Skip to content
View garghub's full-sized avatar

Highlights

  • Pro
Block or Report

Block or report garghub

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned

  1. TROVON TROVON Public

    Learning from what we know: How to perform vulnerability prediction using noisy historical data, Empirical Software Engineering (EMSE)

    11 8

  2. VulnerabilityCouplingMutants VulnerabilityCouplingMutants Public

    On the Coupling between Vulnerabilities and LLM-generated Mutants: A Study on Vul4J dataset, The 17th IEEE International Conference on Software Testing, Verification and Validation (ICST 2024)

    Java 3

  3. Cerebro Cerebro Public

    Cerebro: Static Subsuming Mutant Selection, IEEE Transactions on Software Engineering (TSE)

    3 2

  4. seeker seeker Public

    Enabling Efficient Assertion Inference, 34th IEEE International Symposium on Software Reliability Engineering (ISSRE 2023)

    Java 4 1

  5. mystique mystique Public

    Vulnerability Mimicking Mutants

    Java 2

  6. serval-uni-lu/The_dataset_of_large_case_studies_on_mutants_similarity_with_bugs serval-uni-lu/The_dataset_of_large_case_studies_on_mutants_similarity_with_bugs Public

    The dataset of large case studies on mutants similarity, measured both semantically and syntactically, with bugs

    TeX 1