Picture for Sahil Suneja

Sahil Suneja

Accelerating Production LLMs with Combined Token/Embedding Speculators

Add code
Apr 29, 2024
Viaarxiv icon

Automated Code generation for Information Technology Tasks in YAML through Large Language Models

Add code
May 05, 2023
Figure 1 for Automated Code generation for Information Technology Tasks in YAML through Large Language Models
Figure 2 for Automated Code generation for Information Technology Tasks in YAML through Large Language Models
Figure 3 for Automated Code generation for Information Technology Tasks in YAML through Large Language Models
Figure 4 for Automated Code generation for Information Technology Tasks in YAML through Large Language Models
Viaarxiv icon

Study of Distractors in Neural Models of Code

Add code
Mar 03, 2023
Figure 1 for Study of Distractors in Neural Models of Code
Figure 2 for Study of Distractors in Neural Models of Code
Figure 3 for Study of Distractors in Neural Models of Code
Figure 4 for Study of Distractors in Neural Models of Code
Viaarxiv icon

VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements

Add code
Jan 13, 2022
Figure 1 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 2 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 3 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 4 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Viaarxiv icon

Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection

Add code
Nov 10, 2021
Figure 1 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 2 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 3 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 4 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Viaarxiv icon

Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation

Add code
Sep 07, 2021
Figure 1 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 2 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 3 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 4 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Viaarxiv icon

Probing Model Signal-Awareness via Prediction-Preserving Input Minimization

Add code
Nov 25, 2020
Figure 1 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 2 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 3 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 4 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Viaarxiv icon

Learning to map source code to software vulnerability using code-as-a-graph

Add code
Jun 15, 2020
Figure 1 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 2 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 3 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 4 for Learning to map source code to software vulnerability using code-as-a-graph
Viaarxiv icon