Cited By
View all- Li YNguyen TWang SYadavally ARoychoudhury APaiva AAbreu RStorey M(2024)Poirot: Deep Learning for API Misuse DetectionProceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings10.1145/3639478.3643080(302-303)Online publication date: 14-Apr-2024
- Kang HWang KKim MRoychoudhury APaiva AAbreu RStorey M(2024)Scaling Code Pattern Inference with Interactive What-If AnalysisProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3639193(1-12)Online publication date: 20-May-2024
- Ren XYe XXing ZXia XXu XZhu LSun JGrundy JLe Goues CLo D(2020)API-misuse detection driven by fine-grained API-constraint knowledge graphProceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering10.1145/3324884.3416551(461-472)Online publication date: 21-Dec-2020
- Show More Cited By