Author:
Bassi Deepali,Singh Hardeep
Publisher
Springer Nature Singapore
Reference17 articles.
1. McDaid S (2018) The security problem
2. Ghaffarian SM, Shahriari HR (2017) Software vulnerability analysis and discovery using machine-learning and data-mining techniques : a survey, vol 50(4)
3. Shamal PK, Rahamathulla K, Akbar A (2017) A study on software vulnerability prediction model. In: Proceedings of the 2017 international conference on wireless communications, signal processing and networking (WiSPNET) 2017, vol 2018, pp 703–706. https://doi.org/10.1109/WiSPNET.2017.8299852
4. Yu T, Zhu H (2020) Hyper-Parameter optimization: a review of algorithms and applications, pp 1–56. [Online]. Available: http://arxiv.org/abs/2003.05689
5. Akiba T, Sano S, Yanase T, Ohta T, Koyama M (2019) Optuna: a next-generation hyperparameter optimization framework. In: Proceedings of ACM SIGKDD international conference on knowledge discovery and data mining, pp 2623–2631. https://doi.org/10.1145/3292500.3330701
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献