{"id":"https://openalex.org/W4412722546","doi":"https://doi.org/10.1109/tse.2025.3593515","title":"Keep It Simple: Self-Adaptive Code Graph Simplification for Accurate Vulnerability Detection","display_name":"Keep It Simple: Self-Adaptive Code Graph Simplification for Accurate Vulnerability Detection","publication_year":2025,"publication_date":"2025-07-29","ids":{"openalex":"https://openalex.org/W4412722546","doi":"https://doi.org/10.1109/tse.2025.3593515"},"language":"en","primary_location":{"id":"doi:10.1109/tse.2025.3593515","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tse.2025.3593515","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075363572","display_name":"Xin Peng","orcid":"https://orcid.org/0000-0001-8642-8582"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xin Peng","raw_affiliation_strings":["Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, 410073, China","Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081197883","display_name":"Shangwen Wang","orcid":"https://orcid.org/0000-0003-1469-2063"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shangwen Wang","raw_affiliation_strings":["Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, 410073, China","Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084401185","display_name":"Yihao Qin","orcid":"https://orcid.org/0000-0003-3257-2524"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yihao Qin","raw_affiliation_strings":["Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, 410073, China","Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083554622","display_name":"Bo Lin","orcid":"https://orcid.org/0000-0001-5905-4677"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Lin","raw_affiliation_strings":["Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, 410073, China","Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075676848","display_name":"Liqian Chen","orcid":"https://orcid.org/0000-0001-8084-8009"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liqian Chen","raw_affiliation_strings":["Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, 410073, China","Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054232978","display_name":"Jieren Cheng","orcid":"https://orcid.org/0000-0002-0160-0126"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jieren Cheng","raw_affiliation_strings":["Hainan University, 570228, China","Hainan University, Haikou, China"],"affiliations":[{"raw_affiliation_string":"Hainan University, 570228, China","institution_ids":["https://openalex.org/I20942203"]},{"raw_affiliation_string":"Hainan University, Haikou, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080183182","display_name":"Xiaoguang Mao","orcid":"https://orcid.org/0000-0003-4204-7424"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoguang Mao","raw_affiliation_strings":["Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, 410073, China","Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"Key Laboratory of Software Engineering for Complex Systems, College of Computer Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5075363572"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":6.7913,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.96606011,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"51","issue":"10","first_page":"2744","last_page":"2763"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8587528467178345},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.6283697485923767},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.49619537591934204},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.48613426089286804},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.48502153158187866},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4289079010486603},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.38708263635635376},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33716434240341187},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.32193219661712646},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21901434659957886}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8587528467178345},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.6283697485923767},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.49619537591934204},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.48613426089286804},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.48502153158187866},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4289079010486603},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.38708263635635376},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33716434240341187},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32193219661712646},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21901434659957886},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tse.2025.3593515","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tse.2025.3593515","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":62,"referenced_works":["https://openalex.org/W1981466760","https://openalex.org/W1991546210","https://openalex.org/W1992114977","https://openalex.org/W2048899404","https://openalex.org/W2114345296","https://openalex.org/W2748690817","https://openalex.org/W2781491433","https://openalex.org/W2846896781","https://openalex.org/W2885030880","https://openalex.org/W2907101105","https://openalex.org/W2907492528","https://openalex.org/W2963563709","https://openalex.org/W2965861627","https://openalex.org/W2976184969","https://openalex.org/W2979183801","https://openalex.org/W2990323480","https://openalex.org/W2997997679","https://openalex.org/W2998879504","https://openalex.org/W3003036212","https://openalex.org/W3014780393","https://openalex.org/W3033777149","https://openalex.org/W3035733952","https://openalex.org/W3090891670","https://openalex.org/W3091588759","https://openalex.org/W3093700956","https://openalex.org/W3137781054","https://openalex.org/W3161071537","https://openalex.org/W3166095789","https://openalex.org/W3177116043","https://openalex.org/W4211027502","https://openalex.org/W4211181447","https://openalex.org/W4224322582","https://openalex.org/W4280528532","https://openalex.org/W4284667406","https://openalex.org/W4285490477","https://openalex.org/W4311165836","https://openalex.org/W4312757223","https://openalex.org/W4312969325","https://openalex.org/W4313563607","https://openalex.org/W4313563778","https://openalex.org/W4362575494","https://openalex.org/W4362691848","https://openalex.org/W4376503941","https://openalex.org/W4380520352","https://openalex.org/W4384345641","https://openalex.org/W4385764404","https://openalex.org/W4387345784","https://openalex.org/W4387674316","https://openalex.org/W4388483660","https://openalex.org/W4389070179","https://openalex.org/W4389162095","https://openalex.org/W4390357286","https://openalex.org/W4391113096","https://openalex.org/W4391558363","https://openalex.org/W4391558585","https://openalex.org/W4391651228","https://openalex.org/W4394745748","https://openalex.org/W4394769458","https://openalex.org/W4398151485","https://openalex.org/W4399393614","https://openalex.org/W4400579932","https://openalex.org/W4411552541"],"related_works":["https://openalex.org/W2382521049","https://openalex.org/W1585007175","https://openalex.org/W2144385241","https://openalex.org/W4300101996","https://openalex.org/W2165950148","https://openalex.org/W4253593777","https://openalex.org/W2951497643","https://openalex.org/W4403053866","https://openalex.org/W2142393343","https://openalex.org/W4411769622"],"abstract_inverted_index":{"Software":[0],"vulnerability":[1,25,78,197],"detection":[2,26,79,198],"is":[3],"crucial":[4],"for":[5],"high-quality":[6],"software":[7],"development.":[8],"Recently,":[9],"some":[10],"studies":[11],"utilizing":[12],"Graph":[13,120],"Neural":[14],"Networks":[15],"(GNNs)":[16],"to":[17,46,124,182],"learn":[18,125],"the":[19,51,57,61,68,88,104,109,112,115,119,131,161,183,190],"graph":[20,90,94,127],"representation":[21,95],"of":[22,53,111,160,179,192],"code":[23,48,58,105,126,169],"in":[24,56,63,103,158,167,177,196],"tasks":[27],"have":[28],"achieved":[29],"remarkable":[30],"success.":[31],"However,":[32],"existing":[33],"graph-based":[34],"approaches":[35],"mainly":[36,86],"face":[37],"two":[38],"limitations":[39],"that":[40],"prevent":[41],"them":[42],"from":[43,129],"generalizing":[44],"well":[45],"large":[47,168],"graphs:":[49],"(1)":[50],"interference":[52],"noise":[54],"information":[55,102],"graph;":[59],"(2)":[60],"difficulty":[62],"capturing":[64,137],"long-distance":[65,138],"dependencies":[66],"within":[67],"graph.":[69],"To":[70],"mitigate":[71],"these":[72],"problems,":[73],"we":[74],"propose":[75],"a":[76],"novel":[77],"method,":[80,185],"<sc":[81,171,193],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[82,172,194],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">ANGEL</small>,":[83],"whose":[84],"novelty":[85],"embodies":[87],"hierarchical":[89],"refinement":[91],"and":[92,122,133,163],"context-aware":[93],"learning.":[96],"The":[97],"former":[98],"hierarchically":[99],"filters":[100],"redundant":[101],"graph,":[106,113],"thereby":[107],"reducing":[108],"size":[110],"while":[114],"latter":[116],"collaboratively":[117],"employs":[118],"Transformer":[121],"GNN":[123],"representations":[128],"both":[130],"global":[132],"local":[134],"perspectives,":[135],"thus":[136],"dependencies.":[139],"Extensive":[140],"experiments":[141],"demonstrate":[142,189],"promising":[143],"results":[144,188],"on":[145],"three":[146],"widely":[147],"used":[148],"benchmark":[149],"datasets:":[150],"our":[151],"method":[152],"significantly":[153],"outperforms":[154],"several":[155],"other":[156],"baselines":[157],"terms":[159],"accuracy":[162,178],"F1":[164],"score.":[165],"Particularly,":[166],"graphs,":[170],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">ANGEL</small>":[173,195],"achieves":[174],"an":[175],"improvement":[176],"34.27%-161.93%":[180],"compared":[181],"state-of-the-art":[184],"AMPLE.":[186],"Such":[187],"effectiveness":[191],"tasks.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-03T22:45:19.894376","created_date":"2025-10-10T00:00:00"}
