{"id":"https://openalex.org/W7125208793","doi":"https://doi.org/10.1016/j.scico.2026.103443","title":"DATVD: A novel vulnerability detection method based on dynamic attention and hybrid convolutional pooling","display_name":"DATVD: A novel vulnerability detection method based on dynamic attention and hybrid convolutional pooling","publication_year":2026,"publication_date":"2026-01-21","ids":{"openalex":"https://openalex.org/W7125208793","doi":"https://doi.org/10.1016/j.scico.2026.103443"},"language":"en","primary_location":{"id":"doi:10.1016/j.scico.2026.103443","is_oa":false,"landing_page_url":"https://doi.org/10.1016/j.scico.2026.103443","pdf_url":null,"source":{"id":"https://openalex.org/S21029587","display_name":"Science of Computer Programming","issn_l":"0167-6423","issn":["0167-6423","1872-7964"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Science of Computer Programming","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050737142","display_name":"Jinfu Chen","orcid":"https://orcid.org/0009-0006-8054-2433"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]},{"id":"https://openalex.org/I4210096899","display_name":"Jiangsu University of Science and Technology","ror":"https://ror.org/00tyjp878","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210096899"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinfu Chen","raw_affiliation_strings":["Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China","School of Computer Science and Communication Engineering, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China","institution_ids":["https://openalex.org/I115592961","https://openalex.org/I4210096899"]},{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115025377","display_name":"Jinyu Mu","orcid":null},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]},{"id":"https://openalex.org/I4210096899","display_name":"Jiangsu University of Science and Technology","ror":"https://ror.org/00tyjp878","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210096899"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinyu Mu","raw_affiliation_strings":["Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China","School of Computer Science and Communication Engineering, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China","institution_ids":["https://openalex.org/I115592961","https://openalex.org/I4210096899"]},{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123537940","display_name":"Saihua Cai","orcid":null},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]},{"id":"https://openalex.org/I4210096899","display_name":"Jiangsu University of Science and Technology","ror":"https://ror.org/00tyjp878","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210096899"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Saihua Cai","raw_affiliation_strings":["Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China","School of Computer Science and Communication Engineering, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China","institution_ids":["https://openalex.org/I115592961","https://openalex.org/I4210096899"]},{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100880844","display_name":"Jiapeng Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]},{"id":"https://openalex.org/I4210096899","display_name":"Jiangsu University of Science and Technology","ror":"https://ror.org/00tyjp878","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210096899"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiapeng Zhou","raw_affiliation_strings":["Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China","School of Computer Science and Communication Engineering, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China","institution_ids":["https://openalex.org/I115592961","https://openalex.org/I4210096899"]},{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123198751","display_name":"Ziyan Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]},{"id":"https://openalex.org/I4210096899","display_name":"Jiangsu University of Science and Technology","ror":"https://ror.org/00tyjp878","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210096899"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziyan Liu","raw_affiliation_strings":["Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China","School of Computer Science and Communication Engineering, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China","institution_ids":["https://openalex.org/I115592961","https://openalex.org/I4210096899"]},{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108480072","display_name":"Xinping Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinping Shi","raw_affiliation_strings":["School of Computer Science and Communication Engineering, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Communication Engineering, Jiangsu University, No.301, Xuefu Road, Zhenjiang, 212013, Jiangsu Province, China","institution_ids":["https://openalex.org/I115592961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5123537940"],"corresponding_institution_ids":["https://openalex.org/I115592961","https://openalex.org/I4210096899"],"apc_list":{"value":2460,"currency":"USD","value_usd":2460},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12073604,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"251","issue":null,"first_page":"103443","last_page":"103443"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.3379000127315521,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.3379000127315521,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.27250000834465027,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.131400004029274,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pooling","display_name":"Pooling","score":0.6588000059127808},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5270000100135803},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5019999742507935},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.48350000381469727},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.47870001196861267},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.46889999508857727},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4542999863624573},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4453999996185303}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9027000069618225},{"id":"https://openalex.org/C70437156","wikidata":"https://www.wikidata.org/wiki/Q7228652","display_name":"Pooling","level":2,"score":0.6588000059127808},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.555899977684021},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5270000100135803},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5019999742507935},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4867999851703644},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.48350000381469727},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.47870001196861267},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.46889999508857727},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4542999863624573},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4453999996185303},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4268999993801117},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.39559999108314514},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3686000108718872},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.3037000000476837},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.30250000953674316},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.2992999851703644},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.2913999855518341},{"id":"https://openalex.org/C2779308522","wikidata":"https://www.wikidata.org/wiki/Q843958","display_name":"Digitization","level":2,"score":0.28439998626708984},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2806999981403351},{"id":"https://openalex.org/C174683762","wikidata":"https://www.wikidata.org/wiki/Q609588","display_name":"Component-based software engineering","level":4,"score":0.2766999900341034},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.26930001378059387},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.26190000772476196},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2572999894618988},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.250900000333786}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.scico.2026.103443","is_oa":false,"landing_page_url":"https://doi.org/10.1016/j.scico.2026.103443","pdf_url":null,"source":{"id":"https://openalex.org/S21029587","display_name":"Science of Computer Programming","issn_l":"0167-6423","issn":["0167-6423","1872-7964"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Science of Computer Programming","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44382214546203613,"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2004758929","https://openalex.org/W2944851425","https://openalex.org/W3003525670","https://openalex.org/W3031015423","https://openalex.org/W3033777149","https://openalex.org/W3111602563","https://openalex.org/W3137781054","https://openalex.org/W3161071537","https://openalex.org/W3166095789","https://openalex.org/W3203610772","https://openalex.org/W4212954956","https://openalex.org/W4292491372"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-01-22T00:00:00"}
