{"id":"https://openalex.org/W2995824836","doi":"https://doi.org/10.1109/tfuzz.2019.2958558","title":"DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection","display_name":"DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2995824836","doi":"https://doi.org/10.1109/tfuzz.2019.2958558","mag":"2995824836"},"language":"en","primary_location":{"id":"doi:10.1109/tfuzz.2019.2958558","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tfuzz.2019.2958558","pdf_url":null,"source":{"id":"https://openalex.org/S134177497","display_name":"IEEE Transactions on Fuzzy Systems","issn_l":"1063-6706","issn":["1063-6706","1941-0034"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030973483","display_name":"Shigang Liu","orcid":"https://orcid.org/0000-0003-0162-3595"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Shigang Liu","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085946103","display_name":"Guanjun Lin","orcid":"https://orcid.org/0000-0003-3280-1307"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Guanjun Lin","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083874423","display_name":"Qing\u2010Long Han","orcid":"https://orcid.org/0000-0002-7207-0716"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Qing-Long Han","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076576641","display_name":"Sheng Wen","orcid":"https://orcid.org/0000-0003-0655-666X"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sheng Wen","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044019139","display_name":"Jun Zhang","orcid":"https://orcid.org/0000-0002-2189-7801"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jun Zhang","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, Australia","institution_ids":["https://openalex.org/I57093077"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5030973483"],"corresponding_institution_ids":["https://openalex.org/I57093077"],"apc_list":null,"apc_paid":null,"fwci":19.0008,"has_fulltext":false,"cited_by_count":108,"citation_normalized_percentile":{"value":0.9924032,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7970679402351379},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6437239646911621},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6084352731704712},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.5986477136611938},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.589707612991333},{"id":"https://openalex.org/keywords/oversampling","display_name":"Oversampling","score":0.5895885229110718},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5500314831733704},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5205755829811096},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46064522862434387},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.44411128759384155},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4112367033958435},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3870294988155365},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20146530866622925},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.0953805148601532}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7970679402351379},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6437239646911621},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6084352731704712},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.5986477136611938},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.589707612991333},{"id":"https://openalex.org/C197323446","wikidata":"https://www.wikidata.org/wiki/Q331222","display_name":"Oversampling","level":3,"score":0.5895885229110718},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5500314831733704},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5205755829811096},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46064522862434387},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.44411128759384155},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4112367033958435},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3870294988155365},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20146530866622925},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0953805148601532},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tfuzz.2019.2958558","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tfuzz.2019.2958558","pdf_url":null,"source":{"id":"https://openalex.org/S134177497","display_name":"IEEE Transactions on Fuzzy Systems","issn_l":"1063-6706","issn":["1063-6706","1941-0034"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Fuzzy Systems","raw_type":"journal-article"},{"id":"pmh:oai:researchbank.swinburne.edu.au:43b919ab-d901-4c9e-8444-c59480252e8c/1","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.3/456558","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"IEEE Transactions on Fuzzy Systems, Vol. 28, no. 7 (Jul 2019), pp. 