The dataset and source code for paper "API Method Recommendation without Worrying About the Task-API Knowledge Gap"
☆19Aug 20, 2018Updated 7 years ago
Alternatives and similar repositories for BIKER-ASE2018
Users that are interested in BIKER-ASE2018 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository for Deep API Learning (DeepAPI)☆56Dec 3, 2021Updated 4 years ago
- FOCUS is a context-aware collaborative-filtering system that exploits cross relationships among OSS projects to suggest the inclusion of …☆21Jun 14, 2023Updated 2 years ago
- The implementation of the IJCAI 2018 paper: Code Completion with Neural Attention and Pointer Networks☆18Sep 11, 2019Updated 6 years ago
- ☆12Oct 29, 2022Updated 3 years ago
- ☆11Jan 1, 2024Updated 2 years ago
- Webinar content for Empower LLMs with Knowledge Graphs☆12May 17, 2024Updated last year
- Chronos: Zero-Shot Identification of Libraries from Vulnerability Reports (ICSE 2023, Technical Track)☆11Jul 23, 2023Updated 2 years ago
- DataSet and source code for PyART☆11Nov 27, 2022Updated 3 years ago
- This is the repository of the Dense Hierarchical Retrieval for Open-Domain Question Answering☆14Dec 23, 2021Updated 4 years ago
- Learning Semantic Parsers from Denotations with Latent Structured Alignments and Abstract Programs(EMNLP2019)☆19Dec 3, 2019Updated 6 years ago
- A dataset for natural language code search.☆14Feb 13, 2020Updated 6 years ago
- Source code for the paper "Neural Multi-Step Reasoning for Question Answering on Semi-Structured Tables"☆20May 18, 2017Updated 8 years ago
- Hierarchical Text Classifier of News Group Messages using Facebook's FastText☆10Jul 8, 2019Updated 6 years ago
- A Generative Dialogue State Tracking Model☆22Jun 24, 2021Updated 4 years ago
- A collection of publications that works on code models but beyond focusing on the accuracies.☆13Jun 30, 2023Updated 2 years ago
- Evaluation of ML models in Android malware classification, adversarial attacks on DNNs & defense mechanisms☆13Jan 14, 2020Updated 6 years ago
- ☆22Dec 26, 2020Updated 5 years ago
- ☆16Mar 22, 2024Updated 2 years ago
- ☆26Jun 16, 2017Updated 8 years ago
- Using Android Malware Dataset (CICAndMal2017)☆11Jul 23, 2019Updated 6 years ago
- ☆14Apr 10, 2024Updated last year
- Strength Pareto Evolutionary Algorithm v2 implementation in python☆15Jun 18, 2019Updated 6 years ago
- ☆14Dec 12, 2023Updated 2 years ago
- Official implementation of our work, 'GypSum: Learning Hybrid Representations for Code Summarization'.☆14Jan 20, 2022Updated 4 years ago
- Drools-开源业务规则引擎☆16Feb 26, 2020Updated 6 years ago
- Backdooring Neural Code Search☆14Sep 8, 2023Updated 2 years ago
- ☆14Sep 1, 2022Updated 3 years ago
- ☆23Mar 20, 2024Updated 2 years ago
- Reproduction Code for FSE Paper "DeepSearch: A Simple and Effective Blackbox Attack for Deep Neural Networks"☆13Aug 27, 2020Updated 5 years ago
- Defending Against Backdoor Attacks Using Robust Covariance Estimation☆22Jul 12, 2021Updated 4 years ago
- NLP2Code: Code Snippet Content Assist via Natural Language Tasks☆34Dec 5, 2019Updated 6 years ago
- 针对建筑规范文本数据的知识图谱实体关系提取,知识图谱构建,检索增强生成DEMO☆37Aug 7, 2024Updated last year
- Siamese: a scalable code clone search engine☆37Jul 11, 2024Updated last year
- ☆15Sep 20, 2019Updated 6 years ago
- ☆18Mar 10, 2026Updated 2 weeks ago
- Wechat Oauth Grant For Passport☆11Apr 5, 2018Updated 7 years ago
- 📘 Python scripts for various purposes.☆14Feb 17, 2021Updated 5 years ago
- ☆18May 14, 2024Updated last year
- ☆13Nov 8, 2019Updated 6 years ago