Výsledky vyhledávání - "Code detection"

  1. 1

    代码克隆检测研究进展综述 Autor 乐乔艺, 刘建勋, 孙晓平, 张祥平

    ISSN: 1002-137X
    Vydáno: 湖南科技大学计算机工程与技术学院 湖南 湘潭 411100 16.11.2021
    Vydáno v 计算机科学 (16.11.2021)
    “…TP312; 软件系统中两个或两个以上的相似代码片段被称为代码克隆(code clone).有研究表明,代码克隆在软件系统中大量存在,并且随着时间推移不断增长.随着代码开源成为潮流,…”
    Získat plný text
    Journal Article
  2. 2

    基于Ngram-TFIDF的深度恶意代码可视化分类方法 Autor 王金伟, 陈正嘉, 谢雪, 罗向阳, 马宾

    ISSN: 1000-436X
    Vydáno: 南京信息工程大学计算机学院,江苏 南京 210044%中国科学技术大学网络空间安全学院,安徽 合肥 230031%信息工程大学网络空间安全学院,河南 郑州 450001%齐鲁工业大学网络空间安全学院,山东 济南 250353 25.06.2024
    Vydáno v 通信学报 (25.06.2024)
    “…TP309; 随着恶意代码规模和种类的不断增加,传统恶意代码分析方法由于依赖于人工提取特征,变得耗时且易出错,因此不再适用.为了提高检测效率和准确性,提出了一种基…”
    Získat plný text
    Journal Article
  3. 3

    Deep visualization classification method for malicious code based on Ngram-TFIDF Autor WANG Jinwei, CHEN Zhengjia, XIE Xue, LUO Xiangyang, MA Bin

    ISSN: 1000-436X
    Vydáno: Editorial Department of Journal on Communications 01.06.2024
    Vydáno v Tongxin Xuebao (01.06.2024)
    “…With the continuous increase in the scale and variety of malware, traditional malware analysis methods, which relied on manual feature extraction, become…”
    Získat plný text
    Journal Article
  4. 4

    Deep visualization classification method for malicious code based on Ngram-TFIDF Autor WANG Jinwei, CHEN Zhengjia, XIE Xue, LUO Xiangyang, MA Bin

    ISSN: 1000-436X
    Vydáno: Editorial Department of Journal on Communications 01.06.2024
    Vydáno v Tongxin Xuebao (01.06.2024)
    “…With the continuous increase in the scale and variety of malware, traditional malware analysis methods, which relied on manual feature extraction, become…”
    Získat plný text
    Journal Article
  5. 5

    Synthetic Malware at Scale: Malicious Code Generation with Code Transplanting Autor Wang, Guangzhan, Chen, Diwei, Gu, Xiaodong, Chen, Yuting, Shen, Beijun

    ISSN: 0098-5589, 1939-3520
    Vydáno: IEEE 2025
    “…Malicious code detection is one of the most essential tasks in safeguarding against security breaches, data compromise, and related threats. While machine…”
    Získat plný text
    Journal Article
  6. 6

    Poisoned source code detection in code models Autor Ghannoum, Ehab, Ghafari, Mohammad

    ISSN: 0164-1212
    Vydáno: Elsevier Inc 01.08.2025
    Vydáno v The Journal of systems and software (01.08.2025)
    “…Deep learning models have gained popularity for conducting various tasks involving source code. However, their black-box nature raises concerns about potential…”
    Získat plný text
    Journal Article
  7. 7
  8. 8

    Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems Autor Lee, Kyungroul, Lee, Sun-Young, Yim, Kangbin

    ISSN: 2169-3536, 2169-3536
    Vydáno: Piscataway IEEE 2019
    Vydáno v IEEE access (2019)
    “…With the advent of big data and cloud services, user data has become an important issue. Although a variety of detection and prevention technologies are used…”
    Získat plný text
    Journal Article
  9. 9

    Code-Shifted Differential Chaos Shift Keying With Code Index Modulation for High Data Rate Transmission Autor Xu, Weikai, Huang, Tingting, Wang, Lin

    ISSN: 0090-6778, 1558-0857
    Vydáno: New York IEEE 01.10.2017
    Vydáno v IEEE transactions on communications (01.10.2017)
    “…In the general code-shifted differential chaos shift keying (GCS-DCSK) system, multiple bit-streams are simultaneously carried by CS-DCSK signal using Walsh…”
    Získat plný text
    Journal Article
  10. 10

    SMCD: Privacy-preserving deep learning based malicious code detection Autor Mu, Gaoli, Zhang, Hanlin, Lin, Jie, Kong, Fanyu

    ISSN: 0167-4048
    Vydáno: Elsevier Ltd 01.03.2025
    Vydáno v Computers & security (01.03.2025)
    “…With the rapid development of the Internet, malicious code has been continuously exposing security issues, posing a significant threat to people’s online…”
    Získat plný text
    Journal Article
  11. 11

    一种静态分析与知识图谱结合的Java冗余代码检测方法 Autor 刘昕炜, 陶传奇

    ISSN: 1002-137X
    Vydáno: 计算机软件新技术国家重点实验室 南京210023 15.03.2023
    Vydáno v 计算机科学 (15.03.2023)
    “…TP311; 冗余代码普遍存在于商业和开源软件中,它的存在可能会增加内存占用,影响代码可维护性,增加维护成本.快速类型分析算法是当前Java冗余代码检测中常用的静态分析方法,…”
    Získat plný text
    Journal Article
  12. 12

