Author:
Guan Zhibin,Wang Xiaomeng,Xin Wei,Wang Jiajie
Reference16 articles.
1. Allamanis, M., Brockschmidt, M., Khademi, M.: Learning to represent programs with graphs. CoRR abs/1711.00740 (2017)
2. Büch, L., Andrzejak, A.: Learning-based recursive aggregation of abstract syntax trees for code clone detection. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 95–104 (2019)
3. Dam, H.K., et al.: A deep tree-based model for software defect prediction. CoRR abs/1802.00921 (2018)
4. Duan, X., et al.: Vulsniper: focus your attention to shoot fine-grained vulnerabilities. In: Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI 2019, pp. 4665–4671 (2019)
5. Harer, J.A., et al.: Automated software vulnerability detection with machine learning. CoRR abs/1803.04497 (2018)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics;2023 IEEE Symposium on Security and Privacy (SP);2023-05
2. Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey;2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W);2022-06