共 25 条
[2]
Ben-Nun T., 2018, Advances in Neural Information Processing Systems, P3585
[3]
Cho KYHY, 2014, Arxiv, DOI [arXiv:1406.1078, DOI 10.48550/ARXIV.1406.1078]
[4]
Jiang LX, 2007, PROC INT CONF SOFTW, P96
[5]
Automated Vulnerability Detection in Source Code Using Minimum Intermediate Representation Learning
[J].
APPLIED SCIENCES-BASEL,
2020, 10 (05)
[6]
Li YJ, 2017, Arxiv, DOI arXiv:1511.05493
[7]
Li YJ, 2019, PR MACH LEARN RES, V97
[10]
JDeodorant: Clone Refactoring
[J].
2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C),
2016,
:613-616