共 50 条
- [4] ReGVD: Revisiting Graph Neural Networks for Vulnerability Detection [J]. 2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2022), 2022, : 178 - 182
- [5] Flow-sensitive buffer overrun detection based on syntax node [J]. International Symposium on Communications and Information Technologies 2005, Vols 1 and 2, Proceedings, 2005, : 1064 - 1067
- [6] Smart Contract Vulnerability Detection Using Graph Neural Networks [J]. PROCEEDINGS OF THE TWENTY-NINTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, : 3283 - 3290
- [7] Comparison of Program Representations on Vulnerability Detection with Graph Neural Networks [J]. IEIE Transactions on Smart Processing and Computing, 2021, 10 (06): : 477 - 482
- [8] VulDL: Tree-based and Graph-based Neural Networks for Vulnerability Detection and Localization [J]. PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 323 - 332
- [10] Graph Neural Networks Based Memory Inefficiency Detection Using Selective Sampling [J]. SC22: INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS, 2022,