1329-1343","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7400000095367432,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":63,"referenced_works":["https://openalex.org/W133470593","https://openalex.org/W1420268584","https://openalex.org/W1563577331","https://openalex.org/W1614298861","https://openalex.org/W1707806712","https://openalex.org/W1850047186","https://openalex.org/W1969545431","https://openalex.org/W1986959058","https://openalex.org/W1988510359","https://openalex.org/W1997236144","https://openalex.org/W1997646511","https://openalex.org/W2004758929","https://openalex.org/W2011376672","https://openalex.org/W2029866800","https://openalex.org/W2040900804","https://openalex.org/W2051000513","https://openalex.org/W2069268700","https://openalex.org/W2079753286","https://openalex.org/W2087240369","https://openalex.org/W2096235960","https://openalex.org/W2104933073","https://openalex.org/W2115403315","https://openalex.org/W2136173752","https://openalex.org/W2148143831","https://openalex.org/W2161251616","https://openalex.org/W2165004968","https://openalex.org/W2166336492","https://openalex.org/W2207457333","https://openalex.org/W2297096600","https://openalex.org/W2297419069","https://openalex.org/W2318680981","https://openalex.org/W2360967250","https://openalex.org/W2485082069","https://openalex.org/W2562680154","https://openalex.org/W2567149662","https://openalex.org/W2577142429","https://openalex.org/W2737654582","https://openalex.org/W2743517242","https://openalex.org/W2743521762","https://openalex.org/W2746122193","https://openalex.org/W2748690817","https://openalex.org/W2756848027","https://openalex.org/W2765858138","https://openalex.org/W2768745333","https://openalex.org/W2781491433","https://openalex.org/W2790397506","https://openalex.org/W2790664081","https://openalex.org/W2796200341","https://openalex.org/W2904738276","https://openalex.org/W2905097561","https://openalex.org/W2966342255","https://openalex.org/W2981023147","https://openalex.org/W2988065079","https://openalex.org/W2990323480","https://openalex.org/W3101228802","https://openalex.org/W4238859253","https://openalex.org/W4238865174","https://openalex.org/W6605468800","https://openalex.org/W6628306711","https://openalex.org/W6636510571","https://openalex.org/W6637554470","https://openalex.org/W6675634716","https://openalex.org/W6742725575"],"related_works":["https://openalex.org/W4380075502","https://openalex.org/W4223943233","https://openalex.org/W4312200629","https://openalex.org/W4360585206","https://openalex.org/W4364306694","https://openalex.org/W4380086463","https://openalex.org/W4225984852","https://openalex.org/W4225161397","https://openalex.org/W3014300295","https://openalex.org/W3164822677"],"abstract_inverted_index":{"Software":[0],"vulnerability":[1,28,179],"has":[2,19],"long":[3,95],"been":[4],"an":[5],"important":[6],"but":[7],"critical":[8],"research":[9,25],"issue":[10],"in":[11,23,149,188],"cybersecurity.":[12],"Recently,":[13],"the":[14,24,31,52,75,121,129,136,139,157,160,171,178,184],"machine":[15],"learning":[16,82],"(ML)-based":[17],"approach":[18],"attracted":[20],"increasing":[21],"interest":[22],"of":[26,34,78,131,138,147,156,162,190],"software":[27],"detection.":[29],"However,":[30],"detection":[32,180],"performance":[33,137],"existing":[35],"ML-based":[36],"methods":[37],"require":[38],"further":[39],"improvement.":[40],"There":[41],"are":[42],"two":[43],"challenges:":[44],"one":[45],"is":[46,54,117,186],"code":[47,59,80,103,158],"representation":[48,81],"for":[49,128],"ML":[50],"and":[51,60,83,101,108,165],"other":[53],"class":[55,85,130],"imbalance":[56],"between":[57],"vulnerable":[58,107,132],"nonvulnerable":[61,109],"code.":[62,110,133],"To":[63,134],"overcome":[64],"these":[65],"challenges,":[66],"this":[67],"article":[68],"develops":[69],"a":[70,89,112,145,150],"DeepBalance":[71],"system,":[72,141],"which":[73],"combines":[74],"new":[76,113,140,173],"ideas":[77],"deep":[79,90],"fuzzy-based":[84],"rebalancing.":[86],"We":[87],"design":[88],"neural":[91],"network":[92],"with":[93],"bidirectional":[94],"short-term":[96],"memory":[97],"to":[98,119],"learn":[99],"invariant":[100],"discriminative":[102],"representations":[104],"from":[105,159],"labeled":[106],"Then,":[111],"fuzzy":[114],"oversampling":[115],"method":[116],"employed":[118],"rebalance":[120],"training":[122],"data":[123],"by":[124],"generating":[125],"synthetic":[126],"samples":[127],"evaluate":[135],"we":[142],"carry":[143],"out":[144],"series":[146],"experiments":[148],"real-world":[151],"ground-truth":[152],"dataset":[153],"that":[154,170],"consists":[155],"projects":[161],"LibTIFF,":[163],"LibPNG,":[164],"FFmpeg.":[166],"The":[167],"results":[168],"show":[169],"proposed":[172],"system":[174],"can":[175],"significantly":[176],"improve":[177],"performance.":[181],"For":[182],"example,":[183],"improvement":[185],"15%":[187],"terms":[189],"F-measure.":[191]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":26},{"year":2022,"cited_by_count":21},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":17},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2025-10-10T00:00:00"}
