Out of Sight, out of Mind: Better Automatic Vulnerability Repair by Broadening Input Ranges and Sources
ICSE '24 Proceedings of the IEEE/ACM 46th International Conference on Software Engineering(2024)
Key words
Expert Knowledge,Security Vulnerabilities,Coding Structure,Vulnerability Functions,Validation Set,Source Code,Example Of Analysis,Learning-based Approaches,Evaluation Dataset,Multi-task Learning,Expert Analysis,Relevant Codes,Code Examples,Input Length,Repair Model,Backbone Model,Code Snippets,Sequence Of Tokens,Relevant Pairs,Contextual Embedding,Tokenized,Open Source Software Projects,Special Token,Types Of Vulnerabilities,Transformer Model,Code Changes,Entire Function,Limited Length,Exact Match
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined