Large language models for software engineering: A systematic literature review

X Hou, Y Zhao, Y Liu, Z Yang, K Wang, L Li… - ACM Transactions on …, 2024 - dl.acm.org
Large Language Models (LLMs) have significantly impacted numerous domains, including
Software Engineering (SE). Many recent publications have explored LLMs applied to …

[HTML][HTML] A survey on large language model (llm) security and privacy: The good, the bad, and the ugly

Y Yao, J Duan, K Xu, Y Cai, Z Sun, Y Zhang - High-Confidence Computing, 2024 - Elsevier
Abstract Large Language Models (LLMs), such as ChatGPT and Bard, have revolutionized
natural language understanding and generation. They possess deep language …

Large language models for forecasting and anomaly detection: A systematic literature review

J Su, C Jiang, X **, Y Qiao, T **ao, H Ma… - arxiv preprint arxiv …, 2024 - arxiv.org
This systematic literature review comprehensively examines the application of Large
Language Models (LLMs) in forecasting and anomaly detection, highlighting the current …

CLAP: Learning transferable binary code representations with natural language supervision

H Wang, Z Gao, C Zhang, Z Sha, M Sun… - Proceedings of the 33rd …, 2024 - dl.acm.org
Binary code representation learning has shown significant performance in binary analysis
tasks. But existing solutions often have poor transferability, particularly in few-shot and zero …

Musechat: A conversational music recommendation system for videos

Z Dong, X Liu, B Chen, P Polak… - Proceedings of the …, 2024 - openaccess.thecvf.com
Music recommendation for videos attracts growing interest in multi-modal research.
However existing systems focus primarily on content compatibility often ignoring the users' …

Advanced network intrusion detection with tabtransformer

X Wang, Y Qiao, J **ong, Z Zhao… - Journal of Theory …, 2024 - centuryscipub.com
In today's digital era, the security of networked systems is of utmost importance amidst the
increasing prevalence of cyber threats and sophisticated intrusion techniques. This paper …

[PDF][PDF] Graphene: Infrastructure Security Posture Analysis with AI-generated Attack Graphs

X **, C Katsis, F Sang, J Sun, E Bertino… - arxiv preprint arxiv …, 2023 - sang.fan
The rampant occurrence of cybersecurity breaches imposes substantial limitations on the
progress of network infrastructures, leading to compromised data, financial losses, potential …

Accelerating Semi-Asynchronous Federated Learning

C Xu, Y Qiao, Z Zhou, F Ni, J **ong - arxiv preprint arxiv:2402.10991, 2024 - arxiv.org
Federated Learning (FL) is a distributed machine learning paradigm that allows clients to
train models on their data while preserving their privacy. FL algorithms, such as Federated …

On the effectiveness of large language models in statement-level code summarization

J Zhu, Y Miao, T Xu, J Zhu, X Sun - 2024 IEEE 24th …, 2024 - ieeexplore.ieee.org
Code comments are crucial for program comprehension, and the automated generation of
comments greatly enhances the efficiency of code commenting. Statement-level code …

Enhancing kitchen independence: Deep learning-based object detection for visually impaired assistance

B Dang, D Ma, S Li, X Dong, H Zang… - Academic Journal of …, 2024 - drpress.org
Visually impaired individuals face substantial challenges in kitchens, where identifying
objects accurately is crucial yet difficult due to the complexity and variability of the …