Cited By
View all- Yan SWang SDuan YHong HLee KKim DHong YBalzarotti DXu W(2024)An LLM-assisted easy-to-trigger backdoor attack on code completion modelsProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699001(1795-1812)Online publication date: 14-Aug-2024
- Liu YYin YDeng JLi WPeng Z(2024)A Combinatorial Strategy for API Completion: Deep Learning and HeuristicsElectronics10.3390/electronics1318366913:18(3669)Online publication date: 15-Sep-2024
- Kamran PDevanbu PStanford CFilkov VRay BZhou M(2024)Vision Paper: Proof-Carrying Code CompletionsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops10.1145/3691621.3694932(35-42)Online publication date: 27-Oct-2024
- Show More Cited By