BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

118 related articles for article (PubMed ID: 38548726)

  • 1. Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction.
    Hussain S; Nadeem M; Baber J; Hamdi M; Rajab A; Al Reshan MS; Shaikh A
    Sci Rep; 2024 Mar; 14(1):7406. PubMed ID: 38548726
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Context and Multi-Features-Based Vulnerability Detection: A Vulnerability Detection Frame Based on Context Slicing and Multi-Features.
    Zhang Y; Hu Y; Chen X
    Sensors (Basel); 2024 Feb; 24(5):. PubMed ID: 38474887
    [TBL] [Abstract][Full Text] [Related]  

  • 3. BejaGNN: behavior-based Java malware detection via graph neural network.
    Feng P; Yang L; Lu D; Xi N; Ma J
    J Supercomput; 2023 Apr; ():1-25. PubMed ID: 37359339
    [TBL] [Abstract][Full Text] [Related]  

  • 4. NSCGCN: A novel deep GCN model to diagnosis COVID-19.
    Tang C; Hu C; Sun J; Wang SH; Zhang YD
    Comput Biol Med; 2022 Nov; 150():106151. PubMed ID: 36244303
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A novel code representation for detecting Java code clones using high-level and abstract compiled code representations.
    Quradaa FH; Shahzad S; Saeed R; Sufyan MM
    PLoS One; 2024; 19(5):e0302333. PubMed ID: 38728285
    [TBL] [Abstract][Full Text] [Related]  

  • 6. An attentive joint model with transformer-based weighted graph convolutional network for extracting adverse drug event relation.
    El-Allaly ED; Sarrouti M; En-Nahnahi N; Ouatik El Alaoui S
    J Biomed Inform; 2022 Jan; 125():103968. PubMed ID: 34871807
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Document-Level Biomedical Relation Extraction Using Graph Convolutional Network and Multihead Attention: Algorithm Development and Validation.
    Wang J; Chen X; Zhang Y; Zhang Y; Wen J; Lin H; Yang Z; Wang X
    JMIR Med Inform; 2020 Jul; 8(7):e17638. PubMed ID: 32459636
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Knowledge Guided Attention and Graph Convolutional Networks for Chemical-Disease Relation Extraction.
    Sun Y; Wang J; Lin H; Zhang Y; Yang Z
    IEEE/ACM Trans Comput Biol Bioinform; 2023; 20(1):489-499. PubMed ID: 34962873
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Deep learning-based solution for smart contract vulnerabilities detection.
    Tang X; Du Y; Lai A; Zhang Z; Shi L
    Sci Rep; 2023 Nov; 13(1):20106. PubMed ID: 37973832
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Securing web applications against XSS and SQLi attacks using a novel deep learning approach.
    Tadhani JR; Vekariya V; Sorathiya V; Alshathri S; El-Shafai W
    Sci Rep; 2024 Jan; 14(1):1803. PubMed ID: 38245563
    [TBL] [Abstract][Full Text] [Related]  

  • 11. SFN: A Novel Scalable Feature Network for Vulnerability Representation of Open-Source Codes.
    Guo J; Wang Z; Zhang L; Xue Y; Long K; Jing X; Cheng J; Li G
    Comput Intell Neurosci; 2022; 2022():2998448. PubMed ID: 35990141
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Chinese Clinical Named Entity Recognition From Electronic Medical Records Based on Multisemantic Features by Using Robustly Optimized Bidirectional Encoder Representation From Transformers Pretraining Approach Whole Word Masking and Convolutional Neural Networks: Model Development and Validation.
    Wang W; Li X; Ren H; Gao D; Fang A
    JMIR Med Inform; 2023 May; 11():e44597. PubMed ID: 37163343
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Graph Convolutional Network-Based Method for Chemical-Protein Interaction Extraction: Algorithm Development.
    Wang E; Wang F; Yang Z; Wang L; Zhang Y; Lin H; Wang J
    JMIR Med Inform; 2020 May; 8(5):e17643. PubMed ID: 32348257
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Automatic Code Review by Learning the Structure Information of Code Graph.
    Yin Y; Zhao Y; Sun Y; Chen C
    Sensors (Basel); 2023 Feb; 23(5):. PubMed ID: 36904755
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Software defect prediction using hybrid model (CBIL) of convolutional neural network (CNN) and bidirectional long short-term memory (Bi-LSTM).
    Farid AB; Fathy EM; Sharaf Eldin A; Abd-Elmegid LA
    PeerJ Comput Sci; 2021; 7():e739. PubMed ID: 34901421
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A systematic literature review on the applications of recurrent neural networks in code clone research.
    Quradaa FH; Shahzad S; Almoqbily RS
    PLoS One; 2024; 19(2):e0296858. PubMed ID: 38306372
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Attention-based multi-semantic dynamical graph convolutional network for eeg-based fatigue detection.
    Liu H; Liu Q; Cai M; Chen K; Ma L; Meng W; Zhou Z; Ai Q
    Front Neurosci; 2023; 17():1275065. PubMed ID: 38075265
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A degressive quantum convolutional neural network for quantum state classification and code recognition.
    Wu Q; Liu W; Huang Y; Liu H; Xiao H; Li Z
    iScience; 2024 Apr; 27(4):109394. PubMed ID: 38510123
    [TBL] [Abstract][Full Text] [Related]  

  • 19. iDetect for vulnerability detection in internet of things operating systems using machine learning.
    Al-Boghdady A; El-Ramly M; Wassif K
    Sci Rep; 2022 Oct; 12(1):17086. PubMed ID: 36224208
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Attention enhanced capsule network for text classification by encoding syntactic dependency trees with graph convolutional neural network.
    Jia X; Wang L
    PeerJ Comput Sci; 2022; 8():e831. PubMed ID: 35111918
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.