共 169 条
[1]
360 Security, 2022, QIH
[2]
Alenezi Mamdouh, 2018, 5th International Symposium on Data Mining Applications. Advances in Intelligent Systems and Computing (AISC 753), P84, DOI 10.1007/978-3-319-78753-4_8
[3]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
[4]
code2vec: Learning Distributed Representations of Code
[J].
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL,
2019, 3 (POPL)
[5]
Alqahtani EJ, 2019, 2019 SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), P110, DOI [10.1109/SDS.2019.8768729, 10.1109/sds.2019.8768729]
[6]
Alsayra, 2020, INTELLIGENCE SECURIT
[7]
Machine Learning from Theory to Algorithms: An Overview
[J].
SECOND NATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE (NCCI 2018),
2018, 1142
[8]
Amalfitano D, 2012, IEEE INT CONF AUTOM, P258, DOI 10.1145/2351676.2351717
[10]
Android, 2021, ANDROID SECURITY B