Research Article

An Automatic Source Code Vulnerability Detection Approach Based on KELM

Table 4

Effect of different neural network models on vulnerability detection precision.

DatasetPatternFPR (%)TPR (%)P (%)F1 (%)

BE-ALL + B2.982.091.786.6
d + B3.983.188.185.5
d + E4.481.986.884.3
d + Ada-E3.982.788.185.3
d + KE1.878.793.885.6

RM-ALL + B2.895.394.695.0
d + B3.890.391.991.1
d + E3.992.494.992.1
d + Ada-E2.883.893.488.3
d + KE1.182.797.489.5

HY-ALL + B5.183.986.985.4
d + B3.383.891.187.2
d + E4.483.688.385.9
d + Ada-E3.884.389.887.0
d + KE1.981.094.387.1