Research Article

[Retracted] Software Systems Security Vulnerabilities Management by Exploring the Capabilities of Language Models Using NLP

Table 2

DCNN model construct.

LayerConfiguration

EmbeddingVocabulary size, embedding dimension
Convolutional 1D bigramKernel size = 2; padding = valid; activation = ReLU
Convolutional 1D trigramKernel size = 3; padding = valid; activation = ReLU
Convolutional 1D fourgramKernel size = 4; padding = valid; activation = ReLU
PoolingGlobalMaxPool1D
DenseActivation = ReLU
Dropout0.2
Last dense (for 2 classes)Units = 1; activation = sigmoid
Last dense (for more than 2 classes)Units = number of classes; activation = softmax
Loss (for 2 classes)Binary cross-entropy
Loss (for multiclass)Sparse categorical cross-entropy