{"id":"https://openalex.org/W4416250732","doi":"https://doi.org/10.1109/ijcnn64981.2025.11229292","title":"VulnTeam: A Team Collaboration Framework for LLM-based Vulnerability Detection","display_name":"VulnTeam: A Team Collaboration Framework for LLM-based Vulnerability Detection","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416250732","doi":"https://doi.org/10.1109/ijcnn64981.2025.11229292"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11229292","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11229292","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021084454","display_name":"Jiachong Li","orcid":"https://orcid.org/0000-0002-0784-3882"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiayuan Li","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083041482","display_name":"Lei Cui","orcid":"https://orcid.org/0000-0003-2283-5079"},"institutions":[{"id":"https://openalex.org/I4210132362","display_name":"Yancheng Second People's Hospital","ror":"https://ror.org/02x0x2d91","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210132362"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Cui","raw_affiliation_strings":["Quancheng Lab,Jinan,China"],"affiliations":[{"raw_affiliation_string":"Quancheng Lab,Jinan,China","institution_ids":["https://openalex.org/I4210132362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100874531","display_name":"Wenyan Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenyan Yu","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073508460","display_name":"Haiqiang Fei","orcid":"https://orcid.org/0000-0002-0431-2605"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiqiang Fei","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074720702","display_name":"Feng Cheng","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Cheng","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061759239","display_name":"Hongsong Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongsong Zhu","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5021084454"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.49456658,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.567300021648407,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.567300021648407,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.11289999634027481,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.05810000002384186,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7425000071525574},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6633999943733215},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.5317000150680542},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5098999738693237},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.44589999318122864},{"id":"https://openalex.org/keywords/subject-matter-expert","display_name":"Subject-matter expert","score":0.3950999975204468}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7425000071525574},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6633999943733215},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6542999744415283},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.5317000150680542},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5098999738693237},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.44589999318122864},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41990000009536743},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4009000062942505},{"id":"https://openalex.org/C105002631","wikidata":"https://www.wikidata.org/wiki/Q4833645","display_name":"Subject-matter expert","level":3,"score":0.3950999975204468},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3921999931335449},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3781000077724457},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3614000082015991},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3086000084877014},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.30320000648498535},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3001999855041504},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.28760001063346863},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.27790001034736633},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.27300000190734863},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.26589998602867126}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11229292","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11229292","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2781491433","https://openalex.org/W2885030880","https://openalex.org/W2962960733","https://openalex.org/W2976184969","https://openalex.org/W3098605233","https://openalex.org/W3117923638","https://openalex.org/W3166095789","https://openalex.org/W3191605668","https://openalex.org/W4221166942","https://openalex.org/W4284667406","https://openalex.org/W4312436517","https://openalex.org/W4312868944","https://openalex.org/W4384345641","https://openalex.org/W4385245566","https://openalex.org/W4385570815","https://openalex.org/W4385570973","https://openalex.org/W4387428070","https://openalex.org/W4389161980","https://openalex.org/W4389520309","https://openalex.org/W4389524340","https://openalex.org/W4390874728","https://openalex.org/W4391558363","https://openalex.org/W4394769550","https://openalex.org/W4402264467","https://openalex.org/W4404792940","https://openalex.org/W4408352764"],"related_works":[],"abstract_inverted_index":{"Software":[0],"vulnerability":[1,28,55,67,97,143,159],"detection":[2,68,144,160],"is":[3],"a":[4,60,78,105],"critical":[5],"challenge":[6],"in":[7],"cyber":[8],"security.":[9],"With":[10],"the":[11,110,119],"rise":[12],"of":[13,104,149,165],"deep":[14],"learning":[15],"and":[16,38,118,134],"large":[17],"language":[18],"models":[19,84],"(LLMs),":[20],"numerous":[21],"studies":[22],"have":[23],"applied":[24],"these":[25],"technologies":[26],"to":[27,91,95,125,172],"detection.":[29],"Existing":[30],"approaches":[31],"directly":[32],"employ":[33],"prompt":[34],"engineering,":[35],"chain-of-thought":[36],"reasoning,":[37],"fine-tuning":[39,80,103],"methods":[40,161],"on":[41],"LLMs,":[42],"but":[43],"achieve":[44],"suboptimal":[45],"results.":[46],"To":[47],"effectively":[48],"leverage":[49],"LLMs\u2019":[50,142],"powerful":[51],"reasoning":[52],"capabilities":[53],"for":[54,65,109],"detection,":[56],"we":[57,76,168],"propose":[58],"VulnTeam,":[59],"novel":[61],"team":[62,73,114,120],"collaboration":[63],"framework":[64],"LLM":[66],"inspired":[69],"by":[70,101],"human":[71],"expert":[72,83],"collaboration.":[74],"Specifically,":[75],"introduce":[77],"dual-stage":[79],"approach":[81],"where":[82],"are":[85],"first":[86],"fine-tuned":[87],"using":[88],"low-rank":[89],"adaptation":[90],"detect":[92,126],"vulnerabilities":[93],"related":[94],"different":[96],"syntactic":[98],"features,":[99],"followed":[100],"instruction":[102],"leader":[106,121],"model":[107],"responsible":[108],"final":[111],"decision-making.":[112],"Ultimately,":[113],"members":[115],"(expert":[116],"models)":[117],"(leader":[122],"model)":[123],"collaborate":[124],"vulnerabilities.":[127],"Our":[128],"experimental":[129],"evaluation":[130],"across":[131],"three":[132],"LLMs":[133,153],"two":[135],"datasets":[136],"demonstrates":[137],"that":[138],"VulnTeam":[139],"significantly":[140],"enhances":[141],"performance":[145],"(average":[146,162],"F1-score":[147,163],"improvement":[148,164],"12.51%).":[150],"Moreover,":[151],"VulnTeam-enhanced":[152],"substantially":[154],"outperform":[155],"previous":[156],"state-of-the-art":[157],"(SOTA)":[158],"7.78%).":[166],"Additionally,":[167],"analyze":[169],"computational":[170],"costs":[171],"validate":[173],"VulnTeam\u2019s":[174],"practical":[175],"applicability.":[176]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-14T00:00:00"}
