{"id":"https://openalex.org/W4394628743","doi":"https://doi.org/10.1109/cloudnet59005.2023.10490023","title":"A multi-task deep learning based vulnerability severity prediction method","display_name":"A multi-task deep learning based vulnerability severity prediction method","publication_year":2023,"publication_date":"2023-11-01","ids":{"openalex":"https://openalex.org/W4394628743","doi":"https://doi.org/10.1109/cloudnet59005.2023.10490023"},"language":"en","primary_location":{"id":"doi:10.1109/cloudnet59005.2023.10490023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudnet59005.2023.10490023","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 12th International Conference on Cloud Networking (CloudNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063140687","display_name":"Chun Shan","orcid":"https://orcid.org/0000-0003-4925-6085"},"institutions":[{"id":"https://openalex.org/I4210122543","display_name":"Guangdong Polytechnic Normal University","ror":"https://ror.org/02pcb5m77","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210122543"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chun Shan","raw_affiliation_strings":["Guangdong Polytechnic Normal University,School of Electronics and Information,Guangzhou,China","School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Polytechnic Normal University,School of Electronics and Information,Guangzhou,China","institution_ids":["https://openalex.org/I4210122543"]},{"raw_affiliation_string":"School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China","institution_ids":["https://openalex.org/I4210122543"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020138115","display_name":"Ziyi Zhang","orcid":"https://orcid.org/0000-0001-8509-6264"},"institutions":[{"id":"https://openalex.org/I4210122543","display_name":"Guangdong Polytechnic Normal University","ror":"https://ror.org/02pcb5m77","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210122543"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziyi Zhang","raw_affiliation_strings":["Guangdong Polytechnic Normal University,School of Electronics and Information,Guangzhou,China","School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Polytechnic Normal University,School of Electronics and Information,Guangzhou,China","institution_ids":["https://openalex.org/I4210122543"]},{"raw_affiliation_string":"School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China","institution_ids":["https://openalex.org/I4210122543"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062469414","display_name":"Siyi Zhou","orcid":"https://orcid.org/0000-0001-7830-0108"},"institutions":[{"id":"https://openalex.org/I4210122543","display_name":"Guangdong Polytechnic Normal University","ror":"https://ror.org/02pcb5m77","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210122543"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siyi Zhou","raw_affiliation_strings":["Guangdong Polytechnic Normal University,School of Electronics and Information,Guangzhou,China","School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Polytechnic Normal University,School of Electronics and Information,Guangzhou,China","institution_ids":["https://openalex.org/I4210122543"]},{"raw_affiliation_string":"School of Electronics and Information, Guangdong Polytechnic Normal University, Guangzhou, China","institution_ids":["https://openalex.org/I4210122543"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5063140687"],"corresponding_institution_ids":["https://openalex.org/I4210122543"],"apc_list":null,"apc_paid":null,"fwci":0.2006,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.56303261,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"307","last_page":"315"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9699000120162964,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9699000120162964,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9366999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9271000027656555,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7183046340942383},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.6674174070358276},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6259656548500061},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.591346263885498},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5871772170066833},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4670162796974182},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11488184332847595},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11011207103729248},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.06567966938018799}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7183046340942383},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.6674174070358276},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6259656548500061},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.591346263885498},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5871772170066833},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4670162796974182},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11488184332847595},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11011207103729248},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.06567966938018799}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cloudnet59005.2023.10490023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudnet59005.2023.10490023","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 12th International Conference on Cloud Networking (CloudNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1940872118","https://openalex.org/W2131774270","https://openalex.org/W2565077509","https://openalex.org/W2570094557","https://openalex.org/W2770559357","https://openalex.org/W2890264517","https://openalex.org/W2900346429","https://openalex.org/W2919115771","https://openalex.org/W2947843300","https://openalex.org/W4200507356","https://openalex.org/W4225658316","https://openalex.org/W4230630835","https://openalex.org/W4299301436","https://openalex.org/W6640362995"],"related_works":["https://openalex.org/W2731899572","https://openalex.org/W2961085424","https://openalex.org/W3215138031","https://openalex.org/W4306674287","https://openalex.org/W3009238340","https://openalex.org/W4321369474","https://openalex.org/W4360585206","https://openalex.org/W4285208911","https://openalex.org/W3046775127","https://openalex.org/W3082895349"],"abstract_inverted_index":{"With":[0],"the":[1,33,59,112,120,131,147,150,183,187,192],"rapid":[2],"development":[3],"of":[4,38,62,111,186,194],"information":[5],"technology,":[6],"cyber":[7],"security":[8],"issues":[9],"are":[10],"becoming":[11],"increasingly":[12],"critical.":[13],"Vulnerability":[14,104],"risk":[15],"assessment":[16],"plays":[17],"a":[18,47,73],"key":[19],"role":[20],"in":[21,46],"ensuring":[22],"network":[23],"security.":[24],"The":[25,92,126,173],"existing":[26,180],"vulnerability":[27,63,69,121,201],"warning":[28],"system":[29],"is":[30,116],"limited":[31],"by":[32,124,140],"constant":[34],"changes":[35],"and":[36,49,52,81,89],"emergence":[37],"vulnerabilities,":[39],"which":[40],"cannot":[41],"respond":[42],"to":[43,118,145,200],"potential":[44],"threats":[45],"timely":[48],"effective":[50],"manner":[51],"has":[53],"serious":[54],"lag.":[55],"This":[56],"paper":[57],"addresses":[58],"low":[60],"accuracy":[61],"severity":[64,122,202],"prediction":[65],"using":[66,146],"publicly":[67],"available":[68],"data.":[70],"It":[71],"introduces":[72],"multitask":[74,133],"deep":[75,134,197],"learning":[76,135,198],"method":[77],"that":[78,130],"utilizes":[79],"DistilBERT":[80],"BiLSTM":[82],"for":[83,100,182],"feature":[84],"extraction":[85],"through":[86],"pre-trained":[87],"models":[88,99,139],"multi-task":[90,196],"learning.":[91],"extracted":[93],"sentence":[94],"vectors":[95],"serve":[96],"as":[97],"trained":[98],"all":[101],"eight":[102,113,188],"Common":[103],"Scoring":[105],"System":[106],"(CVSS)":[107],"metrics.":[108],"Then":[109],"each":[110],"predicted":[114],"results":[115,128,157],"used":[117],"calculate":[119],"score":[123],"CVSS.":[125],"experimental":[127],"show":[129],"DistilBERT+BiLSTM":[132,151],"technique":[136],"outperforms":[137],"traditional":[138],"approximately":[141],"30%.":[142],"In":[143],"comparison":[144],"BERT":[148],"model,":[149],"model":[152,175],"not":[153],"only":[154],"exhibits":[155,176],"improved":[156],"but":[158],"also":[159],"delivers":[160],"higher":[161],"performance":[162],"while":[163],"requiring":[164],"fewer":[165],"computational":[166],"resources,":[167],"making":[168],"it":[169],"more":[170],"computationally":[171],"efficient.":[172],"proposed":[174],"significant":[177],"improvement":[178],"over":[179],"methods":[181],"F1":[184],"values":[185],"CVSS":[189],"metrics,":[190],"highlighting":[191],"effectiveness":[193],"applying":[195],"techniques":[199],"prediction.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
