{"id":"https://openalex.org/W7125957967","doi":"https://doi.org/10.1109/smc58881.2025.11343541","title":"CTVD: Collaborative Training of Deep Learning and Large Model for C/C++ Source Code Vulnerability Detection","display_name":"CTVD: Collaborative Training of Deep Learning and Large Model for C/C++ Source Code Vulnerability Detection","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125957967","doi":"https://doi.org/10.1109/smc58881.2025.11343541"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11343541","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343541","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124109051","display_name":"Yaning Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210158522","display_name":"PLA Academy of Military Science","ror":"https://ror.org/05ct4s596","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210158522"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yaning Zheng","raw_affiliation_strings":["Academy of Military Sciences, PLA,Institute of System Engineering,Beijing,China,100101"],"affiliations":[{"raw_affiliation_string":"Academy of Military Sciences, PLA,Institute of System Engineering,Beijing,China,100101","institution_ids":["https://openalex.org/I4210158522"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124067382","display_name":"Dongxia Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210158522","display_name":"PLA Academy of Military Science","ror":"https://ror.org/05ct4s596","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210158522"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongxia Wang","raw_affiliation_strings":["Academy of Military Sciences, PLA,Institute of System Engineering,Beijing,China,100101"],"affiliations":[{"raw_affiliation_string":"Academy of Military Sciences, PLA,Institute of System Engineering,Beijing,China,100101","institution_ids":["https://openalex.org/I4210158522"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100844256","display_name":"Huayang Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210158522","display_name":"PLA Academy of Military Science","ror":"https://ror.org/05ct4s596","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210158522"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huayang Cao","raw_affiliation_strings":["Academy of Military Sciences, PLA,Institute of System Engineering,Beijing,China,100101"],"affiliations":[{"raw_affiliation_string":"Academy of Military Sciences, PLA,Institute of System Engineering,Beijing,China,100101","institution_ids":["https://openalex.org/I4210158522"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124119949","display_name":"Cheng Qian","orcid":null},"institutions":[{"id":"https://openalex.org/I4210158522","display_name":"PLA Academy of Military Science","ror":"https://ror.org/05ct4s596","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210158522"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cheng Qian","raw_affiliation_strings":["Academy of Military Sciences, PLA,Institute of System Engineering,Beijing,China,100101"],"affiliations":[{"raw_affiliation_string":"Academy of Military Sciences, PLA,Institute of System Engineering,Beijing,China,100101","institution_ids":["https://openalex.org/I4210158522"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102430782","display_name":"Honglin Zhuang","orcid":"https://orcid.org/0009-0001-6070-6027"},"institutions":[{"id":"https://openalex.org/I4210158522","display_name":"PLA Academy of Military Science","ror":"https://ror.org/05ct4s596","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210158522"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Honglin Zhuang","raw_affiliation_strings":["Academy of Military Sciences, PLA,Institute of System Engineering,Beijing,China,100101"],"affiliations":[{"raw_affiliation_string":"Academy of Military Sciences, PLA,Institute of System Engineering,Beijing,China,100101","institution_ids":["https://openalex.org/I4210158522"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5124109051"],"corresponding_institution_ids":["https://openalex.org/I4210158522"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.85347326,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2885","last_page":"2892"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.4747999906539917,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.4747999906539917,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.20409999787807465,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.10559999942779541,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7134000062942505},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.6227999925613403},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6155999898910522},{"id":"https://openalex.org/keywords/baseline","display_name":"Baseline (sea)","score":0.51910001039505},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4941999912261963},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4629000127315521},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4562000036239624},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.3734000027179718}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7786999940872192},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7134000062942505},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.660099983215332},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.6227999925613403},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6155999898910522},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6021000146865845},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.51910001039505},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4941999912261963},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4629000127315521},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4562000036239624},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.3734000027179718},{"id":"https://openalex.org/C2777211547","wikidata":"https://www.wikidata.org/wiki/Q17141490","display_name":"Training (meteorology)","level":2,"score":0.34299999475479126},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3407000005245209},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.31949999928474426},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.3118000030517578},{"id":"https://openalex.org/C138020889","wikidata":"https://www.wikidata.org/wiki/Q2349659","display_name":"Collaborative learning","level":2,"score":0.30489999055862427},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.29739999771118164},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.2955000102519989},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.2930000126361847},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.2872999906539917},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.28519999980926514},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.2736999988555908},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.26589998602867126}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11343541","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343541","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.40311914682388306,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2885030880","https://openalex.org/W2976184969","https://openalex.org/W2998879504","https://openalex.org/W3033777149","https://openalex.org/W3091588759","https://openalex.org/W3098605233","https://openalex.org/W3166095789","https://openalex.org/W3177116043","https://openalex.org/W4205584322","https://openalex.org/W4206469504","https://openalex.org/W4286331368","https://openalex.org/W4287848613","https://openalex.org/W4300878468","https://openalex.org/W4308643023","https://openalex.org/W4385337511","https://openalex.org/W4386366018","https://openalex.org/W4387298393","https://openalex.org/W4391558363","https://openalex.org/W4394745219","https://openalex.org/W4396780052","https://openalex.org/W4400798831","https://openalex.org/W4402176088"],"related_works":[],"abstract_inverted_index":{"As":[0],"software":[1,13],"systems":[2],"grow":[3],"in":[4,23,138,180,187,202],"complexity,":[5],"source":[6,231],"code":[7,33,78,93,232],"vulnerability":[8,233],"detection":[9],"becomes":[10],"crucial":[11],"for":[12,230],"security.":[14],"Existing":[15],"methods,":[16],"whether":[17],"sequence-based":[18],"or":[19],"graph-based,":[20],"face":[21],"limitations":[22],"accurately":[24],"detecting":[25],"vulnerabilities.":[26],"Sequence-based":[27],"models":[28,37,90],"often":[29],"struggle":[30],"with":[31,127,172],"capturing":[32],"structure,":[34],"while":[35],"graph-based":[36,57],"have":[38],"difficulty":[39],"handling":[40],"long-distance":[41],"contextual":[42],"relationships.":[43],"To":[44],"overcome":[45],"these":[46],"challenges,":[47],"we":[48],"propose":[49],"a":[50,56,62,224],"collaborative":[51,98,131,209],"training":[52,99,132,210],"framework":[53,211],"that":[54],"unifies":[55],"deep":[58,68,157,217],"learning":[59,69,158,218],"module":[60,159,167],"and":[61,81,106,118,142,163,190,200,219,227],"semantic-rich":[63],"large":[64,83,88,165,220],"model":[65,84,133,166,221],"module.":[66],"The":[67],"module,":[70,85],"based":[71],"on":[72,112,146],"graph":[73],"neural":[74],"networks":[75],"(GNNs),":[76],"captures":[77],"structural":[79],"information,":[80],"the":[82,101,121,147,156,164,173,181,203,214],"leveraging":[86],"pre-trained":[87],"language":[89],"(LLMs),":[91],"understands":[92],"semantics.":[94],"Through":[95],"an":[96],"iterative":[97],"mechanism,":[100],"two":[102],"modules":[103],"exchange":[104],"information":[105],"learn":[107],"from":[108],"each":[109],"other.Experimental":[110],"results":[111],"three":[113],"public":[114],"datasets":[115],"(Big-Vul,":[116],"Reveal,":[117],"Devign)":[119],"demonstrate":[120],"superiority":[122],"of":[123,196,216],"our":[124,130,150,207],"approach.":[125],"Compared":[126,171],"baseline":[128],"models,":[129],"(CTVD)":[134],"achieves":[135],"significant":[136],"improvements":[137],"accuracy,":[139],"recall,":[140],"precision,":[141],"F1-score.":[143],"For":[144],"example,":[145],"Big-Vul":[148],"dataset,":[149],"model\u2019s":[151],"accuracy":[152],"reaches":[153],"86.5%,":[154],"outperforming":[155],"alone":[160,168],"by":[161,169],"8.3%":[162],"6.4%.":[170],"latest":[174],"co-training":[175],"method-Vul-LMGNN,":[176],"CTVD":[177,186],"outperforms":[178],"Vul-LMGNN":[179],"DiverseVul":[182],"dataset.":[183],"We":[184],"applied":[185],"real":[188],"projects":[189],"found":[191],"seven":[192],"undisclosed":[193],"vulnerabilities,":[194],"all":[195],"which":[197],"were":[198],"reported":[199],"included":[201],"CNNVD.":[204],"In":[205],"conclusion,":[206],"proposed":[208],"effectively":[212],"combines":[213],"strengths":[215],"modules,":[222],"providing":[223],"more":[225],"accurate":[226],"reliable":[228],"solution":[229],"detection.":[234]},"counts_by_year":[],"updated_date":"2026-01-29T23:17:01.242718","created_date":"2026-01-29T00:00:00"}
