default search action
Jieke Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Tim Menzies, Bowen Xu, Hong Jin Kang, Jie M. Zhang, Jiri Gesi, Sagar Sen, Beatriz Cassoli, Nicolas Jourdan, Jieke Shi, Phu Hong Nguyen, Valentina Golendukhina:
SEA4DQ 2024 Workshop Summary. ACM SIGSOFT Softw. Eng. Notes 49(4): 29-30 (2024) - [j5]Zhou Yang, Bowen Xu, Jie M. Zhang, Hong Jin Kang, Jieke Shi, Junda He, David Lo:
Stealthy Backdoor Attack for Code Models. IEEE Trans. Software Eng. 50(4): 721-741 (2024) - [c16]Zhou Yang, Zhipeng Zhao, Chenyu Wang, Jieke Shi, Dongsun Kim, DongGyun Han, David Lo:
Unveiling Memorization in Code Models. ICSE 2024: 72:1-72:13 - [c15]Jieke Shi, Zhou Yang, Hong Jin Kang, Bowen Xu, Junda He, David Lo:
Greening Large Language Models of Code. ICSE (SEIS) 2024: 142-153 - [c14]Junda He, Zhou Yang, Jieke Shi, Chengran Yang, Kisub Kim, Bowen Xu, Xin Zhou, David Lo:
Curiosity-Driven Testing for Sequential Decision-Making Process. ICSE 2024: 165:1-165:14 - [c13]Chen Gong, Zhou Yang, Yunpeng Bai, Junda He, Jieke Shi, Kecen Li, Arunesh Sinha, Bowen Xu, Xinwen Hou, David Lo, Tianhao Wang:
Baffle: Hiding Backdoors in Offline Reinforcement Learning Datasets. SP 2024: 2086-2104 - [i17]Jieke Shi, Zhou Yang, David Lo:
Efficient and Green Large Language Models for Software Engineering: Vision and the Road Ahead. CoRR abs/2404.04566 (2024) - [i16]Zhou Yang, Jieke Shi, David Lo:
Ecosystem of Large Language Models for Code. CoRR abs/2405.16746 (2024) - [i15]Jieke Shi, Zhou Yang, Junda He, Bowen Xu, Dongsun Kim, DongGyun Han, David Lo:
Finding Safety Violations of AI-Enabled Control Systems through the Lens of Synthesized Proxy Programs. CoRR abs/2410.04986 (2024) - [i14]Jieke Shi, Junda He, Zhou Yang, Dorde Zikelic, David Lo:
Synthesizing Efficient and Permissive Programmatic Runtime Shields for Neural Policies. CoRR abs/2410.05641 (2024) - 2023
- [c12]Zhou Yang, Chenyu Wang, Jieke Shi, Thong Hoang, Pavneet Singh Kochhar, Qinghua Lu, Zhenchang Xing, David Lo:
What Do Users Ask in Open-Source AI Repositories? An Empirical Study of GitHub Issues. MSR 2023: 79-91 - [i13]Zhou Yang, Bowen Xu, Jie M. Zhang, Hong Jin Kang, Jieke Shi, Junda He, David Lo:
Stealthy Backdoor Attack for Code Models. CoRR abs/2301.02496 (2023) - [i12]Zhou Yang, Jieke Shi, Muhammad Hilmi Asyrofi, Bowen Xu, Xin Zhou, DongGyun Han, David Lo:
Prioritizing Speech Test Cases. CoRR abs/2302.00330 (2023) - [i11]Zhou Yang, Chenyu Wang, Jieke Shi, Thong Hoang, Pavneet Singh Kochhar, Qinghua Lu, Zhenchang Xing, David Lo:
What Do Users Ask in Open-Source AI Repositories? An Empirical Study of GitHub Issues. CoRR abs/2303.09795 (2023) - [i10]Zhou Yang, Zhipeng Zhao, Chenyu Wang, Jieke Shi, Dongsun Kim, DongGyun Han, David Lo:
What Do Code Models Memorize? An Empirical Study on Large Language Models of Code. CoRR abs/2308.09932 (2023) - [i9]Jieke Shi, Zhou Yang, Hong Jin Kang, Bowen Xu, Junda He, David Lo:
Towards Smaller, Faster, and Greener Language Models of Code. CoRR abs/2309.04076 (2023) - [i8]Zhou Yang, Zhipeng Zhao, Chenyu Wang, Jieke Shi, Dongsun Kim, DongGyun Han, David Lo:
Gotcha! This Model Uses My Code! Evaluating Membership Leakage Risks in Code Models. CoRR abs/2310.01166 (2023) - 2022
- [c11]Chen Gong, Zhou Yang, Yunpeng Bai, Jieke Shi, Arunesh Sinha, Bowen Xu, David Lo, Xinwen Hou, Guoliang Fan:
Curiosity-Driven and Victim-Aware Adversarial Policies. ACSAC 2022: 186-200 - [c10]Zhou Yang, Jieke Shi, Junda He, David Lo:
Natural Attack for Pre-trained Models of Code. ICSE 2022: 1482-1493 - [c9]Chengran Yang, Bowen Xu, Ferdian Thung, Yucen Shi, Ting Zhang, Zhou Yang, Xin Zhou, Jieke Shi, Junda He, DongGyun Han, David Lo:
Answer Summarization for Technical Queries: Benchmark and New Approach. ASE 2022: 8:1-8:13 - [c8]Jieke Shi, Zhou Yang, Bowen Xu, Hong Jin Kang, David Lo:
Compressing Pre-trained Models of Code into 3 MB. ASE 2022: 24:1-24:12 - [c7]Ratnadira Widyasari, Stefanus Agus Haryono, Ferdian Thung, Jieke Shi, Constance Tan, Fiona Wee, Jack Phan, David Lo:
On the Influence of Biases in Bug Localization: Evaluation and Benchmark. SANER 2022: 128-139 - [c6]Zhou Yang, Jieke Shi, Muhammad Hilmi Asyrofi, David Lo:
Revisiting Neuron Coverage Metrics and Quality of Deep Neural Networks. SANER 2022: 408-419 - [c5]Jieke Shi, Zhou Yang, Junda He, Bowen Xu, David Lo:
Can Identifier Splitting Improve Open-Vocabulary Language Model of Code? SANER 2022: 1134-1138 - [i7]Zhou Yang, Jieke Shi, Muhammad Hilmi Asyrofi, David Lo:
Revisiting Neuron Coverage Metrics and Quality of Deep Neural Networks. CoRR abs/2201.00191 (2022) - [i6]Jieke Shi, Zhou Yang, Junda He, Bowen Xu, David Lo:
Can Identifier Splitting Improve Open-Vocabulary Language Model of Code? CoRR abs/2201.01988 (2022) - [i5]Zhou Yang, Jieke Shi, Junda He, David Lo:
Natural Attack for Pre-trained Models of Code. CoRR abs/2201.08698 (2022) - [i4]Jieke Shi, Zhou Yang, Bowen Xu, Hong Jin Kang, David Lo:
Compressing Pre-trained Models of Code into 3 MB. CoRR abs/2208.07120 (2022) - [i3]Chengran Yang, Bowen Xu, Ferdian Thung, Yucen Shi, Ting Zhang, Zhou Yang, Xin Zhou, Jieke Shi, Junda He, DongGyun Han, David Lo:
Answer Summarization for Technical Queries: Benchmark and New Approach. CoRR abs/2209.10868 (2022) - [i2]Chen Gong, Zhou Yang, Yunpeng Bai, Junda He, Jieke Shi, Arunesh Sinha, Bowen Xu, Xinwen Hou, Guoliang Fan, David Lo:
Mind Your Data! Hiding Backdoors in Offline Reinforcement Learning Datasets. CoRR abs/2210.04688 (2022) - 2021
- [j4]Junwu Zhu, Ling Teng, Huimin Lu, Jieke Shi, Bin Li:
Ontology negotiation: Knowledge interchange between distributed ontologies through agent negotiation. Concurr. Comput. Pract. Exp. 33(15) (2021) - [c4]Zhou Yang, Harshit Jain, Jieke Shi, Muhammad Hilmi Asyrofi, David Lo:
BiasHeal: On-the-Fly Black-Box Healing of Bias in Sentiment Analysis Systems. ICSME 2021: 644-648 - [c3]Muhammad Hilmi Asyrofi, Zhou Yang, Jieke Shi, Chu Wei Quan, David Lo:
Can Differential Testing Improve Automatic Speech Recognition Systems? ICSME 2021: 674-678 - [c2]Zhou Yang, Jieke Shi, Shaowei Wang, David Lo:
IncBL: Incremental Bug Localization. ASE 2021: 1223-1226 - [i1]Zhou Yang, Jieke Shi, Shaowei Wang, David Lo:
IncBL: Incremental Bug Localization. CoRR abs/2106.07413 (2021) - 2020
- [j3]Yi Jiang, Jinjin Wang, Jieke Shi, Junwu Zhu, Ling Teng:
Network-aware Virtual Machine Migration Based on Gene Aggregation Genetic Algorithm. Mob. Networks Appl. 25(4): 1457-1468 (2020) - [j2]Jieke Shi, Zhou Yang, Junwu Zhu:
An auction-based rescue task allocation approach for heterogeneous multi-robot system. Multim. Tools Appl. 79(21-22): 14529-14538 (2020)
2010 – 2019
- 2019
- [j1]Junwu Zhu, Jieke Shi, Zhou Yang, Bin Li:
A real-time decentralized algorithm for task scheduling in multi-agent system with continuous damage. Appl. Soft Comput. 83 (2019) - [c1]Jieke Shi, Junwu Zhu, Jian Li, Fang Liu, Yunbo Lv:
An Efficient Double Auction Mechanism for Job Allocation. CSCWD 2019: 63-68
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint