{"id":"https://openalex.org/W3111602563","doi":"https://doi.org/10.1109/tifs.2020.3044773","title":"Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection","display_name":"Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection","publication_year":2020,"publication_date":"2020-12-14","ids":{"openalex":"https://openalex.org/W3111602563","doi":"https://doi.org/10.1109/tifs.2020.3044773","mag":"3111602563"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2020.3044773","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2020.3044773","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101484881","display_name":"Huanting Wang","orcid":"https://orcid.org/0000-0003-0579-4295"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huanting Wang","raw_affiliation_strings":["School of Information Science and Technology, Northwest University, Xi\u2019an, China","School of Information Science and Technology, Northwest University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Northwest University, Xi\u2019an, China","institution_ids":["https://openalex.org/I37802460"]},{"raw_affiliation_string":"School of Information Science and Technology, Northwest University, Xi'an, China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013951362","display_name":"Guixin Ye","orcid":"https://orcid.org/0000-0003-2074-4253"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guixin Ye","raw_affiliation_strings":["School of Information Science and Technology, Northwest University, Xi\u2019an, China","School of Information Science and Technology, Northwest University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Northwest University, Xi\u2019an, China","institution_ids":["https://openalex.org/I37802460"]},{"raw_affiliation_string":"School of Information Science and Technology, Northwest University, Xi'an, China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069158506","display_name":"Zhanyong Tang","orcid":"https://orcid.org/0000-0002-4333-2334"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhanyong Tang","raw_affiliation_strings":["School of Information Science and Technology, Northwest University, Xi\u2019an, China","School of Information Science and Technology, Northwest University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Northwest University, Xi\u2019an, China","institution_ids":["https://openalex.org/I37802460"]},{"raw_affiliation_string":"School of Information Science and Technology, Northwest University, Xi'an, China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051957977","display_name":"Shin Hwei Tan","orcid":"https://orcid.org/0000-0001-8633-3372"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shin Hwei Tan","raw_affiliation_strings":["Southern University of Science and Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Southern University of Science and Technology, Shenzhen, China","institution_ids":["https://openalex.org/I3045169105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047856952","display_name":"Songfang Huang","orcid":"https://orcid.org/0000-0001-8084-0904"},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songfang Huang","raw_affiliation_strings":["Alibaba DAMO Academy, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Alibaba DAMO Academy, Hangzhou, China","institution_ids":["https://openalex.org/I45928872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065103224","display_name":"Dingyi Fang","orcid":"https://orcid.org/0000-0002-5816-6922"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dingyi Fang","raw_affiliation_strings":["School of Information Science and Technology, Northwest University, Xi\u2019an, China","School of Information Science and Technology, Northwest University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Northwest University, Xi\u2019an, China","institution_ids":["https://openalex.org/I37802460"]},{"raw_affiliation_string":"School of Information Science and Technology, Northwest University, Xi'an, China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102220317","display_name":"Yansong Feng","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yansong Feng","raw_affiliation_strings":["Wangxuan Institute of Computer Technology (WICT), Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Wangxuan Institute of Computer Technology (WICT), Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000654704","display_name":"Lizhong Bian","orcid":null},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lizhong Bian","raw_affiliation_strings":["Alipay (Hangzhou) Information & Technology Company Ltd., Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Alipay (Hangzhou) Information & Technology Company Ltd., Hangzhou, China","institution_ids":["https://openalex.org/I45928872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100401045","display_name":"Zheng Wang","orcid":"https://orcid.org/0000-0001-6157-0662"},"institutions":[{"id":"https://openalex.org/I130828816","display_name":"University of Leeds","ror":"https://ror.org/024mrxd33","country_code":"GB","type":"education","lineage":["https://openalex.org/I130828816"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zheng Wang","raw_affiliation_strings":["School of Computing, University of Leeds, Leeds, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing, University of