咨询与建议

限定检索结果

文献类型

  • 128 篇 会议
  • 87 篇 期刊文献
  • 7 篇 学位论文

馆藏范围

  • 222 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 203 篇 工学
    • 168 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 57 篇 电气工程
    • 31 篇 信息与通信工程
    • 15 篇 控制科学与工程
    • 8 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 3 篇 城乡规划学
    • 2 篇 化学工程与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物工程
  • 14 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 6 篇 理学
    • 5 篇 数学
    • 1 篇 物理学
  • 4 篇 教育学
    • 4 篇 教育学
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 2 篇 应用经济学
  • 2 篇 法学
    • 2 篇 政治学
    • 2 篇 社会学
  • 1 篇 文学
    • 1 篇 外国语言文学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 222 篇 abstract syntax ...
  • 23 篇 deep learning
  • 10 篇 vulnerability de...
  • 9 篇 syntactics
  • 8 篇 code representat...
  • 8 篇 semantics
  • 7 篇 graph neural net...
  • 7 篇 control flow gra...
  • 7 篇 static analysis
  • 7 篇 code clone detec...
  • 7 篇 machine learning
  • 7 篇 attention mechan...
  • 7 篇 software defect ...
  • 6 篇 codes
  • 6 篇 feature extracti...
  • 5 篇 transformer
  • 5 篇 task analysis
  • 5 篇 source code repr...
  • 5 篇 clone detection
  • 5 篇 compiler

机构

  • 4 篇 chinese acad sci...
  • 4 篇 northwestern pol...
  • 3 篇 yangzhou univ sc...
  • 3 篇 soochow univ sch...
  • 3 篇 xidian univ hang...
  • 3 篇 univ chinese aca...
  • 3 篇 nanjing univ aer...
  • 2 篇 guangdong univ f...
  • 2 篇 univ ljubljana f...
  • 2 篇 shanghai jiao to...
  • 2 篇 shanghai jiao to...
  • 2 篇 hunan univ sci &...
  • 2 篇 univ chinese aca...
  • 2 篇 voestalpine stah...
  • 2 篇 harbin inst tech...
  • 2 篇 nanjing univ sta...
  • 2 篇 department of el...
  • 2 篇 huazhong univ sc...
  • 2 篇 osaka univ grad ...
  • 2 篇 east china univ ...

作者

  • 4 篇 liu wei
  • 4 篇 wu xiaoxue
  • 3 篇 sun xiaobing
  • 3 篇 wu yueming
  • 3 篇 kusumoto shinji
  • 3 篇 zou deqing
  • 3 篇 ullah farhan
  • 3 篇 chen xiang
  • 3 篇 mozina martin
  • 3 篇 jin hai
  • 3 篇 lazar timotej
  • 2 篇 kim misoo
  • 2 篇 huang cheng
  • 2 篇 auer soeren
  • 2 篇 gu zhiwen
  • 2 篇 zheng wei
  • 2 篇 zhang hongyu
  • 2 篇 zhang yuhang
  • 2 篇 yu yaoshen
  • 2 篇 zhao jianhua

