Author of the publication

Game Rewards Vulnerabilities: Software Vulnerability Detection with Zero-Sum Game and Prototype Learning.

, , , , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection., , , , , and . ASE, page 345-357. IEEE, (2023)SCALE: Constructing Structured Natural Language Comment Trees for Software Vulnerability Detection., , , , and . CoRR, (2024)Adaptive Scaling for U-Net in Time Series Classification., and . ICONIP (1), volume 13623 of Lecture Notes in Computer Science, page 309-320. Springer, (2022)LIVABLE: Exploring Long-Tailed Classification of Software Vulnerability Types., , , , , and . IEEE Trans. Software Eng., 50 (6): 1325-1339 (June 2024)Constructing Effective In-Context Demonstration for Code Intelligence Tasks: An Empirical Study., , , , and . CoRR, (2023)The Application of Capsule Neural Network Based CNN for Speech Emotion Recognition., , , and . ICPR, page 9356-9362. IEEE, (2020)A heterogeneous ensemble of trees., , , and . SSCI, page 1-6. IEEE, (2017)Oblique Random Forests on Residual Network Features., , and . ICONIP (3), volume 12534 of Lecture Notes in Computer Science, page 306-317. Springer, (2020)VulEval: Towards Repository-Level Evaluation of Software Vulnerability Detection., , , , , and . CoRR, (2024)ReposVul: A Repository-Level High-Quality Vulnerability Dataset., , , , , and . ICSE Companion, page 472-483. ACM, (2024)