Sign in

How Effective Are Neural Networks for Fixing Security Vulnerabilities.

Yi WuNan JiangHung Viet PhamThibaud LutellierJordan DavisLin TanPetr BabkinSameena Shah
Published in: CoRR (2023)
Keyphrases
  • neural network
  • security vulnerabilities
  • data processing
  • intrusion detection
  • data integration
  • smart card