Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection.
Jordan SamhiMaria KoberAbdoul Kader KaboréSteven ArztTegawendé F. BissyandéJacques KleinPublished in: CoRR (2023)
Keyphrases
- data sets
- human experts
- prior knowledge
- data representations
- data mining techniques
- learning models
- statistical methods
- missing values
- large scale data sets
- learned models
- multiple sources
- database
- high dimensional data
- spectral clustering
- data analysis
- training data
- source code
- learning tasks
- reinforcement learning
- background knowledge
- supervised learning
- data points
- learning process
- artificial neural networks
- clustering algorithm
- data mining
- legacy systems
- leak detection