共 50 条
- [3] Detecting malicious Java']Java code using virtual machine auditing [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, 2003, : 153 - 167
- [4] Detecting Integer Overflow Errors in Java']Java Source Code via Machine Learning [J]. 2021 IEEE 33RD INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2021), 2021, : 724 - 728
- [5] Method Level Refactoring Prediction on Five Open Source Java']Java Projects using Machine Learning Techniques [J]. PROCEEDINGS OF THE 12TH INNOVATIONS ON SOFTWARE ENGINEERING CONFERENCE (ISEC), 2019,
- [6] Data Analytics and Machine Learning with Java']Java [J]. PROCEEDINGS OF THE 44TH INTERNATIONAL CONFERENCE "APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS", 2018, 2048
- [7] Detection of obfuscation in java']java malware [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 521 - 529
- [8] A novel code representation for detecting Java']Java code clones using high-level and abstract compiled code representations [J]. PLOS ONE, 2024, 19 (05):
- [9] Performance measurement of dynamically compiled Java']Java executions [J]. CONCURRENCY-PRACTICE AND EXPERIENCE, 2000, 12 (06): : 343 - 362
- [10] Performance Analysis of Java']Java Virtual Machine for Machine Learning Workloads using Apache Spark [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,