语言

  • 216 篇 英文
  • 3 篇 其他
  • 3 篇 中文
检索条件"主题词=Abstract Syntax Tree"
222 条 记 录,以下是41-50 订阅
排序:
AST-Probe: Recovering abstract syntax trees from hidden representations of pre-trained language models  7
AST-Probe: Recovering abstract syntax trees from hidden repr...
收藏 引用
37th IEEE/ACM International Conference on Automated Software Engineering (ASE)
作者: Hernandez Lopez, Jose Antonio Weyssow, Martin Sanchez Cuadrado, Jesus Sahraoui, Houari Univ Murcia Murcia Spain Univ Montreal DIRO Montreal PQ Canada
The objective of pre-trained language models is to learn contextual representations of textual data. Pre-trained language models have become mainstream in natural language processing and code modeling. Using probes, a... 详细信息
来源: 评论
Script and macro based malware classification by clustering abstract syntax trees
Script and macro based malware classification by clustering ...
收藏 引用
作者: Nurmi, Henri Aalto University
学位级别:硕士
Script and macro-based malicious attachments are typically only the first step of a malicious chain of events. These scripts acting only as a downloader to the actual malicous binary, and they are spread mostly throug... 详细信息
来源: 评论
PassSum: Leveraging paths of abstract syntax trees and self-supervision for code summarization
收藏 引用
JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS 2023年 第6期36卷
作者: Niu, Changan Li, Chuanyi Ng, Vincent Ge, Jidong Huang, Liguo Luo, Bin Nanjing Univ Natl Key Lab Novel Software Technol 22 Hankou Rd Nanjing Peoples R China Univ Texas Dallas Human Language Technol Res Inst Richardson TX USA Southern Methodist Univ Dept Comp Sci Dallas TX USA
Code summarization is to provide a high-level comment for a code snippet that typically describes the function and intent of the given code. Recent years have seen the successful application of data-driven code summar... 详细信息
来源: 评论
MFF-SC: A multi-feature fusion method for smart contract classification
收藏 引用
INTELLIGENT DATA ANALYSIS 2023年 第6期27卷 1781-1810页
作者: Tian, Gang Wang, Xiaojin Wang, Rui Yu, Qiuyue Zhao, Guangxin Shangdong Univ Sci & Technol Coll Comp Sci & Engn Qingdao Shangdong Peoples R China Shangdong Univ Sci & Technol Coll Energy & Min Engn Qingdao 266590 Shangdong Peoples R China
The classification of the smart contract can effectively reduce the search space and improve retrieval efficiency. The existing classification methods are based on natural language processing technologies. Because the... 详细信息
来源: 评论
A domain-specific compiler theory based framework for automated reaction network generation
收藏 引用
COMPUTERS & CHEMICAL ENGINEERING 2008年 第10期32卷 2455-2470页
作者: Hsu, Shuo-Huan Krishnamurthy, Balachandra Rao, Prathima Zhao, Chunhua Jagannathan, Suresh Venkatasubramanian, Venkat Purdue Univ Lab Intelligent Proc Syst Sch Chem Engn W Lafayette IN 47907 USA Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA
Catalytic chemical reaction networks are often very complicated because of the numerous species and reactions involved. Hence, automating the network generation process is necessary as it is quite labor intensive and ... 详细信息
来源: 评论
Class mutation operators for C plus plus object-oriented systems
收藏 引用
ANNALS OF TELECOMMUNICATIONS 2015年 第3-4期70卷 137-148页
作者: Delgado-Perez, Pedro Medina-Bulo, Inmaculada Jose Dominguez-Jimenez, Juan Garcia-Dominguez, Antonio Palomo-Lozano, Francisco Univ Cadiz Escuela Super Ingn Cadiz 11002 Spain
Mutation testing is a fault injection testing technique around which a great variety of studies and tools for different programming languages have been developed. Nevertheless, the mutation testing research with respe... 详细信息
来源: 评论
A Hierarchical Feature Ensemble Deep Learning Approach for Software Defect Prediction
收藏 引用
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING 2023年 第4期33卷 543-573页
作者: Zhang, Shenggang Jiang, Shujuan Yan, Yue China Univ Min & Technol Sch Comp Sci & Technol Xuzhou 221116 Peoples R China
Software defect prediction can detect modules that may have defects in advance and optimize resource allocation to improve test efficiency and reduce development costs. Traditional features cannot capture deep semanti... 详细信息
来源: 评论
TransformCode: A Contrastive Learning Framework for Code Embedding via Subtree Transformation
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2024年 第6期50卷 1600-1619页
作者: Xian, Zixiang Huang, Rubing Towey, Dave Fang, Chunrong Chen, Zhenyu Macau Univ Sci & Technol Sch Comp Sci & Engn Macau 999078 Peoples R China Univ Nottingham Ningbo China Sch Comp Sci Ningbo 315100 Zhejiang Peoples R China Nanjing Univ State Key Lab Novel Software Technol Nanjing 210093 Peoples R China
Artificial intelligence (AI) has revolutionized software engineering (SE) by enhancing software development efficiency. The advent of pre-trained models (PTMs) leveraging transfer learning has significantly advanced A... 详细信息
来源: 评论
Cross-project defect prediction via semantic and syntactic encoding
收藏 引用
EMPIRICAL SOFTWARE ENGINEERING 2024年 第4期29卷 80-80页
作者: Jiang, Siyu Chen, Yuwen He, Zhenhang Shang, Yunpeng Ma, Le Guangdong Univ Foreign Studies Sch Informat Sci & Technol Guangzhou Key Lab Multilingual Intelligent Proc Guangzhou Peoples R China Guangdong Univ Foreign Studies Guangzhou Peoples R China Guangzhou City Univ Technol Guangzhou Peoples R China
Cross-Project Defect Prediction (CPDP) is a promising research field that focuses on detecting defects in projects with limited labeled data by utilizing prediction models trained on projects with abundant data. Howev... 详细信息
来源: 评论
Detecting Malicious JavaScript Using Structure-Based Analysis of Graph Representation
收藏 引用
IEEE ACCESS 2023年 11卷 102727-102745页
作者: Rozi, Muhammad Fakhrur Ban, Tao Ozawa, Seiichi Yamada, Akira Takahashi, Takeshi Kim, Sangwook Inoue, Daisuke Natl Inst Informat & Commun Technol Koganei 1848795 Japan Kobe Univ Elect & Elect Engn Dept Kobe 6578501 Japan Kobe Univ Ctr Math & Data Sci Kobe 6578501 Japan
Malicious JavaScript code in web applications poses a significant threat as cyber attackers exploit it to perform various malicious activities. Detecting these malicious scripts is challenging, given their diverse nat... 详细信息
来源: 评论