共 26 条
- [1] Bengio Y., 2009, INT C MACH LEARN
- [2] Cadar Cristian, 2008, P 8 USENIX C OP SYST, P209
- [3] Dey R, 2017, MIDWEST SYMP CIRCUIT, P1597, DOI 10.1109/MWSCAS.2017.8053243
- [4] Engler D., 2001, Operating Systems Review, V35, P57, DOI 10.1145/502059.502041
- [5] Feng ZY, 2020, Arxiv, DOI [arXiv:2002.08155, DOI 10.48550/ARXIV.2002.08155, 10.48550/arXiv.2002.08155]
- [6] Learning to forget: Continual prediction with LSTM [J]. NEURAL COMPUTATION, 2000, 12 (10) : 2451 - 2471
- [7] Guo DY, 2021, Arxiv, DOI arXiv:2009.08366
- [8] VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 595 - 614
- [9] Li Z., 2005, P 10 EUR SOFTW ENG C, P306, DOI [DOI 10.1145/1095430.1081755, 10.1145/1081706.1081755, DOI 10.1145/1081706.1081755]
- [10] Li Z, 2018, Arxiv, DOI arXiv:1801.01681