Refining chatgpt-generated code: Characterizing and mitigating code quality issues

Y Liu, T Le-Cong, R Widyasari… - ACM Transactions on …, 2024 - dl.acm.org
Since its introduction in November 2022, ChatGPT has rapidly gained popularity due to its
remarkable ability in language understanding and human-like responses. ChatGPT, based …

Rust-lancet: Automated Ownership-Rule-Violation Fixing with Behavior Preservation

W Yang, L Song, Y Xue - Proceedings of the IEEE/ACM 46th …, 2024 - dl.acm.org
As a relatively new programming language, Rust is designed to provide both memory safety
and runtime performance. To achieve this goal, Rust conducts rigorous static checks against …

Enhancing Java Web Application Security: Injection Vulnerability Detection via Interprocedural Analysis and Deep Learning

B Zhang, X Zhi, M Wang, R Ren… - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
Injection attacks exploit vulnerabilities in how applications handle user input, allowing
malicious code to infiltrate the execution environment of web applications, leading to severe …

Silent Vulnerability-fixing Commit Identification Based on Graph Neural Networks

HD Vo, TT Vu, S Nguyen - arxiv preprint arxiv:2309.08225, 2023 - arxiv.org
The growing dependence of software projects on external libraries has generated
apprehensions regarding the security of these libraries because of concealed …

Learning Graph-based Patch Representations for Identifying and Assessing Silent Vulnerability Fixes

M Han, L Wang, J Chang, B Li… - 2024 IEEE 35th …, 2024 - ieeexplore.ieee.org
Software projects are dependent on many third-party libraries, therefore high-risk
vulnerabilities can propagate through the dependency chain to downstream projects. Owing …