Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Syntax-Aware Hierarchical Attention Networks for Code Vulnerability Detection

    Yongbo Jiang, Shengnan Huang, Tao Feng, Baofeng Duan*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-22, 2026, DOI:10.32604/cmc.2025.069423 - 10 November 2025

    Abstract In the context of modern software development characterized by increasing complexity and compressed development cycles, traditional static vulnerability detection methods face prominent challenges including high false positive rates and missed detections of complex logic due to their over-reliance on rule templates. This paper proposes a Syntax-Aware Hierarchical Attention Network (SAHAN) model, which achieves high-precision vulnerability detection through grammar-rule-driven multi-granularity code slicing and hierarchical semantic fusion mechanisms. The SAHAN model first generates Syntax Independent Units (SIUs), which slices the code based on Abstract Syntax Tree (AST) and predefined grammar rules, retaining vulnerability-sensitive contexts. Following this, through More >

  • Open Access

    ARTICLE

    Improve Representation for Cross-Language Clone Detection by Pretrain Using Tree Autoencoder

    Huading Ling1, Aiping Zhang1, Changchun Yin1, Dafang Li2,*, Mengyu Chang3

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1561-1577, 2022, DOI:10.32604/iasc.2022.027349 - 24 March 2022

    Abstract With the rise of deep learning in recent years, many code clone detection (CCD) methods use deep learning techniques and achieve promising results, so is cross-language CCD. However, deep learning techniques require a dataset to train the models. The dataset is typically small and has a gap between real-world clones due to the difficulty of collecting datasets for cross-language CCD. This creates a data bottleneck problem: data scale and quality issues will cause that model with a better design can still not reach its full potential. To mitigate this, we propose a tree autoencoder (TAE)… More >

  • Open Access

    ARTICLE

    SSA-HIAST: A Novel Framework for Code Clone Detection

    Neha Saini*, Sukhdip Singh

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2999-3017, 2022, DOI:10.32604/cmc.2022.022659 - 07 December 2021

    Abstract In the recent era of software development, reusing software is one of the major activities that is widely used to save time. To reuse software, the copy and paste method is used and this whole process is known as code cloning. This activity leads to problems like difficulty in debugging, increase in time to debug and manage software code. In the literature, various algorithms have been developed to find out the clones but it takes too much time as well as more space to figure out the clones. Unfortunately, most of them are not scalable.… More >

Displaying 1-10 on page 1 of 3. Per Page