Deep learning-based software engineering: progress, challenges, and opportunities

X Chen, X Hu, Y Huang, H Jiang, W Ji, Y Jiang… - Science China …, 2025 - Springer
Researchers have recently achieved significant advances in deep learning techniques,
which in turn has substantially advanced other research disciplines, such as natural …

Unifying the perspectives of nlp and software engineering: A survey on language models for code

Z Zhang, C Chen, B Liu, C Liao, Z Gong, H Yu… - arxiv preprint arxiv …, 2023 - arxiv.org
In this work we systematically review the recent advancements in software engineering with
language models, covering 70+ models, 40+ evaluation tasks, 180+ datasets, and 900 …

[HTML][HTML] Vulnerability detection through machine learning-based fuzzing: A systematic review

SB Chafjiri, P Legg, J Hong, MA Tsompanas - Computers & Security, 2024 - Elsevier
Modern software and networks underpin our digital society, yet the rapid growth of
vulnerabilities that are uncovered within these threaten our cyber security posture …

One fuzzing strategy to rule them all

M Wu, L Jiang, J **ang, Y Huang, H Cui… - Proceedings of the 44th …, 2022 - dl.acm.org
Coverage-guided fuzzing has become mainstream in fuzzing to automatically expose
program vulnerabilities. Recently, a group of fuzzers are proposed to adopt a random search …

Augmenting greybox fuzzing with generative ai

J Hu, Q Zhang, H Yin - arxiv preprint arxiv:2306.06782, 2023 - arxiv.org
Real-world programs expecting structured inputs often has a format-parsing stage gating the
deeper program space. Neither a mutation-based approach nor a generative approach can …

Third-party library dependency for large-scale sca in the c/c++ ecosystem: How far are we?

L Jiang, H Yuan, Q Tang, S Nie, S Wu… - Proceedings of the 32nd …, 2023 - dl.acm.org
Existing software composition analysis (SCA) techniques for the C/C++ ecosystem tend to
identify the reused components through feature matching between target software project …

Jitfuzz: Coverage-guided fuzzing for jvm just-in-time compilers

M Wu, M Lu, H Cui, J Chen, Y Zhang… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
As a widely-used platform to support various Java-bytecode-based applications, Java Virtual
Machine (JVM) incurs severe performance loss caused by its real-time program …

Evaluating and improving hybrid fuzzing

L Jiang, H Yuan, M Wu, L Zhang… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
To date, various hybrid fuzzers have been proposed for maximal program vulnerability
exposure by integrating the power of fuzzing strategies and concolic executors. While the …

Binaryai: binary software composition analysis via intelligent binary source code matching

L Jiang, J An, H Huang, Q Tang, S Nie, S Wu… - Proceedings of the …, 2024 - dl.acm.org
While third-party libraries (TPLs) are extensively reused to enhance productivity during
software development, they can also introduce potential security risks such as vulnerability …

Sjfuzz: Seed and mutator scheduling for jvm fuzzing

M Wu, Y Ouyang, M Lu, J Chen, Y Zhao, H Cui… - Proceedings of the 31st …, 2023 - dl.acm.org
While the Java Virtual Machine (JVM) plays a vital role in ensuring correct executions of
Java applications, testing JVMs via generating and running class files on them can be rather …