Xin Peng
YOU?
Author Swipe
View article: Framework-Aware Code Generation with API Knowledge Graph-Constructed Data: A Study on HarmonyOS
Framework-Aware Code Generation with API Knowledge Graph-Constructed Data: A Study on HarmonyOS Open
In the context of software frameworks with limited resources (such as HarmonyOS), large language models (LLMs) often exhibit poor code generation performance because they lack sufficient exposure to such environments during pre-training. A…
View article: EvoDev: An Iterative Feature-Driven Framework for End-to-End Software Development with LLM-based Agents
EvoDev: An Iterative Feature-Driven Framework for End-to-End Software Development with LLM-based Agents Open
Recent advances in large language model agents offer the promise of automating end-to-end software development from natural language requirements. However, existing approaches largely adopt linear, waterfall-style pipelines, which oversimp…
View article: Rapid ranking of thermal safety realized by accelerating rate calorimetry correlating with small-scale slow cook-off: A case study of four melt-castable explosives
Rapid ranking of thermal safety realized by accelerating rate calorimetry correlating with small-scale slow cook-off: A case study of four melt-castable explosives Open
View article: Code Digital Twin: Empowering LLMs with Tacit Knowledge for Complex Software Development
Code Digital Twin: Empowering LLMs with Tacit Knowledge for Complex Software Development Open
Recent advances in large language models (LLMs) have demonstrated strong capabilities in software engineering tasks, raising expectations of revolutionary productivity gains. However, enterprise software development is largely driven by in…
View article: TigAug: Data Augmentation for Testing Traffic Light Detection in Autonomous Driving Systems
TigAug: Data Augmentation for Testing Traffic Light Detection in Autonomous Driving Systems Open
Autonomous vehicle technology has been developed in the last decades with recent advances in sensing and computing technology. There is an urgent need to ensure the reliability and robustness of autonomous driving systems (ADSs). Despite t…
View article: Structure-Aware, Diagnosis-Guided ECU Firmware Fuzzing
Structure-Aware, Diagnosis-Guided ECU Firmware Fuzzing Open
Electronic Control Units (ECUs), providing a wide range of functions from basic control functions to safety-critical functions, play a critical role in modern vehicles. Fuzzing has emerged as an effective approach to ensure the functional …
View article: RouthSearch: Inferring PID Parameter Specification for Flight Control Program by Coordinate Search
RouthSearch: Inferring PID Parameter Specification for Flight Control Program by Coordinate Search Open
Flight control programs are widely used in unmanned aerial vehicles (UAVs) to manage and maintain UAVs’ flying behaviors dynamically. These flight control programs include a PID control module that takes three user-configurable PID paramet…
View article: Recurring Vulnerability Detection: How Far Are We?
Recurring Vulnerability Detection: How Far Are We? Open
With the rapid development of open-source software, code reuse has become a common practice to accelerate development. However, it leads to inheritance from the original vulnerability, which recurs at the reusing projects, known as recurri…
View article: EnvGuard: Guaranteeing Environment-Centric Safety and Security Properties in Web of Things System
EnvGuard: Guaranteeing Environment-Centric Safety and Security Properties in Web of Things System Open
View article: Mystique: Automated Vulnerability Patch Porting with Semantic and Syntactic-Enhanced LLM
Mystique: Automated Vulnerability Patch Porting with Semantic and Syntactic-Enhanced LLM Open
Branching repositories facilitates efficient software development but can also inadvertently propagate vulnerabilities. When an original branch is patched, other unfixed branches remain vulnerable unless the patch is successfully ported. H…
View article: Detecting and Handling WoT Violations by Learning Physical Interactions from Device Logs
Detecting and Handling WoT Violations by Learning Physical Interactions from Device Logs Open
The Web of Things (WoT) system standardizes the integration of ubiquitous IoT devices in physical environments, enabling various software applications to automatically sense and regulate the physical environment. While providing convenienc…
View article: Towards Better Code Generation: Adaptive Decoding with Uncertainty Guidance
Towards Better Code Generation: Adaptive Decoding with Uncertainty Guidance Open
Code generation with large language models (LLMs) is highly sensitive to token selection during decoding, particularly at decision points where uncertainty strongly affects program correctness. Conventional strategies such as greedy decodi…
View article: Benchmarking and Enhancing LLM Agents in Localizing Linux Kernel Bugs
Benchmarking and Enhancing LLM Agents in Localizing Linux Kernel Bugs Open
The Linux kernel is a critical system, serving as the foundation for numerous systems. Bugs in the Linux kernel can cause serious consequences, affecting billions of users. Fault localization (FL), which aims at identifying the buggy code …
View article: Code Copycat Conundrum: Demystifying Repetition in LLM-based Code Generation
Code Copycat Conundrum: Demystifying Repetition in LLM-based Code Generation Open
Despite recent advances in Large Language Models (LLMs) for code generation, the quality of LLM-generated code still faces significant challenges. One significant issue is code repetition, which refers to the model's tendency to generate s…
View article: Ginsenoside Rg1 alleviates ochratoxin A-induced liver inflammation in ducklings: Involvement of intestinal microbiota modulation and the TLR4/NF-κB pathway inhibition
Ginsenoside Rg1 alleviates ochratoxin A-induced liver inflammation in ducklings: Involvement of intestinal microbiota modulation and the TLR4/NF-κB pathway inhibition Open
View article: LogiAgent: Automated Logical Testing for REST Systems with LLM-Based Multi-Agents
LogiAgent: Automated Logical Testing for REST Systems with LLM-Based Multi-Agents Open
