Zobrazeno 1 - 10
of 303
pro vyhledávání: '"ZOU Deqing"'
Publikováno v:
网络与信息安全学报, Vol 7, Iss 5, Pp 113-122 (2021)
For the intelligent vulnerability detection, the system extracts the graph structured source code slices according to the vulnerability characteristics from the program dependency graph of source code, and then presents the graph structured slice inf
Externí odkaz:
https://doaj.org/article/2660b27a345548e4a20851a433eb9701
Autor:
CHEN Haoyu, JIN Hai, ZOU Deqing
Publikováno v:
网络与信息安全学报, Vol 7, Iss 3, Pp 59-71 (2021)
Although the newly introduced SDN and NFV technologies bring flexibility and convenience in network management, the dynamic forwarding policies introduced by SDN may cause invalidation in the network function policies, and the policies in different n
Externí odkaz:
https://doaj.org/article/51101768624246fbb8e6c22f1189bac1
Publikováno v:
网络与信息安全学报, Vol 5, Iss 1, Pp 1-14 (2019)
Static software vulnerability detection is mainly divided into two types according to different analysis objects: vulnerability detection for binary code and vulnerability detection for source code. Because the source code contains more semantic info
Externí odkaz:
https://doaj.org/article/5c811208f34f4a09bf7b4811b8e3aca4
Autor:
Li, Zhen, Wang, Ning, Zou, Deqing, Li, Yating, Zhang, Ruqian, Xu, Shouhuai, Zhang, Chao, Jin, Hai
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as function-level vulnerability dete
Externí odkaz:
http://arxiv.org/abs/2401.09767
Autor:
Li, Zhen, Zhang, Ruqian, Zou, Deqing, Wang, Ning, Li, Yating, Xu, Shouhuai, Chen, Chen, Jin, Hai
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the black-box nature of deep learning mak
Externí odkaz:
http://arxiv.org/abs/2309.10644
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 9 (2013)
Current researches on temporal networks mainly tend to detect community structure. A number of community detection algorithms can obtain community structure on each time slice or each period of time but rarely present the evolution of community struc
Externí odkaz:
https://doaj.org/article/e27b62f088424e76a9206d771fb9e87d
Publikováno v:
In Journal of Network and Computer Applications November 2024 231
Autor:
Li, Zhen, Tang, Jing, Zou, Deqing, Chen, Qian, Xu, Shouhuai, Zhang, Chao, Li, Yichen, Jin, Hai
Automatically detecting software vulnerabilities in source code is an important problem that has attracted much attention. In particular, deep learning-based vulnerability detectors, or DL-based detectors, are attractive because they do not need huma
Externí odkaz:
http://arxiv.org/abs/2108.00669
Android has become the most popular mobile operating system. Correspondingly, an increasing number of Android malware has been developed and spread to steal users' private information. There exists one type of malware whose benign behaviors are devel
Externí odkaz:
http://arxiv.org/abs/2107.04743
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Features extracted from these obfuscated
Externí odkaz:
http://arxiv.org/abs/2107.03799