[1]Morrison P, Herzig K, Murphy B, et al. Challenges with applying vulnerability prediction models[C] Proc of the 2015 Symp and Bootcamp on the Science of Security. New York: ACM, 2015: 19[2]Shin Y, Williams L. An empirical model to predict security vulnerabilities using code complexity metrics[C] Proc of the 2nd ACMIEEE Int Symp on Empirical Software Engineering and Measurement. New York: ACM, 2013: 315317[3]Chowdhury I, Zulkernine M. Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities[J]. Journal of Systems Architecture, 2011, 57(3): 294313[4]Zhou Yaqin, Sharma A. Automated identification of security issues from commit messages and bug reports[C] Proc of the 11th Joint Meeting on Foundations of Software Engineering. New York: ACM, 2017: 914919[5]Pang Yulei, Xue Xiaozhen, Namin A S. Predicting vulnerable software components through NGram analysis and statistical feature selection[C] Proc of the 14th Int Conf on Machine Learning and Applications (ICMLA). Piscataway, NJ: IEEE, 2015: 543548[6]Hovsepyan A, Scandariato R, Joosen W, et al. Software vulnerability prediction using text analysis techniques[C] Proc of the Int Workshop on Security Measurements and Metrics. Piscataway, NJ: IEEE, 2012: 710[7]Nguyen V A, Nguyen D Q, Nguyen V, et al. ReGVD: Rrevisiting graph neural networks for vulnerability detection[C] Proc of the 44th ACMIEEE Int Conf on Software Engineering: Companion Proceedings. New York: ACM, 2022: 178182[8]陈传涛, 潘丽敏, 龚俊, 等. 基于抽象语法树压缩编码的漏洞检测方法[J].信息安全研究, 2022, 8(1): 3542[9]Wartschinski L, Noller Y, Vogel T, et al. Vudenc: Vulnerability detection with deeplearning on a natural codebase for python[J]. Information and Software Technology, 2022, 144: 106809[10]Vaswani A, Shazeer N, Parmar N, et al. Attentionis all you need[J]. arXiv preprint, arXiv:1706.03762, 2017[11]Taylor W L. “Cloze Procedure”: A new tool for measuring readability[J]. The Journalism Quarterly, 1953, 30(4): 415433[12]Zeiler M D. Adadelta: An adaptive learning rate method[J]. arXiv preprint, arXiv:1212.5701, 2012[13]Ruder S. An overview of gradient descent optimization algorithms[J]. arXiv preprint, arXiv:1609.04747, 2016[14]Kingma D P, BA J. Adam: A method for stochastic optimization[J]. arXiv preprint, arXiv:1412.6980, 2014[15]Loshchilov I, Hutter F. Fixing weight decay regularization in Adam[J]. arXiv preprint, arXiv:1711.05101, 2017[16]Robbins H, Monro S. A stochastic approximation method[J]. Annals of Mathematical Statistics, 1951, 22(3): 400407 |