Utilizing code clone detection to generate comments automatically.
☆17Aug 26, 2019Updated 6 years ago
Alternatives and similar repositories for CloCom
Users that are interested in CloCom are comparing it to the libraries listed below
Sorting:
- Automatic Generation of Text Descriptive Comments for Code Blocks☆31Nov 19, 2018Updated 7 years ago
- The dataset for EMSE-DeepCom☆122Mar 20, 2021Updated 4 years ago
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)☆11Mar 28, 2024Updated last year
- Error-controlled interaction discovery in machine learning models☆22Jun 24, 2025Updated 8 months ago
- The CompCert formally-verified C compiler☆10Feb 25, 2026Updated last week
- ATP: Directed Graph Embedding with Asymmetric Transitivity Preservation☆10Apr 18, 2019Updated 6 years ago
- spark MLlib机器学习实践源码☆10Oct 28, 2016Updated 9 years ago
- PyTorch Implementation of Weakly Supervised Pre-training - [IJCAI19]☆12May 23, 2020Updated 5 years ago
- Code for paper "W-RAG: Weakly Supervised Dense Retrieval in RAG for Open-domain Question Answering"☆15Oct 2, 2025Updated 5 months ago
- Machine Learning-Based Malicious Application Detecting using Low-level Architectural Features☆11Jun 22, 2019Updated 6 years ago
- ☆21Dec 25, 2025Updated 2 months ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- ☆45Oct 12, 2020Updated 5 years ago
- For our ICSE22 paper "EAGLE: Creating Equivalent Graphs to Test Deep Learning Libraries" by Jiannan Wang, Thibaud Lutellier, Shangshu Qia…☆13Aug 16, 2023Updated 2 years ago
- A Natural Language Generation System☆14Feb 17, 2024Updated 2 years ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆13Sep 8, 2020Updated 5 years ago
- The TacTok automated Coq proof script synthesis tool☆17Jan 9, 2024Updated 2 years ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆20Sep 18, 2025Updated 5 months ago
- ☆18Updated this week
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Cross-project defection prediction tooling☆17Nov 30, 2021Updated 4 years ago
- 面试经验记录☆14Sep 11, 2019Updated 6 years ago
- ☆16Jul 17, 2021Updated 4 years ago
- SLDeep: Statement-Level Software Defect Prediction Using Deep-Learning Models on Static Code Features☆14Jul 4, 2019Updated 6 years ago
- code for "Retrieve and Refine: Exemplar-based Neural Comment Generation"☆15Mar 27, 2021Updated 4 years ago
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆18Mar 10, 2025Updated 11 months ago
- Official implementation of our work, 'GypSum: Learning Hybrid Representations for Code Summarization'.☆14Jan 20, 2022Updated 4 years ago
- 🧀 KoBART summarization using pytorch☆13Jun 7, 2023Updated 2 years ago
- Implementation of 'A Convolutional Attention Network for Extreme Summarization of Source Code' in PyTorch using TorchText☆14Sep 21, 2018Updated 7 years ago
- Summarizing Source Code using a Neural Attention Model - CODENN☆239Jan 23, 2023Updated 3 years ago
- 基于SpringBoot+MyBatis+Redis的秒杀系统☆15Jan 4, 2019Updated 7 years ago
- Matlab Code for Variational Gaussian Copula Inference☆17Mar 15, 2016Updated 9 years ago
- Vortex: A Flexible and Efficient Sparse Attention Framework☆48Jan 21, 2026Updated last month
- Python implementation of Multi-Index Hashing☆15Sep 6, 2019Updated 6 years ago
- ☆17Mar 11, 2024Updated last year
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆17Feb 26, 2026Updated last week
- ☆15Dec 29, 2023Updated 2 years ago
- ☆21May 23, 2025Updated 9 months ago
- ☆19May 4, 2023Updated 2 years ago