All Papers#
📖 Process-based Indicators of Vulnerability Re-Introducing Code Changes: An Exploratory Case Study
Pre-print Manuscript arXiv 2025 Vulnerabilities arXiv:10.48550/arXiv.2510.26676
-
Conference Paper ESEM 2024 Literature Review
📖 Challenges and practices of deep learning model reengineering: A case study on computer vision
Journal Article ESE 2024 Case Study
-
Conference Paper ASP-DAC 2024 Computer Vision
📖 PeaTMOSS: Mining Pre-Trained Models in Open-Source Software
Pre-print Manuscript arXiv 2023 Dataset arXiv:10.48550/arXiv.2310.03620
📖 An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry
Conference Paper ICSE 2023 Empirical Study
📖 Reusing Deep Learning Models: Challenges and Directions in Software Engineering
Vision Paper JVA 2023 PTM Reuse
📖 PTMTorrent: A Dataset for Mining Open-source Pre-trained Model Packages
Conference Paper MSR 2023 Dataset
📖 Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics
Conference Paper ASE 2022 Process Metrics
📖 An Empirical Study of Artifacts and Security Risks in the Pre-trained Model Supply Chain
Workshop Paper SCORED 2022 PTM Supply Chain