NTDXYG / CCGIRLinks
data and code for paper "CCGIR: Information Retrieval-based Code Comment Generation Method for Smart Contracts", which accepted in KBS. 智能合约 注释生成
☆17Updated 3 years ago
Alternatives and similar repositories for CCGIR
Users that are interested in CCGIR are comparing it to the libraries listed below
Sorting:
- ☆39Updated 2 years ago
- ☆23Updated last year
- ☆48Updated last week
- Source Code for "A multi-modal transformer-based code summarization approach for smart contracts"☆27Updated 4 years ago
- Program Transformation Tool for Java Methods☆11Updated 3 years ago
- [ICSE 2021] - InferCode: Self-Supervised Learning of Code Representations by Predicting Subtrees☆89Updated 3 months ago
- Enhacing Code Pre-trained Models by Contrastive Learning☆37Updated 2 years ago
- ☆15Updated 3 years ago
- This is the official implementation of paper "AST-Trans: Code Summarization with Efficient Tree-StructuredAttention" acceptted in ICSE 20…☆25Updated last year
- Towards Robustness of Deep Program Processing Models – Detection, Estimation and Enhancement☆21Updated 3 years ago
- ☆51Updated 3 years ago
- ☆14Updated 3 years ago
- This repository is the replication package of the ICSE22 paper "FIRA: Fine-Grained Graph-Based Code Change Representation for Automated C…☆33Updated 3 years ago
- Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)☆75Updated 3 years ago
- [SANER 2023] MixCode: Enhancing Code Classification by Mixup-Based Data Augmentation☆15Updated last year
- Replication Package for "Natural Attack for Pre-trained Models of Code", ICSE 2022☆49Updated 3 weeks ago
- ☆45Updated 5 years ago
- MiDas: Multi-granularity Detector for Vulnerability Fixes (IEEE TSE)☆14Updated last year
- Code and data for paper "Detecting Code Clones with Graph Neural Network and Flow-Augmented Abstract Syntax Tree".☆69Updated 3 years ago
- ☆44Updated 4 years ago
- This repo illustrates how to evaluate the artifacts in the paper An Extensive Study on Pre-trained Models for Program Understanding and G…☆25Updated 3 years ago
- ☆32Updated 3 years ago
- ☆85Updated 4 years ago
- ☆12Updated 3 years ago
- ☆20Updated last year
- ☆16Updated 3 years ago
- Fault Localization via Efficient Probabilistic Modeling of Program Semantics☆16Updated last year
- VulnerabilityDetectionResearch☆93Updated 3 years ago
- ☆22Updated 4 years ago
- ☆12Updated 2 years ago