共 93 条
[2]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[4]
code2vec: Learning Distributed Representations of Code
[J].
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL,
2019, 3 (POPL)
[5]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[7]
Atici MA, 2016, 2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), P26, DOI 10.1109/ISDFS.2016.7473512
[8]
Bamman D., 2013, arXiv
[9]
Bhatia T, 2017, 2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), DOI 10.1109/CyberSecPODS.2017.8074847
[10]
Booz J, 2018, 2018 19TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), P140, DOI 10.1109/SNPD.2018.8441128