Research Article
An Automatic Source Code Vulnerability Detection Approach Based on KELM
Table 5
Efficiency of different neural network models on vulnerability detection.
| Pattern | Training code gadgets | Detection code gadgets | Training time (s) | Detection time (s) |
| + B | 48744 | 12894 | 36372.2 | 156.2 | d + B | 49310 | 12328 | 1543.5 | 3.0 | d + E | 49310 | 12328 | 128.7 | 2.7 | d + Ada-E | 49310 | 12328 | 2914.0 | 7.8 | d + KE | 49310 | 12328 | 335.4 | 11.0 |
|
|