Leeds, Leeds, U.K","institution_ids":["https://openalex.org/I130828816"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5101484881"],"corresponding_institution_ids":["https://openalex.org/I37802460"],"apc_list":null,"apc_paid":null,"fwci":36.1682,"has_fulltext":false,"cited_by_count":300,"citation_normalized_percentile":{"value":0.99741857,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"16","issue":null,"first_page":"1943","last_page":"1958"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8597570657730103},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5558185577392578},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5014426708221436},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.493375688791275},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.4876364767551422},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4870169758796692},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.48351147770881653},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.4761545658111572},{"id":"https://openalex.org/keywords/abstract-syntax-tree","display_name":"Abstract syntax tree","score":0.45113641023635864},{"id":"https://openalex.org/keywords/control-flow-graph","display_name":"Control flow graph","score":0.44595977663993835},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.4327712059020996},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.4325553774833679},{"id":"https://openalex.org/keywords/program-comprehension","display_name":"Program comprehension","score":0.41791975498199463},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.41384193301200867},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4104488790035248},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2656751871109009},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2639574110507965},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.2562081813812256},{"id":"https://openalex.org/keywords/syntax","display_name":"Syntax","score":0.2542998492717743},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.23822331428527832}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8597570657730103},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5558185577392578},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5014426708221436},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.493375688791275},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.4876364767551422},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4870169758796692},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.48351147770881653},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.4761545658111572},{"id":"https://openalex.org/C58646249","wikidata":"https://www.wikidata.org/wiki/Q127380","display_name":"Abstract syntax tree","level":3,"score":0.45113641023635864},{"id":"https://openalex.org/C27458966","wikidata":"https://www.wikidata.org/wiki/Q1187693","display_name":"Control flow graph","level":2,"score":0.44595977663993835},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.4327712059020996},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.4325553774833679},{"id":"https://openalex.org/C2777561058","wikidata":"https://www.wikidata.org/wiki/Q2652119","display_name":"Program comprehension","level":4,"score":0.41791975498199463},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.41384193301200867},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4104488790035248},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2656751871109009},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2639574110507965},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.2562081813812256},{"id":"https://openalex.org/C60048249","wikidata":"https://www.wikidata.org/wiki/Q37437","display_name":"Syntax","level":2,"score":0.2542998492717743},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.23822331428527832},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2020.3044773","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2020.3044773","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:eprints.whiterose.ac.uk:168594","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400854","display_name":"White Rose Research Online (University of Leeds, The University of Sheffield, University of York)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2800616092","host_organization_name":"White Rose University Consortium","host_organization_lineage":["https://openalex.org/I2800616092"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4336546243","display_name":null,"funder_award_id":"61672427","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4583476002","display_name":null,"funder_award_id":"61872294","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7527024692","display_name":null,"funder_award_id":"61972314","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":97,"referenced_works":["https://openalex.org/W114020735","https://openalex.org/W1457363419","https://openalex.org/W1522301498","https://openalex.org/W1595275604","https://openalex.org/W1940872118","https://openalex.org/W2043555680","https://openalex.org/W2064675550","https://openalex.org/W2069268700","https://openalex.org/W2107147876","https://openalex.org/W2131571251","https://openalex.org/W2150884987","https://openalex.org/W2153579005","https://openalex.org/W2157331557","https://openalex.org/W2165698076","https://openalex.org/W2171585602","https://openalex.org/W2171928131","https://openalex.org/W2187089797","https://openalex.org/W2249980257","https://openalex.org/W2282821441","https://openalex.org/W2297096600","https://openalex.org/W2360967250","https://openalex.org/W2511803001","https://openalex.org/W2559935471","https://openalex.org/W2583649498","https://openalex.org/W2604314403","https://openalex.org/W2606529538","https://openalex.org/W2607158040","https://openalex.org/W2