An empirical investigation of missing data handling in cloud node failure prediction
- Ma, Minghua, Liu, Yudong, Rajmohan, Saravanakumar, Lin, Qingwei, Tong, Yuang, Li, Haozhe, Zhao, Pu, Xu, Yong, Zhang, Hongyu, He, Shilin, Wang, Lu, Dang, Yingnong
Cross-Domain Deep Code Search with Meta Learning
- Chai, Yitian, Zhang, Hongyu, Shen, Beijun, Gu, Xiaodong
Cross-Language Binary-Source Code Matching with Intermediate Representations
- Gui, Yi, Wan, Yao, Zhang, Hongyu, Huang, Huifang, Sui, Yulei, Xu, Guandong, Shao, Zhiyuan, Jin, Hai
Diet code is healthy: simplifying programs for pre-trained models of code
- Zhang, Zhaowei, Zhang, Hongyu, Shen, Beijun, Gu, Xiaodong
DreamLoc: A Deep Relevance Matching-Based Framework for bug Localization
- Qi, Binhang, Sun, Hailong, Yuan, Wei, Zhang, Hongyu, Meng, Xiangxin
Exploring Representation-Level Augmentation for Code Search
- Li, Haochen, Miao, Chunyan, Leung, Cyril, Huang, Yanxian, Huang, Yuan, Zhang, Hongyu, Wang, Yanlin
HELoC: Hierarchical Contrastive Learning of Source Code Representation
- Wang, Xiao, Wu, Qiong, Zhang, Hongyu, Lyu, Chen, Jiang, Xue, Zheng, Zhuoran, Lyu, Lei, Hu, Songlin
- Meng, Xiangxin, Wang, Xu, Zhang, Hongyu, Sun, Hailong, Liu, Xudong
LibDB: An Effective and Efficient Framework for Detecting Third-Party Libraries in Binaries
- Tang, Wei, Wang, Yanlin, Zhang, Hongyu, Han, Shi, Luo, Ping, Zhang, Dongmei
Log-based Anomaly Detection with Deep Learning: How Far Are We?
- Le, Van-Hoang, Zhang, Hongyu
LogGD: Detecting Anomalies from System Logs with Graph Neural Networks
- Xie, Yongzheng, Zhang, Hongyu, Babar, Muhammad Ali
Multi-task Hierarchical Classification for Disk Failure Prediction in Online Service Systems
- Liu, Yudong, Yang, Hailan, Zhang, Chenjian, Wang, Paul, Dang, Yingnong, Rajmohan, Saravan, Zhang, Dongmei, Zhao, Pu, Ma, Minghua, Wen, Chengwu, Zhang, Hongyu, Luo, Chuan, Lin, Qingwei, Yi, Chang, Wang, Jiaojian
NaturalCC: An Open-Source Toolkit for Code Intelligence
- Wan, Yao, He, Yang, Yu, Philip S., Bi, Zhangqian, Zhang, Jianguo, Sui, Yulei, Zhang, Hongyu, Hashimoto, Kazuma, Jin, Hai, Xu, Guandong, Xiong, Caiming
NENYA: Cascade Reinforcement Learning for Cost-Aware Failure Mitigation at Microsoft 365
- Wang, Lu, Zhao, Pu, Zhang, Hongyu, Rajmohan, Saravan, Zhang, Dongmei, Du, Chao, Luo, Chuan, Su, Mengna, Yang, Fangkai, Liu, Yudong, Lin, Qingwei, Wang, Min, Dang, Yingnong
No more fine-tuning? an experimental evaluation of prompt tuning in code intelligence
- Wang, Chaozheng, Yang, Yuanhang, Gao, Cuiyun, Peng, Yun, Zhang, Hongyu, Lyu, Michael R.
On the Evaluation of Neural Code Summarization
- Shi, Ensheng, Wang, Yanlin, Du, Lun, Chen, Junjie, Han, Shi, Zhang, Hongyu, Zhang, Dongmei, Sun, Hongbin
Patching Weak Convolutional Neural Network Models through Modularization and Composition
- Qi, Binhang, Sun, Hailong, Gao, Xiang, Zhang, Hongyu
RACE: Retrieval-Augmented Commit Message Generation
- Shi, Ensheng, Wang, Yanlin, Tao, Wei, Du, Lun, Zhang, Hongyu, Han, Shi, Zhang, Dongmei, Sun, Hongbin
REFTY: Refinement Types for Valid Deep Learning Models
- Gao, Yanjie, Li, Zhengxian, Lin, Haoxiang, Zhang, Hongyu, Wu, Ming, Yang, Mao
- Luo, Chuan, Zhao, Qiyuan, Cai, Shaowei, Zhang, Hongyu, Hu, Chunming
Are you sure you would like to clear your session, including search history and login status?