咨询与建议

限定检索结果

文献类型

  • 27 篇 会议
  • 18 篇 期刊文献

馆藏范围

  • 45 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 40 篇 计算机科学与技术...
    • 27 篇 软件工程
    • 6 篇 信息与通信工程
    • 5 篇 电气工程
    • 3 篇 控制科学与工程
    • 2 篇 网络空间安全
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 45 篇 software vulnera...
  • 16 篇 deep learning
  • 11 篇 machine learning
  • 5 篇 information secu...
  • 5 篇 source code
  • 3 篇 natural language...
  • 3 篇 large language m...
  • 3 篇 security
  • 2 篇 representation l...
  • 2 篇 test platform
  • 2 篇 fuzzing
  • 2 篇 software securit...
  • 2 篇 taint analysis
  • 2 篇 symbolic executi...
  • 2 篇 evaluation metho...
  • 2 篇 loopholes
  • 2 篇 artificial intel...
  • 1 篇 fine-tuning tech...
  • 1 篇 graph neural net...
  • 1 篇 cyber security

机构

  • 4 篇 univ trento tren...
  • 3 篇 jiangsu univ sch...
  • 2 篇 harbin inst tech...
  • 2 篇 rovira & virgili...
  • 2 篇 northwestern pol...
  • 2 篇 peng cheng lab p...
  • 1 篇 fudan univ sch c...
  • 1 篇 macquarie univ 4...
  • 1 篇 yangzhou univ sc...
  • 1 篇 nanjing univ pos...
  • 1 篇 wright state uni...
  • 1 篇 meta seattle wa ...
  • 1 篇 luxembourg inst ...
  • 1 篇 aws ai labs adel...
  • 1 篇 luxembourg inst ...
  • 1 篇 nanyang technol ...
  • 1 篇 monash univ clay...
  • 1 篇 univ calif los a...
  • 1 篇 univ guilan comp...
  • 1 篇 athena res ctr i...

作者

  • 4 篇 marchetto alessa...
  • 3 篇 guo yuejun
  • 3 篇 chen jinfu
  • 3 篇 wu xiaoxue
  • 2 篇 zheng wei
  • 2 篇 casino fran
  • 2 篇 liu bo
  • 2 篇 he jun
  • 2 篇 ge yuan
  • 2 篇 cai saihua
  • 2 篇 wen xin-cheng
  • 2 篇 semasaba abubaka...
  • 2 篇 liu tao
  • 2 篇 bettaieb seifedd...
  • 2 篇 foulefack rosmae...
  • 2 篇 zhang chi
  • 2 篇 agyemang samuel ...
  • 2 篇 cai jun
  • 2 篇 li gaolei
  • 1 篇 zhang lin

语言

  • 45 篇 英文
检索条件"主题词=Software vulnerability detection"
45 条 记 录,以下是41-50 订阅
排序:
MatsVD: Boosting Statement-Level vulnerability detection via Dependency-Based Attention  15
MatsVD: Boosting Statement-Level Vulnerability Detection via...
收藏 引用
15th Asia-Pacific Symposium on Internetware (Internetware)
作者: Weng, Cheng Qin, Yihao Lin, Bo Liu, Pei Chen, Liqian Natl Univ Def Technol Changsha Peoples R China
software vulnerabilities inevitably arise during software development and may leave behind huge security risks. In order to detect and mitigate vulnerabilities before they can be exploited, various fine-grained deep l... 详细信息
来源: 评论
Tenet: A Flexible Framework for Machine-Learning-based vulnerability detection  2
Tenet: A Flexible Framework for Machine-Learning-based Vulne...
收藏 引用
IEEE/ACM 2nd International Conference on AI Engineering - software Engineering for AI (CAIN)
作者: Pinconschi, Eduard Reis, Sofia Zhang, Chi Abreu, Rui Erdogmus, Hakan Pasareanu, Corina S. Jia, Limin Univ Porto FEUP Porto Portugal Univ Lisbon IST Lisbon Portugal Univ Lisbon INESC ID Lisbon Portugal Carnegie Mellon Univ Pittsburgh PA USA
software vulnerability detection (SVD) aims to identify potential security weaknesses in software. SVD systems have been rapidly evolving from those being based on testing, static analysis, and dynamic analysis to tho... 详细信息
来源: 评论
An empirical evaluation of deep learning-based source code vulnerability detection: Representation versus models
收藏 引用
JOURNAL OF software-EVOLUTION AND PROCESS 2023年 第11期35卷
作者: Semasaba, Abubakar Omari Abdallah Zheng, Wei Wu, Xiaoxue Agyemang, Samuel Akwasi Liu, Tao Ge, Yuan Northwestern Polytech Univ Sch Software Xian Peoples R China Yangzhou Univ Sch Informat Engn Yangzhou Peoples R China Anhui Polytech Univ Sch Comp & Informat Anhui Anhui Peoples R China Anhui Polytech Univ Sch Elect Engn Anhui Anhui Peoples R China
Vulnerabilities in the source code of the software are critical issues in the realm of software engineering. Coping with vulnerabilities in software source code is becoming more challenging due to several aspects such... 详细信息
来源: 评论
Hybrid semantics-based vulnerability detection incorporating a Temporal Convolutional Network and Self-attention Mechanism
收藏 引用
INFORMATION AND software TECHNOLOGY 2024年 171卷
作者: Chen, Jinfu Wang, Weijia Liu, Bo Cai, Saihua Towey, Dave Wang, Shengran Jiangsu Univ Sch Comp Sci & Commun Engn Zhenjiang 212013 Peoples R China Jiangsu Univ Jiangsu Key Lab Secur Technol Ind Cyberspace Zhenjiang 212013 Peoples R China Univ Nottingham Ningbo China Sch Comp Sci Ningbo 315100 Zhejiang Peoples R China
Context: Desirable characteristics in vulnerability -detection (VD) systems (VDSs) include both good detection capability (high accuracy, low false positive rate, low false negative rate, etc.) and low time overheads.... 详细信息
来源: 评论
When Less is Enough: Positive and Unlabeled Learning Model for vulnerability detection  23
When Less is Enough: Positive and Unlabeled Learning Model f...
收藏 引用
Proceedings of the 38th IEEE/ACM International Conference on Automated software Engineering
作者: Xin-Cheng Wen Xinchen Wang Cuiyun Gao Shaohua Wang Yang Liu Zhaoquan Gu School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Central University of Finance and Economics China School of Computer Science and Engineering Nanyang Technological University China
Automated code vulnerability detection has gained increasing attention in recent years. The deep learning (DL)-based methods, which implicitly learn vulnerable code patterns, have proven effective in vulnerability det... 详细信息
来源: 评论