[1]刘宝旭, 李昊, 孙钰杰, 等. 智能化漏洞挖掘与网络空间威胁发现综述[J]. 信息安全研究, 2023, 9(10): 932939[2]Sabour S, Frosst N, Hinton G E. Dynamic routing between capsules[C] Proc of the 31st Int Conf on Neural Information Processing Systems. Red Hook, USA: Curran Associates Inc, 2017: 38593869[3]Geng R, Li B, Li Y, et al. Induction networks for fewshot text classification[C] Proc of the 2019 Conf on Empirical Methods in Natural Language Processing and the 9th Int Joint Conf on Natural Language Processing (EMNLPIJCNLP). Strousburg, PA: ACL, 2019: 39043913[4]Socher R, Chen D, Manning C D, et al. Reasoning with neural tensor networks for knowledge base completion[C] Proc of the 26th Int Conf on Neural Information Processing SystemsVolume 1. Red Hook, USA: Curran Associates Inc, 2013: 926934[5]Kim Y. Convolutional neural networks for sentence classification[J]. arXiv preprint, arXiv:1408.5882, 2014[6]Snell J, Swersky K, Zemel R. Prototypical networks for fewshot learning[C] Proc of the 31st Int Conf on Neural Information Processing Systems. Red Hook, USA: Curran Associates Inc, 2017: 40804090[7]Sung F, Yang Y, Zhang L, et al. Learning to compare: relation network for fewshot learning[C] Proc of 2018 IEEECVF Conf on Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2018: 11991208[8]赵凯琳, 靳小龙, 王元卓. 小样本学习研究综述[J]. 软件学报, 2021, 32(2): 349369[9]Finn C, Levine S. Metalearning: From fewshot learning to rapid reinforcement learning[EBOL] (20190611) [20240301]. https:sites.google.comviewicml19meta learning[10]李凡长, 刘洋, 吴鹏翔, 等. 元学习研究综述[J]. 计算机学报, 2021, 44(2): 422446[11]刘嘉勇, 韩家璇, 黄诚. 源代码漏洞静态分析技术[J]. 信息安全学报, 2022, 7(4): 100113[12]National Institute of Standards and Technology. Software assurance reference dataset[DBOL]. [20200815]. https:samate.nist.govSRDindex.php
|