Toward More Generalized Malicious URL Detection Models Authors: YunDa Tsai, Cayon Liow, Yin Sheng Siang, Shou-De Lin | Published: 2022-02-21 | Updated: 2024-02-09 Token Distribution AnalysisBiasImpact of Generalization 2022.02.21 2025.05.28 Literature Database
Code2Image: Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction Authors: Zeki Bilgin | Published: 2021-05-07 Code Change AnalysisToken Distribution AnalysisVulnerability Analysis 2021.05.07 2025.05.28 Literature Database