Generating realistic vulnerabilities via neural code editing: an empirical study.
Yu NongYuzhe OuMichael PradelFeng ChenHaipeng CaiPublished in: ESEC/SIGSOFT FSE (2022)
Keyphrases
- network architecture
- real life
- neural network
- real world
- security issues
- source code
- nonlinear predictive control
- error correcting
- automatically generating
- neural model
- associative memory
- artificial neural networks
- artificial intelligence
- real time
- reinforcement learning
- generation process
- data mining
- artificial neural
- attack graph
- computational neuroscience
- attack graphs
- database