Jieke Shi

Orcid: 0000-0002-0799-5018

According to our database1, Jieke Shi authored at least 23 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Stealthy Backdoor Attack for Code Models.
IEEE Trans. Software Eng., April, 2024

Efficient and Green Large Language Models for Software Engineering: Vision and the Road Ahead.
CoRR, 2024

2023
Gotcha! This Model Uses My Code! Evaluating Membership Leakage Risks in Code Models.
CoRR, 2023

Towards Smaller, Faster, and Greener Language Models of Code.
CoRR, 2023

What Do Code Models Memorize? An Empirical Study on Large Language Models of Code.
CoRR, 2023

Prioritizing Speech Test Cases.
CoRR, 2023

What Do Users Ask in Open-Source AI Repositories? An Empirical Study of GitHub Issues.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

2022
Mind Your Data! Hiding Backdoors in Offline Reinforcement Learning Datasets.
CoRR, 2022

Revisiting Neuron Coverage Metrics and Quality of Deep Neural Networks.
Proceedings of the IEEE International Conference on Software Analysis, 2022

On the Influence of Biases in Bug Localization: Evaluation and Benchmark.
Proceedings of the IEEE International Conference on Software Analysis, 2022

Can Identifier Splitting Improve Open-Vocabulary Language Model of Code?
Proceedings of the IEEE International Conference on Software Analysis, 2022

Answer Summarization for Technical Queries: Benchmark and New Approach.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Compressing Pre-trained Models of Code into 3 MB.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Natural Attack for Pre-trained Models of Code.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Curiosity-Driven and Victim-Aware Adversarial Policies.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Ontology negotiation: Knowledge interchange between distributed ontologies through agent negotiation.
Concurr. Comput. Pract. Exp., 2021

IncBL: Incremental Bug Localization.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

BiasHeal: On-the-Fly Black-Box Healing of Bias in Sentiment Analysis Systems.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2021

Can Differential Testing Improve Automatic Speech Recognition Systems?
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2021

2020
An auction-based rescue task allocation approach for heterogeneous multi-robot system.
Multim. Tools Appl., 2020

Network-aware Virtual Machine Migration Based on Gene Aggregation Genetic Algorithm.
Mob. Networks Appl., 2020

2019
A real-time decentralized algorithm for task scheduling in multi-agent system with continuous damage.
Appl. Soft Comput., 2019

An Efficient Double Auction Mechanism for Job Allocation.
Proceedings of the 23rd IEEE International Conference on Computer Supported Cooperative Work in Design, 2019


  Loading...