咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 9 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 2 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 生物工程
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 理学
    • 1 篇 生物学

主题

  • 9 篇 code vulnerabili...
  • 4 篇 deep learning
  • 2 篇 software vulnera...
  • 2 篇 software securit...
  • 1 篇 meta-learning te...
  • 1 篇 prompt engineeri...
  • 1 篇 datasets
  • 1 篇 code reconstruct...
  • 1 篇 program analysis
  • 1 篇 graph informatio...
  • 1 篇 software securit...
  • 1 篇 deep graph neura...
  • 1 篇 neural networks
  • 1 篇 clone detection
  • 1 篇 source code anal...
  • 1 篇 vulnerable sourc...
  • 1 篇 computer securit...
  • 1 篇 bi-directional g...
  • 1 篇 software reuse
  • 1 篇 static analysis

机构

  • 1 篇 tsinghua univ sc...
  • 1 篇 peking univ wang...
  • 1 篇 inst politecn na...
  • 1 篇 southern univ sc...
  • 1 篇 hangzhou informa...
  • 1 篇 peoples publ sec...
  • 1 篇 univ leeds leeds...
  • 1 篇 northwest univ s...
  • 1 篇 univ cagliari ca...
  • 1 篇 zhejiang univ co...
  • 1 篇 alibaba damo aca...
  • 1 篇 xian technol uni...
  • 1 篇 shenzhen msu bit...
  • 1 篇 ctr invest innov...
  • 1 篇 univ complutense...
  • 1 篇 electrical and c...
  • 1 篇 pluribus one cag...
  • 1 篇 hangzhou dianzi ...
  • 1 篇 northwest univ x...
  • 1 篇 univ leeds sch c...

作者

  • 2 篇 ye guixin
  • 2 篇 tang zhanyong
  • 2 篇 fang dingyi
  • 2 篇 wang huanting
  • 2 篇 wang zheng
  • 1 篇 perez-meana hect...
  • 1 篇 huang chen
  • 1 篇 pintor maura
  • 1 篇 luo ping
  • 1 篇 li peiyue
  • 1 篇 toscano-medina l...
  • 1 篇 tan shin hwei
  • 1 篇 hernandez-suarez...
  • 1 篇 bian lizhong
  • 1 篇 yu dongjin
  • 1 篇 ke xin
  • 1 篇 li guiping
  • 1 篇 trad fouad
  • 1 篇 sun jianguo
  • 1 篇 chen xin

