Mining Method of Code Vulnerability of Multi-Source Power IoT Terminal Based on Reinforcement Learning

被引:0
|
作者
Yang, Hao [1 ]
Zhang, Junfeng [2 ]
Li, Jun [2 ]
Xie, Xin [3 ]
机构
[1] State Grid Jiangxi Electric Power Research Institute, Nanchang, China
[2] State Grid Jiangxi Electric Power Co. Ltd, Nanchang, China
[3] East China Jiaotong University, Nanchang, China
关键词
Compendex;
D O I
10.6633/IJNS.202305_25(3).07
中图分类号
学科分类号
摘要
Trees (mathematics)
引用
收藏
页码:436 / 448
相关论文
共 50 条
  • [21] mVulSniffer: a multi-type source code vulnerability sniffer method
    Zhang, Xuejun
    Zhang, Fenghe
    Gai, Jiyang
    Du, Xiaogang
    Zhou, Wenjie
    Cai, Teli
    Zhao, Bo
    [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (09): : 149 - 160
  • [22] Predictive Modeling for Machining Power Based on Multi-source Transfer Learning in Metal Cutting
    Kim, Young-Min
    Shin, Seung-Jun
    Cho, Hae-Won
    [J]. INTERNATIONAL JOURNAL OF PRECISION ENGINEERING AND MANUFACTURING-GREEN TECHNOLOGY, 2022, 9 (01) : 107 - 125
  • [23] Predictive Modeling for Machining Power Based on Multi-source Transfer Learning in Metal Cutting
    Young-Min Kim
    Seung-Jun Shin
    Hae-Won Cho
    [J]. International Journal of Precision Engineering and Manufacturing-Green Technology, 2022, 9 : 107 - 125
  • [24] New calculating method of reliability on multi-source and multi-terminal network system
    School of Petroleum Engineering, Southwest Petroleum University, Chengdu 610500, China
    不详
    [J]. J. Mech. Strength, 2008, 6 (921-926):
  • [25] Ensemble Learning Based Multi-Source Information Fusion
    Xu, Junyi
    Li, Le
    Ji, Ming
    [J]. 2019 INTERNATIONAL CONFERENCE ON IMAGE AND VIDEO PROCESSING, AND ARTIFICIAL INTELLIGENCE, 2019, 11321
  • [26] Broad Learning based Multi-Source Collaborative Recommendation
    Zhu, Junxing
    Zhang, Jiawei
    He, Lifang
    Wu, Quanyuan
    Zhou, Bin
    Zhang, Chenwei
    Yu, Philip S.
    [J]. CIKM'17: PROCEEDINGS OF THE 2017 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2017, : 1409 - 1418
  • [27] Walking representation and simulation based on multi-source image fusion and multi-agent reinforcement learning for gait rehabilitation
    Zhu, Yean
    Xiao, Meirong
    Robbins, Dan
    Wu, Xiaoying
    Lu, Wei
    Hou, Wensheng
    [J]. ARTIFICIAL INTELLIGENCE IN MEDICINE, 2024, 156
  • [28] Multi-source big data dynamic compressive sensing and optimization method for water resources based on IoT
    Zhang, Feng
    Xue, Hui-feng
    Zhang, Jing-Cheng
    [J]. SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS, 2018, 20 : 210 - 219
  • [29] Vulnerability Mining Method Based on Code Property Graph and Attention BiLSTM
    Duan, Xu
    Wu, Jing-Zheng
    Luo, Tian-Yue
    Yang, Mu-Tian
    Wu, Yan-Jun
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (11): : 3404 - 3420
  • [30] A Binary Code Vulnerability Mining Method Based on Generative Adversarial Networks
    Lai, Ji
    Li, Shuo
    Yao, Qigui
    [J]. ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 639 - 650