Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic literature review on the applications of recurrent neural networks in code clone research
FH Quradaa, S Shahzad, RS Almoqbily - Plos one, 2024 - journals.plos.org
Code clones, referring to code fragments that are either similar or identical and are copied
and pasted within software systems, have negative effects on both software quality and …
and pasted within software systems, have negative effects on both software quality and …
HGE-BVHD: Heterogeneous graph embedding scheme of complex structure functions for binary vulnerability homology discrimination
J **ng, S Luo, L Pan, J Hao, Y Guan, Z Wu - Expert Systems with …, 2024 - Elsevier
Homologous vulnerability detection is an important aspect of computer security. It has
several key problems, including discriminating structurally complex functions, supporting …
several key problems, including discriminating structurally complex functions, supporting …
Convolutional neural network-based terahertz spectral classification of liquid contraband for security inspection
Terahertz (THz) spectroscopy is now achieving increasing attention in security inspection
owning to its non-destructiveness and deep penetrability of most packaging materials, such …
owning to its non-destructiveness and deep penetrability of most packaging materials, such …
Multi-modal Learning for WebAssembly Reverse Engineering
The increasing adoption of WebAssembly (Wasm) for performance-critical and security-
sensitive tasks drives the demand for WebAssembly program comprehension and reverse …
sensitive tasks drives the demand for WebAssembly program comprehension and reverse …
[HTML][HTML] IntelliSwAS: Optimizing deep neural network architectures using a particle swarm-based approach
Deep learning is in a continuous evolution and many domains benefit from this substantial
progress in the development of intelligent solutions. While this progress has been swift …
progress in the development of intelligent solutions. While this progress has been swift …
A deep learning‐based approach for software vulnerability detection using code metrics
Vulnerabilities can have devastating effects on information security, affecting the economy,
social stability, and national security. The idea of automatic vulnerability detection has …
social stability, and national security. The idea of automatic vulnerability detection has …
EMBERSim: a large-scale databank for boosting similarity search in malware analysis
In recent years there has been a shift from heuristics based malware detection towards
machine learning, which proves to be more robust in the current heavily adversarial threat …
machine learning, which proves to be more robust in the current heavily adversarial threat …
ToolPhet: Inference of Compiler Provenance From Stripped Binaries With Emerging Compilation Toolchains
Identifying compiler toolchain provenance serves as a basis for both benign and malicious
binary analyses. A wealth of prior studies mostly focuses on the inference of a popular …
binary analyses. A wealth of prior studies mostly focuses on the inference of a popular …
Codeformer: A gnn-nested transformer model for binary code similarity detection
G Liu, X Zhou, J Pang, F Yue, W Liu, J Wang - Electronics, 2023 - mdpi.com
Binary code similarity detection is used to calculate the code similarity of a pair of binary
functions or files, through a certain calculation method and judgment method. It is a …
functions or files, through a certain calculation method and judgment method. It is a …
Automated WebAssembly Function Purpose Identification With Semantics-Aware Analysis
WebAssembly is a recent web standard built for better performance in web applications. The
standard defines a binary code format to use as a compilation target for a variety of …
standard defines a binary code format to use as a compilation target for a variety of …