共 67 条
[21]
DEERWESTER S, 1990, J AM SOC INFORM SCI, V41, P391, DOI 10.1002/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO
[22]
2-9
[23]
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:472-489
[24]
Feng Q., 2016, CCS
[25]
Gabel M, 2008, ICSE'08 PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, P321, DOI 10.1145/1368088.1368132
[26]
Gao D., 2008, ICICS
[27]
Gartner says 8.4 billion connected, 2017, GARTN SAYS 8 4 BILL
[28]
Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description
[J].
2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME),
2017,
:125-136
[29]
Hochreiter S, 1997, Neural Computation, V9, P1735
[30]
Huo X., 2016, IJCAI