Interpretation of Learning-Based Automatic Source Code Vulnerability Detection Model Using LIME
暂无分享,去创建一个
Meikang Qiu | Weipeng Cao | Huiqiang Wang | Feng Yang | Gaigai Tang | Lin Yang | Long Zhang | Lianxiao Meng | Shuangyin Ren
[1] Meikang Qiu,et al. Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability , 2012, J. Parallel Distributed Comput..
[2] Meikang Qiu,et al. Reinforcement Learning-based Content-Centric Services in Mobile Sensing , 2018, IEEE Network.
[3] Meikang Qiu,et al. Differential Privacy-Based Blockchain for Industrial Internet-of-Things , 2020, IEEE Transactions on Industrial Informatics.
[4] Meikang Qiu,et al. Enabling Cloud Computing in Emergency Management Systems , 2014, IEEE Cloud Computing.
[5] Keke Gai,et al. Optimal resource allocation using reinforcement learning for IoT content-centric services , 2018, Appl. Soft Comput..
[6] Meikang Qiu,et al. Who Moved My Data? Privacy Protection in Smartphones , 2017, IEEE Communications Magazine.