Cited By
View all- Wu YWen MYu ZGuo XJin HFilkov VRay BZhou M(2024)Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language ModelsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695013(393-405)Online publication date: 27-Oct-2024
- Liu JLiu SChen JDig DBryksin TGolubev YBezzubov A(2024)I3DE: An IDE for Inspecting Inconsistencies in PL/SQL CodeProceedings of the 1st ACM/IEEE Workshop on Integrated Development Environments10.1145/3643796.3648461(74-75)Online publication date: 20-Apr-2024
- Malcher PViana DAntonino Pdos Santos R(2024)Investigating user feedback from a crowd in requirements management in software ecosystemsEmpirical Software Engineering10.1007/s10664-024-10546-529:6Online publication date: 23-Sep-2024
- Show More Cited By