Deep learning in electron microscopy

JM Ede - Machine Learning: Science and Technology, 2021 - iopscience.iop.org
Deep learning is transforming most areas of science and technology, including electron
microscopy. This review paper offers a practical perspective aimed at developers with …

A systematic review of API evolution literature

M Lamothe, YG Guéhéneuc, W Shang - ACM Computing Surveys …, 2021 - dl.acm.org
Recent software advances have led to an expansion of the development and usage of
application programming interfaces (APIs). From millions of Android packages (APKs) …

A comprehensive study of deep learning compiler bugs

Q Shen, H Ma, J Chen, Y Tian, SC Cheung… - Proceedings of the 29th …, 2021 - dl.acm.org
There are increasing uses of deep learning (DL) compilers to generate optimized code,
boosting the runtime performance of DL models on specific hardware. Like their traditional …

On the importance of building high-quality training datasets for neural code search

Z Sun, L Li, Y Liu, X Du, L Li - … of the 44th International Conference on …, 2022 - dl.acm.org
The performance of neural code search is significantly influenced by the quality of the
training data from which the neural models are derived. A large corpus of high-quality query …

Bugs in large language models generated code: An empirical study

F Tambon, A Moradi-Dakhel, A Nikanjam… - Empirical Software …, 2025 - Springer
Abstract Large Language Models (LLMs) for code have gained significant attention recently.
They can generate code in different programming languages based on provided prompts …

Prompt-tuned code language model as a neural knowledge base for type inference in statically-typed partial code

Q Huang, Z Yuan, Z **ng, X Xu, L Zhu… - Proceedings of the 37th …, 2022 - dl.acm.org
Partial code usually involves non-fully-qualified type names (non-FQNs) and undeclared
receiving objects. Resolving the FQNs of these non-FQN types and undeclared receiving …

Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects

S Rahaman, Y **ao, S Afrose, F Shaon, K Tian… - Proceedings of the …, 2019 - dl.acm.org
Cryptographic API misuses, such as exposed secrets, predictable random numbers, and
vulnerable certificate verification, seriously threaten software security. The vision of …

A study on robustness and reliability of large language model code generation

L Zhong, Z Wang - arxiv preprint arxiv:2308.10335, 2023 - arxiv.org
Recently, the large language models (LLMs) have shown extraordinary ability in
understanding natural language and generating programming code. It has been a common …

A disruptive research playbook for studying disruptive innovations

MA Storey, D Russo, N Novielli, T Kobayashi… - ACM Transactions on …, 2024 - dl.acm.org
As researchers today, we are witnessing a fundamental change in our technologically-
enabled world due to the advent and diffusion of highly disruptive technologies such as …

Don't leak your keys: Understanding, measuring, and exploiting the appsecret leaks in mini-programs

Y Zhang, Y Yang, Z Lin - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Mobile mini-programs in WeChat have gained significant popularity since their debut in
2017, reaching a scale similar to that of Android apps in the Play Store. Like Google …