Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2022
/
Article
/
Fig 2
/
Research Article
Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization
Figure 2
The example of C functions. (a) A vulnerable function. (b) Tthe revised function.
(a)
(b)