Picture for Yunhui Zheng

Yunhui Zheng

VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements

Add code
Jan 13, 2022
Figure 1 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 2 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 3 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 4 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Viaarxiv icon

Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection

Add code
Nov 10, 2021
Figure 1 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 2 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 3 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 4 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Viaarxiv icon

D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis

Add code
Feb 16, 2021
Figure 1 for D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis
Figure 2 for D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis
Figure 3 for D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis
Figure 4 for D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis
Viaarxiv icon

Probing Model Signal-Awareness via Prediction-Preserving Input Minimization

Add code
Nov 25, 2020
Figure 1 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 2 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 3 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 4 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Viaarxiv icon

Exploring Software Naturalness through Neural Language Models

Add code
Jun 24, 2020
Figure 1 for Exploring Software Naturalness through Neural Language Models
Figure 2 for Exploring Software Naturalness through Neural Language Models
Figure 3 for Exploring Software Naturalness through Neural Language Models
Figure 4 for Exploring Software Naturalness through Neural Language Models
Viaarxiv icon

Learning to map source code to software vulnerability using code-as-a-graph

Add code
Jun 15, 2020
Figure 1 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 2 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 3 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 4 for Learning to map source code to software vulnerability using code-as-a-graph
Viaarxiv icon

GaDei: On Scale-up Training As A Service For Deep Learning

Add code
Oct 03, 2017
Figure 1 for GaDei: On Scale-up Training As A Service For Deep Learning
Figure 2 for GaDei: On Scale-up Training As A Service For Deep Learning
Figure 3 for GaDei: On Scale-up Training As A Service For Deep Learning
Figure 4 for GaDei: On Scale-up Training As A Service For Deep Learning
Viaarxiv icon