咨询与建议

限定检索结果

文献类型

  • 128 篇 会议
  • 87 篇 期刊文献
  • 7 篇 学位论文

馆藏范围

  • 222 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 203 篇 工学
    • 168 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 57 篇 电气工程
    • 31 篇 信息与通信工程
    • 15 篇 控制科学与工程
    • 8 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 3 篇 城乡规划学
    • 2 篇 化学工程与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物工程
  • 14 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 6 篇 理学
    • 5 篇 数学
    • 1 篇 物理学
  • 4 篇 教育学
    • 4 篇 教育学
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 2 篇 应用经济学
  • 2 篇 法学
    • 2 篇 政治学
    • 2 篇 社会学
  • 1 篇 文学
    • 1 篇 外国语言文学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 222 篇 abstract syntax ...
  • 23 篇 deep learning
  • 10 篇 vulnerability de...
  • 9 篇 syntactics
  • 8 篇 code representat...
  • 8 篇 semantics
  • 7 篇 graph neural net...
  • 7 篇 control flow gra...
  • 7 篇 static analysis
  • 7 篇 code clone detec...
  • 7 篇 machine learning
  • 7 篇 attention mechan...
  • 7 篇 software defect ...
  • 6 篇 codes
  • 6 篇 feature extracti...
  • 5 篇 transformer
  • 5 篇 task analysis
  • 5 篇 source code repr...
  • 5 篇 clone detection
  • 5 篇 compiler

机构

  • 4 篇 chinese acad sci...
  • 4 篇 northwestern pol...
  • 3 篇 yangzhou univ sc...
  • 3 篇 soochow univ sch...
  • 3 篇 xidian univ hang...
  • 3 篇 univ chinese aca...
  • 3 篇 nanjing univ aer...
  • 2 篇 guangdong univ f...
  • 2 篇 univ ljubljana f...
  • 2 篇 shanghai jiao to...
  • 2 篇 shanghai jiao to...
  • 2 篇 hunan univ sci &...
  • 2 篇 univ chinese aca...
  • 2 篇 voestalpine stah...
  • 2 篇 harbin inst tech...
  • 2 篇 nanjing univ sta...
  • 2 篇 department of el...
  • 2 篇 huazhong univ sc...
  • 2 篇 osaka univ grad ...
  • 2 篇 east china univ ...

作者

  • 4 篇 liu wei
  • 4 篇 wu xiaoxue
  • 3 篇 sun xiaobing
  • 3 篇 wu yueming
  • 3 篇 kusumoto shinji
  • 3 篇 zou deqing
  • 3 篇 ullah farhan
  • 3 篇 chen xiang
  • 3 篇 mozina martin
  • 3 篇 jin hai
  • 3 篇 lazar timotej
  • 2 篇 kim misoo
  • 2 篇 huang cheng
  • 2 篇 auer soeren
  • 2 篇 gu zhiwen
  • 2 篇 zheng wei
  • 2 篇 zhang hongyu
  • 2 篇 zhang yuhang
  • 2 篇 yu yaoshen
  • 2 篇 zhao jianhua

