{"id":"https://openalex.org/W3097867666","doi":"https://doi.org/10.1109/access.2020.3034766","title":"Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey","display_name":"Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3097867666","doi":"https://doi.org/10.1109/access.2020.3034766","mag":"3097867666"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.3034766","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3034766","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09244140.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09244140.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005866333","display_name":"Peng Zeng","orcid":"https://orcid.org/0000-0002-3904-9245"},"institutions":[{"id":"https://openalex.org/I120825670","display_name":"Yunnan Normal University","ror":"https://ror.org/00sc9n023","country_code":"CN","type":"education","lineage":["https://openalex.org/I120825670"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Peng Zeng","raw_affiliation_strings":["School of Physics and Electronic Information, Yunnan Normal University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"School of Physics and Electronic Information, Yunnan Normal University, Kunming, China","institution_ids":["https://openalex.org/I120825670"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085946103","display_name":"Guanjun Lin","orcid":"https://orcid.org/0000-0003-3280-1307"},"institutions":[{"id":"https://openalex.org/I4210149962","display_name":"Sanming University","ror":"https://ror.org/044pany34","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210149962"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guanjun Lin","raw_affiliation_strings":["School of Information Engineering, Sanming University, Sanming, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Sanming University, Sanming, China","institution_ids":["https://openalex.org/I4210149962"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045991464","display_name":"Lei Pan","orcid":"https://orcid.org/0000-0002-4691-8330"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Lei Pan","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049712745","display_name":"Yonghang Tai","orcid":"https://orcid.org/0000-0001-9186-475X"},"institutions":[{"id":"https://openalex.org/I120825670","display_name":"Yunnan Normal University","ror":"https://ror.org/00sc9n023","country_code":"CN","type":"education","lineage":["https://openalex.org/I120825670"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yonghang Tai","raw_affiliation_strings":["School of Physics and Electronic Information, Yunnan Normal University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"School of Physics and Electronic Information, Yunnan Normal University, Kunming, China","institution_ids":["https://openalex.org/I120825670"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056896173","display_name":"Jun Zhang","orcid":"https://orcid.org/0000-0002-5310-0270"},"institutions":[{"id":"https://openalex.org/I120825670","display_name":"Yunnan Normal University","ror":"https://ror.org/00sc9n023","country_code":"CN","type":"education","lineage":["https://openalex.org/I120825670"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Zhang","raw_affiliation_strings":["School of Physics and Electronic Information, Yunnan Normal University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"School of Physics and Electronic Information, Yunnan Normal University, Kunming, China","institution_ids":["https://openalex.org/I120825670"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5005866333"],"corresponding_institution_ids":["https://openalex.org/I120825670"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":4.8667,"has_fulltext":true,"cited_by_count":74,"citation_normalized_percentile":{"value":0.96200717,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"8","issue":null,"first_page":"197158","last_page":"197172"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.80577552318573},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6844469308853149},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.6519542932510376},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6107543706893921},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.582495927810669},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5191042423248291},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.44465872645378113},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4374350607395172},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.41612452268600464},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.37162065505981445},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35292255878448486},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3245265483856201}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.80577552318573},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6844469308853149},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.6519542932510376},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6107543706893921},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.582495927810669},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5191042423248291},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.44465872645378113},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4374350607395172},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.41612452268600464},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37162065505981445},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35292255878448486},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3245265483856201},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/access.2020.3034766","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3034766","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09244140.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8c9bada603444693830b5ae8317a4d64","is_oa":true,"landing_page_url":"https://doaj.org/article/8c9bada603444693830b5ae8317a4d64","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 197158-197172 (2020)","raw_type":"article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30144859","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20684665","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Software_Vulnerability_Analysis_and_Discovery_using_Deep_Learning_Techniques_A_Survey/20684665","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1109/access.2020.3034766","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3034766","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09244140.