咨询与建议

限定检索结果

文献类型

  • 127 篇 会议
  • 87 篇 期刊文献
  • 7 篇 学位论文

馆藏范围

  • 221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 203 篇 工学
    • 168 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 57 篇 电气工程
    • 31 篇 信息与通信工程
    • 15 篇 控制科学与工程
    • 8 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 3 篇 城乡规划学
    • 2 篇 化学工程与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物工程
  • 14 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 6 篇 理学
    • 5 篇 数学
    • 1 篇 物理学
  • 4 篇 教育学
    • 4 篇 教育学
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 2 篇 应用经济学
  • 2 篇 法学
    • 2 篇 政治学
    • 2 篇 社会学
  • 1 篇 文学
    • 1 篇 外国语言文学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 221 篇 abstract syntax ...
  • 23 篇 deep learning
  • 10 篇 vulnerability de...
  • 9 篇 syntactics
  • 8 篇 code representat...
  • 8 篇 semantics
  • 7 篇 graph neural net...
  • 7 篇 control flow gra...
  • 7 篇 static analysis
  • 7 篇 code clone detec...
  • 7 篇 machine learning
  • 7 篇 attention mechan...
  • 7 篇 software defect ...
  • 6 篇 codes
  • 6 篇 feature extracti...
  • 5 篇 transformer
  • 5 篇 task analysis
  • 5 篇 source code repr...
  • 5 篇 clone detection
  • 5 篇 compiler

机构

  • 4 篇 chinese acad sci...
  • 4 篇 northwestern pol...
  • 3 篇 yangzhou univ sc...
  • 3 篇 soochow univ sch...
  • 3 篇 xidian univ hang...
  • 3 篇 univ chinese aca...
  • 3 篇 nanjing univ aer...
  • 2 篇 guangdong univ f...
  • 2 篇 univ ljubljana f...
  • 2 篇 shanghai jiao to...
  • 2 篇 shanghai jiao to...
  • 2 篇 hunan univ sci &...
  • 2 篇 univ chinese aca...
  • 2 篇 voestalpine stah...
  • 2 篇 harbin inst tech...
  • 2 篇 nanjing univ sta...
  • 2 篇 department of el...
  • 2 篇 huazhong univ sc...
  • 2 篇 osaka univ grad ...
  • 2 篇 east china univ ...

作者

  • 4 篇 liu wei
  • 4 篇 wu xiaoxue
  • 3 篇 sun xiaobing
  • 3 篇 wu yueming
  • 3 篇 kusumoto shinji
  • 3 篇 zou deqing
  • 3 篇 ullah farhan
  • 3 篇 chen xiang
  • 3 篇 mozina martin
  • 3 篇 jin hai
  • 3 篇 lazar timotej
  • 2 篇 kim misoo
  • 2 篇 huang cheng
  • 2 篇 auer soeren
  • 2 篇 gu zhiwen
  • 2 篇 zheng wei
  • 2 篇 zhang hongyu
  • 2 篇 zhang yuhang
  • 2 篇 yu yaoshen
  • 2 篇 zhao jianhua

