咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 5 篇 计算机科学与技术...
    • 4 篇 软件工程
    • 3 篇 信息与通信工程
    • 2 篇 电气工程
    • 2 篇 网络空间安全
    • 1 篇 控制科学与工程
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 管理学
    • 1 篇 工商管理

主题

  • 9 篇 source code clas...
  • 3 篇 deep learning
  • 2 篇 fuzzy logic
  • 2 篇 software enginee...
  • 2 篇 software vulnera...
  • 2 篇 tainted object p...
  • 2 篇 code exploits
  • 1 篇 pre-trained mode...
  • 1 篇 graph convolutio...
  • 1 篇 lstm
  • 1 篇 program analysis
  • 1 篇 honeypot
  • 1 篇 stacked bi-lstm
  • 1 篇 notebooks
  • 1 篇 micro benchmark
  • 1 篇 static analysis
  • 1 篇 integrated gradi...
  • 1 篇 abstract syntax ...
  • 1 篇 data science wor...
  • 1 篇 software quality

机构

  • 1 篇 peking univ key ...
  • 1 篇 department of in...
  • 1 篇 advanced course ...
  • 1 篇 athens univ econ...
  • 1 篇 nanyang technol ...
  • 1 篇 peking univ key ...
  • 1 篇 aristotle univ t...
  • 1 篇 aristotle univ t...
  • 1 篇 univ alberta mom...
  • 1 篇 department of in...
  • 1 篇 univ zurich dept...
  • 1 篇 aueb dept inform...
  • 1 篇 microsoft micros...
  • 1 篇 the graduate sch...
  • 1 篇 department of in...
  • 1 篇 univ aizu grad d...
  • 1 篇 department of co...
  • 1 篇 wakayama univ so...
  • 1 篇 dhaka univ engn ...

作者

  • 2 篇 katsaros panagio...
  • 2 篇 stergiopoulos ge...
  • 2 篇 gritzalis dimitr...
  • 1 篇 jin zhi
  • 1 篇 赖谷鑫
  • 1 篇 ma lei
  • 1 篇 zhang huangzhao
  • 1 篇 liu yang
  • 1 篇 lu shuai
  • 1 篇 saiki kazuya
  • 1 篇 li zhuo
  • 1 篇 kiyak elife oztu...
  • 1 篇 rahman md mostaf...
  • 1 篇 seiya mitsumori
  • 1 篇 ihara akinori
  • 1 篇 li ge
  • 1 篇 watanobe yutaka
  • 1 篇 birant kokten ul...
  • 1 篇 ramasamy dhivyab...
  • 1 篇 petsanas panagio...

