Cited By
View all- Wu YWen MYu ZGuo XJin HFilkov VRay BZhou M(2024)Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language ModelsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695013(393-405)Online publication date: 27-Oct-2024
- Song XWu YLiu SChen BLin YPeng XChristakis MPradel M(2024)C2D2: Extracting Critical Changes for Real-World Bugs with Dependency-Sensitive Delta DebuggingProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3652129(300-312)Online publication date: 11-Sep-2024
- Li XZhang ZQian ZJaeger TSong CSpinellis DConstantinou EBacchelli A(2024)An Investigation of Patch Porting Practices of the Linux Kernel EcosystemProceedings of the 21st International Conference on Mining Software Repositories10.1145/3643991.3644902(63-74)Online publication date: 15-Apr-2024
- Show More Cited By