Results 21 to 30 of about 11,357,928 (275)
Reinforcement-Learning-Guided Source Code Summarization Using Hierarchical Attention
Code summarization (aka comment generation) provides a high-level natural language description of the function performed by code, which can benefit the software maintenance, code categorization and retrieval.
Wenhua Wang+7 more
semanticscholar +1 more source
C Source code Obfuscation using Hash Function and Encryption Algorithm
Obfuscation is a technique for transforming program code into a different form that is more difficult to understand. Several obfuscation methods are used to obfuscate source code, including dead code insertion, code transposition, and string encryption ...
Sarah Rosdiana Tambunan, Nur Rokhman
doaj +1 more source
Complex Cases of Source Code Authorship Identification Using a Hybrid Deep Neural Network
This paper is a continuation of our previous work on solving source code authorship identification problems. The analysis of heterogeneous source code is a relevant issue for copyright protection in commercial software development. This is related to the
Anna Kurtukova+3 more
doaj +1 more source
Are Source Code Metrics “Good Enough” in Predicting Security Vulnerabilities?
Modern systems produce and handle a large volume of sensitive enterprise data. Therefore, security vulnerabilities in the software systems must be identified and resolved early to prevent security breaches and failures.
Sundarakrishnan Ganesh+2 more
doaj +1 more source
A Survey of Automatic Source Code Summarization
Source code summarization refers to the natural language description of the source code’s function. It can help developers easily understand the semantics of the source code.
Chunyan Zhang+6 more
semanticscholar +1 more source
Deep Learning for Source Code Modeling and Generation [PDF]
Deep Learning (DL) techniques for Natural Language Processing have been evolving remarkably fast. Recently, the DL advances in language modeling, machine translation, and paragraph understanding are so prominent that the potential of DL in Software ...
T. H. Le, Hao Chen, M. A. Babar
semanticscholar +1 more source
Automated Data-Processing Function Identification Using Deep Neural Network
The number of software vulnerabilities is increasing year by year. In the era of big data, data-processing software with many users is more concerned by hackers.
Hongyu Kuang+4 more
doaj +1 more source
Scalable Source Code Similarity Detection in Large Code Repositories [PDF]
Source code similarity are increasingly used in application development to identify clones, isolate bugs, and find copy-rights violations. Similar code fragments can be very problematic due to the fact that errors in the original code must be fixed in ...
Firas Alomari, Muhammed Harbi
doaj +1 more source
Meta-Heuristic Guided Feature Optimization for Enhanced Authorship Attribution in Java Source Code
Source code authorship attribution is the task of identifying who develops the code based on learning based on the programmer style. It is one of the critical activities which used extensively in different aspects such as computer security, computer law,
Bilal Al-Ahmad+8 more
doaj +1 more source
Semantic Robustness of Models of Source Code [PDF]
Deep neural networks are vulnerable to adversarial examples-small input perturbations that result in incorrect predictions. We study this problem for models of source code, where we want the neural network to be robust to source-code modifications that ...
Goutham Ramakrishnan+5 more
semanticscholar +1 more source