2021
DOI: 10.1109/tifs.2020.3044773
|View full text |Cite
|
Sign up to set email alerts
|

Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
86
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 164 publications
(86 citation statements)
references
References 51 publications
0
86
0
Order By: Relevance
“…Six of the research works developed framework to automate vulnerability detection in software product (Wang et al 2015;Bagri & Gupta, 2019;Min et al 2019;Wang et al 2020;Zarakovitis et al 2021). Min et al (2019) designed an Android software vulnerability mining framework based on dynamic taint analysis technology.…”
Section: Analysis and Resultsmentioning
confidence: 99%
“…Six of the research works developed framework to automate vulnerability detection in software product (Wang et al 2015;Bagri & Gupta, 2019;Min et al 2019;Wang et al 2020;Zarakovitis et al 2021). Min et al (2019) designed an Android software vulnerability mining framework based on dynamic taint analysis technology.…”
Section: Analysis and Resultsmentioning
confidence: 99%
“…Predictive modeling. Machine learning has been used to model power consumption [34], task scheduling [74,93,105] of mobile systems, program tuning and modeling in general [12,15,18,19,58,65,97,100,102,104,106,107,110,111,117]. Our work is the first to employ machine learning for 4K MAR offloading.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…], [23], [24], [25], [33], [34], [35], [36], [37], our RL-based solution has the benefit of not requiring labelled a large number of training samples to train the model. Obtaining sufficient and representative training samples to cover a diverse set of workloads seen in deployment have been shown to be difficult [38], [39], [40], [41]. Without a large and sufficient training dataset, a supervised learning method often delivers poor performance during real-life uses as the target program behavior can be significantly different from those seen at the training phase.…”
Section: Introductionmentioning
confidence: 99%