Hidden code vulnerability detection: A study of the Graph-BiLSTM algorithm.
Kao GeQing-Bang HanPublished in: Inf. Softw. Technol. (2024)
Keyphrases
- detection algorithm
- experimental study
- k means
- preprocessing
- np hard
- computational cost
- graph structure
- shortest path problem
- dynamic programming
- optimization algorithm
- solution path
- graph based algorithm
- minimum spanning tree
- graph model
- recognition algorithm
- random walk
- particle swarm optimization
- search space
- learning algorithm
- shortest path
- matching algorithm
- convergence rate
- source code
- false alarms
- data structure
- optimal solution
- genetic algorithm