Cited By
View all- Tihanyi NBisztray TFerrag MJain RCordeiro L(2025)How secure is AI-generated code: a large-scale comparison of large language modelsEmpirical Software Engineering10.1007/s10664-024-10590-130:2Online publication date: 1-Mar-2025
- Cheng ZWu TSchrammel PTihanyi Nde Lima Filho ECordeiro LChristakis MPradel M(2024)JCWIT: A Correctness-Witness Validator for Java Programs Based on Bounded Model CheckingProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3685303(1831-1835)Online publication date: 11-Sep-2024
- Sondoqah MBen Abdesslem FPopova KMcgregor MLa Delfa JGarrett RLampinen AMottola LHöök K(2024)Shaping and Being Shaped by Drones: Programming in Perception-Action LoopsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661636(2926-2945)Online publication date: 1-Jul-2024
- Show More Cited By