Automated testing for REST APIs has become essential for ensuring the correctness and reliability of modern web services. While existing approaches primarily focus on detecting server crashes and error codes, they often overlook logical is…
View article: Code Digital Twin: Empowering LLMs with Tacit Knowledge for Complex Software Development
Code Digital Twin: Empowering LLMs with Tacit Knowledge for Complex Software Development Open
Recent advances in large language models (LLMs) have demonstrated strong capabilities in software engineering tasks, raising expectations of revolutionary productivity gains. However, enterprise software development is largely driven by in…
View article: A Survey of Fuzzing Open-Source Operating Systems
A Survey of Fuzzing Open-Source Operating Systems Open
Vulnerabilities in open-source operating systems (OSs) pose substantial security risks to software systems, making their detection crucial. While fuzzing has been an effective vulnerability detection technique in various domains, OS fuzzin…
View article: Deep learning-based prediction of autoimmune diseases
Deep learning-based prediction of autoimmune diseases Open
Autoimmune Diseases are a complex group of diseases caused by the immune system mistakenly attacking body tissues. Their etiology involves multiple factors such as genetics, environmental factors, and abnormalities in immune cells, making …
View article: The Impact of Intelligent Delivery Systems and Automated Rail Logistics on the Efficiency and Safety of Clinical Item Transportation: A Observational Studies
The Impact of Intelligent Delivery Systems and Automated Rail Logistics on the Efficiency and Safety of Clinical Item Transportation: A Observational Studies Open
This paper aims to establish an intelligent delivery system integrated with track logistics and explores its impact on the clinical transportation of goods. The study analyzed hospital delivery items before and after the implementation of …
View article: Application Research of FPGA-DSP Architecture in Ship Radar Signal Processing
Application Research of FPGA-DSP Architecture in Ship Radar Signal Processing Open
In view of the continuous improvement of maritime safety requirements, the demand for maritime radar signal processing system is increasing day by day. A ship radar Signal processing system based on Field-Programmable Gate Array (FPGA) and…
View article: VMud: Detecting Recurring Vulnerabilities with Multiple Fixing Functions via Function Selection and Semantic Equivalent Statement Matching
VMud: Detecting Recurring Vulnerabilities with Multiple Fixing Functions via Function Selection and Semantic Equivalent Statement Matching Open
View article: Killing Two Birds with One Stone: Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence
Killing Two Birds with One Stone: Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence Open
Open source software (OSS) supply chain enlarges the attack surface of a software system, which makes package registries attractive targets for attacks. Recently, multiple package registries have received intensified attacks with malicious…
View article: Semantic Alignment-Enhanced Code Translation via an LLM-Based Multi-Agent System
Semantic Alignment-Enhanced Code Translation via an LLM-Based Multi-Agent System Open
Code translation converts code from one programming language to another while maintaining its original functionality, which is crucial for software migration, system refactoring, and cross-platform development. Traditional rule-based metho…
View article: Large Language Model-Based Agents for Software Engineering: A Survey
Large Language Model-Based Agents for Software Engineering: A Survey Open
The recent advance in Large Language Models (LLMs) has shaped a new paradigm of AI agents, i.e., LLM-based agents. Compared to standalone LLMs, LLM-based agents substantially extend the versatility and expertise of LLMs by enhancing LLMs w…
View article: Evaluating and Improving ChatGPT for Unit Test Generation
Evaluating and Improving ChatGPT for Unit Test Generation Open
Unit testing plays an essential role in detecting bugs in functionally-discrete program units (e.g., methods). Manually writing high-quality unit tests is time-consuming and laborious. Although the traditional techniques are able to genera…
View article: Embryo injected with Ochratoxin A induced jejunum injury in ducklings by activating the TLR4 signaling pathway: Involvement of intestinal microbiota
Embryo injected with Ochratoxin A induced jejunum injury in ducklings by activating the TLR4 signaling pathway: Involvement of intestinal microbiota Open
Ochratoxin A (OTA) is a common mycotoxin that causes intestinal injury in humans and various animal species. OTA may lead to intestinal injury in offspring due to the maternal effect. The aim of this study was to investigate the mechanism …
View article: Vul-RAG: Enhancing LLM-based Vulnerability Detection via Knowledge-level RAG
Vul-RAG: Enhancing LLM-based Vulnerability Detection via Knowledge-level RAG Open
Although LLMs have shown promising potential in vulnerability detection, this study reveals their limitations in distinguishing between vulnerable and similar-but-benign patched code (only 0.06 - 0.14 accuracy). It shows that LLMs struggle…
View article: LLMs Meet Library Evolution: Evaluating Deprecated API Usage in LLM-based Code Completion
LLMs Meet Library Evolution: Evaluating Deprecated API Usage in LLM-based Code Completion Open
Large language models (LLMs), pre-trained or fine-tuned on large code corpora, have shown effectiveness in generating code completions. However, in LLM-based code completion, LLMs may struggle to use correct and up-to-date Application Prog…
View article: A general approach to enhance the survivability of backdoor attacks by decision path coupling
A general approach to enhance the survivability of backdoor attacks by decision path coupling Open
Backdoor attacks have been one of the emerging security threats to deep neural networks (DNNs), leading to serious consequences. One of the mainstream backdoor defenses is model reconstruction-based. Such defenses adopt model unlearning or…