Haoye Tian

ORCID: 0000-0002-8049-3997
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Software Reliability and Analysis Research
  • Software Testing and Debugging Techniques
  • Topic Modeling
  • Software Engineering Techniques and Practices
  • Advanced Malware Detection Techniques
  • Industrial Vision Systems and Defect Detection
  • Software System Performance and Reliability
  • Artificial Intelligence in Healthcare and Education
  • Scientific Computing and Data Management
  • Privacy-Preserving Technologies in Data
  • Social Media and Politics
  • Misinformation and Its Impacts
  • Multi-Agent Systems and Negotiation
  • Handwritten Text Recognition Techniques
  • Image Processing and 3D Reconstruction
  • Web Application Security Vulnerabilities
  • Context-Aware Activity Recognition Systems
  • IoT and Edge/Fog Computing
  • Online Learning and Analytics
  • Hate Speech and Cyberbullying Detection
  • Recommender Systems and Techniques
  • Blockchain Technology Applications and Security
  • Intelligent Tutoring Systems and Adaptive Learning
  • Hand Gesture Recognition Systems

The University of Melbourne
2024-2025

University of Luxembourg
2020-2024

Chongqing University
2018-2019

Recently, the ChatGPT LLM has received great attention: it can be used as a bot for discussing source code, prompting to suggest changes, provide descriptions or even generate code. Typical demonstrations generally focus on existing benchmarks, which may have been in model training (i.e., data leakage). To assess feasibility of using an useful assistant programmers, we must its realistic capabilities unseen problems well various tasks. In this paper, present empirical study ChatGPT's...

10.48550/arxiv.2304.11938 preprint EN other-oa arXiv (Cornell University) 2023-01-01

A large body of the literature automated program repair develops approaches where patches are generated to be validated against an oracle (e.g., a test suite). Because such can imperfect, patches, although by oracle, may actually incorrect. While state art explore research directions that require dynamic information or rely on manually-crafted heuristics, we study benefit learning code representations in order learn deep features encode properties patch correctness. Our empirical work mainly...

10.1145/3324884.3416532 article EN 2020-12-21

Automated detection of software failures is an important but challenging engineering task. It involves finding in a vast search space the failure-inducing test cases that contain input triggering fault and oracle asserting incorrect execution. We are motivated to study how far this outstanding challenge can be solved by recent advances large language models (LLMs) such as ChatGPT. However, our reveals ChatGPT has relatively low success rate (28.8%) correct for buggy programs. A possible...

10.1109/ase56229.2023.00089 article EN 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2023-09-11

Learning to edit code automatically is becoming more and feasible. Thanks recent advances in Neural Machine Translation (NMT), various case studies are being investigated where patches produced assessed either (using test suites) or by developers themselves. An appealing setting remains when the developer must provide a natural language input of requirement for change. A proof concept literature showed that it indeed feasible translate these requirements into changes. advancement, MODIT [8],...

10.1145/3712187 article EN ACM Transactions on Software Engineering and Methodology 2025-01-13

How do we know a generated patch is correct? This key challenging question that automated program repair (APR) systems struggle to address given the incompleteness of available test suites. Our intuition can triage correct patches by checking whether each implements code changes (i.e., behavior) are relevant bug it addresses. Such commonly specified failing case. Towards predicting correctness in APR, propose novel yet simple hypothesis on how link between behavior and specifications be...

10.1145/3511096 article EN ACM Transactions on Software Engineering and Methodology 2022-04-20

Abstract Software development teams generally welcome any effort to expose bugs in their code base. In this work, we build on the hypothesis that mobile apps from same category (e.g., two web browser apps) may be affected by similar evolution process. It is therefore possible transfer experience of one historical app quickly find its new counterparts. This has been referred as collaborative bug finding literature. Our novelty guide process considering existing have hinted within reviews....

