Results 31 to 40 of about 113,367 (297)

JACLNet:Application of adaptive code length network in JavaScript malicious code detection.

open access: yesPLoS ONE, 2022
Currently, JavaScript malicious code detection methods are becoming more and more effective. Still, the existing methods based on deep learning are poor at detecting too long or too short JavaScript code.
Zhining Zhang   +5 more
doaj   +1 more source

FAM: Featuring Android Malware for Deep Learning-Based Familial Analysis

open access: yesIEEE Access, 2022
To handle relentlessly emerging Android malware, deep learning has been widely adopted in the research community. Prior work proposed deep learning-based approaches that use different features of malware, and reported a high accuracy in malware detection,
Younghoon Ban   +4 more
doaj   +1 more source

Loop Transformations using Clang’s Abstract Syntax Tree [PDF]

open access: yes50th International Conference on Parallel Processing Workshop, 2021
LLPP'21 ( The First Workshop on LLVM in Parallel Processing ...
openaire   +3 more sources

Type-Directed Program Transformations for the Working Functional Programmer [PDF]

open access: yes, 2020
We present preliminary research on Deuce+, a set of tools integrating plain text editing with structural manipulation that brings the power of expressive and extensible type-directed program transformations to everyday, working programmers without a ...
Chugh, Ravi, Lubin, Justin
core   +1 more source

Long short‐term memory on abstract syntax tree for SQL injection detection

open access: yesIET Software, 2021
SQL injection attack (SQLIA) is a code injection technique, used to attack data‐driven applications by executing malicious SQL statements. Techniques like pattern matching, software testing and grammar analysis etc.
Z. Zhuo, T. Cai, X. Zhang, F. Lv
doaj   +1 more source

Abstract Syntax Tree Based Source Code Antiplagiarism System for Large Projects Set

open access: yesIEEE Access, 2020
The paper deals with the issue of detecting plagiarism in source code, which we unfortunately encounter when teaching subjects dealing with programming and software development.
Michal Duracik   +3 more
doaj   +1 more source

Synthesis Algorithm of Homology Detection Based on AHP [PDF]

open access: yesInternational Journal of Computational Intelligence Systems, 2013
Traditional software homology detection techniques based on text, token, abstract syntax tree in many cases get the real similarity inaccurately when they work alone.
Baojiang Cui   +5 more
doaj   +1 more source

Target Code Selection by Tilling AST with the Use of Tree Pattern Pushdown Automaton [PDF]

open access: yes, 2014
A new and simple method for target code selection by tilling an abstract syntax tree is presented. As it is usual, tree patterns corresponding to target machine instructions are matched in the abstract syntax tree.
Janousek, Jan
core   +1 more source

An Abstract Syntax Tree Encoding Method for Cross-Project Defect Prediction

open access: yesIEEE Access, 2019
In the last few years, with the development of deep learning theory, researchers have tried to introduce the method of artificial intelligence into the field of software defect prediction (SDP) to improve its prediction effect.
Ziyi Cai, Lu Lu, Shaojian Qiu
doaj   +1 more source

Code Clone Detection Based on Program Vector Tree

open access: yesJisuanji kexue yu tansuo, 2020
Code cloning facilitates software development but also causes recurring bugs and software quality problems. Some types of code clones have very low similarity in literal, leading to difficulty of detection.
ZENG Jie, BEN Kerong, ZHANG Xian, LI Xiaowei, ZHOU Quan
doaj   +1 more source

Home - About - Disclaimer - Privacy