-
公开(公告)号:US20230418578A1
公开(公告)日:2023-12-28
申请号:US18463956
申请日:2023-09-08
Applicant: Huawei Technologies Co., Ltd.
Inventor: Jinfu CHEN , Yuan WANG , Dong QIU , Xin XIA
Abstract: Methods and devices are described for detecting code clones in a software program. The source code of the software program is processed into a group of n-gram representations. A clone index is generated for each respective code portion defined in the normalized source code, where each clone index includes a feature vector encoding features of the respective code portion based on the n-gram representations corresponding to the respective code portion. Comparison of the clone indexes is used to detect a code clone, based on matching the feature vectors of the clone indexes.
-
公开(公告)号:US20200099468A1
公开(公告)日:2020-03-26
申请号:US16696559
申请日:2019-11-26
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Xin XIA , Yun LIU , Weimin CHEN , Xiaoyu LUO
Abstract: Embodiments of the present disclosure disclose a data transmission method and a communications device. The method in the embodiments of the present disclosure includes: obtaining, by a first communications device, a transmission mode instruction, where the transmission mode instruction is used to instruct to use a frequency-domain repetition mode to transmit data, and the frequency-domain repetition mode means that same data is repeatedly transmitted on different frequency-domain resources; determining, by the first communications device, the frequency-domain repetition mode based on the transmission mode instruction; and performing, by the first communications device, data transmission with a second communications device in the frequency-domain repetition mode.
-
公开(公告)号:US20240004638A1
公开(公告)日:2024-01-04
申请号:US18468126
申请日:2023-09-15
Applicant: Huawei Technologies Co., Ltd.
Inventor: Jiayuan ZHOU , Michael PACHECO , Xin XIA , Yuan WANG
CPC classification number: G06F8/65 , G06F21/577 , G06F2221/033
Abstract: Methods and systems are described for detecting and reporting a vulnerability fix in a code repository. A commit obtained from the code repository is preprocessed to generate file-level token sequences each representing a file-level code change for respective files. Respective file-level code change embedding vectors are generated by inputting each file-level token sequence into a transformer model, each file-level code change embedding vector being a vector representation of the file-level code change for the respective file. The file-level code change embedding vectors are combined into a commit-level code change embedding vector that represents all code changes contained in the commit. A predicted commit-level vulnerability fix score is generated by inputting the commit-level code change embedding vector into a classifier. A vulnerability fix report is outputted, containing an identification of the commit and the predicted commit-level vulnerability fix score.
-
-