Research Article

Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization

Figure 2

The example of C functions. (a) A vulnerable function. (b) Tthe revised function.
(a)
(b)