Alert button
Picture for Jim Laredo

Jim Laredo

Alert button

VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements

Add code
Bookmark button
Alert button
Jan 13, 2022
Yangruibo Ding, Sahil Suneja, Yunhui Zheng, Jim Laredo, Alessandro Morari, Gail Kaiser, Baishakhi Ray

Figure 1 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 2 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 3 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 4 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Viaarxiv icon

Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection

Add code
Bookmark button
Alert button
Nov 10, 2021
Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari

Figure 1 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 2 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 3 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 4 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Viaarxiv icon

Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation

Add code
Bookmark button
Alert button
Sep 07, 2021
Yufan Zhuang, Sahil Suneja, Veronika Thost, Giacomo Domeniconi, Alessandro Morari, Jim Laredo

Figure 1 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 2 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 3 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 4 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Viaarxiv icon

D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis

Add code
Bookmark button
Alert button
Feb 16, 2021
Yunhui Zheng, Saurabh Pujar, Burn Lewis, Luca Buratti, Edward Epstein, Bo Yang, Jim Laredo, Alessandro Morari, Zhong Su

Figure 1 for D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis
Figure 2 for D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis
Figure 3 for D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis
Figure 4 for D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis
Viaarxiv icon

Probing Model Signal-Awareness via Prediction-Preserving Input Minimization

Add code
Bookmark button
Alert button
Nov 25, 2020
Yunhui Zheng, Sahil Suneja, Yufan Zhuang, Alessandro Morari, Jim Laredo

Figure 1 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 2 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 3 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 4 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Viaarxiv icon

Exploring Software Naturalness through Neural Language Models

Add code
Bookmark button
Alert button
Jun 24, 2020
Luca Buratti, Saurabh Pujar, Mihaela Bornea, Scott McCarley, Yunhui Zheng, Gaetano Rossiello, Alessandro Morari, Jim Laredo, Veronika Thost, Yufan Zhuang, Giacomo Domeniconi

Figure 1 for Exploring Software Naturalness through Neural Language Models
Figure 2 for Exploring Software Naturalness through Neural Language Models
Figure 3 for Exploring Software Naturalness through Neural Language Models
Figure 4 for Exploring Software Naturalness through Neural Language Models
Viaarxiv icon

Exploring Software Naturalness throughNeural Language Models

Add code
Bookmark button
Alert button
Jun 22, 2020
Luca Buratti, Saurabh Pujar, Mihaela Bornea, Scott McCarley, Yunhui Zheng, Gaetano Rossiello, Alessandro Morari, Jim Laredo, Veronika Thost, Yufan Zhuang, Giacomo Domeniconi

Figure 1 for Exploring Software Naturalness throughNeural Language Models
Figure 2 for Exploring Software Naturalness throughNeural Language Models
Figure 3 for Exploring Software Naturalness throughNeural Language Models
Figure 4 for Exploring Software Naturalness throughNeural Language Models
Viaarxiv icon

Learning to map source code to software vulnerability using code-as-a-graph

Add code
Bookmark button
Alert button
Jun 15, 2020
Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Laredo, Alessandro Morari

Figure 1 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 2 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 3 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 4 for Learning to map source code to software vulnerability using code-as-a-graph
Viaarxiv icon