咨询与建议

限定检索结果

文献类型

  • 16 篇 会议
  • 12 篇 期刊文献

馆藏范围

  • 28 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26 篇 工学
    • 24 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 5 篇 电气工程
    • 5 篇 信息与通信工程
    • 1 篇 网络空间安全
  • 1 篇 文学
    • 1 篇 外国语言文学

主题

  • 28 篇 code property gr...
  • 7 篇 vulnerability de...
  • 3 篇 source code vuln...
  • 2 篇 graph neural net...
  • 2 篇 tool evaluation
  • 2 篇 tool integration
  • 2 篇 graph attention ...
  • 2 篇 deep learning
  • 2 篇 source code vuln...
  • 2 篇 static analysis
  • 2 篇 feature fusion
  • 2 篇 abstract syntax ...
  • 2 篇 feature profile
  • 2 篇 machine learning
  • 2 篇 data rebalancing
  • 1 篇 edge feature
  • 1 篇 source embedding
  • 1 篇 vulnerability an...
  • 1 篇 cyber security
  • 1 篇 representation l...

机构

  • 3 篇 chinese acad sci...
  • 3 篇 univ chinese aca...
  • 2 篇 posts & telecomm...
  • 2 篇 fraunhofer aisec...
  • 2 篇 natl engn lab fo...
  • 2 篇 anhui sci & tech...
  • 2 篇 beijing univ pos...
  • 1 篇 wuhan univ techn...
  • 1 篇 zhongguancun lab...
  • 1 篇 college of compu...
  • 1 篇 shenyang aerosp ...
  • 1 篇 kobe univ grad s...
  • 1 篇 faculty of infor...
  • 1 篇 school of comput...
  • 1 篇 univ econ & tech...
  • 1 篇 shahid beheshti ...
  • 1 篇 kobe univ ctr ma...
  • 1 篇 tsinghua univ in...
  • 1 篇 mybank antgroup ...
  • 1 篇 china univ petr ...

作者

  • 3 篇 xin yang
  • 3 篇 zhang chunyong
  • 2 篇 weiss konrad
  • 2 篇 thanh ma cong
  • 2 篇 liu qixu
  • 2 篇 liu bin
  • 2 篇 xuan cho do
  • 2 篇 jia liyuan
  • 2 篇 dong wei
  • 1 篇 liyuan jia
  • 1 篇 figueira alvaro
  • 1 篇 zhang tao
  • 1 篇 jin ze
  • 1 篇 feng yun
  • 1 篇 wei dong
  • 1 篇 van cong bui
  • 1 篇 shameli-sendi al...
  • 1 篇 yang yufei
  • 1 篇 wang shuqi
  • 1 篇 xin wei

