Research Article
An Automatic Source Code Vulnerability Detection Approach Based on KELM
Table 6
Effectiveness of word2vec compared with doc2vec.
| Sample | Tool | Vector dimension | Cosine (BE-ALL) | Cosine (HY-ALL) |
| 1 and 2 | word2vec | 2500 | 0.832 | 0.828 | doc2vec | 250 | 0.642 | 0.639 |
| 3 and 4 | word2vec | 2500 | 0.482 | 0.514 | doc2vec | 250 | 0.586 | 0.578 |
|
|