Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

邮发代号 80-970

2019 Impact Factor: 1.275

Frontiers of Computer Science  2022, Vol. 16 Issue (2): 162201   https://doi.org/10.1007/s11704-020-0312-6
  本期目录
Automated detection on the security of the linked-list operations
Hongyu KUANG, Jian WANG(), Ruilin LI, Chao FENG, YunFei SU, Xing ZHANG
College of Electronic Science and Technology, National University of Defense Technology, Changsha 410073, China
 全文: PDF(903 KB)   HTML
收稿日期: 2020-07-02      出版日期: 2021-09-18
Corresponding Author(s): Jian WANG   
 引用本文:   
. [J]. Frontiers of Computer Science, 2022, 16(2): 162201.
Hongyu KUANG, Jian WANG, Ruilin LI, Chao FENG, YunFei SU, Xing ZHANG. Automated detection on the security of the linked-list operations. Front. Comput. Sci., 2022, 16(2): 162201.
 链接本文:  
https://academic.hep.com.cn/fcs/CN/10.1007/s11704-020-0312-6
https://academic.hep.com.cn/fcs/CN/Y2022/V16/I2/162201
Fig.1  
Dataset Model F1_M Pr_M Re_M F1_W Pr_W Re_W
BLSTM 0.979 0.999 0.960 0.979 0.999 0.960
BIN BGRU 0.953 0.961 0.945 0.953 0.961 0.945
CNN 0.970 0.987 0.955 0.970 0.987 0.955
BLSTM 0.740 0.733 0.797 0.765 0.815 0.759
MULTI BGRU 0.562 0.681 0.689 0.472 0.738 0.543
CNN 0.819 0.813 0.842 0.820 0.841 0.818
Tab.1  
1 Dowd M, McDonald J, Schuh J. The art of software security assessment: Identifying and preventing software vulnerabilities. Addison Wesley Professional, 2007
2 F Liu , G Li , X Hu . Program Comprehension Based on Deep learning. Journal of Computer Research and Development, 2019, 56( 8): 1605– 1620
[1] Highlights Download
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed