咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 1 篇 机械工程
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 3 篇 graph representa...
  • 1 篇 deep learning
  • 1 篇 path compression
  • 1 篇 cwe
  • 1 篇 vulnerability de...
  • 1 篇 smart contract
  • 1 篇 shortest path
  • 1 篇 vulnerability ca...
  • 1 篇 gnn
  • 1 篇 source code

机构

  • 1 篇 college of infor...
  • 1 篇 key laboratory o...
  • 1 篇 school of nation...
  • 1 篇 school of softwa...
  • 1 篇 key laboratory o...
  • 1 篇 key lab of educa...
  • 1 篇 national digital...
  • 1 篇 guangxi key lab ...

作者

  • 1 篇 fuyuan wei
  • 1 篇 chuanjian yao
  • 1 篇 haiying duan
  • 1 篇 shuyi zhang
  • 1 篇 zhenglian li
  • 1 篇 xianxian li
  • 1 篇 peng liu
  • 1 篇 peng gong
  • 1 篇 yuanyuan liao
  • 1 篇 wenzhe ye
  • 1 篇 liejun wang
  • 1 篇 yongnan li
  • 1 篇 shuxin liu
  • 1 篇 wenzhong yang
  • 1 篇 ruiyang huang
  • 1 篇 lixin ji
  • 1 篇 kezierbieke hail...

语言

  • 3 篇 英文
检索条件"主题词=graph representation"
3 条 记 录,以下是1-10 订阅
排序:
GRATDet:Smart Contract Vulnerability Detector Based on graph representation and Transformer
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 1439-1462页
作者: Peng Gong Wenzhong Yang Liejun Wang Fuyuan Wei KeZiErBieKe HaiLaTi Yuanyuan Liao College of Information Science and Engineering Xinjiang UniversityUrumqi830000China Key Laboratory of Signal Detection and Processing in Xinjiang Uygur Autonomous Region Xinjiang UniversityUrumqi830000China Key Laboratory of Multilingual Information Technology in Xinjiang Uygur Autonomous Region Xinjiang UniversityUrumqi830000China
Smart contracts have led to more efficient development in finance and healthcare,but vulnerabilities in contracts pose high risks to their future *** current vulnerability detection methods for contracts are either ba... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Improving Centralized Path Calculation Based on graph Compression
收藏 引用
China Communications 2018年 第6期15卷 120-124页
作者: Zhenglian Li Lixin Ji Ruiyang Huang Shuxin Liu National Digital Switching System Engineering&Technological R&D Center ZhengzhouChina
Shortest-path calculation on weighted graphs are an essential operation in computer networks. The performance of such algorithms has become a critical challenge in emerging software-defined networks(SDN),since SDN con... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
graph neural network based approach Che upo to automatically assigning common weakness enumeration identifiers for vulnerabilities
收藏 引用
Cybersecurity 2024年 第3期7卷 1-15页
作者: Peng Liu Wenzhe Ye Haiying Duan Xianxian Li Shuyi Zhang Chuanjian Yao Yongnan Li Key Lab of Education Blockchain and Intelligent Technology Ministry of EducationGuangxi Normal UniversityGuilin 541004China School of Software Beihang UniversityBeijing 100000China School of National Security People's Public Security University of ChinaBeijing 1000000China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal UniversityGuilin 541004China
Vulnerability reports are essential for improving software security since they record key information on *** a report,CWE denotes the weakness of the vulnerability and thus helps quickly understand the cause of the **... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论