the recent explosive growth of mobile devices such as smartphones or tablets, guaranteeing consistent web appearance across all environments has become a significant problem. This happens simply because it is hard to keep track of the web appear
Externí odkaz:
http://arxiv.org/abs/2201.00117
Publikováno v:
The 44th IEEE/ACM International Conference on Software Engineering (ICSE 2022)
Graph Neural Networks (GNNs) have recently emerged as a robust framework for graph-structured data. They have been applied to many problems such as knowledge graph analysis, social networks recommendation, and even Covid19 detection and vaccine devel
Externí odkaz:
http://arxiv.org/abs/2201.00115