618043096","https://openalex.org/W2619331983","https://openalex.org/W2634106992","https://openalex.org/W2740329368","https://openalex.org/W2749008552","https://openalex.org/W2755572540","https://openalex.org/W2781491433","https://openalex.org/W2795170942","https://openalex.org/W2803187616","https://openalex.org/W2806718802","https://openalex.org/W2808279976","https://openalex.org/W2809418595","https://openalex.org/W2884293495","https://openalex.org/W2905097561","https://openalex.org/W2907492528","https://openalex.org/W2945945312","https://openalex.org/W2950898568","https://openalex.org/W2960121311","https://openalex.org/W2961882312","https://openalex.org/W2962698568","https://openalex.org/W2962711740","https://openalex.org/W2962724414","https://openalex.org/W2963499994","https://openalex.org/W2963695663","https://openalex.org/W2963759070","https://openalex.org/W2963791934","https://openalex.org/W2963821229","https://openalex.org/W2964032018","https://openalex.org/W2964121744","https://openalex.org/W2964278684","https://openalex.org/W2969343988","https://openalex.org/W2970188762","https://openalex.org/W2970862273","https://openalex.org/W2972135640","https://openalex.org/W2974889942","https://openalex.org/W2976184969","https://openalex.org/W2979566992","https://openalex.org/W2990323480","https://openalex.org/W2994872359","https://openalex.org/W3003438155","https://openalex.org/W3009381467","https://openalex.org/W3033775865","https://openalex.org/W3033777149","https://openalex.org/W3090891670","https://openalex.org/W3101228802","https://openalex.org/W3104849875","https://openalex.org/W3105136071","https://openalex.org/W3105926539","https://openalex.org/W3127736190","https://openalex.org/W3145169422","https://openalex.org/W3157172840","https://openalex.org/W4210257598","https://openalex.org/W4255421341","https://openalex.org/W4288286902","https://openalex.org/W4294170691","https://openalex.org/W6628365534","https://openalex.org/W6631190155","https://openalex.org/W6640362995","https://openalex.org/W6682691769","https://openalex.org/W6690815549","https://openalex.org/W6713955831","https://openalex.org/W6736296761","https://openalex.org/W6736310604","https://openalex.org/W6745034332","https://openalex.org/W6751420435","https://openalex.org/W6754929296","https://openalex.org/W6765465941","https://openalex.org/W6767260250","https://openalex.org/W6774263817","https://openalex.org/W6790047161"],"related_works":["https://openalex.org/W2138385884","https://openalex.org/W2166895275","https://openalex.org/W2765394967","https://openalex.org/W157564837","https://openalex.org/W2080313875","https://openalex.org/W2998775986","https://openalex.org/W2011536294","https://openalex.org/W1971022286","https://openalex.org/W4384302888","https://openalex.org/W2080046362"],"abstract_inverted_index":{"This":[0,133],"paper":[1],"presents":[2],"FUNDED":[3],"(Flow-sensitive":[4],"vUl-Nerability":[5],"coDE":[6],"Detection),":[7],"a":[8,28,53,65],"novel":[9,29],"learning":[10,31,115,120],"framework":[11],"for":[12,98],"building":[13],"vulnerability":[14,102,151,191],"detection":[15,103,192],"models.":[16,193],"Funded":[17,60,93,155,170,198],"leverages":[18],"the":[19,38,50,69,87,99,143,161],"advances":[20],"in":[21,73,149,178],"graph":[22,66],"neural":[23],"networks":[24],"(GNNs)":[25],"to":[26,33,79,110,124,141,156],"develop":[27],"graph-based":[30],"method":[32],"capture":[34],"and":[35,42,62,91,121,182,184],"reason":[36],"about":[37],"program's":[39],"control,":[40],"data,":[41],"call":[43],"dependencies.":[44],"Unlike":[45],"prior":[46],"work":[47],"that":[48,197],"treats":[49],"program":[51,70,88,165],"as":[52],"sequential":[54],"sequence":[55],"or":[56],"an":[57,112],"untyped":[58],"graph,":[59],"learns":[61],"operates":[63],"on":[64,171],"representation":[67,97],"of":[68],"source":[71,166],"code,":[72],"which":[74],"individual":[75],"statements":[76,81],"are":[77],"connected":[78],"other":[80],"through":[82],"relational":[83],"edges.":[84],"By":[85],"capturing":[86],"syntax,":[89],"semantics":[90],"flows,":[92],"finds":[94],"better":[95],"code":[96,138,146,190],"downstream":[100],"software":[101,158],"task.":[104],"To":[105],"provide":[106],"sufficient":[107],"training":[108,128,139],"data":[109],"build":[111],"effective":[113],"deep":[114],"model,":[116],"we":[117],"combine":[118],"probabilistic":[119],"statistical":[122],"assessments":[123],"automatically":[125],"gather":[126],"high-quality":[127],"samples":[129,140,147],"from":[130,164],"open-source":[131],"projects.":[132],"provides":[134],"many":[135],"real-life":[136],"vulnerable":[137,145],"complement":[142],"limited":[144],"available":[148],"standard":[150],"databases.":[152],"We":[153,168],"apply":[154],"identify":[157],"vulnerabilities":[159],"at":[160],"function":[162],"level":[163],"code.":[167],"evaluate":[169],"large":[172],"real-world":[173],"datasets":[174],"with":[175],"programs":[176],"written":[177],"C,":[179],"Java,":[180],"Swift":[181],"Php,":[183],"compare":[185],"it":[186],"against":[187],"six":[188],"state-of-the-art":[189],"Experimental":[194],"results":[195],"show":[196],"significantly":[199],"outperforms":[200],"alternative":[201],"approaches":[202],"across":[203],"evaluation":[204],"settings.":[205]},"counts_by_year":[{"year":2026,"cited_by_count":13},{"year":2025,"cited_by_count":74},{"year":2024,"cited_by_count":83},{"year":2023,"cited_by_count":74},{"year":2022,"cited_by_count":39},{"year":2021,"cited_by_count":16},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-12T07:58:50.170612","created_date":"2025-10-10T00:00:00"}
