Table 2 Different combinations of optimizers and loss functions.

From: Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction

No

Combination

Selection 1

Adam + MSE

Selection 2

Adam + MAE

Selection 3

AdaDelta + MSE

Selection 4

AdaDelta + MAE

Selection 5

Momentum + MSE

Selection 6

Momentum + MAE

Selection 7

SDG + MSE

Selection 8

SDG + MAE