Picture for Chakkrit Tantithamthavorn

Chakkrit Tantithamthavorn

AI for DevSecOps: A Landscape and Future Opportunities

Add code
Apr 07, 2024
Viaarxiv icon

Navigating Fairness: Practitioners' Understanding, Challenges, and Strategies in AI/ML Development

Add code
Mar 21, 2024
Viaarxiv icon

Practitioners' Challenges and Perceptions of CI Build Failure Predictions at Atlassian

Add code
Feb 15, 2024
Figure 1 for Practitioners' Challenges and Perceptions of CI Build Failure Predictions at Atlassian
Figure 2 for Practitioners' Challenges and Perceptions of CI Build Failure Predictions at Atlassian
Figure 3 for Practitioners' Challenges and Perceptions of CI Build Failure Predictions at Atlassian
Figure 4 for Practitioners' Challenges and Perceptions of CI Build Failure Predictions at Atlassian
Viaarxiv icon

Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey

Add code
Oct 27, 2023
Figure 1 for Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey
Figure 2 for Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey
Figure 3 for Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey
Figure 4 for Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey
Viaarxiv icon

Ethics in the Age of AI: An Analysis of AI Practitioners' Awareness and Challenges

Add code
Jul 14, 2023
Figure 1 for Ethics in the Age of AI: An Analysis of AI Practitioners' Awareness and Challenges
Figure 2 for Ethics in the Age of AI: An Analysis of AI Practitioners' Awareness and Challenges
Figure 3 for Ethics in the Age of AI: An Analysis of AI Practitioners' Awareness and Challenges
Figure 4 for Ethics in the Age of AI: An Analysis of AI Practitioners' Awareness and Challenges
Viaarxiv icon

Learning to Quantize Vulnerability Patterns and Match to Locate Statement-Level Vulnerabilities

Add code
May 26, 2023
Figure 1 for Learning to Quantize Vulnerability Patterns and Match to Locate Statement-Level Vulnerabilities
Figure 2 for Learning to Quantize Vulnerability Patterns and Match to Locate Statement-Level Vulnerabilities
Figure 3 for Learning to Quantize Vulnerability Patterns and Match to Locate Statement-Level Vulnerabilities
Figure 4 for Learning to Quantize Vulnerability Patterns and Match to Locate Statement-Level Vulnerabilities
Viaarxiv icon

Syntax-Aware On-the-Fly Code Completion

Add code
Nov 09, 2022
Figure 1 for Syntax-Aware On-the-Fly Code Completion
Figure 2 for Syntax-Aware On-the-Fly Code Completion
Figure 3 for Syntax-Aware On-the-Fly Code Completion
Figure 4 for Syntax-Aware On-the-Fly Code Completion
Viaarxiv icon

An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability

Add code
Sep 20, 2022
Figure 1 for An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability
Figure 2 for An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability
Figure 3 for An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability
Figure 4 for An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability
Viaarxiv icon

Cross Project Software Vulnerability Detection via Domain Adaptation and Max-Margin Principle

Add code
Sep 19, 2022
Figure 1 for Cross Project Software Vulnerability Detection via Domain Adaptation and Max-Margin Principle
Figure 2 for Cross Project Software Vulnerability Detection via Domain Adaptation and Max-Margin Principle
Figure 3 for Cross Project Software Vulnerability Detection via Domain Adaptation and Max-Margin Principle
Figure 4 for Cross Project Software Vulnerability Detection via Domain Adaptation and Max-Margin Principle
Viaarxiv icon

Deep Learning for Android Malware Defenses: a Systematic Literature Review

Add code
Mar 09, 2021
Figure 1 for Deep Learning for Android Malware Defenses: a Systematic Literature Review
Figure 2 for Deep Learning for Android Malware Defenses: a Systematic Literature Review
Figure 3 for Deep Learning for Android Malware Defenses: a Systematic Literature Review
Figure 4 for Deep Learning for Android Malware Defenses: a Systematic Literature Review
Viaarxiv icon