Picture for Vincent Urias

Vincent Urias

Automated Software Vulnerability Static Code Analysis Using Generative Pre-Trained Transformer Models

Add code
Jul 31, 2024
Figure 1 for Automated Software Vulnerability Static Code Analysis Using Generative Pre-Trained Transformer Models
Figure 2 for Automated Software Vulnerability Static Code Analysis Using Generative Pre-Trained Transformer Models
Figure 3 for Automated Software Vulnerability Static Code Analysis Using Generative Pre-Trained Transformer Models
Figure 4 for Automated Software Vulnerability Static Code Analysis Using Generative Pre-Trained Transformer Models
Viaarxiv icon

Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models

Add code
Apr 24, 2024
Figure 1 for Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models
Figure 2 for Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models
Figure 3 for Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models
Viaarxiv icon

Automated Multi-Language to English Machine Translation Using Generative Pre-Trained Transformers

Add code
Apr 23, 2024
Figure 1 for Automated Multi-Language to English Machine Translation Using Generative Pre-Trained Transformers
Figure 2 for Automated Multi-Language to English Machine Translation Using Generative Pre-Trained Transformers
Figure 3 for Automated Multi-Language to English Machine Translation Using Generative Pre-Trained Transformers
Figure 4 for Automated Multi-Language to English Machine Translation Using Generative Pre-Trained Transformers
Viaarxiv icon

An Enhanced Machine Learning Topic Classification Methodology for Cybersecurity

Add code
Aug 30, 2021
Figure 1 for An Enhanced Machine Learning Topic Classification Methodology for Cybersecurity
Figure 2 for An Enhanced Machine Learning Topic Classification Methodology for Cybersecurity
Figure 3 for An Enhanced Machine Learning Topic Classification Methodology for Cybersecurity
Figure 4 for An Enhanced Machine Learning Topic Classification Methodology for Cybersecurity
Viaarxiv icon