关注
Yutao Hu
标题
引用次数
引用次数
年份
TreeCen: Building tree graph for scalable semantic code clone detection
Y Hu, D Zou, J Peng, Y Wu, J Shan, H Jin
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
202022
mVulPreter: A Multi-Granularity Vulnerability Detection System With Interpretations
D Zou, Y Hu, W Li, Y Wu, H Zhao, H Jin
IEEE Transactions on Dependable and Secure Computing, 2022
182022
Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?
Y Hu, S Wang, W Li, J Peng, Y Wu, D Zou, H Jin
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
122023
Code2Img: Tree-based Image Transformation for Scalable Code Clone Detection
Y Hu, Y Fang, Y Sun, Y Jia, Y Wu, D Zou, H Jin
IEEE Transactions on Software Engineering, 2023
32023
基于图神经网络的切片级漏洞检测及解释方法
胡雨涛, 王溯远, 吴月明, 邹德清, 李文科, 金海
软件学报 34 (6), 0-0, 2023
22023
系统目前无法执行此操作,请稍后再试。
文章 1–5