Wen-Hao Chiang
YOU?
Author Swipe
View article: A Deep Dive into Large Language Models for Automated Bug Localization and Repair
A Deep Dive into Large Language Models for Automated Bug Localization and Repair Open
Large language models (LLMs) have shown impressive effectiveness in various software engineering tasks, including automated program repair (APR). In this study, we take a deep dive into automated bug fixing utilizing LLMs. In contrast to m…
View article: Inference for Ever-Changing Policy of Taint Analysis
Inference for Ever-Changing Policy of Taint Analysis Open
Identifying correct and complete taint specifications is critical for detecting vulnerabilities in the ever-changing landscape of software security, and an automated scalable and practical solution remains elusive in the field. In this pap…
View article: Hawkes process modeling of COVID-19 with mobility leading indicators and spatial covariates
Hawkes process modeling of COVID-19 with mobility leading indicators and spatial covariates Open
Hawkes processes are used in statistical modeling for event clustering and causal inference, while they also can be viewed as stochastic versions of popular compartmental models used in epidemiology. Here we show how to develop accurate mo…
View article: Hawkes process modeling of COVID-19 with mobility leading indicators and spatial covariates
Hawkes process modeling of COVID-19 with mobility leading indicators and spatial covariates Open
Hawkes processes are used in machine learning for event clustering and causal inference, while they also can be viewed as stochastic versions of popular compartmental models used in epidemiology. Here we show how to develop accurate models…
View article: Hawkes Process Multi-armed Bandits for Disaster Search and Rescue
Hawkes Process Multi-armed Bandits for Disaster Search and Rescue Open
We propose a novel framework for integrating Hawkes processes with multi-armed bandit algorithms to solve spatio-temporal event forecasting and detection problems when data may be undersampled or spatially biased. In particular, we introdu…
View article: Drug-drug interaction prediction based on co-medication patterns and graph matching
Drug-drug interaction prediction based on co-medication patterns and graph matching Open
Background: The problem of predicting whether a drug combination of arbitrary orders is likely to induce adverse drug reactions is considered in this manuscript. Methods: Novel kernels over drug combinations of arbitrary orders are develop…
View article: Computational Drug Recommendation Approaches toward Safe Polypharmacy
Computational Drug Recommendation Approaches toward Safe Polypharmacy Open
Adverse drug reactions (ADRs) induced from high-order drug-drug interactions (DDIs) due to polypharmacy - simultaneous use of multiple drugs - represent a significant public health problem. Unfortunately, computational efforts to facilitat…
View article: Multi-armed bandit problem on rescue resource allocation
Multi-armed bandit problem on rescue resource allocation Open
Natural disasters have been posed a significant threat in many areas of the United States. Many catastrophic ones had taken the lives of millions of people throughout history and caused severe negative economic damages. For example, known …
View article: Pattern Discovery from High-Order Drug-Drug Interaction Relations
Pattern Discovery from High-Order Drug-Drug Interaction Relations Open
View article: Drug Recommendation toward Safe Polypharmacy
Drug Recommendation toward Safe Polypharmacy Open
Adverse drug reactions (ADRs) induced from high-order drug-drug interactions (DDIs) due to polypharmacy represent a significant public health problem. In this paper, we formally formulate the to-avoid and safe (with respect to ADRs) drug r…