Research Article
A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code
Table 2
Settings of the proposed network.
| | Layer name | Activation func. | Node num. |
| | BLSTM | None | 600 | | Dense 1 | “LeakyReLU” | 300 | | Dense 2 | “LeakyReLU” | 300 | | Softmax | “Softmax” | 2 |
|
|