The application of neural network for software vulnerability detection: a review

Y Zhu, G Lin, L Song, J Zhang - Neural Computing and Applications, 2023 - Springer
To date, being benefited from the ability of automated feature extraction and the
performance of software vulnerability identification, deep learning techniques have attracted …

An attention-based automatic vulnerability detection approach with GGNN

G Tang, L Yang, L Zhang, W Cao, L Meng, H He… - International Journal of …, 2023 - Springer
Vulnerability detection has long been an important issue in software security. The existing
methods mainly define the rules and features of vulnerabilities through experts, which are …

Huey: Intelligent agents for natural human to machine communication

H Levinson - 2021 - search.proquest.com
This thesis presents a novel architecture including two new programming languages,
allowing software developers to create intelligent agents operating anywhere on the …

Interpretation of learning-based automatic source code vulnerability detection model using LIME

G Tang, L Zhang, F Yang, L Meng, W Cao… - … on Knowledge Science …, 2021 - Springer
The existing advanced automatic vulnerability detection methods based on source code are
mainly learning-based, such as machine learning and deep learning. These models can …

The MIT Voice Name System

B Subirana, H Levinson, F Hueto… - arXiv preprint arXiv …, 2022 - arxiv.org
This RFC white Paper summarizes our progress on the MIT Voice Name System (VNS) and
Huey. The VNS, similar in name and function to the DNS, is a system to reserve and use" …

Understanding Computer Programs: Computational and Cognitive Perspectives

S Srikant - 2023 - dspace.mit.edu
In this thesis, I study the understanding of computer programs (code) from two perspectives:
computational and cognitive. I ask what the human bases of understanding code are, and …