Clinician-facing AI in the Wild: Taking Stock of the Sociotechnical Challenges and Opportunities for HCI

HD Zając, D Li, X Dai, JF Carlsen, F Kensing… - ACM Transactions on …, 2023 - dl.acm.org
Artificial Intelligence (AI) in medical applications holds great promise. However, the use of
Machine Learning-based (ML) systems in clinical practice is still minimal. It is uniquely …

Deep learning for code intelligence: Survey, benchmark and toolkit

Y Wan, Z Bi, Y He, J Zhang, H Zhang, Y Sui… - ACM Computing …, 2024 - dl.acm.org
Code intelligence leverages machine learning techniques to extract knowledge from
extensive code corpora, with the aim of develo** intelligent tools to improve the quality …

VulRepair: a T5-based automated software vulnerability repair

M Fu, C Tantithamthavorn, T Le, V Nguyen… - Proceedings of the 30th …, 2022 - dl.acm.org
As software vulnerabilities grow in volume and complexity, researchers proposed various
Artificial Intelligence (AI)-based approaches to help under-resourced security analysts to …

MVD: memory-related vulnerability detection based on flow-sensitive graph neural networks

S Cao, X Sun, L Bo, R Wu, B Li, C Tao - Proceedings of the 44th …, 2022 - dl.acm.org
Memory-related vulnerabilities constitute severe threats to the security of modern software.
Despite the success of deep learning-based approaches to generic vulnerability detection …

CSGVD: A deep learning approach combining sequence and graph embedding for source code vulnerability detection

W Tang, M Tang, M Ban, Z Zhao, M Feng - Journal of Systems and Software, 2023 - Elsevier
In order to secure software, it is critical to detect potential vulnerabilities. The performance of
traditional static vulnerability detection methods is limited by predefined rules, which rely …

Prompt-enhanced software vulnerability detection using chatgpt

C Zhang, H Liu, J Zeng, K Yang, Y Li, H Li - … of the 2024 IEEE/ACM 46th …, 2024 - dl.acm.org
With the increase in software vulnerabilities that cause significant economic and social
losses, automatic vulnerability detection has become essential in software development and …

{VulChecker}: Graph-based vulnerability localization in source code

Y Mirsky, G Macon, M Brown, C Yagemann… - 32nd USENIX Security …, 2023 - usenix.org
In software development, it is critical to detect vulnerabilities in a project as early as possible.
Although, deep learning has shown promise in this task, current state-of-the-art methods …

Cctest: Testing and repairing code completion systems

Z Li, C Wang, Z Liu, H Wang, D Chen… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Code completion, a highly valuable topic in the software development domain, has been
increasingly promoted for use by recent advances in large language models (LLMs). To …

Poison attack and poison detection on deep source code processing models

J Li♂, Z Li, HZ Zhang, G Li, Z **, X Hu… - ACM Transactions on …, 2024 - dl.acm.org
In the software engineering (SE) community, deep learning (DL) has recently been applied
to many source code processing tasks, achieving state-of-the-art results. Due to the poor …

Automated conformance testing for JavaScript engines via deep compiler fuzzing

G Ye, Z Tang, SH Tan, S Huang, D Fang… - Proceedings of the …, 2021 - dl.acm.org
JavaScript (JS) is a popular, platform-independent programming language. To ensure the
interoperability of JS programs across different platforms, the implementation of a JS engine …