Publisher
Atlantis Press International BV
Reference5 articles.
1. H. G. Rice. Classes of recursively enumerable sets and their decision problems[J]. Journal of Symbolic Logic, 1954, 19(2): 358–122.
2. N. Jovanovic, C. Kruegel, E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities[C]//In Proceeding of IEEE Symposium on Security and Privacy. 2006
3. Z. Li, D. Zou, S. Xu, et al. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection[J]. arXiv preprint arXiv: 1801.01681, 2018.
4. D. Zou, S. Wang, S. Xu, et al. μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(5): 2224–2236.
5. G. Lin, J. Zhang, W. Luo, et al. Cross-project transfer representation learning for vulnerable function discovery[J]. IEEE Transactions on Industrial Informatics, 2018, 14(7): 3289–3297.