Chrome Extension
WeChat Mini Program
Use on ChatGLM

Out of Sight, out of Mind: Better Automatic Vulnerability Repair by Broadening Input Ranges and Sources

ICSE '24 Proceedings of the IEEE/ACM 46th International Conference on Software Engineering(2024)

Cited 1|Views8
Key words
Expert Knowledge,Security Vulnerabilities,Coding Structure,Vulnerability Functions,Validation Set,Source Code,Example Of Analysis,Learning-based Approaches,Evaluation Dataset,Multi-task Learning,Expert Analysis,Relevant Codes,Code Examples,Input Length,Repair Model,Backbone Model,Code Snippets,Sequence Of Tokens,Relevant Pairs,Contextual Embedding,Tokenized,Open Source Software Projects,Special Token,Types Of Vulnerabilities,Transformer Model,Code Changes,Entire Function,Limited Length,Exact Match
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined