咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 11 篇 计算机科学与技术...
    • 6 篇 电气工程
    • 4 篇 信息与通信工程
    • 2 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 化学工程与技术
  • 2 篇 理学
    • 2 篇 化学
    • 1 篇 生物学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 12 篇 source code vuln...
  • 3 篇 code property gr...
  • 3 篇 feature profile
  • 2 篇 graph neural net...
  • 2 篇 code similarity
  • 2 篇 deep learning
  • 2 篇 computer archite...
  • 2 篇 source code vuln...
  • 2 篇 contrastive lear...
  • 2 篇 codes
  • 2 篇 data rebalancing
  • 2 篇 source coding
  • 1 篇 edge feature
  • 1 篇 source embedding
  • 1 篇 transformer
  • 1 篇 transformers
  • 1 篇 source code repr...
  • 1 篇 hierarchical att...
  • 1 篇 natural language...
  • 1 篇 neural networks

机构

  • 3 篇 posts & telecomm...
  • 2 篇 korea univ sch c...
  • 1 篇 civil aviat univ...
  • 1 篇 yangzhou univ sc...
  • 1 篇 hunan dajia data...
  • 1 篇 inner mongolia a...
  • 1 篇 faculty of infor...
  • 1 篇 huazhong univ sc...
  • 1 篇 univ econ & tech...
  • 1 篇 lig nex1 cyber w...
  • 1 篇 civil aviat univ...
  • 1 篇 hubei univ techn...
  • 1 篇 univ sci ho chi ...
  • 1 篇 china mobile grp...
  • 1 篇 univ informat te...
  • 1 篇 univ edinburgh e...
  • 1 篇 department of in...
  • 1 篇 southwest jiaoto...
  • 1 篇 katholieke univ ...
  • 1 篇 lig nex1 cyber w...

作者

  • 2 篇 thanh ma cong
  • 2 篇 han sungmin
  • 2 篇 kim kwangsoo
  • 2 篇 kang jaesik
  • 2 篇 lee sangkyun
  • 2 篇 xuan cho do
  • 1 篇 yang haiyun
  • 1 篇 han daoqi
  • 1 篇 xu hao
  • 1 篇 fan yuanhai
  • 1 篇 van cong bui
  • 1 篇 gui qingchi
  • 1 篇 kim miju
  • 1 篇 tang mingwei
  • 1 篇 hu jie
  • 1 篇 zhao mingfeng
  • 1 篇 fu xueliang
  • 1 篇 tang wei
  • 1 篇 cho do xuan
  • 1 篇 zhang jixin