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3097867666.pdf","grobid_xml":"https://content.openalex.org/works/W3097867666.grobid-xml"},"referenced_works_count":121,"referenced_works":["https://openalex.org/W133470593","https://openalex.org/W1793121960","https://openalex.org/W1901367599","https://openalex.org/W1990088911","https://openalex.org/W1997236144","https://openalex.org/W2026750231","https://openalex.org/W2027887391","https://openalex.org/W2043837581","https://openalex.org/W2051000513","https://openalex.org/W2059218484","https://openalex.org/W2062118960","https://openalex.org/W2064675550","https://openalex.org/W2080829704","https://openalex.org/W2089367555","https://openalex.org/W2125113755","https://openalex.org/W2157331557","https://openalex.org/W2160988203","https://openalex.org/W2161251616","https://openalex.org/W2164582878","https://openalex.org/W2165004968","https://openalex.org/W2165698076","https://openalex.org/W2166336492","https://openalex.org/W2282821441","https://openalex.org/W2360967250","https://openalex.org/W2522925973","https://openalex.org/W2592125937","https://openalex.org/W2606462007","https://openalex.org/W2624697062","https://openalex.org/W2743517242","https://openalex.org/W2748690817","https://openalex.org/W2749008552","https://openalex.org/W2753415590","https://openalex.org/W2765858138","https://openalex.org/W2767521898","https://openalex.org/W2770227012","https://openalex.org/W2774274879","https://openalex.org/W2781491433","https://openalex.org/W2788403449","https://openalex.org/W2788730650","https://openalex.org/W2789983203","https://openalex.org/W2790664081","https://openalex.org/W2793157084","https://openalex.org/W2794659749","https://openalex.org/W2796200341","https://openalex.org/W2809426407","https://openalex.org/W2889225139","https://openalex.org/W2896215772","https://openalex.org/W2896457183","https://openalex.org/W2905097561","https://openalex.org/W2906579670","https://openalex.org/W2907492528","https://openalex.org/W2912213068","https://openalex.org/W2914120296","https://openalex.org/W2937381238","https://openalex.org/W2950087183","https://openalex.org/W2951008357","https://openalex.org/W2953021844","https://openalex.org/W2962739339","https://openalex.org/W2962931396","https://openalex.org/W2962960733","https://openalex.org/W2963341956","https://openalex.org/W2964144088","https://openalex.org/W2966342255","https://openalex.org/W2969775414","https://openalex.org/W2970049541","https://openalex.org/W2970597249","https://openalex.org/W2976184969","https://openalex.org/W2979183801","https://openalex.org/W2980999875","https://openalex.org/W2981023147","https://openalex.org/W2988065079","https://openalex.org/W2990323480","https://openalex.org/W2995824836","https://openalex.org/W2997532515","https://openalex.org/W3005086430","https://openalex.org/W3006602764","https://openalex.org/W3008371681","https://openalex.org/W3009129408","https://openalex.org/W3011056055","https://openalex.org/W3014780393","https://openalex.org/W3020975691","https://openalex.org/W3021182036","https://openalex.org/W3022179901","https://openalex.org/W3025067198","https://openalex.org/W3033777149","https://openalex.org/W3036286896","https://openalex.org/W3037952601","https://openalex.org/W3039175093","https://openalex.org/W3072699177","https://openalex.org/W3091388282","https://openalex.org/W3101228802","https://openalex.org/W3101609372","https://openalex.org/W3104849875","https://openalex.org/W3105926539","https://openalex.org/W3126600141","https://openalex.org/W3127736190","https://openalex.org/W3145169422","https://openalex.org/W3161938055","https://openalex.org/W4210257598","https://openalex.org/W4288257480","https://openalex.org/W4295270931","https://openalex.org/W6602113894","https://openalex.org/W6605468800","https://openalex.org/W6638318767","https://openalex.org/W6666023844","https://openalex.org/W6732742072","https://openalex.org/W6743846187","https://openalex.org/W6748426178","https://openalex.org/W6749470980","https://openalex.org/W6754575879","https://openalex.org/W6755207826","https://openalex.org/W6756943956","https://openalex.org/W6757474954","https://openalex.org/W6763701032","https://openalex.org/W6767115310","https://openalex.org/W6767737316","https://openalex.org/W6774315026","https://openalex.org/W6780413722","https://openalex.org/W6782369875","https://openalex.org/W6790047161","https://openalex.org/W6795436412"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W2947584067","https://openalex.org/W3118510577","https://openalex.org/W3157230915","https://openalex.org/W2062873522","https://openalex.org/W1756374135","https://openalex.org/W2789975780","https://openalex.org/W2007895524","https://openalex.org/W4390540899"],"abstract_inverted_index":{"Exploitable":[0],"vulnerabilities":[1],"in":[2,8,161,179],"software":[3],"have":[4,28,113],"attracted":[5],"tremendous":[6],"attention":[7],"recent":[9,57],"years":[10],"because":[11],"of":[12,42,94,103,118],"their":[13,133],"potentially":[14],"high":[15],"severity":[16],"impact":[17,91],"on":[18,121,140,150],"computer":[19],"security":[20],"and":[21,49,99,107,135,146,164],"information":[22],"safety.":[23],"Many":[24],"vulnerability":[25,97],"detection":[26,98],"methods":[27],"been":[29],"proposed":[30],"to":[31,63,67,75,115,171,175],"aid":[32],"code":[33,79],"inspection.":[34],"Among":[35,81],"these":[36],"methods,":[37],"there":[38],"is":[39],"a":[40],"line":[41],"studies":[43,58],"that":[44,59,89,109],"apply":[45],"machine":[46],"learning":[47,62],"techniques":[48,74],"achieve":[50],"promising":[51],"results.":[52],"This":[53],"paper":[54],"reviews":[55,102],"22":[56],"adopt":[60],"deep":[61,95],"detect":[64],"vulnerabilities,":[65],"aiming":[66],"show":[68],"how":[69],"they":[70],"utilize":[71],"state-of-the-art":[72],"neural":[73],"capture":[76],"possible":[77],"vulnerable":[78],"patterns.":[80],"reviewed":[82],"studies,":[83,131],"we":[84,127],"identify":[85],"four":[86,123],"game":[87,111,125,144],"changers":[88,112],"significantly":[90],"the":[92,104,110,122,129,143,151,158,173],"domain":[93],"learning-based":[96],"provide":[100],"detailed":[101],"insights,":[105],"ideas,":[106],"concepts":[108],"brought":[114],"this":[116,162,180],"field":[117,163],"interest.":[119],"Based":[120],"identified":[124],"changers,":[126,145],"review":[128],"remaining":[130],"presenting":[132],"approaches":[134],"solutions":[136],"which":[137],"either":[138],"build":[139],"or":[141],"extend":[142],"sharing":[147],"our":[148],"views":[149],"future":[152],"research":[153,167,178],"trends.":[154],"We":[155,169],"also":[156],"highlight":[157],"challenges":[159],"faced":[160],"discuss":[165],"potential":[166],"directions.":[168],"hope":[170],"motivate":[172],"readers":[174],"conduct":[176],"further":[177],"developing":[181],"but":[182],"fast-growing":[183],"field.":[184]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":24},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":6}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
