共 90 条
[11]
Do Bugs Foreshadow Vulnerabilities? A Study of the Chromium Project
[J].
12TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2015),
2015,
:269-279
[13]
XGBoost: A Scalable Tree Boosting System
[J].
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING,
2016,
:785-794
[15]
MultiNet: Multi-Modal Multi-Task Learning for Autonomous Driving
[J].
2019 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV),
2019,
:1496-1504
[16]
Cochran WilliamGemmell., 1999, Sampling techniques, V3d
[17]
Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
[18]
Elbaz Clement, 2020, P 15 INT C AV REL SE, P1
[19]
Falessi D, 2020, EMPIR SOFTW ENG, V25, P4805, DOI 10.1007/s10664-020-09868-x
[20]
Fan Yuanrui, 2019, IEEE Trans. on Software Eng.