Reference76 articles.
1. Ahmad, W., Chakraborty, S., Ray, B., Chang, K.-W., 2021. Unified Pre-training for Program Understanding and Generation. In: Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. pp. 2655–2668.
2. Learning to represent programs with graphs;Allamanis,2018
3. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions;Aslan;Electronics,2023
4. A bug mining tool to identify and analyze security bugs using naive bayes and tf-idf;Behl,2014
5. Automated optimized parameters for T-distributed stochastic neighbor embedding improve visualization and analysis of large datasets;Belkina;Nat. Commun.,2019
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Collaboration to Repository-Level Vulnerability Detection;Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis;2024-09-11
2. Enhancing Chinese abbreviation prediction with LLM generation and contrastive evaluation;Information Processing & Management;2024-07