Picture for Sahil Suneja

Sahil Suneja

Accelerating Production LLMs with Combined Token/Embedding Speculators

Add code
Apr 29, 2024
Viaarxiv icon

Automated Code generation for Information Technology Tasks in YAML through Large Language Models

Add code
May 05, 2023
Viaarxiv icon

Study of Distractors in Neural Models of Code

Add code
Mar 03, 2023
Figure 1 for Study of Distractors in Neural Models of Code
Figure 2 for Study of Distractors in Neural Models of Code
Figure 3 for Study of Distractors in Neural Models of Code
Figure 4 for Study of Distractors in Neural Models of Code
Viaarxiv icon

VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements

Add code
Jan 13, 2022
Figure 1 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 2 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 3 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Figure 4 for VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Viaarxiv icon

Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection

Add code
Nov 10, 2021
Figure 1 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 2 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 3 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Figure 4 for Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection
Viaarxiv icon

Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation

Add code
Sep 07, 2021
Figure 1 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 2 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 3 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Figure 4 for Software Vulnerability Detection via Deep Learning over Disaggregated Code Graph Representation
Viaarxiv icon

Probing Model Signal-Awareness via Prediction-Preserving Input Minimization

Add code
Nov 25, 2020
Figure 1 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 2 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 3 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Figure 4 for Probing Model Signal-Awareness via Prediction-Preserving Input Minimization
Viaarxiv icon

Learning to map source code to software vulnerability using code-as-a-graph

Add code
Jun 15, 2020
Figure 1 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 2 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 3 for Learning to map source code to software vulnerability using code-as-a-graph
Figure 4 for Learning to map source code to software vulnerability using code-as-a-graph
Viaarxiv icon