Cited By
View all- Mousavi ZIslam CMoore KAbuadbba ABabar MQuek TGao DZhou JCardenas A(2024)An Investigation into Misuse of Java Security APIs by Large Language ModelsProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3661134(1299-1315)Online publication date: 1-Jul-2024
- Yu ZMartinez MChen ZBissyandé TMonperrus M(2023)Learning the Relation Between Code Features and Code Transforms With Structured PredictionIEEE Transactions on Software Engineering10.1109/TSE.2023.327538049:7(3872-3900)Online publication date: 1-Jul-2023
- Zhang YKabir MXiao YYao DMeng N(2023)Automatic Detection of Java Cryptographic API Misuses: Are We There Yet?IEEE Transactions on Software Engineering10.1109/TSE.2022.315030249:1(288-303)Online publication date: 1-Jan-2023
- Show More Cited By