Similar Items: Less is more: usefulness of data flow diagrams and large language models for security threat validation
- Implicit security requirements classification with large language models using the OWASP application security verification standard: a shift-left approach
- HAFix: history-augmented large language models for bug fixing
- Byam: Fixing Breaking Dependency Updates with Large Language Models
- Evaluating large language models for multilingual vulnerability detection at dual granularities
- An evaluation study of large language models for addressing code quality issues
- Output format biases in the evaluation of large language models for code translation