Cited By
View all- Corona-Fraga PHernandez-Suarez ASanchez-Perez GToscano-Medina LPerez-Meana HPortillo-Portillo JOlivares-Mercado JGarcía Villalba L(2025)Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-LearningFuture Internet10.3390/fi1701003317:1(33)Online publication date: 14-Jan-2025
- Taghavi Far SFeyzi F(2025)Large language models for software vulnerability detection: a guide for researchers on models, methods, techniques, datasets, and metricsInternational Journal of Information Security10.1007/s10207-025-00992-724:2Online publication date: 1-Apr-2025
- He YLin GMa XKeung JTan CHu WLi F(2024)Enhancing Deep Learning Vulnerability Detection through Imbalance Loss Functions: An Empirical StudyProceedings of the 15th Asia-Pacific Symposium on Internetware10.1145/3671016.3671379(85-94)Online publication date: 24-Jul-2024
- Show More Cited By