Research Article
Research on Cross-Company Defect Prediction Method to Improve Software Security
Table 6
Performance results of different K values for target project Ant-1.7
| Source | Target | K | Ratio | Pd | Pf | F1 | AUC |
| MW1 | Ant-1.7 | 4 | 2.701 | 0.639 | 0.164 | 0.578 | 0.737 | 5 | 2.56 | 0.633 | 0.18 | 0.56 | 0.726 | 6 | 0.815 | 0.307 | 0.621 | 0.177 | 0.343 | 7 | 2.153 | 0.639 | 0.225 | 0.527 | 0.707 | 8 | 2.012 | 0.645 | 0.242 | 0.518 | 0.701 | 9 | 2.012 | 0.62 | 0.249 | 0.499 | 0.686 | Median | 2.153 | 0.639 | 0.225 | 0.527 | 0.707 |
|
|