10.1007/s10664-024-10489-x article EN cc-by Empirical Software Engineering 2024-07-26

Developing interventions that successfully reduce engagement with misinformation on social media is challenging. One intervention has recently gained great attention X/Twitter's Community Notes (previously known as "Birdwatch"). a crowdsourced fact-checking approach allows users to write textual notes inform others about potentially misleading posts X/Twitter. Yet, empirical evidence regarding its effectiveness in reducing missing. In this paper, we perform large-scale study analyze whether...

10.1145/3686967 article EN cc-by Proceedings of the ACM on Human-Computer Interaction 2024-11-07

A large body of the literature on automated program repair develops approaches where patches are automatically generated to be validated against an oracle (e.g., a test suite). Because such can imperfect, patches, although by oracle, may actually incorrect. While state-of-the-art explores research directions that require dynamic information or rely manually-crafted heuristics, we study benefit learning code representations in order learn deep features encode properties patch correctness. Our...

10.1145/3576039 article EN ACM Transactions on Software Engineering and Methodology 2022-12-15

Code review is a heavily collaborative process, which aims at ensuring the overall quality and reliability of software. While it provides massive benefits, implementation code in an organization faces several challenges that make its automation appealing. Automated tools have been around for while are now improving thanks to adoption novel AI models, help can learn about standard practices systematically check reviewed adheres them. Unfortunately, existing methods fall short: they often...

10.48550/arxiv.2402.02172 preprint EN arXiv (Cornell University) 2024-02-03

With the rapid growth of music industry data, it is difficult for people to find their favorite songs in library. Therefore, urgently need an efficient recommendation system help them retrieve music. Traditional collaborative filtering algorithms are applied field recommendation. However, does not handle data sparse problems very well when new items introduced. To solve this problem, some use logistic regression method as a classifier predict user's preferences recommend songs. Logistic...

10.1109/ijcnn.2019.8852094 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2019-07-01

Developing interventions that successfully reduce engagement with misinformation on social media is challenging. One intervention has recently gained great attention X/Twitter's Community Notes (previously known as "Birdwatch"). a crowdsourced fact-checking approach allows users to write textual notes inform others about potentially misleading posts X/Twitter. Yet, empirical evidence regarding its effectiveness in reducing missing. In this paper, we perform large-scale study analyze whether...

10.48550/arxiv.2307.07960 preprint EN other-oa arXiv (Cornell University) 2023-01-01

In this work, we propose a novel perspective to the problem of patch correctness assessment: correct implements changes that "answer" posed by buggy behaviour. Concretely, turn assessment into Question Answering problem. To tackle problem, our intuition is natural language processing can provide necessary representations and models for assessing semantic correlation between bug (question) (answer). Specifically, consider as inputs reports well description generated patches. Our approach,...

10.1145/3551349.3556914 preprint EN 2022-10-10

We propose Patcherizer, a novel patch representation methodology that combines context and structure intention features to capture the semantic changes in Abstract Syntax Trees (ASTs) surrounding of code changes. Utilizing graph convolutional neural networks transformers, Patcherizer effectively captures underlying intentions patches, outperforming state-of-the-art representations with significant improvements BLEU, ROUGE-L, METEOR metrics for generating descriptions.

10.1145/3639478.3643521 article EN 2024-04-14

Unit testing, crucial for identifying bugs in code modules like classes and methods, is often neglected by developers due to time constraints. Automated test generation techniques have emerged address this, but lack readability require developer intervention. Large Language Models (LLMs), GPT Mistral, show promise software engineering, including generation. However, their effectiveness remains unclear. This study conducts the first comprehensive investigation of LLMs, evaluating four LLMs...

10.48550/arxiv.2407.00225 preprint EN arXiv (Cornell University) 2024-06-28

Recent years have witnessed an astonishing explosion in the evolution of mobile applications powered by AI technologies. The rapid growth frameworks enables transition technologies to devices, significantly prompting adoption apps (i.e., that integrate into their functions) among smartphone devices. In this paper, we conduct most extensive empirical study on 56,682 published from three perspectives: dataset characteristics, development issues, and user feedback privacy. To end, build...

