2025-10-14 10:12:48
Grounded AI for Code Review: Resource-Efficient Large-Model Serving in Enterprise Pipelines
Sayan Mandal, Hua Jiang
https://arxiv.org/abs/2510.10290 https://
Grounded AI for Code Review: Resource-Efficient Large-Model Serving in Enterprise Pipelines
Sayan Mandal, Hua Jiang
https://arxiv.org/abs/2510.10290 https://
U-Turn: Enhancing Incorrectness Analysis by Reversing Direction
Flavio Ascari, Roberto Bruni, Roberta Gori, Azalea Raad
https://arxiv.org/abs/2510.09292 https://
"Your Doctor is Spying on You": An Analysis of Data Practices in Mobile Healthcare Applications
Luke Stevenson, Sanchari Das
https://arxiv.org/abs/2510.06015 https://
Time-To-Inconsistency: A Survival Analysis of Large Language Model Robustness to Adversarial Attacks
Yubo Li, Ramayya Krishnan, Rema Padman
https://arxiv.org/abs/2510.02712 http…
ZeroFalse: Improving Precision in Static Analysis with LLMs
Mohsen Iranmanesh (Simon Fraser University), Sina Moradi Sabet (Amirkabir University of Technology), Sina Marefat (K. N. Toosi University of Technology), Ali Javidi Ghasr (Ferdowsi University of Mashhad), Allison Wilson (Cyber Risk Solutions), Iman Sharafaldin (Forward Security), Mohammad A. Tayebi (Simon Fraser University)
Exploring Network-Knowledge Graph Duality: A Case Study in Agentic Supply Chain Risk Analysis
Evan Heus, Rick Bookstaber, Dhruv Sharma
https://arxiv.org/abs/2510.01115 https://
Try-Mopsa: Relational Static Analysis in Your Pocket
Rapha\"el Monat
https://arxiv.org/abs/2509.13128 https://arxiv.org/pdf/2509.13128
"This paper presents a comprehensive scientometric analysis of the long-term impact of [event] on the nation scientific development."
*oh, interesting!*
"Using Scopus-indexed data..."
*closes tab*
TridentServe: A Stage-level Serving System for Diffusion Pipelines
Yifei Xia, Fangcheng Fu, Hao Yuan, Hanke Zhang, Xupeng Miao, Yijun Liu, Suhan Ling, Jie Jiang, Bin Cui
https://arxiv.org/abs/2510.02838
Exploring Network-Knowledge Graph Duality: A Case Study in Agentic Supply Chain Risk Analysis
Evan Heus, Rick Bookstaber, Dhruv Sharma
https://arxiv.org/abs/2510.01115 https://
Boosting Pointer Analysis With Large Language Model-Enhanced Allocation Function Detection
Baijun Cheng, Kailong Wang, Ling Shi, Haoyu Wang, Peng Di, Yao Guo, Ding Li, Xiangqun Chen
https://arxiv.org/abs/2509.22530
Synergizing Static Analysis with Large Language Models for Vulnerability Discovery and beyond
Vaibhav Agrawal, Kiarash Ahi
https://arxiv.org/abs/2509.15433 https://
Static AdS Black Holes Surrounded by Strings and Quintessence-like Field within Rastall Gravity Framework
Allan. R. P. Moreira, Faizuddin Ahmed, Abdelmalek Bouzenada
https://arxiv.org/abs/2509.15274
Analysis of an Architecture for Integrated Sensing and Communication in 5G OpenRAN
Daniel Lindenschmitt, Tobias Jung, Prudhvi Kumar Kakani, Torsten Reissland, Norman Franchi, Hans D. Schotten
https://arxiv.org/abs/2509.16917
Transfer tensor analysis of localization in the Anderson and Aubry-Andr\'e-Harper models
