Login / Signup

Generating realistic vulnerabilities via neural code editing: an empirical study.

Yu NongYuzhe OuMichael PradelFeng ChenHaipeng Cai
Published in: ESEC/SIGSOFT FSE (2022)
Keyphrases