Deep learning-based software engineering: progress, challenges, and opportunities
Researchers have recently achieved significant advances in deep learning techniques,
which in turn has substantially advanced other research disciplines, such as natural …
which in turn has substantially advanced other research disciplines, such as natural …
Linevul: A transformer-based line-level vulnerability prediction
Software vulnerabilities are prevalent in software systems, causing a variety of problems
including deadlock, information loss, or system failures. Thus, early predictions of software …
including deadlock, information loss, or system failures. Thus, early predictions of software …
LineVD: statement-level vulnerability detection using graph neural networks
Current machine-learning based software vulnerability detection methods are primarily
conducted at the function-level. However, a key limitation of these methods is that they do …
conducted at the function-level. However, a key limitation of these methods is that they do …
VulRepair: a T5-based automated software vulnerability repair
As software vulnerabilities grow in volume and complexity, researchers proposed various
Artificial Intelligence (AI)-based approaches to help under-resourced security analysts to …
Artificial Intelligence (AI)-based approaches to help under-resourced security analysts to …
Autotransform: Automated code transformation to support modern code review process
Code review is effective, but human-intensive (eg, developers need to manually modify
source code until it is approved). Recently, prior work proposed a Neural Machine …
source code until it is approved). Recently, prior work proposed a Neural Machine …
Pre-trained model-based automated software vulnerability repair: How far are we?
Various approaches are proposed to help under-resourced security researchers to detect
and analyze software vulnerabilities. It is still incredibly time-consuming and labor-intensive …
and analyze software vulnerabilities. It is still incredibly time-consuming and labor-intensive …
Vulexplainer: A transformer-based hierarchical distillation for explaining vulnerability types
Deep learning-based vulnerability prediction approaches are proposed to help under-
resourced security practitioners to detect vulnerable functions. However, security …
resourced security practitioners to detect vulnerable functions. However, security …
GPT2SP: A transformer-based agile story point estimation approach
Story point estimation is a task to estimate the overall effort required to fully implement a
product backlog item. Various estimation approaches (eg, Planning Poker, Analogy, and …
product backlog item. Various estimation approaches (eg, Planning Poker, Analogy, and …
Ai for devsecops: A landscape and future opportunities
DevOps has emerged as one of the most rapidly evolving software development paradigms.
With the growing concerns surrounding security in software systems, the DevSecOps …
With the growing concerns surrounding security in software systems, the DevSecOps …
Commentfinder: a simpler, faster, more accurate code review comments recommendation
Code review is an effective quality assurance practice, but can be labor-intensive since
developers have to manually review the code and provide written feedback. Recently, a …
developers have to manually review the code and provide written feedback. Recently, a …