咨询与建议

限定检索结果

文献类型

  • 128 篇 会议
  • 87 篇 期刊文献
  • 7 篇 学位论文

馆藏范围

  • 222 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 203 篇 工学
    • 168 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 57 篇 电气工程
    • 31 篇 信息与通信工程
    • 15 篇 控制科学与工程
    • 8 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 3 篇 城乡规划学
    • 2 篇 化学工程与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物工程
  • 14 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 6 篇 理学
    • 5 篇 数学
    • 1 篇 物理学
  • 4 篇 教育学
    • 4 篇 教育学
  • 2 篇 经济学
    • 2 篇 理论经济学
    • 2 篇 应用经济学
  • 2 篇 法学
    • 2 篇 政治学
    • 2 篇 社会学
  • 1 篇 文学
    • 1 篇 外国语言文学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 222 篇 abstract syntax ...
  • 23 篇 deep learning
  • 10 篇 vulnerability de...
  • 9 篇 syntactics
  • 8 篇 code representat...
  • 8 篇 semantics
  • 7 篇 graph neural net...
  • 7 篇 control flow gra...
  • 7 篇 static analysis
  • 7 篇 code clone detec...
  • 7 篇 machine learning
  • 7 篇 attention mechan...
  • 7 篇 software defect ...
  • 6 篇 codes
  • 6 篇 feature extracti...
  • 5 篇 transformer
  • 5 篇 task analysis
  • 5 篇 source code repr...
  • 5 篇 clone detection
  • 5 篇 compiler

机构

  • 4 篇 chinese acad sci...
  • 4 篇 northwestern pol...
  • 3 篇 yangzhou univ sc...
  • 3 篇 soochow univ sch...
  • 3 篇 xidian univ hang...
  • 3 篇 univ chinese aca...
  • 3 篇 nanjing univ aer...
  • 2 篇 guangdong univ f...
  • 2 篇 univ ljubljana f...
  • 2 篇 shanghai jiao to...
  • 2 篇 shanghai jiao to...
  • 2 篇 hunan univ sci &...
  • 2 篇 univ chinese aca...
  • 2 篇 voestalpine stah...
  • 2 篇 harbin inst tech...
  • 2 篇 nanjing univ sta...
  • 2 篇 department of el...
  • 2 篇 huazhong univ sc...
  • 2 篇 osaka univ grad ...
  • 2 篇 east china univ ...

作者

  • 4 篇 liu wei
  • 4 篇 wu xiaoxue
  • 3 篇 sun xiaobing
  • 3 篇 wu yueming
  • 3 篇 kusumoto shinji
  • 3 篇 zou deqing
  • 3 篇 ullah farhan
  • 3 篇 chen xiang
  • 3 篇 mozina martin
  • 3 篇 jin hai
  • 3 篇 lazar timotej
  • 2 篇 kim misoo
  • 2 篇 huang cheng
  • 2 篇 auer soeren
  • 2 篇 gu zhiwen
  • 2 篇 zheng wei
  • 2 篇 zhang hongyu
  • 2 篇 zhang yuhang
  • 2 篇 yu yaoshen
  • 2 篇 zhao jianhua

