{"id":"https://openalex.org/W4404031165","doi":"https://doi.org/10.1109/icccnt61001.2024.10724230","title":"DL-VulBERT: A Deep Learning Classifier for the Identification of Software Vulnerabilities","display_name":"DL-VulBERT: A Deep Learning Classifier for the Identification of Software Vulnerabilities","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404031165","doi":"https://doi.org/10.1109/icccnt61001.2024.10724230"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10724230","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10724230","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024495289","display_name":"Aditya Gupta","orcid":"https://orcid.org/0000-0002-6188-4810"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Aditya Raj Gupta","raw_affiliation_strings":["Maulana Azad National Institute of Technology,Department of Computer Science and Engineering,Bhopal,India"],"affiliations":[{"raw_affiliation_string":"Maulana Azad National Institute of Technology,Department of Computer Science and Engineering,Bhopal,India","institution_ids":["https://openalex.org/I91277730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074527311","display_name":"Deepak Singh Tomar","orcid":"https://orcid.org/0000-0001-9025-1679"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Deepak Singh Tomar","raw_affiliation_strings":["Maulana Azad National Institute of Technology,Department of Computer Science and Engineering,Bhopal,India"],"affiliations":[{"raw_affiliation_string":"Maulana Azad National Institute of Technology,Department of Computer Science and Engineering,Bhopal,India","institution_ids":["https://openalex.org/I91277730"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102802216","display_name":"Raj Shekhar","orcid":"https://orcid.org/0000-0001-5799-0736"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Raj Shekhar","raw_affiliation_strings":["Maulana Azad National Institute of Technology,Department of Computer Science and Engineering,Bhopal,India"],"affiliations":[{"raw_affiliation_string":"Maulana Azad National Institute of Technology,Department of Computer Science and Engineering,Bhopal,India","institution_ids":["https://openalex.org/I91277730"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5024495289"],"corresponding_institution_ids":["https://openalex.org/I91277730"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30602928,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9675999879837036,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9675999879837036,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9671000242233276,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9478999972343445,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7286497354507446},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5810732841491699},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5205312967300415},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.48512041568756104},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4492895305156708},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4361423850059509},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.37242764234542847},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14746975898742676}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7286497354507446},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5810732841491699},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5205312967300415},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.48512041568756104},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4492895305156708},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4361423850059509},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37242764234542847},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14746975898742676},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10724230","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10724230","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2781491433","https://openalex.org/W2791845676","https://openalex.org/W2792425537","https://openalex.org/W2796200341","https://openalex.org/W2885030880","https://openalex.org/W2947411064","https://openalex.org/W3048901179","https://openalex.org/W3136874603","https://openalex.org/W3137781054","https://openalex.org/W4281763794","https://openalex.org/W4392741075","https://openalex.org/W6749470980","https://openalex.org/W6751601040","https://openalex.org/W6755207826","https://openalex.org/W6850058609","https://openalex.org/W6853016249"],"related_works":["https://openalex.org/W4375867731","https://openalex.org/W2611989081","https://openalex.org/W2731899572","https://openalex.org/W4230611425","https://openalex.org/W4294635752","https://openalex.org/W4304166257","https://openalex.org/W2898732673","https://openalex.org/W4383066092","https://openalex.org/W3215138031","https://openalex.org/W4380075502"],"abstract_inverted_index":{"The":[0,15,36,50,76,108,127,145],"research":[1,180],"presents":[2],"DL-VulBERT,":[3],"a":[4,91,96,165],"novel":[5],"vulnerability":[6,162,176],"detection":[7,177],"system":[8],"in":[9,39,73,154,157],"software":[10,161,188],"using":[11,135],"deep":[12,155],"learning":[13,156],"model.":[14],"model":[16,77,118,148],"leverages":[17],"the":[18,62,67,70,74,100,106,117,124,130,150,158,171,183],"power":[19],"of":[20,64,66,99,105,129,152,160,175],"tokenization":[21,51],"and":[22,27,32,44,56,69,90,143,173,190],"LSTM":[23,81],"networks":[24],"to":[25,46,119,123,182,186],"process":[26,52],"learn":[28],"from":[29],"both":[30],"code":[31,55,68],"natural":[33],"language":[34],"descriptions.":[35,75],"dataset":[37],"used":[38],"this":[40],"study":[41],"is":[42,114,133],"balanced":[43],"shuffled":[45],"ensure":[47],"unbiased":[48],"learning.":[49],"transforms":[53],"raw":[54],"descriptions":[57],"into":[58],"structured":[59],"representations,":[60],"capturing":[61],"structure":[63],"syntax":[65],"semantic":[71],"knowledge":[72],"architecture":[78],"includes":[79],"two":[80],"blocks":[82],"for":[83],"each":[84],"input":[85],"type,":[86],"an":[87],"attention":[88],"mechanism,":[89],"final":[92],"output":[93,120],"layer":[94],"with":[95],"activation":[97],"function":[98,113],"sigmoid":[101],"function.":[102],"For":[103],"training":[104],"model,":[107],"Binary":[109],"Cross":[110],"Entropy":[111],"loss":[112],"used,":[115],"encouraging":[116],"probabilities":[121],"close":[122],"true":[125],"labels.":[126],"evaluation":[128],"model\u2019s":[131],"performance":[132],"done":[134],"different":[136],"metrics,":[137],"including":[138],"F1":[139],"Score,":[140],"Accuracy,":[141],"Recall":[142],"Precision.":[144],"proposed":[146],"DL-VulBERT":[147],"represents":[149],"capability":[151],"algorithms":[153],"domain":[159],"detection,":[163],"providing":[164],"new":[166],"approach":[167],"that":[168],"could":[169],"enhance":[170],"effectiveness":[172],"efficiency":[174],"tools.":[178],"This":[179],"contributes":[181],"ongoing":[184],"efforts":[185],"secure":[187],"systems":[189],"protect":[191],"them":[192],"against":[193],"potential":[194],"threats.":[195]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
