Detecting code vulnerabilities by learning from large-scale open source repositories.
Rongze XuZhanyong TangGuixin YeHuanting WangXin KeDingyi FangZheng WangPublished in: J. Inf. Secur. Appl. (2022)
Keyphrases
- open source
- source code
- learning systems
- learning process
- neural network
- knowledge acquisition
- learning algorithm
- reinforcement learning
- learning scheme
- learning tasks
- prior knowledge
- supervised learning
- elementary school
- learning scenarios
- mobile learning
- learning styles
- online learning
- mobile devices
- machine learning
- data mining
- real world