Picture for Yves Le Traon

Yves Le Traon

SnT, CSC

An Empirical Study of the Imbalance Issue in Software Vulnerability Detection

Add code
Feb 12, 2026
Viaarxiv icon

When Prompts Go Wrong: Evaluating Code Model Robustness to Ambiguous, Contradictory, and Incomplete Task Descriptions

Add code
Jul 27, 2025
Figure 1 for When Prompts Go Wrong: Evaluating Code Model Robustness to Ambiguous, Contradictory, and Incomplete Task Descriptions
Figure 2 for When Prompts Go Wrong: Evaluating Code Model Robustness to Ambiguous, Contradictory, and Incomplete Task Descriptions
Figure 3 for When Prompts Go Wrong: Evaluating Code Model Robustness to Ambiguous, Contradictory, and Incomplete Task Descriptions
Figure 4 for When Prompts Go Wrong: Evaluating Code Model Robustness to Ambiguous, Contradictory, and Incomplete Task Descriptions
Viaarxiv icon

Leveraging External Factors in Household-Level Electrical Consumption Forecasting using Hypernetworks

Add code
Jun 17, 2025
Figure 1 for Leveraging External Factors in Household-Level Electrical Consumption Forecasting using Hypernetworks
Figure 2 for Leveraging External Factors in Household-Level Electrical Consumption Forecasting using Hypernetworks
Figure 3 for Leveraging External Factors in Household-Level Electrical Consumption Forecasting using Hypernetworks
Figure 4 for Leveraging External Factors in Household-Level Electrical Consumption Forecasting using Hypernetworks
Viaarxiv icon

HInter: Exposing Hidden Intersectional Bias in Large Language Models

Add code
Mar 15, 2025
Viaarxiv icon

Robustness Analysis of AI Models in Critical Energy Systems

Add code
Jun 20, 2024
Figure 1 for Robustness Analysis of AI Models in Critical Energy Systems
Figure 2 for Robustness Analysis of AI Models in Critical Energy Systems
Figure 3 for Robustness Analysis of AI Models in Critical Energy Systems
Figure 4 for Robustness Analysis of AI Models in Critical Energy Systems
Viaarxiv icon

Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data

Add code
Nov 08, 2023
Figure 1 for Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data
Figure 2 for Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data
Figure 3 for Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data
Figure 4 for Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data
Viaarxiv icon

Evaluating the Robustness of Test Selection Methods for Deep Neural Networks

Add code
Jul 29, 2023
Viaarxiv icon

CodeLens: An Interactive Tool for Visualizing Code Representations

Add code
Jul 27, 2023
Viaarxiv icon

RNNS: Representation Nearest Neighbor Search Black-Box Attack on Code Models

Add code
May 20, 2023
Viaarxiv icon

Distribution-aware Fairness Test Generation

Add code
May 08, 2023
Figure 1 for Distribution-aware Fairness Test Generation
Figure 2 for Distribution-aware Fairness Test Generation
Figure 3 for Distribution-aware Fairness Test Generation
Figure 4 for Distribution-aware Fairness Test Generation
Viaarxiv icon