Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A novel neural source code representation based on abstract syntax tree
Exploiting machine learning techniques for analyzing programs has attracted much
attention. One key problem is how to represent code fragments well for follow-up analysis …
attention. One key problem is how to represent code fragments well for follow-up analysis …
Predictive models in software engineering: Challenges and opportunities
Predictive models are one of the most important techniques that are widely applied in many
areas of software engineering. There have been a large number of primary studies that …
areas of software engineering. There have been a large number of primary studies that …
Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence
Cyber attacks cost the global economy approximately $445 billion per year. To mitigate
attacks, many companies rely on cyber threat intelligence (CTI), or threat intelligence related …
attacks, many companies rely on cyber threat intelligence (CTI), or threat intelligence related …
Graphsearchnet: Enhancing gnns via capturing global dependencies for semantic code search
Code search aims to retrieve accurate code snippets based on a natural language query to
improve software productivity and quality. With the massive amount of available programs …
improve software productivity and quality. With the massive amount of available programs …
Similarity-based analyses on software applications: A systematic literature review
In empirical studies on processes, practices, and techniques of software engineering,
automation and machine learning are gaining popularity. In order to extract knowledge from …
automation and machine learning are gaining popularity. In order to extract knowledge from …
Why my code summarization model does not work: Code comment improvement with category prediction
Code summarization aims at generating a code comment given a block of source code and
it is normally performed by training machine learning algorithms on existing code block …
it is normally performed by training machine learning algorithms on existing code block …
Can pre-trained code embeddings improve model performance? Revisiting the use of code embeddings in software engineering tasks
Word representation plays a key role in natural language processing (NLP). Various
representation methods have been developed, among which pre-trained word embeddings …
representation methods have been developed, among which pre-trained word embeddings …
Clustering mobile apps based on mined textual features
Context: Categorising software systems according to their functionality yields many benefits
to both users and developers. Goal: In order to uncover the latent clustering of mobile apps …
to both users and developers. Goal: In order to uncover the latent clustering of mobile apps …
CRaDLe: Deep code retrieval based on semantic dependency learning
Code retrieval is a common practice for programmers to reuse existing code snippets in the
open-source repositories. Given a user query (ie, a natural language description), code …
open-source repositories. Given a user query (ie, a natural language description), code …
Exploring hacker assets in underground forums
Many large companies today face the risk of data breaches via malicious software,
compromising their business. These types of attacks are usually executed using hacker …
compromising their business. These types of attacks are usually executed using hacker …