Funder
State Key Laboratory of Geo-Information Engineering
Fundamental Research Funds for the Central Universities
Basic and Applied Basic Research Foundation of Guangdong Province
National Natural Science Foundation of China
Subject
Computer Science Applications,Information Systems,Software
Reference39 articles.
1. A study of c/c++ code weaknesses on stack overflow;Zhang;IEEE Trans. Softw. Eng.,2021
2. Y. Wan, S. Zhang, H. Zhang, Y. Sui, G. Xu, D. Yao, H. Jin, L. Sun, You see what I want you to see: poisoning vulnerabilities in neural code search, in: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/FSE 2022, pp. 1233–1245.
3. Y. Wan, W. Zhao, H. Zhang, Y. Sui, G. Xu, H. Jin, What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code, in: 44th IEEE/ACM 44th International Conference on Software Engineering, ICSE 2022, pp. 2377–2388.
4. X. Cheng, G. Zhang, H. Wang, Y. Sui, Path-sensitive code embedding via contrastive learning for software vulnerability detection, in: ISSTA ’22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 519–531.
5. X. Cheng, H. Wang, J. Hua, M. Zhang, G. Xu, L. Yi, Y. Sui, Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding, in: 24th International Conference on Engineering of Complex Computer Systems, ICECCS 2019, pp. 41–50.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献