Abstract: Key classes have become excellent starting points for developers to understand unknown software systems. Up to now, a variety of approaches have been proposed to mine key classes in a ...
Abstract: Recent studies have revealed that Deep Neural Networks (DNNs) are highly vulnerable to adversarial examples, which are generated by introducing imperceptible perturbations to clean images, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results