10.48550/arxiv.2212.01635 preprint EN other-oa arXiv (Cornell University) 2022-01-01

Within the realm of advanced code retrieval, existing methods have primarily relied on intricate matching and attention-based mechanisms. However, these often lead to computational memory inefficiencies, posing a significant challenge their real-world applicability. To tackle this challenge, we propose novel approach, Hyperbolic Code QA Matching (HyCoQA). This approach leverages unique properties space express connections between fragments corresponding queries, thereby obviating necessity...

10.48550/arxiv.2308.15234 preprint EN other-oa arXiv (Cornell University) 2023-01-01

A large body of the literature automated program repair develops approaches where patches are generated to be validated against an oracle (e.g., a test suite). Because such can imperfect, patches, although by oracle, may actually incorrect. While state art explore research directions that require dynamic information or rely on manually-crafted heuristics, we study benefit learning code representations learn deep features encode properties patch correctness. Our work mainly investigates...

10.48550/arxiv.2008.02944 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Visual hand gesture interaction is one of the main ways human-computer interaction, and provides users more interactive degrees freedom realistic experience. Authors present a hybrid model based on SVM-LSTM, design three-dimensional dynamic system. The system uses Leap Motion to capture information, combined with SVM powerful static classification ability LSTM variable-length time series processing ability, enabling real-time recognition user gestures. method can automatically define start...

10.4018/ijmhci.2018070104 article EN International Journal of Mobile Human Computer Interaction 2018-06-11

Smart contracts are susceptible to various security issues, among which access control (AC) vulnerabilities particularly critical. While existing research has proposed multiple detection tools, the automatic and appropriate repair of AC in smart remains a challenge. Unlike commonly supported vulnerability types by such as reentrancy, usually fixed template-based approaches, main obstacle lies identifying roles or permissions amid long list non-AC-related source code generate proper patch...

10.48550/arxiv.2403.06838 preprint EN arXiv (Cornell University) 2024-03-11

Context: Cross-project defect prediction (CPDP), due to the potential of adaption by industry in realistic scenarios, had gained significant attention from research community. Currently, existing CPDP studies use static statistical features designed experts, which might not capture semantic and structural aspects software, resulting low accuracy prediction. Meanwhile, they tend overlook valuable iterative information brought about version updates mature software projects. Objective: This...

10.1142/s0218194024500165 article EN International Journal of Software Engineering and Knowledge Engineering 2024-04-05

Large language models (LLMs) have demonstrated remarkable capabilities on a broad spectrum of downstream tasks. Within the realm software engineering, specialized tasks code, such as program repair, present unique challenges, necessitating fine-tuning to unlock state-of-the-art performance. Fine-tuning approaches proposed in literature for LLMs repair are however generally overlooking need reason about logic behind code changes, beyond syntactic patterns data. High-performing experiments...

10.48550/arxiv.2404.12636 preprint EN arXiv (Cornell University) 2024-04-19

Software security vulnerabilities allow attackers to perform malicious activities disrupt software operations. Recent Transformer-based language models have significantly advanced vulnerability detection, surpassing the capabilities of static analysis based deep learning models. However, trained solely on code tokens do not capture either explanation type or data flow structure information code, both which are crucial for detection. We propose a novel technique that integrates multitask...

10.48550/arxiv.2406.05892 preprint EN arXiv (Cornell University) 2024-06-09

Program repair techniques offer cost-saving benefits for debugging within software development and programming education scenarios. With the proven effectiveness of Large Language Models (LLMs) in code-related tasks, researchers have explored their potential program repair. However, it is crucial to recognize that existing benchmarks may influenced LLM training data, potentially causing data leakage. To evaluate LLMs' realistic capabilities, (1) we introduce an extensive, non-crawled...

10.48550/arxiv.2406.13972 preprint EN arXiv (Cornell University) 2024-06-19
Coming Soon ...