no code implementations • 18 Sep 2023 • André Storhaug, Jingyue Li, Tianyuan Hu
We then auto-completed the 176 SCs again and found that our approach could identify 62% of the code to be generated as vulnerable and avoid generating 67% of them, indicating the approach could efficiently and effectively avoid vulnerabilities in the auto-completed code.