Deep learning-based software engineering: progress, challenges, and opportunities

X Chen, X Hu, Y Huang, H Jiang, W Ji, Y Jiang… - Science China …, 2025 - Springer
Researchers have recently achieved significant advances in deep learning techniques,
which in turn has substantially advanced other research disciplines, such as natural …

Linevul: A transformer-based line-level vulnerability prediction

M Fu, C Tantithamthavorn - … of the 19th International Conference on …, 2022 - dl.acm.org
Software vulnerabilities are prevalent in software systems, causing a variety of problems
including deadlock, information loss, or system failures. Thus, early predictions of software …

LineVD: statement-level vulnerability detection using graph neural networks

D Hin, A Kan, H Chen, MA Babar - Proceedings of the 19th international …, 2022 - dl.acm.org
Current machine-learning based software vulnerability detection methods are primarily
conducted at the function-level. However, a key limitation of these methods is that they do …

VulRepair: a T5-based automated software vulnerability repair

M Fu, C Tantithamthavorn, T Le, V Nguyen… - Proceedings of the 30th …, 2022 - dl.acm.org
As software vulnerabilities grow in volume and complexity, researchers proposed various
Artificial Intelligence (AI)-based approaches to help under-resourced security analysts to …

Autotransform: Automated code transformation to support modern code review process

P Thongtanunam, C Pornprasit… - Proceedings of the 44th …, 2022 - dl.acm.org
Code review is effective, but human-intensive (eg, developers need to manually modify
source code until it is approved). Recently, prior work proposed a Neural Machine …

Pre-trained model-based automated software vulnerability repair: How far are we?

Q Zhang, C Fang, B Yu, W Sun… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Various approaches are proposed to help under-resourced security researchers to detect
and analyze software vulnerabilities. It is still incredibly time-consuming and labor-intensive …

Vulexplainer: A transformer-based hierarchical distillation for explaining vulnerability types

M Fu, V Nguyen, CK Tantithamthavorn… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Deep learning-based vulnerability prediction approaches are proposed to help under-
resourced security practitioners to detect vulnerable functions. However, security …

GPT2SP: A transformer-based agile story point estimation approach

M Fu, C Tantithamthavorn - IEEE Transactions on Software …, 2022 - ieeexplore.ieee.org
Story point estimation is a task to estimate the overall effort required to fully implement a
product backlog item. Various estimation approaches (eg, Planning Poker, Analogy, and …

Ai for devsecops: A landscape and future opportunities

M Fu, J Pasuksmit, C Tantithamthavorn - ACM Transactions on Software …, 2024 - dl.acm.org
DevOps has emerged as one of the most rapidly evolving software development paradigms.
With the growing concerns surrounding security in software systems, the DevSecOps …

Commentfinder: a simpler, faster, more accurate code review comments recommendation

Y Hong, C Tantithamthavorn… - Proceedings of the 30th …, 2022 - dl.acm.org
Code review is an effective quality assurance practice, but can be labor-intensive since
developers have to manually review the code and provide written feedback. Recently, a …