Refining chatgpt-generated code: Characterizing and mitigating code quality issues
Since its introduction in November 2022, ChatGPT has rapidly gained popularity due to its
remarkable ability in language understanding and human-like responses. ChatGPT, based …
remarkable ability in language understanding and human-like responses. ChatGPT, based …
Rust-lancet: Automated Ownership-Rule-Violation Fixing with Behavior Preservation
As a relatively new programming language, Rust is designed to provide both memory safety
and runtime performance. To achieve this goal, Rust conducts rigorous static checks against …
and runtime performance. To achieve this goal, Rust conducts rigorous static checks against …
Enhancing Java Web Application Security: Injection Vulnerability Detection via Interprocedural Analysis and Deep Learning
B Zhang, X Zhi, M Wang, R Ren… - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
Injection attacks exploit vulnerabilities in how applications handle user input, allowing
malicious code to infiltrate the execution environment of web applications, leading to severe …
malicious code to infiltrate the execution environment of web applications, leading to severe …
Silent Vulnerability-fixing Commit Identification Based on Graph Neural Networks
The growing dependence of software projects on external libraries has generated
apprehensions regarding the security of these libraries because of concealed …
apprehensions regarding the security of these libraries because of concealed …
Learning Graph-based Patch Representations for Identifying and Assessing Silent Vulnerability Fixes
M Han, L Wang, J Chang, B Li… - 2024 IEEE 35th …, 2024 - ieeexplore.ieee.org
Software projects are dependent on many third-party libraries, therefore high-risk
vulnerabilities can propagate through the dependency chain to downstream projects. Owing …
vulnerabilities can propagate through the dependency chain to downstream projects. Owing …