Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code.
Yulong YangHaoran FanChenhao LinQian LiZhengyu ZhaoChao ShenPublished in: IEEE Trans. Inf. Forensics Secur. (2024)
Keyphrases
- source code
- transfer learning
- open source
- software systems
- learning tasks
- knowledge transfer
- reinforcement learning
- labeled data
- active learning
- cross domain
- machine learning
- semi supervised learning
- domain adaptation
- machine learning algorithms
- transfer knowledge
- collaborative filtering
- software projects
- text mining
- target domain
- text classification
- text categorization
- high level
- plagiarism detection
- multi agent
- unlabeled data
- learning algorithm
- free software
- software evolution
- software repositories
- source files
- software maintenance
- general purpose
- training data
- information retrieval