2025 Vol.8 Aug.N04 |
---|
|
![]() |
Reference: [1] LI Z J, LI T, CHEN H D, et al. Software vulnerability detection method based on abstract syntax tree feature migration(AST-FMVD) [J]. Computer Technology and Development. 2024, 34(6), 81-88. [2] FENG Q W, WANG D H, ZHANG D X. Simulation of software potential overflow vulnerability detection under LSTM-SVM algorithm [J]. Computer Simulation. 2024, 41(2), 487-491. [3] ZHAO H P, XUE D Q, SHANG Z L. Simulation of software source code vulnerability detection based on human-computer interaction big data [J]. Computer Simulation. 2023, 40(11), 388-392+465. [4] CHEN H D, LI L, QIAO M Q, et al. Software vulnerability detection based on mixed representation and cooperative training [J]. Computer Technology and Development. 2024, 34(5), 126-132. [5] LIU J H, WAN M, ZHOU C X, et al. Vulnerability detection in java open source software based on bidirection LSTM [J]. Computer Applications and Software. 2020, 37(12), 322-327. [6] FAN C, QU Z G, WANG B W, et al. CS-GNN:A class-sensitive graph neural network for real-world vulnerability detection [J]. Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition). 2024, 36(5), 1042-1051. [7] WANG Y, FAN L, ZHAO N N. Sequential recommendation model using gated network to construct user’s dynamic interest [J]. Computer Engineering. 2022, 48 (8), 283-291. [8] LUO R R, GONG H F, XU D. Multilayer gating and relational graph attention fusion network for aspect-based sentiment analysis [J]. Computer Engineering and Applications. 2023, 59(15), 169-176. [9] TONG W G, ZENG S C, ZHANG L F. Multi-scale convolutional neural network algorithm for electrical resistance tomography [J]. Computer Applications and Software. 2024, 41(5), 177-182.
|
Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16