Research Article
An Automatic Source Code Vulnerability Detection Approach Based on KELM
Table 8
Effect of different symbolization levels on KELM precision.
| Dataset | Symbolization group | FPR (%) | TPR (%) | P (%) | F1 (%) |
| BE-ALL | F | 2.1 | 83.5 | 93.4 | 88.1 | F + V | 1.8 | 78.7 | 93.8 | 85.6 | F + T | 2.0 | 83.6 | 93.6 | 88.3 | F + V + T | 2.3 | 79.1 | 92.3 | 85.2 |
| RM-ALL | F | 1.3 | 88.0 | 97.0 | 92.3 | F + V | 1.1 | 82.7 | 97.4 | 89.5 | F + T | 1.2 | 87.5 | 97.3 | 92.1 | F + V + T | 1.3 | 83.1 | 96.8 | 89.5 |
| HY-ALL | F | 1.1 | 81.8 | 96.8 | 88.7 | F + V | 1.9 | 81.0 | 94.3 | 87.1 | F + T | 0.87 | 82.3 | 97.5 | 89.3 | F + V + T | 1.8 | 81.6 | 94.7 | 87.7 |
|
|