[1]
X.
Hu, G. Li, X. Xia, D. Lo, and Z. Jin,
“Deep code comment
generation,” in
Proceedings of the 26th conference on
program comprehension, 2018, pp. 200–210.
[2]
R.
Krishna and T. Menzies, “Bellwethers: A baseline method for
transfer learning,” IEEE Transactions on Software
Engineering, 2018.
[4]
I.
Rosenberg, G. Sicard, and E. David, “End-to-end deep neural
networks and transfer learning for automatic analysis of nation-state
malware,” Entropy, vol. 20, no. 5, p. 390, 2018.
[5]
L.
Chen, S. Sultana, and R. Sahita, “Henet: A deep learning approach
on intel processor trace for effective exploit
detection,” in 2018 IEEE security and privacy workshops
(SPW), 2018, pp. 109–115.
[6]
T.
Sharma, V. Efstathiou, P. Louridas, and D. Spinellis, “On the
feasibility of transfer-learning code smells using deep
learning,” arXiv preprint arXiv:1904.03031, 2019.