References

[1] X. Hu, G. Li, X. Xia, D. Lo, and Z. Jin, “Deep code comment generation,” in Proceedings of the 26th conference on program comprehension, 2018, pp. 200–210.

[2] R. Krishna and T. Menzies, “Bellwethers: A baseline method for transfer learning,” IEEE Transactions on Software Engineering, 2018.

[3] P. Jamshidi, M. Velez, C. Kästner, N. Siegmund, and P. Kawthekar, “Transfer learning for improving model predictions in highly configurable software,” in Proceedings of the 12th international symposium on software engineering for adaptive and self-managing systems, 2017, pp. 31–41.

[4] I. Rosenberg, G. Sicard, and E. David, “End-to-end deep neural networks and transfer learning for automatic analysis of nation-state malware,” Entropy, vol. 20, no. 5, p. 390, 2018.

[5] L. Chen, S. Sultana, and R. Sahita, “Henet: A deep learning approach on intel processor trace for effective exploit detection,” in 2018 ieee security and privacy workshops (spw), 2018, pp. 109–115.

[6] T. Sharma, V. Efstathiou, P. Louridas, and D. Spinellis, “On the feasibility of transfer-learning code smells using deep learning,” arXiv preprint arXiv:1904.03031, 2019.