语言

  • 215 篇 英文
  • 3 篇 其他
  • 3 篇 中文
检索条件"主题词=Abstract Syntax Tree"
221 条 记 录,以下是1-10 订阅
排序:
Multiclass vulnerability and clone detection in Ethereum smart contracts using Block-wise abstract syntax tree based Federated Graph Neural Networks
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2025年 123卷
作者: Sharma, Shruti Ratmele, Ankur Seth, Abhay Deep SVKMs NMIMS Dept Comp Engn STME Indore 453112 Madhya Pradesh India
Smart contracts on blockchain networks autonomously execute applications based on predefined conditions, making their security-critical due to the potential for significant financial losses from vulnerabilities. Curre... 详细信息
来源: 评论
A Heterogeneous Graph to abstract syntax tree Framework for Text-to-SQL
收藏 引用
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 2023年 第11期45卷 13796-13813页
作者: Cao, Ruisheng Chen, Lu Li, Jieyu Zhang, Hanchong Xu, Hongshen Zhang, Wangyou Yu, Kai Shanghai Jiao Tong Univ X LANCE Lab MoE Key Lab Artificial Intelligence Dept Comp Sci & EngnAI Inst Shanghai 200240 Peoples R China
Text-to-SQL is the task of converting a natural language utterance plus the corresponding database schema into a SQL program. The inputs naturally form a heterogeneous graph while the output SQL can be transduced into... 详细信息
来源: 评论
Node Embedding of the abstract syntax tree for Source Code Representation  39th
Node Embedding of the Abstract Syntax Tree for Source Code R...
收藏 引用
39th CCF National Conference on Computer Applications
作者: Chen, Chang-Feng Zain, Azlan Mohd Zhou, Kai-Qing Jishou Univ Coll Comp Sci & Engn Jishou 416000 Peoples R China Univ Teknol Malaysia Fac Comp Skudai 80310 Johor Malaysia Jishou Univ Sch Commun & Elect Engn Jishou 416000 Peoples R China
Source code representation has garnered significant attention owing to its critical role in solving software engineering problems. There are various methodologies for representing code, and the abstract syntax tree (A... 详细信息
来源: 评论
Multi-language Webshell Detection based on abstract syntax tree and treeLSTM  27
Multi-language Webshell Detection based on Abstract Syntax T...
收藏 引用
27th International Conference on Computer Supported Cooperative Work in Design (CSCWD)
作者: Shang, Mengchuan Han, Xueying Zhao, Changzhi Cui, Zelin Du, Dan Jiang, Bo Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China
Webshell is a command execution environment existing in web containers, which is used by attackers to remotely control servers and illegally access website resources. Accurately detecting Webshells is of great signifi... 详细信息
来源: 评论
TRIDENT: Detecting SQL Injection Attacks via abstract syntax tree-based Neural Network  24
TRIDENT: Detecting SQL Injection Attacks via Abstract Syntax...
收藏 引用
39th ACM/IEEE International Conference on Automated Software Engineering (ASE)
作者: Li, Yuanlin Xu, Zhiwei Zhou, Min Wan, Hai Zhao, Xibin Tsinghua Univ Sch Software BNRist KLISS Beijing Peoples R China
SQL injection attacks have posed a significant threat to web applications for decades. They obfuscate malicious codes into natural SQL statements so as to steal sensitive data, making them difficult to detect. General... 详细信息
来源: 评论
ATOM: Commit Message Generation Based on abstract syntax tree and Hybrid Ranking
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2022年 第5期48卷 1800-1817页
作者: Liu, Shangqing Gao, Cuiyun Chen, Sen Nie, Lun Yiu Liu, Yang Nanyang Technol Univ Sch Comp Sci & Engn Singapore 639798 Singapore Harbin Inst Technol Sch Comp Sci & Technol Shenzhen 518055 Peoples R China Tianjin Univ Coll Intelligence & Comp Tianjin 300350 Peoples R China Chinese Univ Hong Kong Hong Kong Peoples R China
Commit messages record code changes (e.g., feature modifications and bug repairs) in natural language, and are useful for program comprehension. Due to the frequent updates of software and time cost, developers are ge... 详细信息
来源: 评论
Exploring the Effectiveness of abstract syntax tree Patterns for Algorithm Recognition  4
Exploring the Effectiveness of Abstract Syntax Tree Patterns...
收藏 引用
4th International Conference on Code Quality (ICCQ)
作者: Neumuller, Denis Straub, Raphael Sihler, Florian Tichy, Matthias Univ Ulm Ulm Germany
The automated recognition of algorithm implementations can support many software maintenance and reengineering activities by providing knowledge about the concerns present in the code base. Moreover, recognizing ineff... 详细信息
来源: 评论
Fine-Grained Code Clone Detection with Block-Based Splitting of abstract syntax tree  2023
Fine-Grained Code Clone Detection with Block-Based Splitting...
收藏 引用
32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)
作者: Hu, Tiancheng Xu, Zijing Fang, Yilin Wu, Yueming Yuan, Bin Zou, Deqing Jin, Hai Huazhong Univ Sci & Technol Sch Cyber Sci & Engn Wuhan 430074 Peoples R China Huazhong Univ Sci & Technol Hubei Key Lab Distributed Syst Secur Hubei Engn Res Ctr Big Data SecurCluster & Grid Natl Engn Res Ctr Big Data Technol & SystServ Co Wuhan Peoples R China Nanyang Technol Univ Singapore Singapore Huazhong Univ Sci & Technol Sch Comp Sci Wuhan 430074 Peoples R China
Code clone detection aims to find similar code fragments and gains increasing importance in the field of software engineering. There are several types of techniques for detecting code clones. Text-based or token-based... 详细信息
来源: 评论
CloneBAS: A Code Clone Detection Method Based on abstract syntax tree and Simhash  3
CloneBAS: A Code Clone Detection Method Based on Abstract Sy...
收藏 引用
2023 IEEE 3rd International Conference on Data Science and Computer Application, ICDSCA 2023
作者: He, Hongkui Lin, Liannan Yu, Tianchen Zhong, Xinlei South China University of Technology Guangzhou China
Code clone, which is one of the common 'code smells', is the duplicate code that exists in the source code. In this paper, we present CloneBAS, a code clone detection method based on abstract syntax tree (AST)... 详细信息
来源: 评论
Blockchain Based abstract syntax tree to Detect Vulnerability in IOT-Enabled Smart Contract  2
Blockchain Based Abstract Syntax Tree to Detect Vulnerabilit...
收藏 引用
2nd International Conference on Smart Technologies for Smart Nation, SmartTechCon 2023
作者: Mittal, Amit Widjaja, Gunawan Pecho, Renzon Daniel Cosme Kiruba, R. Roque, Jesus Marino Falcón Chandra, Alok Department of Allied Science Graphic Era Hill University Bhimtal263136 India Faculty of Law Universitas 17 Agustus 1945 Faculty of Public Health Universitas Indonesia Indonesia Lima Peru Sri Ramakrishna Engineering College Coimbatore641002 India Department of Environmental Engineering Universidad San Ignacio de Loyola La Molina Lima1524 Peru Lajpatrai institute of Management Mumbai Mumbai University India
As blockchain technology and the Internet of Things (IoT) have advanced, smart contracts have found new uses in many industries. Ethereum has become the go-to system for smart contract development. However, major fina... 详细信息
来源: 评论