Autor der Publikation

Gitor: Scalable Code Clone Detection by Building Global Sample Graph.

, , , , und . ESEC/SIGSOFT FSE, Seite 784-795. ACM, (2023)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

 

Другие публикации лиц с тем же именем

Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing., , , , , , , , и . CoRR, (2024)Gitor: Scalable Code Clone Detection by Building Global Sample Graph., , , , и . ESEC/SIGSOFT FSE, стр. 784-795. ACM, (2023)Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?, , , , , , и . ISSTA, стр. 1407-1419. ACM, (2023)SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis., , , , , , , и . ASE, стр. 821-833. IEEE, (2020)MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis., , , , , и . ASE, стр. 139-150. IEEE, (2019)A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments., , , , , и . ICSE, стр. 12:1-12:13. ACM, (2024)Code2Img: Tree-Based Image Transformation for Scalable Code Clone Detection., , , , , , и . IEEE Trans. Software Eng., 49 (9): 4429-4442 (September 2023)Historical Embedding-Guided Efficient Large-Scale Federated Graph Learning., , , , , , , и . Proc. ACM Manag. Data, 2 (3): 144 (2024)Web-based virtual operating of CNC milling machine tools., и . Comput. Ind., 60 (9): 686-697 (2009)Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model., , , , , , , и . ICSE, стр. 2262-2274. IEEE, (2023)