{"id":"https://openalex.org/W4408100816","doi":"https://doi.org/10.1109/acai63924.2024.10899694","title":"Python Source Code Vulnerability Detection Based on CodeBERT Language Model","display_name":"Python Source Code Vulnerability Detection Based on CodeBERT Language Model","publication_year":2024,"publication_date":"2024-12-20","ids":{"openalex":"https://openalex.org/W4408100816","doi":"https://doi.org/10.1109/acai63924.2024.10899694"},"language":"en","primary_location":{"id":"doi:10.1109/acai63924.2024.10899694","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acai63924.2024.10899694","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 7th International Conference on Algorithms, Computing and Artificial Intelligence (ACAI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043098486","display_name":"Kunpeng Zhao","orcid":"https://orcid.org/0009-0004-2285-6720"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kunpeng Zhao","raw_affiliation_strings":["School of Cyberspace Security, Zhengzhou University,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Zhengzhou University,Zhengzhou,China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113024816","display_name":"Shuya Duan","orcid":null},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuya Duan","raw_affiliation_strings":["School of Cyberspace Security, Zhengzhou University,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Zhengzhou University,Zhengzhou,China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116482667","display_name":"Ge Qiu","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ge Qiu","raw_affiliation_strings":["School of Cyberspace Security, University of Information Engineering,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, University of Information Engineering,Zhengzhou,China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116482668","display_name":"Jinyuan Zhai","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinyuan Zhai","raw_affiliation_strings":["School of Cyberspace Security, University of Information Engineering,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, University of Information Engineering,Zhengzhou,China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100621995","display_name":"Mingze Li","orcid":"https://orcid.org/0000-0001-7721-0768"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingze Li","raw_affiliation_strings":["School of Cyberspace Security, University of Information Engineering,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, University of Information Engineering,Zhengzhou,China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100348287","display_name":"Long Liu","orcid":"https://orcid.org/0000-0002-5389-5448"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Long Liu","raw_affiliation_strings":["School of Cyberspace Security, University of Information Engineering,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, University of Information Engineering,Zhengzhou,China","institution_ids":["https://openalex.org/I169689159"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5043098486"],"corresponding_institution_ids":["https://openalex.org/I38877650"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25080863,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13650","display_name":"Computational Physics and Python Applications","score":0.9768000245094299,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13650","display_name":"Computational Physics and Python Applications","score":0.9768000245094299,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.7940018177032471},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7787160277366638},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5913305878639221},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5033828616142273}],"concepts":[{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.7940018177032471},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7787160277366638},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5913305878639221},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5033828616142273}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acai63924.2024.10899694","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acai63924.2024.10899694","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 7th International Conference on Algorithms, Computing and Artificial Intelligence (ACAI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2003529494","https://openalex.org/W2084974764","https://openalex.org/W2514626402","https://openalex.org/W2925189961","https://openalex.org/W2962960733","https://openalex.org/W2964210007","https://openalex.org/W3098605233","https://openalex.org/W3189308362","https://openalex.org/W4205733352","https://openalex.org/W4236586490","https://openalex.org/W4311165836"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2341492732","https://openalex.org/W3187193180","https://openalex.org/W106542691","https://openalex.org/W1699080303","https://openalex.org/W2207495067","https://openalex.org/W1906486629","https://openalex.org/W2789551765"],"abstract_inverted_index":{"Programming":[0],"language":[1,24],"source":[2,72,93,121,148,232],"code":[3,34,47,73,94,149,167,200,233],"vulnerability":[4,43,74,105,125,152,182,218,234,237],"mining":[5,75,235],"is":[6,18,35,48,65,128,135,184,193,208],"crucial":[7],"to":[8,30,67,98,160,195,240],"improving":[9,214],"the":[10,22,99,102,104,115,120,124,163,172,175,191,203,215,250],"security":[11,164],"of":[12,101,111,114,119,165,199,217,249],"software":[13,40,166],"systems,":[14,41],"but":[15,96],"current":[16],"research":[17],"mostly":[19],"focused":[20],"on":[21,83,156],"C":[23],"field,":[25],"with":[26],"little":[27],"attention":[28],"paid":[29],"scripting":[31],"languages.":[32],"Python":[33,46,56,71,92],"currently":[36],"widely":[37],"used":[38,194],"in":[39,45,90,139,231],"and":[42,60,64,123,131,133,141,177,189,220,236],"detection":[44,80,153,244],"also":[49],"very":[50],"important.":[51],"As":[52],"an":[53],"interpreted":[54],"language,":[55,69],"has":[57,76,107,227],"a":[58,147,180,222],"concise":[59],"clear":[61],"grammatical":[62],"structure":[63],"closer":[66],"natural":[68],"so":[70],"greater":[77],"advantages.":[78],"Previous":[79],"systems":[81],"based":[82,155],"LSTM":[84,242],"models":[85],"have":[86],"achieved":[87,228],"certain":[88],"results":[89],"detecting":[91],"vulnerabilities,":[95],"due":[97],"limitations":[100],"model,":[103,224],"dataset":[106,183],"low":[108],"accuracy,":[109],"lack":[110],"full":[112],"consideration":[113],"deep":[116],"semantic":[117],"features":[118],"code,":[122],"multi-classification":[126,151,205],"process":[127],"relatively":[129],"cumbersome":[130],"inefficient,":[132],"there":[134],"room":[136],"for":[137,210],"improvement":[138],"accuracy":[140,216,248],"recall.":[142],"Therefore,":[143],"this":[144,225],"paper":[145],"proposes":[146],"snippet":[150],"system":[154],"CodeBERT,":[157],"which":[158],"aims":[159],"automatically":[161],"detect":[162],"snippets.":[168],"First,":[169],"by":[170],"analyzing":[171],"differences":[173],"between":[174],"new":[176],"old":[178],"versions,":[179],"multi-label":[181],"constructed":[185,204],"using":[186],"diff":[187],"files,":[188],"then":[190],"RoBERTa":[192],"obtain":[196],"high-quality":[197],"expressions":[198],"keywords.":[201],"Finally,":[202],"CodeBERT":[206],"model":[207,252],"introduced":[209],"fine-tuning":[211],"detection.":[212],"By":[213],"datasets":[219],"introducing":[221],"high-performance":[223],"method":[226],"significant":[229],"improvements":[230],"classification":[238],"compared":[239],"traditional":[241],"model-based":[243],"methods.":[245],"The":[246],"average":[247],"proposed":[251],"reaches":[253],"98%.":[254]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
