Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Guanjun Lin"'
Publikováno v:
IEEE Access, Vol 8, Pp 201900-201913 (2020)
As a key service of the future 6G network, healthcare digital twin is the virtual replica of a person, which employs Internet of Things (IoT) technologies and AI-powered models to predict the state of health and provide suggestions to a range of clin
Externí odkaz:
https://doaj.org/article/a31bb4a9d9504fa180883235993d88e4
Publikováno v:
IEEE Access, Vol 8, Pp 197158-197172 (2020)
Exploitable vulnerabilities in software have attracted tremendous attention in recent years because of their potentially high severity impact on computer security and information safety. Many vulnerability detection methods have been proposed to aid
Externí odkaz:
https://doaj.org/article/8c9bada603444693830b5ae8317a4d64
Publikováno v:
Mathematics, Vol 10, Iss 23, p 4482 (2022)
Detecting vulnerabilities in programs is an important yet challenging problem in cybersecurity. The recent advancement in techniques of natural language understanding enables the data-driven research on automated code analysis to embrace Pre-trained
Externí odkaz:
https://doaj.org/article/624856c0dcc446a8aab5ff71f2672208
Publikováno v:
Algorithms, Vol 14, Iss 11, p 335 (2021)
Exploitable vulnerabilities in software systems are major security concerns. To date, machine learning (ML) based solutions have been proposed to automate and accelerate the detection of vulnerabilities. Most ML techniques aim to isolate a unit of so
Externí odkaz:
https://doaj.org/article/27cd83465d714f0ab5bfa399d1c9a74a
Publikováno v:
IEEE Access, Vol 5, Pp 11142-11154 (2017)
With the trend that the Internet is becoming more accessible and our devices being more mobile, people are spending an increasing amount of time on social networks. However, due to the popularity of online social networks, cyber criminals are spammin
Externí odkaz:
https://doaj.org/article/acb019f7f2c2461e977b150ad9253e92
Publikováno v:
Computer Systems Science and Engineering. 46:1277-1292
Publikováno v:
Neural Computing and Applications. 35:1279-1301
Publikováno v:
Security and Communication Networks, Vol 2022 (2022)
Due to multitudinous vulnerabilities in sophisticated software programs, the detection performance of existing approaches requires further improvement. Multiple vulnerability detection approaches have been proposed to aid code inspection. Among them,
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:438-451
A major cause of security incidents such as cyber attacks is rooted in software vulnerabilities. These vulnerabilities should ideally be found and fixed before the code gets deployed. Machine learning-based approaches achieve state-of-the-art perform
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 18:2469-2485
Machine learning (ML) has great potential in automated code vulnerability discovery. However, automated discovery application driven by off-the-shelf machine learning tools often performs poorly due to the shortage of high-quality training data. The