Program synthesis with large language models

J Austin, A Odena, M Nye, M Bosma… - arxiv preprint arxiv …, 2021 - arxiv.org
This paper explores the limits of the current generation of large language models for
program synthesis in general purpose programming languages. We evaluate a collection of …

A systematic evaluation of large language models of code

FF Xu, U Alon, G Neubig, VJ Hellendoorn - Proceedings of the 6th ACM …, 2022 - dl.acm.org
Large language models (LMs) of code have recently shown tremendous promise in
completing code and synthesizing code from natural language descriptions. However, the …

A systematic literature review on the use of deep learning in software engineering research

C Watson, N Cooper, DN Palacio, K Moran… - ACM Transactions on …, 2022 - dl.acm.org
An increasingly popular set of techniques adopted by software engineering (SE)
researchers to automate development tasks are those rooted in the concept of Deep …

Codexglue: A machine learning benchmark dataset for code understanding and generation

S Lu, D Guo, S Ren, J Huang, A Svyatkovskiy… - arxiv preprint arxiv …, 2021 - arxiv.org
Benchmark datasets have a significant impact on accelerating research in programming
language tasks. In this paper, we introduce CodeXGLUE, a benchmark dataset to foster …

Linevul: A transformer-based line-level vulnerability prediction

M Fu, C Tantithamthavorn - … of the 19th International Conference on …, 2022 - dl.acm.org
Software vulnerabilities are prevalent in software systems, causing a variety of problems
including deadlock, information loss, or system failures. Thus, early predictions of software …

An empirical evaluation of using large language models for automated unit test generation

M Schäfer, S Nadi, A Eghbali… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Unit tests play a key role in ensuring the correctness of software. However, manually
creating unit tests is a laborious task, motivating the need for automation. Large Language …

Log-based anomaly detection without log parsing

VH Le, H Zhang - … 36th IEEE/ACM International Conference on …, 2021 - ieeexplore.ieee.org
Software systems often record important runtime information in system logs for
troubleshooting purposes. There have been many studies that use log data to construct …

VulRepair: a T5-based automated software vulnerability repair

M Fu, C Tantithamthavorn, T Le, V Nguyen… - Proceedings of the 30th …, 2022 - dl.acm.org
As software vulnerabilities grow in volume and complexity, researchers proposed various
Artificial Intelligence (AI)-based approaches to help under-resourced security analysts to …

Natural attack for pre-trained models of code

Z Yang, J Shi, J He, D Lo - … of the 44th International Conference on …, 2022 - dl.acm.org
Pre-trained models of code have achieved success in many important software engineering
tasks. However, these powerful models are vulnerable to adversarial attacks that slightly …

Multi-task learning based pre-trained language model for code completion

F Liu, G Li, Y Zhao, Z ** - Proceedings of the 35th IEEE/ACM …, 2020 - dl.acm.org
Code completion is one of the most useful features in the Integrated Development
Environments (IDEs), which can accelerate software development by suggesting the next …