Jiho Shin

Orcid: 0009-0009-3665-9468

According to our database1, Jiho Shin authored at least 34 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
StaAgent: An Agentic Framework for Testing Static Analyzers.
CoRR, July, 2025

SecVulEval: Benchmarking LLMs for Real-World C/C++ Vulnerability Detection.
CoRR, May, 2025

Prompt Engineering or Fine-Tuning: An Empirical Assessment of LLMs for Code.
Proceedings of the 22nd IEEE/ACM International Conference on Mining Software Repositories, 2025

Pre-trained Models for Bytecode Instructions.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2025

SparseInfer: Training-free Prediction of Activation Sparsity for Fast LLM Inference.
Proceedings of the Design, Automation & Test in Europe Conference, 2025

2024
Assessing Evaluation Metrics for Neural Test Oracle Generation.
IEEE Trans. Software Eng., September, 2024

The Good, the Bad, and the Missing: Neural Code Generation for Machine Learning Tasks.
ACM Trans. Softw. Eng. Methodol., February, 2024

Checker Bug Detection and Repair in Deep Learning Libraries.
CoRR, 2024

Retrieval-Augmented Test Generation: How Far Are We?
CoRR, 2024

Strainer GAN: Filtering out Impurity Samples in GAN Training.
Proceedings of the SIGGRAPH Asia 2024 Posters, SA 2024, Tokyo, Japan, December 3-6, 2024, 2024

Domain Adaptation for Code Model-Based Unit Test Case Generation.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

2023
Design the IoT Botnet Defense Process for Cybersecurity in Smart City.
Intell. Autom. Soft Comput., 2023

Prompt Engineering or Fine Tuning: An Empirical Assessment of Large Language Models in Automated Software Engineering Tasks.
CoRR, 2023

Automated Test Case Generation Using Code Models and Domain Adaptation.
CoRR, 2023

Automatic Static Bug Detection for Machine Learning Libraries: Are We There Yet?
CoRR, 2023

Cyber Security Controls in Nuclear Power Plant by Technical Assessment Methodology.
IEEE Access, 2023

OCR Meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime.
Proceedings of the Information Security Applications - 24th International Conference, 2023

Characterizing and Understanding Software Security Vulnerabilities in Machine Learning Libraries.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

Automatic Static Vulnerability Detection for Machine Learning Libraries: Are We There Yet?
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

An Empirical Study on the Stability of Explainable Software Defect Prediction.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

2022
A study on command block collection and restoration techniques through detection of project file manipulation on engineering workstation of industrial control system.
Digit. Investig., 2022

Characterizing and Understanding Software Security Vulnerabilities in Machine Learning Libraries.
CoRR, 2022

Analyzing and Evaluating Critical Cyber Security Challenges Faced by Vendor Organizations in Software Development: SLR Based Approach.
IEEE Access, 2022

SRT's Neural Machine Translation System for WMT22 Biomedical Translation Task.
Proceedings of the Seventh Conference on Machine Translation, 2022

API recommendation for machine learning libraries: how far are we?
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

2021
A Survey of Automatic Code Generation fromNatural Language.
J. Inf. Process. Syst., 2021

Explainable Software Defect Prediction: Are We There Yet?
CoRR, 2021

2020
Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process.
Mob. Inf. Syst., 2020

Detection and Analysis Technique for Manipulation Attacks on PLC Control Logic.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Research on PEB-LDR Data Analysis Technique for DLL Injection Detection on ICS Engineering Workstation.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Study on Anomaly Detection Technique in an Industrial Control System Based on Machine Learning.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

A Study on the Application of Technical Assessment Methodology (TAM) for CyberSecurity in Nuclear Power Plant.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

A Study on the Digital Forensic Method for Decentralized Web Service.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

2019
Design and Development of Data Map Visualization Tool for Property Search of Police Information.
Proceedings of the International Conference on Electronics, Information, and Communication, 2019


  Loading...