Picture for Xin Peng

Xin Peng

Code Copycat Conundrum: Demystifying Repetition in LLM-based Code Generation

Add code
Apr 17, 2025
Viaarxiv icon

The Composite Visual-Laser Navigation Method Applied in Indoor Poultry Farming Environments

Add code
Apr 11, 2025
Viaarxiv icon

RoadGen: Generating Road Scenarios for Autonomous Vehicle Testing

Add code
Nov 29, 2024
Figure 1 for RoadGen: Generating Road Scenarios for Autonomous Vehicle Testing
Figure 2 for RoadGen: Generating Road Scenarios for Autonomous Vehicle Testing
Figure 3 for RoadGen: Generating Road Scenarios for Autonomous Vehicle Testing
Figure 4 for RoadGen: Generating Road Scenarios for Autonomous Vehicle Testing
Viaarxiv icon

AdvFuzz: Finding More Violations Caused by the EGO Vehicle in Simulation Testing by Adversarial NPC Vehicles

Add code
Nov 29, 2024
Figure 1 for AdvFuzz: Finding More Violations Caused by the EGO Vehicle in Simulation Testing by Adversarial NPC Vehicles
Figure 2 for AdvFuzz: Finding More Violations Caused by the EGO Vehicle in Simulation Testing by Adversarial NPC Vehicles
Figure 3 for AdvFuzz: Finding More Violations Caused by the EGO Vehicle in Simulation Testing by Adversarial NPC Vehicles
Figure 4 for AdvFuzz: Finding More Violations Caused by the EGO Vehicle in Simulation Testing by Adversarial NPC Vehicles
Viaarxiv icon

TRANSAGENT: An LLM-Based Multi-Agent System for Code Translation

Add code
Sep 30, 2024
Viaarxiv icon

Large Language Model-Based Agents for Software Engineering: A Survey

Add code
Sep 04, 2024
Viaarxiv icon

Flow Perturbation to Accelerate Unbiased Sampling of Boltzmann distribution

Add code
Jul 15, 2024
Viaarxiv icon

Vul-RAG: Enhancing LLM-based Vulnerability Detection via Knowledge-level RAG

Add code
Jun 17, 2024
Viaarxiv icon

Unlocking Parameter-Efficient Fine-Tuning for Low-Resource Language Translation

Add code
Apr 05, 2024
Viaarxiv icon

A general approach to enhance the survivability of backdoor attacks by decision path coupling

Add code
Mar 05, 2024
Figure 1 for A general approach to enhance the survivability of backdoor attacks by decision path coupling
Figure 2 for A general approach to enhance the survivability of backdoor attacks by decision path coupling
Figure 3 for A general approach to enhance the survivability of backdoor attacks by decision path coupling
Figure 4 for A general approach to enhance the survivability of backdoor attacks by decision path coupling
Viaarxiv icon