Picture for Gail Kaiser

Gail Kaiser

Understanding Software Engineering Agents Through the Lens of Traceability: An Empirical Study

Add code
Jun 10, 2025
Figure 1 for Understanding Software Engineering Agents Through the Lens of Traceability: An Empirical Study
Figure 2 for Understanding Software Engineering Agents Through the Lens of Traceability: An Empirical Study
Figure 3 for Understanding Software Engineering Agents Through the Lens of Traceability: An Empirical Study
Figure 4 for Understanding Software Engineering Agents Through the Lens of Traceability: An Empirical Study
Viaarxiv icon

Can LLM Prompting Serve as a Proxy for Static Analysis in Vulnerability Detection

Add code
Dec 16, 2024
Viaarxiv icon

SemCoder: Training Code Language Models with Comprehensive Semantics

Add code
Jun 03, 2024
Viaarxiv icon

CYCLE: Learning to Self-Refine the Code Generation

Add code
Mar 27, 2024
Figure 1 for CYCLE: Learning to Self-Refine the Code Generation
Figure 2 for CYCLE: Learning to Self-Refine the Code Generation
Figure 3 for CYCLE: Learning to Self-Refine the Code Generation
Figure 4 for CYCLE: Learning to Self-Refine the Code Generation
Viaarxiv icon

Vignat: Vulnerability identification by learning code semantics via graph attention networks

Add code
Oct 30, 2023
Figure 1 for Vignat: Vulnerability identification by learning code semantics via graph attention networks
Figure 2 for Vignat: Vulnerability identification by learning code semantics via graph attention networks
Figure 3 for Vignat: Vulnerability identification by learning code semantics via graph attention networks
Figure 4 for Vignat: Vulnerability identification by learning code semantics via graph attention networks
Viaarxiv icon

Beyond Accuracy: Evaluating Self-Consistency of Code Large Language Models with IdentityChain

Add code
Oct 21, 2023
Figure 1 for Beyond Accuracy: Evaluating Self-Consistency of Code Large Language Models with IdentityChain
Figure 2 for Beyond Accuracy: Evaluating Self-Consistency of Code Large Language Models with IdentityChain
Figure 3 for Beyond Accuracy: Evaluating Self-Consistency of Code Large Language Models with IdentityChain
Figure 4 for Beyond Accuracy: Evaluating Self-Consistency of Code Large Language Models with IdentityChain
Viaarxiv icon

On Contrastive Learning of Semantic Similarity forCode to Code Search

Add code
May 05, 2023
Figure 1 for On Contrastive Learning of Semantic Similarity forCode to Code Search
Figure 2 for On Contrastive Learning of Semantic Similarity forCode to Code Search
Figure 3 for On Contrastive Learning of Semantic Similarity forCode to Code Search
Figure 4 for On Contrastive Learning of Semantic Similarity forCode to Code Search
Viaarxiv icon

VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements

Add code
Jan 13, 2022
Figure 1 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 2 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 3 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 4 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Viaarxiv icon

Neural Network Guided Evolutionary Fuzzing for Finding Traffic Violations of Autonomous Vehicles

Add code
Sep 13, 2021
Figure 1 for Neural Network Guided Evolutionary Fuzzing for Finding Traffic Violations of Autonomous Vehicles
Figure 2 for Neural Network Guided Evolutionary Fuzzing for Finding Traffic Violations of Autonomous Vehicles
Figure 3 for Neural Network Guided Evolutionary Fuzzing for Finding Traffic Violations of Autonomous Vehicles
Figure 4 for Neural Network Guided Evolutionary Fuzzing for Finding Traffic Violations of Autonomous Vehicles
Viaarxiv icon