Research Article

An Automatic Source Code Vulnerability Detection Approach Based on KELM

Table 6

Effectiveness of word2vec compared with doc2vec.

SampleToolVector dimensionCosine (BE-ALL)Cosine (HY-ALL)

1 and 2word2vec25000.8320.828
doc2vec2500.6420.639

3 and 4word2vec25000.4820.514
doc2vec2500.5860.578