Saurabh PujarYunhui ZhengLuca BurattiBurn L. LewisYunchung ChenJim LaredoAlessandro MorariEdward A. EpsteinTsungnan LinBo Yang 0013Zhong SuAnalyzing source code vulnerabilities in the D2A dataset with ML ensembles and C-BERT.482024April29Empir. Softw. Eng.2https://doi.org/10.1007/s10664-023-10405-9db/journals/ese/ese29.html#PujarZBLCLMELYS24