Code detection method and device, storage medium and terminal

A code detection and code technology, applied in computer security devices, instruments, platform integrity maintenance, etc., can solve problems such as high business, loss, error code classification rate, etc.

Pending Publication Date: 2021-02-02
SHENZHEN HEYTAP TECHNOLOGY CO LTD +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a code detection method, device, storage medium and terminal, which can solve the problem of directly applying the machine learning algorithm based on the standard loss f

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code detection method and device, storage medium and terminal
  • Code detection method and device, storage medium and terminal
  • Code detection method and device, storage medium and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the features and advantages of the present application more obvious and understandable, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is only a part of the embodiments of the present application, but not all the embodiments. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.

[0032] When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a code detection method and device, a storage medium and a terminal, and relates to the technical field of computer security. The method comprises the steps of: firstly acquiring a training sample code, and acquiring a self-defined loss function of misinformation and missing information corresponding to the training sample code; performing iterative training on a preset training model based on the self-defined loss function and the training sample code, and taking the trained preset training model as a prediction model; and finally, acquiring a to-be-detected code, andinputting the to-be-detected code into the prediction model to obtain a code detection result. Therefore, the self-defined loss function of misinformation and missing information corresponding to thetraining sample code can be set according to the service requirements corresponding to the code, and the service loss caused by the code detection result can be greatly reduced.

Description

technical field [0001] The present application relates to the technical field of computer security, and in particular to a code detection method, device, storage medium and terminal. Background technique [0002] With the development of science and technology, there are more and more opportunities for people to use electronic devices such as mobile terminals and computers in their lives. In various electronic devices, software is the basis for realizing various functions, and malicious code detection methods in software have also become One of the key points of research in this field. [0003] Malicious code refers to code that has no effect but brings danger. The most common malicious codes include computer viruses (referred to as viruses), Trojan horses (referred to as Trojan horses), computer worms (referred to as worms), backdoors, and logic bombs. In related technologies, machine learning based on the standard loss function can be used to realize code detection, but di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06N20/00
CPCG06F21/562G06N20/00
Inventor 罗元海
Owner SHENZHEN HEYTAP TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products