Searched for: author%3A%22Izadi%2C+M.%22
(1 - 13 of 13)
document
Izadi, Mehri (author), Izadi, M. (author), Heidari, Farrokhlagha (author)
In the PDF of this article, the pages were incorrectly numbered as ‘2303–2327’ when it should have been ‘3637–3661’. The page range was found to be just correct in the HTML version of the article. The original article has been corrected.
journal article 2024
document
Al-Kaswan, A. (author), Izadi, M. (author), van Deursen, A. (author)
Previous work has shown that Large Language Models are susceptible to so-called data extraction attacks. This allows an attacker to extract a sample that was contained in the training data, which has massive privacy implications. The construction of data extraction attacks is challenging, current attacks are quite inefficient, and there exists a...
other 2023
document
Izadi, M. (author), Nejati, Mahtab (author), Heydarnoori, Abbas (author)
Software-related platforms such as GitHub and Stack Overflow, have enabled their users to collaboratively label software entities with a form of metadata called topics. Tagging software repositories with relevant topics can be exploited for facilitating various downstream tasks. For instance, a correct and complete set of topics assigned to a...
journal article 2023
document
Kallis, Rafael (author), Izadi, M. (author), Pascarella, Luca (author), Chaparro, Oscar (author), Rani, Pooja (author)
We report on the organization and results of the second edition of the tool competition from the International Workshop on Natural Language-based Software Engineering (NLBSE'23). As in the prior edition, we organized the competition on automated issue report classification, with a larger dataset. This year, we featured an extra competition on...
conference paper 2023
document
Al-Kaswan, A. (author), Ahmed, Toufique (author), Izadi, M. (author), Sawant, Anand Ashok (author), Devanbu, Premkumar (author), van Deursen, A. (author)
Binary reverse engineering is used to understand and analyse programs for which the source code is unavailable. Decompilers can help, transforming opaque binaries into a more readable source code-like representation. Still, reverse engineering is difficult and costly, involving considering effort in labelling code with helpful summaries....
conference paper 2023
document
van Dam, Tim (author), Izadi, M. (author), van Deursen, A. (author)
Transformer-based pre-trained models have recently achieved great results in solving many software engineering tasks including automatic code completion which is a staple in a developer’s toolkit. While many have striven to improve the code-understanding abilities of such models, the opposite – making the code easier to understand – has not been...
conference paper 2023
document
Izadi, Mehri (author), Izadi, M. (author), Heidari, Farrokhlagha  (author)
In today’s environment of growing class sizes due to the prevalence of online and e-learning systems, providing one-to-one instruction and feedback has become a challenging task for teachers. Anyhow, the dialectical integration of instruction and assessment into a seamless and dynamic activity can provide a continuous flow of assessment...
journal article 2023
document
Izadi, Mehri (author), Izadi, M. (author), Heidari, Farrokhlagha (author)
The copyright holder in the original publication of this article was incorrect. The original article has been corrected.
journal article 2023
document
Al-Kaswan, A. (author), Izadi, M. (author), van Deursen, A. (author)
Code comments are a key resource for information about software artefacts. Depending on the use case, only some types of comments are useful. Thus, automatic approaches to clas-sify these comments have been proposed. In this work, we address this need by proposing, STACC, a set of SentenceTransformers- based binary classifiers. These...
conference paper 2023
document
Al-Kaswan, A. (author), Izadi, M. (author)
In recent years, Large Language Models (LLMs) have gained significant popularity due to their ability to generate human-like text and their potential applications in various fields, such as Software Engineering. LLMs for Code are commonly trained on large unsanitized corpora of source code scraped from the Internet. The content of these datasets...
conference paper 2023
document
Izadi, M. (author), Ahmadabadi, Martin Nili (author)
NLP-based models have been increasingly incorporated to address SE problems. These models are either employed in the SE domain with little to no change, or they are greatly tailored to source code and its unique characteristics. Many of these approaches are considered to be outperforming or complementing existing solutions. However, an important...
conference paper 2022
document
Izadi, M. (author)
Users use Issue Tracking Systems to keep track and manage issue reports in their repositories. An issue is a rich source of software information that contains different reports including a problem, a request for new features, or merely a question about the software product. As the number of these issues increases, it becomes harder to manage...
conference paper 2022
document
Izadi, M. (author), Gismondi, Roberta (author), Gousios, G. (author)
Code completion is an essential feature of IDEs, yet current auto-completers are restricted to either grammar-based or NLP-based single token completions. Both approaches have significant draw-backs: grammar-based autocompletion is restricted in dynamically-typed language environments, whereas NLP-based autocompleters struggle to understand...
conference paper 2022
Searched for: author%3A%22Izadi%2C+M.%22
(1 - 13 of 13)