2023
DOI: 10.1016/j.infsof.2023.107304
|View full text |Cite
|
Sign up to set email alerts
|

Can an old fashioned feature extraction and a light-weight model improve vulnerability type identification performance?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 53 publications
0
1
0
Order By: Relevance
“…Several studies have been proposed for specific software engineering tasks, including code suggestion/completion [31][32][33], code summarization [34][35][36], program synthesis [37], pull request description generation [38,39], code clones [40], fuzz testing [41], code-text translation [42], and bug/vulnerability detection [14,43,44].…”
Section: Related Workmentioning
confidence: 99%
“…Several studies have been proposed for specific software engineering tasks, including code suggestion/completion [31][32][33], code summarization [34][35][36], program synthesis [37], pull request description generation [38,39], code clones [40], fuzz testing [41], code-text translation [42], and bug/vulnerability detection [14,43,44].…”
Section: Related Workmentioning
confidence: 99%