Cited By
View all- Liu SMa WWang JXie XFeng RLiu YShrivastava ASui Y(2024)Enhancing Code Vulnerability Detection via Vulnerability-Preserving Data AugmentationProceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems10.1145/3652032.3657564(166-177)Online publication date: 20-Jun-2024
- Yongxu HYing ZPengzhi XZhen G(2024)Research on Buffer Overflow Vulnerability Mining Method Based on Deep Learning2024 2nd International Conference on Big Data and Privacy Computing (BDPC)10.1109/BDPC59998.2024.10649293(28-36)Online publication date: 10-Jan-2024
- Sun HCui LLi LDing ZLi SHao ZZhu H(2024)VDTriplet: Vulnerability Detection with Graph Semantics Using Triplet ModelComputers & Security10.1016/j.cose.2024.103732(103732)Online publication date: Jan-2024
- Show More Cited By