语言

  • 216 篇 英文
  • 3 篇 其他
  • 3 篇 中文
检索条件"主题词=Abstract Syntax Tree"
222 条 记 录,以下是51-60 订阅
排序:
Unsupervised Model for Detecting Plagiarism in Internet-based Handwritten Arabic Documents
收藏 引用
JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING 2020年 第2期32卷 42-66页
作者: Zaher, Mahmoud Shehab, Abdulaziz Elhoseny, Mohamed Farahat, Farahat Farag Mansoura Univ Fac Comp & Informat Mansoura Egypt Sadat Acad Cairo Egypt
Due to the rapid increase of internet-based data, there is urgent need for a robust intelligent documents security mechanism. Although there are many attempts to build a plagiarism detection system in natural language... 详细信息
来源: 评论
Semantic Feature Learning via Dual Sequences for Defect Prediction
收藏 引用
IEEE ACCESS 2021年 9卷 13112-13124页
作者: Lin, Junhao Lu, Lu South China Univ Technol Sch Comp Sci & Engn Guangzhou 510006 Peoples R China South China Univ Technol Modern Ind Technol Res Inst Meizhou 528400 Peoples R China
Software defect prediction (SDP) can help developers reasonably allocate limited resources for locating bugs and prioritizing their testing efforts. Existing methods often serialize an abstract syntax tree (AST) obtai... 详细信息
来源: 评论
Mining Variable-Method Correlation for Change Impact Analysis
收藏 引用
IEEE ACCESS 2018年 6卷 77581-77595页
作者: Hu, Chunling Li, Bixin Sun, Xiaobing Hefei Univ Dept Comp Sci & Technol Hefei 230026 Anhui Peoples R China Southeast Univ Sch Comp Sci & Engn Nanjing 210096 Jiangsu Peoples R China Yangzhou Univ Sch Informat Engn Yangzhou 225009 Jiangsu Peoples R China
Software change impact analysis (CIA) is a key technique to identify the potential ripple effects of the changes to software. Coarse-grained CIA techniques such as file, class and method level techniques often gain le... 详细信息
来源: 评论
BovdGFE: buffer overflow vulnerability detection based on graph feature extraction
收藏 引用
APPLIED INTELLIGENCE 2023年 第12期53卷 15204-15221页
作者: Lv, Xinghang Peng, Tao Chen, Jia Liu, Junping Hu, Xinrong He, Ruhan Jiang, Minghua Cao, Wenli Wuhan Text Univ Sch Comp Sci & Artificial Intelligence Wuhan 430200 Hubei Peoples R China Hubei Prov Engn Res Ctr Intelligent Text & Fash Wuhan 430200 Hubei Peoples R China Engn Res Ctr Hubei Prov Clothing Informat Wuhan 430200 Hubei Peoples R China
Automatically detecting buffer overflow vulnerabilities is an important research topic in software security. Recent studies have shown that vulnerability detection performance utilizing deep learning-based techniques ... 详细信息
来源: 评论
A graph-based code representation method to improve code readability classification
收藏 引用
EMPIRICAL SOFTWARE ENGINEERING 2023年 第4期28卷 1-26页
作者: Mi, Qing Zhan, Yi Weng, Han Bao, Qinghang Cui, Longjie Ma, Wei Beijing Univ Technol Fac Informat Technol Beijing Peoples R China
Context Code readability is crucial for developers since it is closely related to code maintenance and affects developers' work efficiency. Code readability classification refers to the source code being classifie... 详细信息
来源: 评论
Effective method for detecting malicious PowerShell scripts based on hybrid features
收藏 引用
NEUROCOMPUTING 2021年 448卷 30-39页
作者: Fang, Yong Zhou, Xiangyu Huang, Cheng Sichuan Univ Coll Cybersecur Chengdu Sichuan Peoples R China
At present, network attacks are rampant in the Internet world, and the attack methods of hackers are changing steadily. PowerShell is a programming language based on the command line *** framework, with powerful funct... 详细信息
来源: 评论
READSUM: Retrieval-Augmented Adaptive Transformer for Source Code Summarization
收藏 引用
IEEE ACCESS 2023年 11卷 51155-51165页
作者: Choi, Yunseok Na, Cheolwon Kim, Hyojun Lee, Jee-Hyong Sungkyunkwan Univ Dept Platform Software Suwon 16419 South Korea Sungkyunkwan Univ Dept Artificial Intelligence Suwon 16419 South Korea
Code summarization is the process of automatically generating brief and informative summaries of source code to aid in software comprehension and maintenance. In this paper, we propose a novel model called READSUM, RE... 详细信息
来源: 评论
FAM: Featuring Android Malware for Deep Learning-Based Familial Analysis
收藏 引用
IEEE ACCESS 2022年 10卷 20008-20018页
作者: Ban, Younghoon Lee, Sunjun Song, Dokyung Cho, Haehyun Yi, Jeong Hyun Soongsil Univ Sch Software Convergence Seoul 06978 South Korea Soongsil Univ Sch Software Seoul 06978 South Korea Yonsei Univ Dept Comp Sci Seoul 03722 South Korea
To handle relentlessly emerging Android malware, deep learning has been widely adopted in the research community. Prior work proposed deep learning-based approaches that use different features of malware, and reported... 详细信息
来源: 评论
An AST Structure Enhanced Decoder for Code Generation
收藏 引用
IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING 2022年 30卷 468-476页
作者: Jiang, Hui Song, Linfeng Ge, Yubin Meng, Fandong Yao, Junfeng Su, Jinsong Xiamen Univ Sch Informat Xiamen 361005 Fujian Peoples R China Pengcheng Lab Shenzhen 518066 Guangdong Peoples R China Tencent Co Shenzhen 518000 Peoples R China Univ Illinois Urbana IL 61801 USA Tecent Co Shenzhen 100080 Peoples R China
Currently, the most dominant neural code generation modelsare often equipped with a tree-structured LSTM decoder, which outputs a sequence of actions to construct an abstract syntax tree (AST) via pre-order traversal.... 详细信息
来源: 评论
Bug localization based on syntactical and semantic information of source code
收藏 引用
Journal of Systems Engineering and Electronics 2023年 第1期34卷 236-246页
作者: YAN Xuefeng CHENG Shasha GUO Liqin College of Computer Science Technology Nanjing University of Aeronautics and AstronauticsNanjing 211106China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing 211106China State Key Laboratory of Intelligent Manufacturing System Technology Beijing Institute of Electronic System EngineeringBeijing 100854China
The existing software bug localization models treat the source file as natural language, which leads to the loss of syntactical and structure information of the source file. A bug localization model based on syntactic... 详细信息
来源: 评论