共 61 条
[1]
code2vec: Learning Distributed Representations of Code
[J].
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL,
2019, 3 (POPL)
[2]
Alon Uri, 2018, INT C LEARNING REPRE
[3]
Source Code Authorship Attribution Using Long Short-Term Memory Based Networks
[J].
COMPUTER SECURITY - ESORICS 2017, PT I,
2018, 10492
:65-82
[4]
Convolutional Neural Networks over Control Flow Graphs for Software Defect Prediction
[J].
2017 IEEE 29TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2017),
2017,
:45-52
[5]
[Anonymous], Tree-sitter
[6]
Bojanowski Piotr., 2017, Trans ACL, V5, P135, DOI [DOI 10.1162/TACL_A_00051, 10.1162/tacla00051, DOI 10.1162/TACLA00051, 10.1162/tacl_a_00051]
[7]
A Theory of Dual Channel Constraints
[J].
2020 IEEE/ACM 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: NEW IDEAS AND EMERGING RESULTS (ICSE-NIER 2020),
2020,
:25-28
[8]
Cheers H, 2019, INT CONF SOFTW ENG, P617, DOI [10.1109/icsess47205.2019.9040853, 10.1109/ICSESS47205.2019.9040853]
[9]
Generating Adversarial Source Programs Using Important Tokens-based Structural Transformations
[J].
2022 26TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2022),
2022,
:173-182
[10]
UNDERSTANDING THE METROPOLIS-HASTINGS ALGORITHM
[J].
AMERICAN STATISTICIAN,
1995, 49 (04)
:327-335