Research Article

An Automatic Source Code Vulnerability Detection Approach Based on KELM

Figure 4

Effect of different activation function on the precision of ELM.