Login / Signup

Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code.

Yulong YangHaoran FanChenhao LinQian LiZhengyu ZhaoChao Shen
Published in: IEEE Trans. Inf. Forensics Secur. (2024)
Keyphrases