共 71 条
- [1] [Anonymous], 2013, Advances in neural information processing systems
- [2] [Anonymous], The 2021 common weakness enumeration top 25 most dangerous software weaknesses
- [3] Bastings J., 2017, C EM PIRICAL METHOD, P1957
- [5] MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks [J]. 2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022), 2022, : 1456 - 1468
- [7] BinGo: Cross-Architecture Cross-OS Binary Search [J]. FSE'16: PROCEEDINGS OF THE 2016 24TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2016, : 678 - 689
- [9] Cluster-GCN: An Efficient Algorithm for Training Deep and Large Graph Convolutional Networks [J]. KDD'19: PROCEEDINGS OF THE 25TH ACM SIGKDD INTERNATIONAL CONFERENCCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2019, : 257 - 266
- [10] Dahl GE, 2013, INT CONF ACOUST SPEE, P8609, DOI 10.1109/ICASSP.2013.6639346