Machine/deep learning for software engineering: A systematic literature review

S Wang, L Huang, A Gao, J Ge, T Zhang… - IEEE Transactions …, 2022‏ - ieeexplore.ieee.org
Since 2009, the deep learning revolution, which was triggered by the introduction of
ImageNet, has stimulated the synergy between Software Engineering (SE) and Machine …

A literature review of using machine learning in software development life cycle stages

S Shafiq, A Mashkoor, C Mayr-Dorn, A Egyed - IEEe Access, 2021‏ - ieeexplore.ieee.org
The software engineering community is rapidly adopting machine learning for transitioning
modern-day software towards highly intelligent and self-learning systems. However, the …

Combining graph-based learning with automated data collection for code vulnerability detection

H Wang, G Ye, Z Tang, SH Tan… - IEEE Transactions …, 2020‏ - ieeexplore.ieee.org
This paper presents FUNDED (Flow-sensitive vUl-Nerability coDE Detection), a novel
learning framework for building vulnerability detection models. Funded leverages the …

[HTML][HTML] A survey on machine learning techniques applied to source code

T Sharma, M Kechagia, S Georgiou, R Tiwari… - Journal of Systems and …, 2024‏ - Elsevier
The advancements in machine learning techniques have encouraged researchers to apply
these techniques to a myriad of software engineering tasks that use source code analysis …

A survey on machine learning techniques for source code analysis

T Sharma, M Kechagia, S Georgiou, R Tiwari… - arxiv preprint arxiv …, 2021‏ - arxiv.org
The advancements in machine learning techniques have encouraged researchers to apply
these techniques to a myriad of software engineering tasks that use source code analysis …

Deep learning-based software engineering: progress, challenges, and opportunities

X Chen, X Hu, Y Huang, H Jiang, W Ji, Y Jiang… - Science China …, 2025‏ - Springer
Researchers have recently achieved significant advances in deep learning techniques,
which in turn has substantially advanced other research disciplines, such as natural …

Learning approximate execution semantics from traces for binary function similarity

K Pei, Z Xuan, J Yang, S Jana… - IEEE Transactions on …, 2022‏ - ieeexplore.ieee.org
Detecting semantically similar binary functions–a crucial capability with broad security
usages including vulnerability detection, malware analysis, and forensics–requires …

Machine learning methods for software vulnerability detection

B Chernis, R Verma - Proceedings of the fourth ACM international …, 2018‏ - dl.acm.org
Software vulnerabilities are a primary concern in the IT security industry, as malicious
hackers who discover these vulnerabilities can often exploit them for nefarious purposes …

Mitigating false positive static analysis warnings: Progress, challenges, and opportunities

Z Guo, T Tan, S Liu, X Liu, W Lai, Y Yang… - IEEE Transactions …, 2023‏ - ieeexplore.ieee.org
Static analysis (SA) tools can generate useful static warnings to reveal the problematic code
snippets in a software system without dynamically executing the corresponding source code …

NTFuzz: Enabling type-aware kernel fuzzing on windows with static binary analysis

J Choi, K Kim, D Lee, SK Cha - 2021 IEEE Symposium on …, 2021‏ - ieeexplore.ieee.org
Although it is common practice for kernel fuzzers to leverage type information of system
calls, current Windows kernel fuzzers do not follow the practice as most system calls are …