{"id":"https://openalex.org/W2795990847","doi":"https://doi.org/10.1109/saner.2018.8330232","title":"DeepWeak: Reasoning common software weaknesses via knowledge graph embedding","display_name":"DeepWeak: Reasoning common software weaknesses via knowledge graph embedding","publication_year":2018,"publication_date":"2018-03-01","ids":{"openalex":"https://openalex.org/W2795990847","doi":"https://doi.org/10.1109/saner.2018.8330232","mag":"2795990847"},"language":"en","primary_location":{"id":"doi:10.1109/saner.2018.8330232","is_oa":false,"landing_page_url":"https://doi.org/10.1109/saner.2018.8330232","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050983165","display_name":"Zhuobing Han","orcid":null},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhuobing Han","raw_affiliation_strings":["Tianjin Key Laboratory of Advanced Networking (TANK), Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking (TANK), Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100451509","display_name":"Xiaohong Li","orcid":"https://orcid.org/0000-0002-0752-6764"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohong Li","raw_affiliation_strings":["Tianjin Key Laboratory of Advanced Networking (TANK), Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking (TANK), Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100444832","display_name":"Hongtao Liu","orcid":"https://orcid.org/0000-0001-6939-3672"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongtao Liu","raw_affiliation_strings":["Tianjin Key Laboratory of Advanced Networking (TANK), Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking (TANK), Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028641941","display_name":"Zhenchang Xing","orcid":"https://orcid.org/0000-0001-7663-1421"},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Zhenchang Xing","raw_affiliation_strings":["Research School of Computer Science, Australian National University, Australia"],"affiliations":[{"raw_affiliation_string":"Research School of Computer Science, Australian National University, Australia","institution_ids":["https://openalex.org/I118347636"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100736532","display_name":"Zhiyong Feng","orcid":"https://orcid.org/0000-0001-8158-7453"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiyong Feng","raw_affiliation_strings":["School of Computer Software, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Software, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5050983165"],"corresponding_institution_ids":["https://openalex.org/I162868743"],"apc_list":null,"apc_paid":null,"fwci":3.7066,"has_fulltext":false,"cited_by_count":60,"citation_normalized_percentile":{"value":0.93623607,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"456","last_page":"466"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7388238906860352},{"id":"https://openalex.org/keywords/strengths-and-weaknesses","display_name":"Strengths and weaknesses","score":0.6541649699211121},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5049520134925842},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.44117027521133423},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.37834516167640686},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3498682379722595},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1889963448047638}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7388238906860352},{"id":"https://openalex.org/C63882131","wikidata":"https://www.wikidata.org/wiki/Q17122954","display_name":"Strengths and weaknesses","level":2,"score":0.6541649699211121},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5049520134925842},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.44117027521133423},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.37834516167640686},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3498682379722595},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1889963448047638},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/saner.2018.8330232","is_oa":false,"landing_page_url":"https://doi.org/10.1109/saner.2018.8330232","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W174427690","https://openalex.org/W1522301498","https://openalex.org/W1533861849","https://openalex.org/W1614298861","https://openalex