Accepted
Back to the Basics: Rethinking Issue-Commit Linking with LLM-Assisted Retrieval
48th IEEE/ACM International Conference on Software Engineering (ICSE 2026)
Link
48th IEEE/ACM International Conference on Software Engineering (ICSE 2026)
Link
Vercation: Precise Vulnerable Open-source Software Versions Identification based on Static Analysis and LLM
IEEE Transactions on Software Engineering
Link
IEEE Transactions on Software Engineering
Link
Received Major Revision
Revisiting Vulnerability Patch Identification
on Data in the Wild
ACM Transactions on Software Engineering and Methodology
Link
ACM Transactions on Software Engineering and Methodology
Link
CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics
ACM Transactions on Software Engineering and Methodology
Link
ACM Transactions on Software Engineering and Methodology
Link
Mapping NVD Records to their VFCs: How Hard is it?
ACM Transactions on Software Engineering and Methodology
Link
ACM Transactions on Software Engineering and Methodology
Link
Beyond ChatGPT: Enhancing Software Quality Assurance Tasks with Diverse LLMs and Validation Techniques
ACM Transactions on Software Engineering and Methodology
Link
ACM Transactions on Software Engineering and Methodology
Link
Fixseeker: An Empirical Driven Graph-based Approach for Detecting Silent Vulnerability Fixes in Open Source Software
ACM Transactions on Software Engineering and Methodology
Link
ACM Transactions on Software Engineering and Methodology
Link
Submitted
Benchmarking Large Language Models for Multi-Language Software Vulnerability Detection
Link
Link
VulCoCo: A Simple Yet Effective Method for Detecting Vulnerable Code Clones
Link
Link
R2Vul: Learning to Reason about Software Vulnerabilities with Reinforcement Learning and Structured Reasoning Distillation
Link
Link
Let the Trial Begin: A Mock-Court Approach to Vulnerability Detection using LLM-Based Agents
Link
Link
PatchSeeker: Mapping NVD Records to their Vulnerability-fixing
Commits with LLM Generated Commits and Embeddings
Link
Link
Out of Distribution, Out of Luck: How Well Can LLMs Trained on Vulnerability Datasets Detect Top 25 CWE Weaknesses?
Link
Link