SYSTEMS AND METHODS FOR DETECTION OF CODE CLONES

    公开(公告)号:US20230418578A1

    公开(公告)日:2023-12-28

    申请号:US18463956

    申请日:2023-09-08

    CPC classification number: G06F8/443 G06F8/73

    Abstract: Methods and devices are described for detecting code clones in a software program. The source code of the software program is processed into a group of n-gram representations. A clone index is generated for each respective code portion defined in the normalized source code, where each clone index includes a feature vector encoding features of the respective code portion based on the n-gram representations corresponding to the respective code portion. Comparison of the clone indexes is used to detect a code clone, based on matching the feature vectors of the clone indexes.

    DATA TRANSMISSION METHOD AND COMMUNICATIONS DEVICE

    公开(公告)号:US20200099468A1

    公开(公告)日:2020-03-26

    申请号:US16696559

    申请日:2019-11-26

    Abstract: Embodiments of the present disclosure disclose a data transmission method and a communications device. The method in the embodiments of the present disclosure includes: obtaining, by a first communications device, a transmission mode instruction, where the transmission mode instruction is used to instruct to use a frequency-domain repetition mode to transmit data, and the frequency-domain repetition mode means that same data is repeatedly transmitted on different frequency-domain resources; determining, by the first communications device, the frequency-domain repetition mode based on the transmission mode instruction; and performing, by the first communications device, data transmission with a second communications device in the frequency-domain repetition mode.

    SYSTEMS AND METHODS FOR DETECTION OF SOFTWARE VULNERABILITY FIX

    公开(公告)号:US20240004638A1

    公开(公告)日:2024-01-04

    申请号:US18468126

    申请日:2023-09-15

    CPC classification number: G06F8/65 G06F21/577 G06F2221/033

    Abstract: Methods and systems are described for detecting and reporting a vulnerability fix in a code repository. A commit obtained from the code repository is preprocessed to generate file-level token sequences each representing a file-level code change for respective files. Respective file-level code change embedding vectors are generated by inputting each file-level token sequence into a transformer model, each file-level code change embedding vector being a vector representation of the file-level code change for the respective file. The file-level code change embedding vectors are combined into a commit-level code change embedding vector that represents all code changes contained in the commit. A predicted commit-level vulnerability fix score is generated by inputting the commit-level code change embedding vector into a classifier. A vulnerability fix report is outputted, containing an identification of the commit and the predicted commit-level vulnerability fix score.

Patent Agency Ranking