语言

  • 8 篇 英文
  • 1 篇 其他
检索条件"主题词=code vulnerability detection"
9 条 记 录,以下是1-10 订阅
排序:
Vul-LMGNNs: Fusing language models and online-distilled graph neural networks for code vulnerability detection
收藏 引用
INFORMATION FUSION 2025年 115卷
作者: Liu, Ruitong Wang, Yanbin Xu, Haitao Sun, Jianguo Zhang, Fan Li, Peiyue Guo, Zhenhao Shenzhen MSU BIT Univ Shenzhen 518172 Peoples R China Xidian Univ Hangzhou Res Inst Technol Hangzhou 311200 Peoples R China Zhejiang Univ Coll Comp Sci & Technol Sch Cyber Sci & Technol Hangzhou 310027 Peoples R China Peoples Publ Secur Univ China Beijing 100038 Peoples R China
code Language Models (codeLMs) and Graph Neural Networks (GNNs) are widely used in code vulnerability detection. However, a critical yet often overlooked issue is that GNNs primarily rely on aggregating information fr... 详细信息
来源: 评论
Manual Prompt Engineering is Not Dead: A Case Study on Large Language Models for code vulnerability detection with DSPy  8
Manual Prompt Engineering is Not Dead: A Case Study on Large...
收藏 引用
8th International Conference on Data Science and Machine Learning Applications, CDMA 2025
作者: Trad, Fouad Chehab, Ali Electrical and Computer Engineering American University of Beirut Beirut Lebanon
Automated prompt engineering tools have recently emerged as a promising solution to simplify the traditional man-ual task of crafting prompts for large language models (LLMs). This study investigates whether such tool... 详细信息
来源: 评论
Combining Graph-Based Learning With Automated Data Collection for code vulnerability detection
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2021年 16卷 1943-1958页
作者: Wang, Huanting Ye, Guixin Tang, Zhanyong Tan, Shin Hwei Huang, Songfang Fang, Dingyi Feng, Yansong Bian, Lizhong Wang, Zheng Northwest Univ Sch Informat Sci & Technol Xian 710127 Peoples R China Southern Univ Sci & Technol Dept Comp Sci & Engn Shenzhen 518055 Peoples R China Alibaba DAMO Acad Hangzhou 311121 Peoples R China Peking Univ Wangxuan Inst Comp Technol WICT Beijing 100871 Peoples R China Hangzhou Informat & Technol Co Ltd Hangzhou 310099 Peoples R China Univ Leeds Sch Comp Leeds LS2 9JT W Yorkshire England
This paper presents FUNDED (Flow-sensitive vUl-Nerability code detection), a novel learning framework for building vulnerability detection models. Funded leverages the advances in graph neural networks (GNNs) to devel... 详细信息
来源: 评论
VulGraB: Graph-embedding-based code vulnerability detection with bi-directional gated graph neural network
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2023年 第8期53卷 1631-1658页
作者: Wang, Sixuan Huang, Chen Yu, Dongjin Chen, Xin Hangzhou Dianzi Univ Sch Comp Sci & Technol Hangzhou 310018 Peoples R China
code vulnerabilities can have serious consequences such as system attacks and data leakage, making it crucial to perform code vulnerability detection during the software development phase. Deep learning is an emerging... 详细信息
来源: 评论
On the code vulnerability detection Based on Deep Learning: A Comparative Study
收藏 引用
IEEE ACCESS 2024年 12卷 152377-152391页
作者: Li, Guiping Yang, Yege Xian Technol Univ Sch Comp Sci & Engn Xian 710021 Peoples R China
Deep learning is one of the important methods to detect and fix vulnerabilities in software programs. How to represent code information and how to use artificial intelligence methods to learn and understand code seman... 详细信息
来源: 评论
SQVDT: A scalable quantitative vulnerability detection technique for source code security assessment
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2021年 第2期51卷 294-318页
作者: Akram, Junaid Luo, Ping Tsinghua Univ Sch Software Key Lab Informat Syst Secur Beijing Peoples R China
vulnerability detection and exploit is becoming a very important part of security, especially in malware code delivery, hacking a system, efforts to create patches, improving the source code, or updating a software. V... 详细信息
来源: 评论
Question-Answer Methodology for Vulnerable Source code Review via Prototype-Based Model-Agnostic Meta-Learning
收藏 引用
FUTURE INTERNET 2025年 第1期17卷 33-33页
作者: Corona-Fraga, Pablo Hernandez-Suarez, Aldo Sanchez-Perez, Gabriel Toscano-Medina, Linda Karina Perez-Meana, Hector Portillo-Portillo, Jose Olivares-Mercado, Jesus Villalba, Luis Javier Garcia Ctr Invest Innovac Tecnol Informac & Comunicac Ave San Fernando 37 Mexico City 14050 Mexico Inst Politecn Nacl ESIME Culhuacan Mexico City 04440 Mexico Univ Complutense Madrid UCM Fac Comp Sci & Engn Dept Software Engn & Artificial Intelligence DISIA Off 431Grp Anal Secur & Syst GASS Calle Prof Jose Garcia Santesmases 9Ciudad Univ Madrid 28040 Spain
In cybersecurity, identifying and addressing vulnerabilities in source code is essential for maintaining secure IT environments. Traditional static and dynamic analysis techniques, although widely used, often exhibit ... 详细信息
来源: 评论
Explainability-based Debugging of Machine Learning for vulnerability Discovery  22
Explainability-based Debugging of Machine Learning for Vulne...
收藏 引用
17th International Conference on Availability, Reliability and Security (ARES)
作者: Sotgiu, Angelo Pintor, Maura Biggio, Battista Pluribus One Cagliari Italy Univ Cagliari Cagliari Italy
Machine learning has been successfully used for increasingly complex and critical tasks, achieving high performance and efficiency that would not be possible for human operators. Unfortunately, recent studies have sho... 详细信息
来源: 评论
Detecting code vulnerabilities by learning from large-scale open source repositories
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022年 69卷
作者: Xu, Rongze Tang, Zhanyong Ye, Guixin Wang, Huanting Ke, Xin Fang, Dingyi Wang, Zheng Northwest Univ Xian Peoples R China Univ Leeds Leeds England
Machine learning methods are widely used to identify common, repeatedly occurring bugs and code vulnerabilities. The performance of a machine-learned model is bounded by the quality and quantity of training data and t... 详细信息
来源: 评论