A survey on rag meeting llms: Towards retrieval-augmented large language models

W Fan, Y Ding, L Ning, S Wang, H Li, D Yin… - Proceedings of the 30th …, 2024 - dl.acm.org
As one of the most advanced techniques in AI, Retrieval-Augmented Generation (RAG) can
offer reliable and up-to-date external knowledge, providing huge convenience for numerous …

Large language models are few-shot summarizers: Multi-intent comment generation via in-context learning

M Geng, S Wang, D Dong, H Wang, G Li, Z **… - Proceedings of the 46th …, 2024 - dl.acm.org
Code comment generation aims at generating natural language descriptions for a code
snippet to facilitate developers' program comprehension activities. Despite being studied for …

Promptintern: Saving inference costs by internalizing recurrent prompt during large language model fine-tuning

J Zou, M Zhou, T Li, S Han, D Zhang - arxiv preprint arxiv:2407.02211, 2024 - arxiv.org
Recent advances in fine-tuning large language models (LLMs) have greatly enhanced their
usage in domain-specific tasks. Despite the success, fine-tuning continues to rely on …

MeDeT: Medical Device Digital Twins Creation with Few-shot Meta-learning

H Sartaj, S Ali, JM Gjøby - ACM Transactions on Software Engineering …, 2024 - dl.acm.org
Testing healthcare Internet of Things (IoT) applications at system and integration levels
necessitates integrating numerous medical devices. Challenges of incorporating medical …

B4: Towards optimal assessment of plausible code solutions with plausible tests

M Chen, Z Liu, H Tao, Y Hong, D Lo, X **a… - Proceedings of the 39th …, 2024 - dl.acm.org
Selecting the best code solution from multiple generated ones is an essential task in code
generation, which can be achieved by using some reliable validators (eg, developer-written …

Out of context: How important is local context in neural program repair?

JA Prenner, R Robbes - Proceedings of the IEEE/ACM 46th International …, 2024 - dl.acm.org
Deep learning source code models have been applied very successfully to the problem of
automated program repair. One of the standing issues is the small input window of current …

Reality check: assessing GPT-4 in fixing real-world software vulnerabilities

Z Ságodi, G Antal, B Bogenfürst, M Isztin… - Proceedings of the 28th …, 2024 - dl.acm.org
Discovering and mitigating software vulnerabilities is a challenging task. These
vulnerabilities are often caused by simple, otherwise (and in other contexts) harmless code …

Software vulnerability detection with gpt and in-context learning

Z Liu, Q Liao, W Gu, C Gao - 2023 8th International Conference …, 2023 - ieeexplore.ieee.org
Code vulnerability detection is a software security analysis technique that focuses on
recognizing and resolving possible code vulnerabilities and weaknesses. Its primary …

Assured automatic programming via large language models

M Mirchev, A Costea, AK Singh… - arxiv preprint arxiv …, 2024 - arxiv.org
With the advent of AI-based coding engines, it is possible to convert natural language
requirements to executable code in standard programming languages. However, AI …

Exploration On Prompting LLM With Code-Specific Information For Vulnerability Detection

Z Liu, Z Yang, Q Liao - 2024 IEEE International Conference on …, 2024 - ieeexplore.ieee.org
Software vulnerability detection is a software se-curity analysis technique that aims to
recognize possible code vulnerabilities and weaknesses. The majority of previous research …