.org/W1967446222","https://openalex.org/W2028742638","https://openalex.org/W2127426251","https://openalex.org/W2127795553","https://openalex.org/W2153579005","https://openalex.org/W2158899491","https://openalex.org/W2165612380","https://openalex.org/W2184957013","https://openalex.org/W2250807343","https://openalex.org/W2251182116","https://openalex.org/W2283196293","https://openalex.org/W2387719207","https://openalex.org/W2499696929","https://openalex.org/W2513738415","https://openalex.org/W2521166731","https://openalex.org/W2524017757","https://openalex.org/W2558476738","https://openalex.org/W2571811098","https://openalex.org/W2579141170","https://openalex.org/W2738442461","https://openalex.org/W2750886690","https://openalex.org/W2755637027","https://openalex.org/W2767521898","https://openalex.org/W2950577311","https://openalex.org/W2952230511","https://openalex.org/W2962886429","https://openalex.org/W2962948632","https://openalex.org/W2964007976","https://openalex.org/W2964121744","https://openalex.org/W2998704965","https://openalex.org/W4285719527","https://openalex.org/W4294170691","https://openalex.org/W6607091552","https://openalex.org/W6631943919","https://openalex.org/W6678830454","https://openalex.org/W6678846912","https://openalex.org/W6680532216","https://openalex.org/W6682691769","https://openalex.org/W6683738474","https://openalex.org/W6686133869","https://openalex.org/W6693832603","https://openalex.org/W6695596964","https://openalex.org/W6724366048","https://openalex.org/W6727425933","https://openalex.org/W6731817843","https://openalex.org/W6732324391"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W4387369504","https://openalex.org/W3046775127","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W3107602296","https://openalex.org/W4364306694","https://openalex.org/W4312192474"],"abstract_inverted_index":{"Common":[0,27],"software":[1,39,47,57,73,99,112,133,153,175],"weaknesses,":[2,48,58,74],"such":[3,20,75],"as":[4,21,76,117],"improper":[5],"input":[6],"validation,":[7],"integer":[8],"overflow,":[9],"can":[10,158],"harm":[11],"system":[12],"security":[13],"directly":[14],"or":[15],"indirectly,":[16],"causing":[17],"adverse":[18],"effects":[19],"denial-of-service,":[22],"execution":[23],"of":[24,37,78,84,97,152,174],"unauthorized":[25],"code.":[26],"Weakness":[28],"Enumeration":[29],"(CWE)":[30],"maintains":[31],"a":[32,118,123,143],"standard":[33],"list":[34],"and":[35,54,81,93,101,114,121,135,155,164,177,191],"classification":[36],"common":[38,52,82,98,111,192],"weakness.":[40],"Although":[41],"CWE":[42,185,188],"contains":[43],"rich":[44],"information":[45],"about":[46],"including":[49,184],"textual":[50],"descriptions,":[51],"sequences":[53],"relations":[55,80,116,137,157],"between":[56],"the":[59,139,172],"current":[60],"data":[61],"representation,":[62],"i.e.,":[63],"hyperlined":[64],"documents,":[65],"does":[66],"not":[67],"support":[68],"advanced":[69],"reasoning":[70,87,182],"tasks":[71,88],"on":[72],"prediction":[77],"missing":[79],"consequences":[83],"CWEs.":[85],"Such":[86],"become":[89],"critical":[90],"to":[91,109,130,170],"managing":[92],"analyzing":[94],"large":[95],"numbers":[96],"weaknesses":[100,113,134,154],"their":[102,115,136,156],"relations.":[103],"In":[104],"this":[105],"paper,":[106],"we":[107],"propose":[108],"represent":[110],"knowledge":[119,126,140,162,196],"graph,":[120],"develop":[122],"translation-based,":[124],"description-embodied":[125],"representation":[127,205],"learning":[128,206],"method":[129],"embed":[131],"both":[132],"in":[138,180],"graph":[141,197],"into":[142],"semantic":[144],"vector":[145,148],"space.":[146],"The":[147],"representations":[149],"(i.e.,":[150],"embeddings)":[151],"be":[159],"exploited":[160],"for":[161],"acquisition":[163],"inference.":[165],"We":[166],"conduct":[167],"extensive":[168],"experiments":[169],"evaluate":[171],"performance":[173],"weakness":[176],"relation":[178],"embeddings":[179],"three":[181],"tasks,":[183],"link":[186],"prediction,":[187],"triple":[189],"classification,":[190],"consequence":[193],"prediction.":[194],"Our":[195],"embedding":[198],"approach":[199],"outperforms":[200],"other":[201],"description-":[202],"and/or":[203],"structure-based":[204],"methods.":[207]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
