Author of the publication

A Systematic Literature Review on Explainability for Machine/Deep Learning-based Software Engineering Research.

, , , , , , , , , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GrasP: Graph-to-Sequence Learning for Automated Program Repair., , , , , and . QRS, page 819-828. IEEE, (2021)Large Language Model for Vulnerability Detection and Repair: Literature Review and the Road Ahead., , , and . CoRR, (2024)SPVF: security property assisted vulnerability fixing via attention-based models., , , , , , , and . Empir. Softw. Eng., 27 (7): 171 (2022)BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection., , , , and . Inf. Softw. Technol., (2021)MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks., , , , , and . ICSE, page 1456-1468. ACM, (2022)Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection Systems., , , , , , and . ICSE, page 155:1-155:13. ACM, (2024)ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing., , , , , , , , , and 2 other author(s). SP, page 2726-2743. IEEE, (2023)Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation., , , , , , , , , and . ICSE, page 397-409. IEEE, (2023)Learning to Detect Memory-related Vulnerabilities., , , , , , , , and . ACM Trans. Softw. Eng. Methodol., 33 (2): 43:1-43:35 (February 2024)A comprehensive study on security bug characteristics., , , , , and . J. Softw. Evol. Process., (2021)