Research Article

An Automatic Source Code Vulnerability Detection Approach Based on KELM

Figure 3

A typical ELM with a single hidden layer network structure.