    Privacy-Preserving Anomaly Detection of Encrypted Smart Contract for Blockchain-Based Data Trading Autor Chen, Dajiang, Liao, Zeyu, Chen, Ruidong, Wang, Hao, Yu, Chong, Zhang, Kuan, Zhang, Ning, Shen, Xuemin

    ISSN: 1545-5971, 1941-0018
    Vydáno: Washington IEEE 01.09.2024
    “…In a blockchain-based data trading platform, data users can purchase data sets and computing power through encrypted smart contracts. The security of smart…”
    Získat plný text
    Journal Article
  13. 13

    Malicious Code Detection Method Based on Hybrid Quantum Convolutional Neural Network Autor XIONG Qibing, MIAO Qiguang, YANG Tian, YUAN Benzheng, FEI Yangyang

    ISSN: 1002-137X
    Vydáno: Editorial office of Computer Science 01.03.2025
    Vydáno v Ji suan ji ke xue (01.03.2025)
    “…Quantum computing is a new computing model based on quantum mechanics,with powerful parallel computing capabi-lity far beyond classical computing.Hybrid…”
    Získat plný text
    Journal Article
  14. 14

    A Malicious Code Detection Method Based on Stacked Depthwise Separable Convolutions and Attention Mechanism Autor Huang, Hong, Du, Rui, Wang, Zhaolian, Li, Xin, Yuan, Guotao

    ISSN: 1424-8220, 1424-8220
    Vydáno: Basel MDPI AG 01.08.2023
    Vydáno v Sensors (Basel, Switzerland) (01.08.2023)
    “…To address the challenges of weak model generalization and limited model capacity adaptation in traditional malware detection methods, this article presents a…”
    Získat plný text
    Journal Article
  15. 15

    User Authentication: A Three Level Password Authentication Mechanism Autor Mishra, Gouri Sankar, Mishra, Pradeep Kumar, Nand, Parma, Astya, Rani, Amrita

    ISSN: 1742-6588, 1742-6596
    Vydáno: Bristol IOP Publishing 01.12.2020
    Vydáno v Journal of physics. Conference series (01.12.2020)
    “…User authentication is one of the cutting edge research to provide access to legitimate uses. A number of mechanisms like biometric, image based, graphical…”
    Získat plný text
    Journal Article
  16. 16

    Java Code Clone Detection by Exploiting Semantic and Syntax Information From Intermediate Code-Based Graph Autor Yuan, Dawei, Fang, Sen, Zhang, Tao, Xu, Zhou, Luo, Xiapu

    ISSN: 0018-9529, 1558-1721
    Vydáno: New York IEEE 01.06.2023
    Vydáno v IEEE transactions on reliability (01.06.2023)
    “…Code clone detection plays a critical role in the field of software engineering. To achieve this goal, developers are required to have rich development…”
    Získat plný text
    Journal Article
  17. 17

    Fast Blind Recognition of Channel Codes Autor Moosavi, Reza, Larsson, Erik G.

    ISSN: 0090-6778, 1558-0857, 1558-0857
    Vydáno: New York, NY IEEE 01.05.2014
    Vydáno v IEEE transactions on communications (01.05.2014)
    “…We present a fast algorithm that, for a given input sequence and a linear channel code, computes the syndrome posterior probability (SPP) of the code, i.e.,…”
    Získat plný text
    Journal Article
  18. 18

    Knowledge Graph Construction and Intelligent Application Based on Enterprise-level Big Data of Nuclear Power Industry Autor Zhengyu, Zou, Qinhao, Wu, Zhiqiang, Zhu

    ISSN: 1877-0509, 1877-0509
    Vydáno: Elsevier B.V 2022
    Vydáno v Procedia computer science (2022)
    “…This paper is based on the needs of nuclear power business, combined with big data processing, deep learning, natural language processing and other related…”
    Získat plný text
    Journal Article
  19. 19

    Coarse-to-fine visual autonomous unmanned aerial vehicle landing on a moving platform Autor Cui, Qiangqiang, Liu, Min, Huang, Xiaoyin, Gao, Ming

    ISSN: 2667-3797, 2667-3797
    Vydáno: Elsevier B.V 01.03.2023
    Vydáno v Biomimetic intelligence and robotics (01.03.2023)
    “…Autonomous unmanned aerial vehicle (UAV) landing is a challenging task, especially on a moving platform in an unstructured environment. Under such a scenario,…”
    Získat plný text
    Journal Article
  20. 20

    A User-Friendly Machine Learning Pipeline for Automated Leaf Segmentation in Atriplex lentiformis Autor Yung, Michelle Lynn, Murawska-Wlodarczyk, Kamila, Babst-Kostecka, Alicja, Maier, Raina Margaret, Merchant, Nirav, Ooi, Aikseng

    ISSN: 1177-9322, 1177-9322
    Vydáno: United States SAGE Publications 01.01.2025
    Vydáno v Bioinformatics and biology insights (01.01.2025)
    “…Automated leaf segmentation pipelines must balance accuracy, scalability, and usability to be readily adopted in plant research. We present an end-to-end deep…”
    Získat plný text
    Journal Article