Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Deep learning-based software engineering: progress, challenges, and opportunities
Researchers have recently achieved significant advances in deep learning techniques,
which in turn has substantially advanced other research disciplines, such as natural …
which in turn has substantially advanced other research disciplines, such as natural …
Unifying the perspectives of nlp and software engineering: A survey on language models for code
Z Zhang, C Chen, B Liu, C Liao, Z Gong, H Yu… - arxiv preprint arxiv …, 2023 - arxiv.org
In this work we systematically review the recent advancements in software engineering with
language models, covering 70+ models, 40+ evaluation tasks, 180+ datasets, and 900 …
language models, covering 70+ models, 40+ evaluation tasks, 180+ datasets, and 900 …
[HTML][HTML] Vulnerability detection through machine learning-based fuzzing: A systematic review
Modern software and networks underpin our digital society, yet the rapid growth of
vulnerabilities that are uncovered within these threaten our cyber security posture …
vulnerabilities that are uncovered within these threaten our cyber security posture …
One fuzzing strategy to rule them all
Coverage-guided fuzzing has become mainstream in fuzzing to automatically expose
program vulnerabilities. Recently, a group of fuzzers are proposed to adopt a random search …
program vulnerabilities. Recently, a group of fuzzers are proposed to adopt a random search …
Augmenting greybox fuzzing with generative ai
Real-world programs expecting structured inputs often has a format-parsing stage gating the
deeper program space. Neither a mutation-based approach nor a generative approach can …
deeper program space. Neither a mutation-based approach nor a generative approach can …
Third-party library dependency for large-scale sca in the c/c++ ecosystem: How far are we?
Existing software composition analysis (SCA) techniques for the C/C++ ecosystem tend to
identify the reused components through feature matching between target software project …
identify the reused components through feature matching between target software project …
Jitfuzz: Coverage-guided fuzzing for jvm just-in-time compilers
As a widely-used platform to support various Java-bytecode-based applications, Java Virtual
Machine (JVM) incurs severe performance loss caused by its real-time program …
Machine (JVM) incurs severe performance loss caused by its real-time program …
Evaluating and improving hybrid fuzzing
To date, various hybrid fuzzers have been proposed for maximal program vulnerability
exposure by integrating the power of fuzzing strategies and concolic executors. While the …
exposure by integrating the power of fuzzing strategies and concolic executors. While the …
Binaryai: binary software composition analysis via intelligent binary source code matching
While third-party libraries (TPLs) are extensively reused to enhance productivity during
software development, they can also introduce potential security risks such as vulnerability …
software development, they can also introduce potential security risks such as vulnerability …
Sjfuzz: Seed and mutator scheduling for jvm fuzzing
While the Java Virtual Machine (JVM) plays a vital role in ensuring correct executions of
Java applications, testing JVMs via generating and running class files on them can be rather …
Java applications, testing JVMs via generating and running class files on them can be rather …