Vulseye: Detect smart contract vulnerabilities via stateful directed graybox fuzzing
Smart contracts, the cornerstone of decentralized applications, have become increasingly
prominent in revolutionizing the digital landscape. However, vulnerabilities in smart …
prominent in revolutionizing the digital landscape. However, vulnerabilities in smart …
Secure Resource Allocation via Constrained Deep Reinforcement Learning
The proliferation of Internet of Things (IoT) devices and the advent of 6G technologies have
introduced computationally intensive tasks that often surpass the processing capabilities of …
introduced computationally intensive tasks that often surpass the processing capabilities of …
Optimized design refactoring (ODR): a generic framework for automated search-based refactoring to optimize object-oriented software architectures
Software design optimization (SDO) demands advanced abstract reasoning to define
optimal design components' structure and interactions. Modeling tools such as UML and …
optimal design components' structure and interactions. Modeling tools such as UML and …
Analysis of Code Similarity with Triplet Loss-Based Deep Learning System
E Islamoğlu, A Nizam - Recent Trends and Advances in Artificial …, 2024 - books.google.com
Nowadays, several plagiarism detection tools based on static code features are available for
code similarity detection. The application of deep learning in this domain represents an …
code similarity detection. The application of deep learning in this domain represents an …
Applying Graph Learning For Technical Debt Detection
AS Istudor - 2024 - fse.studenttheses.ub.rug.nl
In the domain of software engineering, the increasing presence of Technical Debt (TD)
poses a significant challenge for the quality and long-term maintenance of modern software …
poses a significant challenge for the quality and long-term maintenance of modern software …
Dmvaf: A Privacy-Preserving Multimodal Framework for Decentralized Vulnerability Assessment
Abstract Software Vulnerability Assessment (SVA) plays a crucial role in identifying and
evaluating security vulnerabilities in software systems and prioritizing their resolution …
evaluating security vulnerabilities in software systems and prioritizing their resolution …
Analysis of Code Similarity with Triplet Loss-Based Deep Learning System
ATA Abdellatif, E İslamoğlu, A Nizam - International Conference on …, 2024 - Springer
Nowadays, several plagiarism detection tools based on static code features are available for
code similarity detection. The application of deep learning in this domain represents an …
code similarity detection. The application of deep learning in this domain represents an …
Updates to the Provet Compiler
A Jones - 2024 - diva-portal.org
This thesis addresses the enhancement of the compiler for the Provet soft-SIMD architecture,
necessitated by significant updates to architecture design since the conception of the …
necessitated by significant updates to architecture design since the conception of the …
Utility Libraries for Traversing and Manipulating Tree-like Data Structures with Varying Schemas
A Janicki - 2024 - dspace.mit.edu
Tree-like data structures are very commonly used data types found in the wild in a wide
array of projects JavaScript projects. A specific example of one of these structures is an …
array of projects JavaScript projects. A specific example of one of these structures is an …
[HTML][HTML] РАЗРАБОТКА ПРОГРАММНОГО КОМПЛЕКСА ПРОВЕРКИ ПРАВИЛЬНОСТИ СОСТАВЛЕНИЯ БЛОК-СХЕМ НА ОСНОВЕ ПРОГРАММНОГО КОДА
АР Манджиева - Вестник науки, 2024 - cyberleninka.ru
Исследование фокусируется на рассмотрении методов, которые будут использованы
при разработке программного комплекса. Этот комплекс позволит визуализировать …
при разработке программного комплекса. Этот комплекс позволит визуализировать …