Login / Signup

Analyzing source code vulnerabilities in the D2A dataset with ML ensembles and C-BERT.

Saurabh PujarYunhui ZhengLuca BurattiBurn L. LewisYunchung ChenJim LaredoAlessandro MorariEdward A. EpsteinTsungnan LinBo YangZhong Su
Published in: Empir. Softw. Eng. (2024)
Keyphrases