no code implementations • 10 Dec 2016 • Johannes Schneider, Thomas Locher
We evaluated our method using more than ten programmers as well as pattern mining across open source code repositories to gain insights of (micro-)coding patterns that are relevant for generating misleading statements.
Cryptography and Security