Michelle C. Anderson, Chern Chuang
https://arxiv.org/abs/2509.21374 https://
CodeCureAgent: Automatic Classification and Repair of Static Analysis Warnings
Pascal Joos, Islem Bouzenia, Michael Pradel
https://arxiv.org/abs/2509.11787 https://
Pixels to Prices: Visual Traits, Market Cycles, and the Economics of NFT Valuation
Samiha Tariq
https://arxiv.org/abs/2509.24879 https://arxiv.org/pdf/2509…
LLM Hallucination Detection: A Fast Fourier Transform Method Based on Hidden Layer Temporal Signals
Jinxin Li, Gang Tu, ShengYu Cheng, Junjie Hu, Jinting Wang, Rui Chen, Zhilong Zhou, Dongbo Shan
https://arxiv.org/abs/2509.13154
On the Late-Time Instability of MOT solution to the Time-Domain PMCHWT Equation
Van Chien Le, Viviana Giunzioni, Pierrick Cordel, Francesco P. Andriulli, Kristof Cools
https://arxiv.org/abs/2509.14995 …
ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System
Taesoo Kim, HyungSeok Han, Soyeon Park, Dae R. Jeong, Dohyeok Kim, Dongkwan Kim, Eunsoo Kim, Jiho Kim, Joshua Wang, Kangsu Kim, Sangwoo Ji, Woosun Song, Hanqing Zhao, Andrew Chin, Gyejin Lee, Kevin Stevens, Mansour Alharthi, Yizhuo Zhai, Cen Zhang, Joonun Jang, Yeongjin Jang, Ammar Askar, Dongju Kim, Fabian Fleischer, Jeongin Cho, Junsik Kim, Kyungjoon Ko, Insu Yun, Sangdon Park, Dowoo Baik, Haein Lee, Hy…
Explaining Code Risk in OSS: Towards LLM-Generated Fault Prediction Interpretations
Elijah Kayode Adejumo, Brittany Johnson
https://arxiv.org/abs/2510.06104 https://
LitterBox : An Extensible Framework for LLM-enhanced Scratch Static Code Analysis
Benedikt Fein, Florian Oberm\"uller, Gordon Fraser
https://arxiv.org/abs/2509.12021 https:…
BugMagnifier: TON Transaction Simulator for Revealing Smart Contract Vulnerabilities
Yury Yanovich, Victoria Kovalevskaya, Maksim Egorov, Elizaveta Smirnova, Matvey Mishuris, Yash Madhwal, Kirill Ziborov, Vladimir Gorgadze, Subodh Sharma
https://arxiv.org/abs/2509.24444
Security Evaluation of Android apps in budget African Mobile Devices
Alioune Diallo, Anta Diop, Abdoul Kader Kabore, Jordan Samhi, Aleksandr Pilgun, Tegawend\'e F. Bissyande, Jacque Klein
https://arxiv.org/abs/2509.18800
Can We Trust the AI Pair Programmer? Copilot for API Misuse Detection and Correction
Saikat Mondal, Chanchal K. Roy, Hong Wang, Juan Arguello, Samantha Mathan
https://arxiv.org/abs/2509.16795
The Cybersecurity of a Humanoid Robot
V\'ictor Mayoral-Vilches
https://arxiv.org/abs/2509.14096 https://arxiv.org/pdf/2509.14096
Characterizing Phishing Pages by JavaScript Capabilities
Aleksandr Nahapetyan, Kanv Khare, Kevin Schwarz, Bradley Reaves, Alexandros Kapravelos
https://arxiv.org/abs/2509.13186 …
Validating Solidity Code Defects using Symbolic and Concrete Execution powered by Large Language Models
\c{S}tefan-Claudiu Susan ("Alexandru Ioan Cuza", University of Ia\c{s}i, Department of Computer Science), Andrei Arusoaie ("Alexandru Ioan Cuza", University of Ia\c{s}i, Department of Computer Science), Dorel Lucanu ("Alexandru Ioan Cuza", University of Ia\c{s}i, Department of Computer Science)