A Code Clone Oracle DE Krutz, W Le 11th Working Conference on Mining Software Repositories, 388-391, 2014 | 30 | 2014 |
A Comparison of Energy Bugs for Smartphone Platforms J Zhang, A Musa, W Le 1st International Workshop on the Engineering of Mobile-Enabled Systems, 25-30, 2013 | 45 | 2013 |
A Comprehensive Study of the Capabilities of Large Language Models for Vulnerability Detection B Steenhoek, MM Rahman, MK Roy, MS Alam, ET Barr, W Le arXiv preprint arXiv:2403.17218, 2024 | 3 | 2024 |
A path-based framework for automatically identifying multiple types of software faults W Le, ML Soffa review, 2011 | 1 | 2011 |
A Study of Static Warning Cascading Tools (Experience Paper) X Guo, AK Joshy, B Steenhoek, W Le, L Flynn arXiv preprint arXiv:2305.02515, 2023 | | 2023 |
ActiveClean: Generating Line-Level Vulnerability Data via Active Learning A Kallingal Joshy, M Sanjida Alam, S Sharmin, Q Li, W Le arXiv e-prints, arXiv: 2312.01588, 2023 | | 2023 |
ActiveClean: Generating Line-Level Vulnerability Data via Active Learning AK Joshy, MS Alam, S Sharmin, Q Li, W Le arXiv preprint arXiv:2312.01588, 2023 | | 2023 |
An effective data-driven approach for localizing deep learning faults M Wardat, BD Cruz, W Le, H Rajan arXiv preprint arXiv:2307.08947, 2023 | 3 | 2023 |
An empirical study of deep learning models for vulnerability detection B Steenhoek, MM Rahman, R Jiles, W Le 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023 | 38 | 2023 |
An empirical study of deep learning models for vulnerability detection. In 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE) B Steenhoek, MM Rahman, R Jiles, W Le Los Alamitos, CA, USA, may, 2237-2248, 2023 | 9 | 2023 |
An improved (adversarial) reprogramming technique for neural networks E Kloberdanz, J Tian, W Le Artificial Neural Networks and Machine Learning–ICANN 2021: 30th …, 2021 | 10 | 2021 |
Automatic loop summarization via path dependency analysis X Xie, B Chen, L Zou, Y Liu, W Le, X Li IEEE Transactions on Software Engineering 45 (6), 537-557, 2017 | 33 | 2017 |
Beryllium: Neural Search for Algorithm Implementations A Kulkarni, M Chakraborty, Y Sium, SC Valluri, W Le, Q Li arXiv preprint arXiv:2305.15690, 2023 | | 2023 |
Block-Level Stiffness Analysis of Residual Networks E Kloberdanz, W Le International Conference on Artificial Neural Networks, 61-73, 2023 | | 2023 |
Comparing Privacy Control Methods for Smartphone Platforms M Alhamed, K Amir, M Omari, W Le 1st International Workshop on the Engineering of Mobile-Enabled Systems, 36-41, 2013 | 16 | 2013 |
Dataflow analysis-inspired deep learning for efficient vulnerability detection B Steenhoek, H Gao, W Le Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024 | 8 | 2024 |
DeepDFA: Dataflow Analysis-Guided Efficient Graph Learning for Vulnerability Detection B Steenhoek, W Le, H Gao | 2 | 2022 |
Deepdiagnosis: automatically diagnosing faults and recommending actionable fixes in deep learning programs M Wardat, BD Cruz, W Le, H Rajan Proceedings of the 44th international conference on software engineering …, 2022 | 33 | 2022 |
Deeplocalize: Fault localization for deep neural networks M Wardat, W Le, H Rajan 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 71 | 2021 |
DeepStability: A study of unstable numerical methods and their solutions in deep learning E Kloberdanz, KG Kloberdanz, W Le Proceedings of the 44th International Conference on Software Engineering …, 2022 | 10 | 2022 |