语言

  • 9 篇 英文
检索条件"主题词=source code classification"
9 条 记 录,以下是1-10 订阅
排序:
Comparison of Image-Based and Text-Based source code classification Using Deep Learning
收藏 引用
SN Computer Science 2020年 第5期1卷 1-13页
作者: Kiyak, Elife Ozturk Cengiz, Ayse Betul Birant, Kokten Ulas Birant, Derya The Graduate School of Natural and Applied Sciences Dokuz Eylul University Izmir 35390 Turkey Department of Computer Engineering Dokuz Eylul University Izmir 35390 Turkey
source code classification (SCC) is a task to assign codes into different categories according to a criterion such as according to their functionalities, programming languages or vulnerabilities. Many source code arch... 详细信息
来源: 评论
Deep Learning-based source code classification and Visualization of Decision Rationales
收藏 引用
Procedia Computer Science 2024年 246卷 2753-2761页
作者: Shinichi Oeda Seiya Mitsumori Department of Information and Computer Engineering National Institute of Technology Kisarazu College 11-1 Kiyomidaihigashi 2-chome Kisarazu City Chiba Japan Advanced Course of Control and Information Engineering National Institute of Technology Kisarazu College 11-1 Kiyomidaihigashi 2-chome Kisarazu City Chiba Japan
In programming education, it is crucial to provide instruction that is tailored to students’ proficiency levels. For this purpose, an objective evaluation of each student’s coding ability is essential. Additionally,... 详细信息
来源: 评论
Research on classification of Malware source code
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2014年 第4期19卷 425-430页
作者: 陈嘉玫 赖谷鑫 Department of Information Management National Sun Yat-Sen University Department of Information Management Chinese Culture University
In the face threat of the Internet attack, malware classification is one of the promising solutions in the field of intrusion detection and digital forensics. In previous work, researchers performed dynamic analysis o... 详细信息
来源: 评论
Automated Exploit Detection using Path Profiling The Disposition Should Matter, Not the Position  12
Automated Exploit Detection using Path Profiling <i>The Disp...
收藏 引用
12th International Joint Conference on E-Business and Telecommunications (ICETE)
作者: Stergiopoulos, George Petsanas, Panagiotis Katsaros, Panagiotis Gritzalis, Dimitris Athens Univ Econ & Business Dept Informat Informat Secur & Crit Infrastruct Protect INFOSEC Athens Greece Aristotle Univ Thessaloniki Dept Informat Thessaloniki Greece
Recent advances in static and dynamic program analysis resulted in tools capable to detect various types of security bugs in the Applications under Test (AUT). However, any such analysis is designed for a priori speci... 详细信息
来源: 评论
Execution Path classification for Vulnerability Analysis and Detection  1
收藏 引用
12th International Joint Conference on E-Business and Telecommunications (ICETE)
作者: Stergiopoulos, George Katsaros, Panagiotis Gritzalis, Dimitris AUEB Dept Informat Informat Secur & Crit Infrastruct Protect INFOSEC Athens Greece Aristotle Univ Thessaloniki Dept Informat GR-54006 Thessaloniki Greece
Various commercial and open-source tools exist, developed both by the industry and academic groups, which are able to detect various types of security bugs in applications' source code. However, most of these tool... 详细信息
来源: 评论
A Stacked Bidirectional LSTM Model for Classifying source codes Built in MPLs  21st
A Stacked Bidirectional LSTM Model for Classifying Source Co...
收藏 引用
21st Joint European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD)
作者: Rahman, Md Mostafizer Watanobe, Yutaka Kiran, Rage Uday Kabir, Raihan Univ Aizu Grad Dept Comp Sci & Engn Aizu Wakamatsu Fukushima Japan Dhaka Univ Engn & Technol Dept Comp Sci & Engn Gazipur Bangladesh
Over the years, programmers have improved their programming skills and can now write code in many different languages to solve problems. A lot of new code is being generated all over the world regularly. Since a progr... 详细信息
来源: 评论
Linkage of Similar code Snippets Assessed in the Micro Benchmark Service jsPerf  21
Linkage of Similar Code Snippets Assessed in the Micro Bench...
收藏 引用
21st IEEE International Working Conference on source code Analysis and Manipulation (SCAM)
作者: Saiki, Kazuya Ihara, Akinori Wakayama Univ Social Software Engn Lab SocSEL Wakayama Japan
A benchmark is an action to assess performance (e.g., program execution time) by developers preparing and running several test cases over a long period. To reasonably assess the performance of method-level code snippe... 详细信息
来源: 评论
codeBERT-Attack: Adversarial attack against source code deep learning models via pre-trained model
收藏 引用
JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS 2024年 第3期36卷
作者: Zhang, Huangzhao Lu, Shuai Li, Zhuo Jin, Zhi Ma, Lei Liu, Yang Li, Ge Peking Univ Key Lab High Confidence Software Technol Beijing Peoples R China Microsoft Microsoft Res Asia Beijing Peoples R China Univ Alberta Momentum Lab Edmonton AB Canada Nanyang Technol Univ Sch Comp Sci & Engn Singapore Singapore Peking Univ Key Lab High Confidence Software Technol 16191 Sci Bldg5 Yiheyuan Rd Beijing 100871 Peoples R China
Over the past few years, the software engineering (SE) community has widely employed deep learning (DL) techniques in many source code processing tasks. Similar to other domains like computer vision and natural langua... 详细信息
来源: 评论
Workflow analysis of data science code in public GitHub repositories
收藏 引用
EMPIRICAL SOFTWARE ENGINEERING 2023年 第1期28卷 7-7页
作者: Ramasamy, Dhivyabharathi Sarasua, Cristina Bacchelli, Alberto Bernstein, Abraham Univ Zurich Dept Informat Zurich Switzerland
Despite the ubiquity of data science, we are far from rigorously understanding how coding in data science is performed. Even though the scientific literature has hinted at the iterative and explorative nature of data ... 详细信息
来源: 评论