Author:
Jiang Hanqing,Ji Shaopei,Zha Chengchao,Liu Yanhong
Reference18 articles.
1. Detecting malware activity using public search data[C];Villanueva-Miranda,2022
2. Finding bugs using your own code: detecting functionally-similar yet inconsistent code[C];Ahmadi,2021
3. Nil: large-scale detection of large-variance clones[C];Nakagawa,2021
4. Deep learning based vulnerability detection: Are we there yet[J];Chakraborty;IEEE Transactions on Software Engineering,2021
5. Literature survey of deep learning-based vulnerability analysis on source code