{"id":"https://openalex.org/W4415744240","doi":"https://doi.org/10.1109/qrs-c65679.2025.00065","title":"An Automatic Classification Model for Long Code Vulnerabilities Based on the Teacher-Student Framework","display_name":"An Automatic Classification Model for Long Code Vulnerabilities Based on the Teacher-Student Framework","publication_year":2025,"publication_date":"2025-07-16","ids":{"openalex":"https://openalex.org/W4415744240","doi":"https://doi.org/10.1109/qrs-c65679.2025.00065"},"language":null,"primary_location":{"id":"doi:10.1109/qrs-c65679.2025.00065","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00065","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062828812","display_name":"Yu Han","orcid":"https://orcid.org/0000-0002-5684-1453"},"institutions":[{"id":"https://openalex.org/I4210095084","display_name":"Zhongji Test Equipment (China)","ror":"https://ror.org/00p24re17","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210095084"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yaolin Han","raw_affiliation_strings":["Chinese Flight Test Establishment,Xi'an,China"],"affiliations":[{"raw_affiliation_string":"Chinese Flight Test Establishment,Xi'an,China","institution_ids":["https://openalex.org/I4210095084"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076464406","display_name":"Wei Zheng","orcid":"https://orcid.org/0000-0002-2134-6540"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Zheng","raw_affiliation_strings":["Northwestern Polytechnical University,Xi'an,China"],"affiliations":[{"raw_affiliation_string":"Northwestern Polytechnical University,Xi'an,China","institution_ids":["https://openalex.org/I17145004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5062828812"],"corresponding_institution_ids":["https://openalex.org/I4210095084"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.46958158,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"472","last_page":"482"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.3790999948978424,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.3790999948978424,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.17550000548362732,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.07410000264644623,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5638999938964844},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4830999970436096},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.46889999508857727},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4203000068664551},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4052000045776367},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3828999996185303},{"id":"https://openalex.org/keywords/source-lines-of-code","display_name":"Source lines of code","score":0.37940001487731934},{"id":"https://openalex.org/keywords/bridge","display_name":"Bridge (graph theory)","score":0.3686000108718872}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7986000180244446},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6093000173568726},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5709999799728394},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5638999938964844},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4830999970436096},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.46889999508857727},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4203000068664551},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4052000045776367},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3828999996185303},{"id":"https://openalex.org/C199519371","wikidata":"https://www.wikidata.org/wiki/Q942695","display_name":"Source lines of code","level":3,"score":0.37940001487731934},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37599998712539673},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.3686000108718872},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.3382999897003174},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3156999945640564},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2957000136375427},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.29159998893737793},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.28029999136924744},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.2720000147819519},{"id":"https://openalex.org/C12186640","wikidata":"https://www.wikidata.org/wiki/Q6815743","display_name":"Memory model","level":3,"score":0.265500009059906},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.2612000107765198},{"id":"https://openalex.org/C2776650193","wikidata":"https://www.wikidata.org/wiki/Q264661","display_name":"Obstacle","level":2,"score":0.25940001010894775},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.25}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/qrs-c65679.2025.00065","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00065","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1832693441","https://openalex.org/W2168382229","https://openalex.org/W2599482629","https://openalex.org/W2890264517","https://openalex.org/W2963351448","https://openalex.org/W3034933032","https://openalex.org/W3091588759","https://openalex.org/W3096121526","https://openalex.org/W3098605233","https://openalex.org/W3177200443","https://openalex.org/W3210162706","https://openalex.org/W4221166942","https://openalex.org/W4243650394","https://openalex.org/W4312436517","https://openalex.org/W4312757223","https://openalex.org/W4312969325","https://openalex.org/W4385884967","https://openalex.org/W4402457356","https://openalex.org/W4409347440"],"related_works":[],"abstract_inverted_index":{"Information":[0],"security":[1],"is":[2,20,127,153,165,229,286],"a":[3,99,128,155,168],"critical":[4],"safeguard":[5],"in":[6,125,276],"the":[7,59,61,79,87,94,110,119,162,179,184,192,200,211,217,232,236,248,252,270,277,280],"digital":[8],"age,":[9],"and":[10,26,31,55,73,81,205,255],"software":[11,70],"vulnerabilities":[12],"are":[13,208,258],"one":[14],"of":[15,51,58,93,101,112,122,150,221,226,240,264,284],"its":[16,291],"primary":[17],"threats.":[18],"It":[19],"extremely":[21],"urgent":[22],"to":[23,44,77,106,174,195,214,230,234],"develop":[24],"efficient":[25],"reliable":[27],"automated":[28,69,140],"vulnerability":[29,71,95,123,132,141,175,261,273],"detection":[30,72,133,274],"classification":[32,74,142],"methods.":[33],"The":[34,147,224],"existing":[35,278],"methods":[36],"still":[37],"have":[38,98],"three":[39],"major":[40],"limitations:":[41],"insufficient":[42],"ability":[43,220],"handle":[45],"imbalanced":[46,120],"datasets,":[47],"poor":[48],"learning":[49,114,129,219],"effect":[50],"long":[52,116,145,222,241],"code":[53,242,253],"features,":[54],"limited":[56],"interpretability":[57],"model.Addressing":[60],"aforementioned":[62],"issues,":[63],"this":[64,135,151],"thesis":[65],"researches":[66],"deep":[67],"learning-based":[68],"methods,":[75],"aiming":[76],"improve":[78],"accuracy":[80],"interpretability.":[82],"Empirical":[83],"analysis":[84],"based":[85],"on":[86,167,251],"Big-Vul":[88],"dataset":[89,171],"shows":[90],"that":[91,257,267],"35.4%":[92],"sample":[96],"codes":[97],"length":[100],"greater":[102],"than":[103],"or":[104],"equal":[105],"512":[107],"tokens,":[108],"highlighting":[109],"importance":[111],"feature":[113,180,218],"for":[115,131,144,191,260],"codes.":[117],"Meanwhile,":[118],"distribution":[121],"categories":[124],"datasets":[126],"obstacle":[130],"models.Therefore,":[134],"study":[136],"proposes":[137],"LongVC,":[138,161],"an":[139],"method":[143,152],"code.":[146,223],"core":[148],"idea":[149],"utilizing":[154],"teacher-student":[156],"hierarchical":[157],"distillation":[158],"method.":[159],"In":[160],"teacher":[163,185],"model":[164,186,194,213,233,249],"trained":[166],"more":[169,188],"balanced":[170],"grouped":[172],"according":[173],"abstract":[176],"types.":[177],"Moreover,":[178],"representations":[181],"learned":[182],"by":[183,288],"provide":[187],"useful":[189],"knowledge":[190,197],"student":[193,212],"perform":[196],"distillation.":[198],"At":[199],"same":[201],"time,":[202],"bridge":[203,227],"memory":[204,207,228,246],"hint":[206,245],"introduced":[209],"into":[210],"further":[215],"enhance":[216],"role":[225],"enable":[231],"learn":[235],"semantic":[237],"context":[238],"flow":[239],"sequences,":[243],"while":[244],"helps":[247],"focus":[250],"structures":[254],"statements":[256],"helpful":[259],"classification.A":[262],"series":[263],"experiments":[265],"demonstrate":[266],"compared":[268],"with":[269],"state-of-the-art":[271],"Transformer-based":[272],"models":[275],"literature,":[279],"weighted":[281],"F1":[282],"value":[283],"LongVC":[285],"increased":[287],"5%,":[289],"verifying":[290],"superiority.":[292]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-31T00:00:00"}
