Abstract: Key classes have become excellent starting points for developers to understand unknown software systems. Up to now, a variety of approaches have been proposed to mine key classes in a ...
Abstract: Deep neural networks yield desirable performance in text, image, and speech classification. However, these networks are vulnerable to adversarial examples. An adversarial example is a sample ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results