语言

  • 216 篇 英文
  • 3 篇 其他
  • 3 篇 中文
检索条件"主题词=Abstract Syntax Tree"
222 条 记 录,以下是1-10 订阅
排序:
Multiclass vulnerability and clone detection in Ethereum smart contracts using Block-wise abstract syntax tree based Federated Graph Neural Networks
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2025年 123卷
作者: Sharma, Shruti Ratmele, Ankur Seth, Abhay Deep SVKMs NMIMS Dept Comp Engn STME Indore 453112 Madhya Pradesh India
Smart contracts on blockchain networks autonomously execute applications based on predefined conditions, making their security-critical due to the potential for significant financial losses from vulnerabilities. Curre... 详细信息
来源: 评论
ATOM: Commit Message Generation Based on abstract syntax tree and Hybrid Ranking
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2022年 第5期48卷 1800-1817页
作者: Liu, Shangqing Gao, Cuiyun Chen, Sen Nie, Lun Yiu Liu, Yang Nanyang Technol Univ Sch Comp Sci & Engn Singapore 639798 Singapore Harbin Inst Technol Sch Comp Sci & Technol Shenzhen 518055 Peoples R China Tianjin Univ Coll Intelligence & Comp Tianjin 300350 Peoples R China Chinese Univ Hong Kong Hong Kong Peoples R China
Commit messages record code changes (e.g., feature modifications and bug repairs) in natural language, and are useful for program comprehension. Due to the frequent updates of software and time cost, developers are ge... 详细信息
来源: 评论
Deep Learning With Customized abstract syntax tree for Bug Localization
收藏 引用
IEEE ACCESS 2019年 7卷 116309-116320页
作者: Liang, Hongliang Sun, Lu Wang, Meilin Yang, Yuxing Beijing Univ Posts & Telecommun Sch Comp Sci Beijing 100876 Peoples R China China Informat Technol Secur Evaluat Ctr Beijing 100085 Peoples R China
Given a bug report, bug localization technique can help developers automatically locate potential buggy files. Information retrieval and deep learning approaches have been applied in bug localization by extracting lex... 详细信息
来源: 评论
abstract syntax tree Analysis for Plagiarism Detection
Abstract Syntax Tree Analysis for Plagiarism Detection
收藏 引用
作者: Erik A. Nilsson Linkoping University
学位级别:硕士
Today, universities rely heavily on systems for detecting plagiarism in students' essays and reports. Code submissions however require specific tools. A number of approaches to finding plagiarisms in code have alr... 详细信息
来源: 评论
A Heterogeneous Graph to abstract syntax tree Framework for Text-to-SQL
收藏 引用
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 2023年 第11期45卷 13796-13813页
作者: Cao, Ruisheng Chen, Lu Li, Jieyu Zhang, Hanchong Xu, Hongshen Zhang, Wangyou Yu, Kai Shanghai Jiao Tong Univ X LANCE Lab MoE Key Lab Artificial Intelligence Dept Comp Sci & EngnAI Inst Shanghai 200240 Peoples R China
Text-to-SQL is the task of converting a natural language utterance plus the corresponding database schema into a SQL program. The inputs naturally form a heterogeneous graph while the output SQL can be transduced into... 详细信息
来源: 评论
A Novel Neural Source Code Representation Based on abstract syntax tree  19
A Novel Neural Source Code Representation Based on Abstract ...
收藏 引用
41st IEEE/ACM International Conference on Software Engineering (ICSE)
作者: Zhang, Jian Wang, Xu Zhang, Hongyu Sun, Hailong Wang, Kaixuan Liu, Xudong Beihang Univ SKLSDE Lab Sch Comp Sci & Engn Beijing Peoples R China Beijing Adv Innovat Ctr Big Data & Brain Comp Beijing Peoples R China Univ Newcastle Callaghan NSW Australia
Exploiting machine learning techniques for analyzing programs has attracted much attention. One key problem is how to represent code fragments well for follow-up analysis. Traditional information retrieval based metho... 详细信息
来源: 评论
Loop Transformations using Clang's abstract syntax tree  21
Loop Transformations using Clang's Abstract Syntax Tree
收藏 引用
50th International Conference on Parallel Processing (ICPP)
作者: Kruse, Michael Argonne Natl Lab Lemont IL 60439 USA
OpenMP 5.1 introduced the first loop nest transformation directives unroll and tile, and more are expected to be included in OpenMP 6.0. We discuss the two abstract syntax tree (AST) representations used by Clang'... 详细信息
来源: 评论
Malicious Code Utilization Chain Detection Scheme based on abstract syntax tree  6
Malicious Code Utilization Chain Detection Scheme based on A...
收藏 引用
6th IEEE Advanced Information Technology, Electronic and Automation Control Conference (IEEE IAEAC)
作者: Si, Guanlin Zhang, Yue Li, Min Jing, Sen North China Elect Power Res Inst Co Ltd Beijing 100045 Peoples R China
The vulnerability based on deserialization is a code defect that does great harm but is not easy to be detected by the machine. This vulnerability requires a combination of multiple trigger functions. Once a complete ... 详细信息
来源: 评论
Reverse Engineering of Source Code to Sequence Diagram Using abstract syntax tree  3
Reverse Engineering of Source Code to Sequence Diagram Using...
收藏 引用
3rd International Conference on Data and Software Engineering (ICoDSE)
作者: Fauzil, Esa Hendradjaya, Bayu Sunindyo, Wikan Danar Bandung Technol Inst Sch Elect Engn & Informat Bandung Indonesia
Reverse engineering from a source code to a sequence diagram can be very important in the software maintenance process. On the process of reverse engineering, there are a lot of models/approaches that can be used. Ext... 详细信息
来源: 评论
Source Code Plagiarism Detection Based on abstract syntax tree Fingerprintings  17
Source Code Plagiarism Detection Based on Abstract Syntax Tr...
收藏 引用
17th International Joint Symposium on Artificial Intelligence and Natural Language Processing (iSAI-NLP) / 3rd International Conference on Artificial Intelligence and Internet of Things (AIoT)
作者: Suttichaya, Vasin Eakvorachai, Niracha Lurkraisit, Tunchanok Mahidol Univ Fac Engn Dept Comp Engn 25-25 Salaya Phuttamonthon 73170 Nakhon Pathom Thailand Mahidol Univ Int Coll Dept Comp Engn 999 Salaya Phuttamonthon 73170 Nakhon Pathom Thailand
.abstract syntax tree (AST) is an abstract logical structure of source code represented as a tree. This research utilizes information of fingerprinting with AST to locate the similarities between source codes. The pro... 详细信息
来源: 评论