Author of the publication

Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention.

, , , , and . ICDF2C, volume 441 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 248-264. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Chinese Handwriting Education System with Automatic Error Detection., , , and . J. Softw., 4 (2): 101-107 (2009)Prediction of Fuel Consumption for Enroute Ship Based on Machine Learning., , , , , and . IEEE Access, (2019)Research on Composite SaaS Placement Problem Based on Ant Colony Optimization Algorithm with Performance Matching Degree Strategy., , and . J. Digit. Inf. Manag., 12 (4): 225-234 (2014)Research on Medical Image Classification Based on Machine Learning., and . IEEE Access, (2020)Density Peaks Clustering Based on Feature Reduction and Quasi-Monte Carlo., , , , , , and . Sci. Program., (2022)Automatic Online Educational Game Content Creation by Identifying Similar Chinese Characters with Radical Extraction and Graph Matching Algorithms., , , , and . Int. J. Distance Educ. Technol., 8 (3): 31-46 (2010)Quantitative matching method for network traffic features., and . CIS, page 394-398. IEEE, (2022)ARNets: Action Recurrent Networks for Human Action Recognition., , , , , and . ICIGP, page 8-15. ACM, (2023)Stroke Correspondence Based on Graph Matching for Detecting Stroke Production Errors in Chinese Character Handwriting., , and . PCM, volume 4810 of Lecture Notes in Computer Science, page 734-743. Springer, (2007)Liberate Pseudo Labels from Over-Dependence: Label Information Migration on Sparsely Labeled Graphs., , , , , and . CIKM, page 833-842. ACM, (2023)