语言

  • 28 篇 英文
检索条件"主题词=code Property graph"
28 条 记 录,以下是1-10 订阅
排序:
code property graph based Cross-Domain Vulnerability Detection via Deep Fused Feature
Code Property Graph based Cross-Domain Vulnerability Detecti...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Du, Gewangzi Chen, Liwei Wu, Tongshuai Zheng, Xiong Shi, Gang Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China
Deep learning is becoming an important means to detect source code vulnerabilities. However, the most severe problem is the compromise of detection performance when there is a scarcity of labeled data. Researchers emp... 详细信息
来源: 评论
What Makefile? Detecting Compiler Information Without Source Using The code property graph  4
What Makefile? Detecting Compiler Information Without Source...
收藏 引用
IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS-ISA)
作者: Deaton, Sean Blue Star & Bogart Associates Columbia MD 21045 USA
Users frequently lack access to the underlying source code and build artifacts of the programs they use. Without access, uncovering information about programs, such as compiler information or security properties, beco... 详细信息
来源: 评论
CPGBERT: An Effective Model for Defect Detection by Learning Program Semantics via code property graph  21
CPGBERT: An Effective Model for Defect Detection by Learning...
收藏 引用
21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom)
作者: Liu, Jingqiang Zhu, Xiaoxi Liu, Chaoge Cui, Xiang Liu, Qixu Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China Zhongguancun Lab Beijing Peoples R China
With the increasing complexity of software composition, code defects have become a long-term problem in software security. Traditional static analysis techniques cannot exhaustively enumerate all unsafe modes, and pro... 详细信息
来源: 评论
REMS: Recommending Extract Method Refactoring Opportunities via Multi-view Representation of code property graph  31
REMS: Recommending Extract Method Refactoring Opportunities ...
收藏 引用
31st IEEE/ACM International Conference on Program Comprehension (ICPC)
作者: Cui, Di Wang, Qiangqiang Wang, Siqi Chi, Jianlei Li, Jianan Wang, Lu Li, Qingshan Xidian Univ Sch Comp Sci & Technol Xian 710071 Peoples R China
Extract Method is one of the most frequently performed refactoring operations for the decomposition of large and complex methods, which can also be combined with other refactoring operations to remove a variety of des... 详细信息
来源: 评论
CPGVA: code property graph based Vulnerability Analysis by Deep Learning
CPGVA: Code Property Graph based Vulnerability Analysis by D...
收藏 引用
10th International Conference on Advanced Infocomm Technology (ICAIT)
作者: Wang Xiaomeng Zhang Tao Wu Runpu Xin Wei Hou Changyu China Informat Technol Secur Evaluat Ctr Beijing Peoples R China China Anhua Technol Ltd Co Beijing Peoples R China
The vast majority of security breaches encountered recent years are direct result of insecure source code. Therefore, the protection of software critically depends on the identification of security defect in source co... 详细信息
来源: 评论
Cloud property graph: Connecting Cloud Security Assessments with Static code Analysis  14
Cloud Property Graph: Connecting Cloud Security Assessments ...
收藏 引用
IEEE 14th International Conference on Cloud Computing (CLOUD)
作者: Banse, Christian Kunz, Immanuel Schneider, Angelika Weiss, Konrad Fraunhofer AISEC Garching Germany
In this paper, we present the Cloud property graph (CloudPG), which bridges the gap between static code analysis and runtime security assessment of cloud services. The CloudPG is able to resolve data flows between clo... 详细信息
来源: 评论
codeSAGE: A multi-feature fusion vulnerability detection approach using code attribute graphs and attention mechanisms
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2025年 89卷
作者: Zhang, Guodong Yao, Tianyu Qin, Jiawei Li, Yitao Ma, Qiao Sun, Donghong Shenyang Aerosp Univ Sch Comp Shenyang 110000 Liaoning Peoples R China Tsinghua Univ Inst Network Sci & Cyberspace Beijing 100084 Peoples R China Coordinat Ctr China Natl Comp Network Emergency Response Tech Team Beijing 100029 Peoples R China Liaoning Branch Co Coordinat Ctr China Natl Comp Network Emergency Response Tech Team Dalian 116021 Liaoning Peoples R China
Software supply chain security is a critical aspect of modern computer security, with vulnerabilities being a significant threats. Identifying and patching these vulnerabilities promptly can significantly reduce secur... 详细信息
来源: 评论
Optimising source code vulnerability detection using deep learning and deep graph network
收藏 引用
CONNECTION SCIENCE 2025年 第1期37卷
作者: Xuan, Cho Do Luong, Tran Thi Thanh, Ma Cong Posts & Telecommun Inst Technol Fac Informat Secur Hanoi Vietnam Acad Cryptog Tech Hanoi Vietnam
To enhance the effectiveness of vulnerability detection in software developed using C and C++ programming languages, our study introduces a novel correlation calculation method for analyzing and evaluating code Proper... 详细信息
来源: 评论
A Vulnerability Detection Framework Based on graph Decomposition Fusion and Augmented Abstract Syntax Tree  25
A Vulnerability Detection Framework Based on Graph Decomposi...
收藏 引用
Proceedings of the 2025 4th International Conference on Big Data, Information and Computer Network
作者: Yalong Yu Cheng Zhang School of Computer Science and Technology Anhui University Hefei Anhui China
Nowadays, the method of using deep learning models for vulnerability detection is widely applied. Most of the methods convert the code of the program into a graph, and then use graph learning methods to get features. ... 详细信息
来源: 评论
ADCPG: Classifying JavaScript code property graphs with Explanations for Ad and Tracker Blocking  23
ADCPG: Classifying JavaScript Code Property Graphs with Expl...
收藏 引用
30th ACM SIGSAC Conference on Computer and Communications Security (ACM CCS)
作者: Lee, Changmin Son, Sooel Korea Adv Inst Sci & Technol Daejeon South Korea
Advertising and tracking service (ATS) blocking has been safeguarding the privacy of millions of Internet users from privacy-invasive tracking behaviors. Previous research has proposed using a graph representation tha... 详细信息
来源: 评论