语言

  • 12 篇 英文
检索条件"主题词=Source code vulnerability detection"
12 条 记 录,以下是1-10 订阅
排序:
An Improved Software source code vulnerability detection Method: Combination of Multi-Feature Screening and Integrated Sampling Model
收藏 引用
SENSORS 2025年 第6期25卷 1816-1816页
作者: He, Xin Han, Daoqi Zhou, Shuncheng Fu, Xueliang Li, Honghui Inner Mongolia Agr Univ Hohhot Coll Comp & Informat Engn Hohhot 010018 Peoples R China
vulnerability detection in software source code is crucial in ensuring software security. Existing models face challenges with dataset class imbalance and long training times. To address these issues, this paper intro... 详细信息
来源: 评论
Optimising source code vulnerability detection using deep learning and deep graph network
收藏 引用
CONNECTION SCIENCE 2025年 第1期37卷
作者: Xuan, Cho Do Luong, Tran Thi Thanh, Ma Cong Posts & Telecommun Inst Technol Fac Informat Secur Hanoi Vietnam Acad Cryptog Tech Hanoi Vietnam
To enhance the effectiveness of vulnerability detection in software developed using C and C++ programming languages, our study introduces a novel correlation calculation method for analyzing and evaluating code Proper... 详细信息
来源: 评论
source code vulnerability detection Using vulnerability Dependency Representation Graph  21
Source Code Vulnerability Detection Using Vulnerability Depe...
收藏 引用
21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom)
作者: Yang, Hongyu Yang, Haiyun Zhang, Liang Cheng, Xiang Civil Aviat Univ China Sch Comp Sci & Technol Sch Safely Sci & Engn Tianjin Peoples R China Civil Aviat Univ China Sch Comp Sci & Technol Tianjin Peoples R China Univ Arizona Sch Informat Tucson AZ USA Yangzhou Univ Sch Informat Engn Yangzhou Jiangsu Peoples R China
Aiming at the fact that the existing source code vulnerability detection methods did not explicitly maintain the semantic information related to the vulnerability in the source code, which made it difficult for the vu... 详细信息
来源: 评论
Similarity-Based source code vulnerability detection Leveraging Transformer Architecture: Harnessing Cross- Attention for Hierarchical Analysis
收藏 引用
IEEE ACCESS 2024年 12卷 150295-150307页
作者: Han, Sungmin Kim, Miju Kang, Jaesik Kim, Kwangsoo Lee, Seungwoon Lee, Sangkyun Korea Univ Sch Cybersecur Seoul 02841 South Korea LIG Nex1 Cyber Warfare Res & Dev Lab Seongnam Si 13488 South Korea
The growing complexity and volume of modern software have led to an increase in source code vulnerabilities, posing significant security risks. In response, deep learning-based automated source code vulnerability dete... 详细信息
来源: 评论
code-SMASH: source-code vulnerability detection Using Siamese and Multi-Level Neural Architecture
收藏 引用
IEEE ACCESS 2024年 12卷 102492-102504页
作者: Han, Sungmin Nam, Hyunkyung Kang, Jaesik Kim, Kwangsoo Cho, Seungjae Lee, Sangkyun Korea Univ Sch Cybersecur Seoul 02841 South Korea LIG Nex1 Cyber Warfare Res & Dev Lab Seongnam 13488 South Korea
The rapid evolution of software development, propelled by competitive demands and the continuous integration of new features, frequently leads to inadvertent security oversights. Traditional security practices, often ... 详细信息
来源: 评论
A vulnerability detection algorithm based on residual graph attention networks for source code imbalance (RGAN)
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2024年 238卷
作者: Tang, Mingwei Tang, Wei Gui, Qingchi Hu, Jie Zhao, Mingfeng Xihua Univ Sch Comp & Software Engn Chengdu 610039 Sichuan Peoples R China Southwest Jiaotong Univ Sch Comp & Artificial Intelligence Chengdu 611756 Sichuan Peoples R China China Mobile Grp Design Inst Co Ltd Sichuan Branch Chengdu 610045 Sichuan Peoples R China
It is essential to detect potential vulnerabilities in software to ensure its safety. As software systems become more complex, traditional static vulnerability detection methods perform poorly. Currently, deep learnin... 详细信息
来源: 评论
Tensor-based gated graph neural network for automatic vulnerability detection in source code
收藏 引用
SOFTWARE TESTING VERIFICATION & RELIABILITY 2024年 第2期34卷 e1867-e1867页
作者: Yang, Jia Ruan, Ou Zhang, JiXin Hubei Univ Technol Sch Comp Sci Wuhan 430068 Peoples R China
The rapid expansion of smart devices leads to the increasing demand for vulnerability detection in the cyber security field. Writing secure source codes is crucial to protect applications and software. Recent vulnerab... 详细信息
来源: 评论
DetectVul: A statement-level code vulnerability detection for Python
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2025年 163卷
作者: Tran, Hoai-Chau Tran, Anh-Duy Le, Kim-Hung Univ Sci Ho Chi Minh City Ho Chi Minh City Vietnam Univ Informat Technol Ho Chi Minh City Vietnam Vietnam Natl Univ Ho Chi Minh City Vietnam Katholieke Univ Leuven Imec DistriNet Leuven Belgium
Detecting vulnerabilities in source code using graph neural networks (GNN) has gained significant attention in recent years. However, the detection performance of these approaches relies highly on the graph structure,... 详细信息
来源: 评论
VDoTR: vulnerability detection based on tensor representation of comprehensive code graphs
收藏 引用
COMPUTERS & SECURITY 2023年 第1期130卷
作者: Fan, Yuanhai Wan, Chuanhao Fu, Cai Han, Lansheng Xu, Hao Huazhong Univ Sci & Technol Hubei Engn Res Ctr Big Data Secur Sch Cyber Sci & Engn Hubei Key Lab Distributed Syst Secur Wuhan 430074 Peoples R China Hunan Dajia Data Technol Co Ltd Changsha Peoples R China
code vulnerability detection has long been a critical issue due to its potential threat to computer systems. It is imperative to detect source code vulnerabilities in software and remediate them to avoid cyber at-tack... 详细信息
来源: 评论
A New Framework for Software vulnerability detection Based on an Advanced Computing
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 3699-3723页
作者: Bui Van Cong Cho Do Xuan Department of Information Technology University of Economics and Technical IndustriesHanoi100000Vietnam Faculty of Information Security Posts and Telecommunications Institute of TechnologyHanoi100000Vietnam
The detection of software vulnerabilities written in C and C++languages takes a lot of attention and interest *** paper proposes a new framework called DrCSE to improve software vulnerability *** uses an intelligent c... 详细信息
来源: 评论