{"id":"https://openalex.org/W4409796871","doi":"https://doi.org/10.1109/apsec65559.2024.00025","title":"Effective Vulnerability Detection over Code Token Graph: A GCN with Score Gate Based Approach","display_name":"Effective Vulnerability Detection over Code Token Graph: A GCN with Score Gate Based Approach","publication_year":2024,"publication_date":"2024-12-03","ids":{"openalex":"https://openalex.org/W4409796871","doi":"https://doi.org/10.1109/apsec65559.2024.00025"},"language":"en","primary_location":{"id":"doi:10.1109/apsec65559.2024.00025","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsec65559.2024.00025","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 31st Asia-Pacific Software Engineering Conference (APSEC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117309352","display_name":"Nong Zou","orcid":null},"institutions":[{"id":"https://openalex.org/I142108993","display_name":"Southwest University","ror":"https://ror.org/01kj4z117","country_code":"CN","type":"education","lineage":["https://openalex.org/I142108993"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Nong Zou","raw_affiliation_strings":["College of computer and info science, Southwest University,ChongQing,China"],"affiliations":[{"raw_affiliation_string":"College of computer and info science, Southwest University,ChongQing,China","institution_ids":["https://openalex.org/I142108993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100341056","display_name":"Nan Li","orcid":"https://orcid.org/0000-0002-3614-9558"},"institutions":[{"id":"https://openalex.org/I142108993","display_name":"Southwest University","ror":"https://ror.org/01kj4z117","country_code":"CN","type":"education","lineage":["https://openalex.org/I142108993"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nan Li","raw_affiliation_strings":["College of computer and info science, Southwest University,ChongQing,China"],"affiliations":[{"raw_affiliation_string":"College of computer and info science, Southwest University,ChongQing,China","institution_ids":["https://openalex.org/I142108993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100630263","display_name":"Junxiang Zhang","orcid":"https://orcid.org/0000-0003-4051-7365"},"institutions":[{"id":"https://openalex.org/I142108993","display_name":"Southwest University","ror":"https://ror.org/01kj4z117","country_code":"CN","type":"education","lineage":["https://openalex.org/I142108993"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junxiang Zhang","raw_affiliation_strings":["College of computer and info science, Southwest University,ChongQing,China"],"affiliations":[{"raw_affiliation_string":"College of computer and info science, Southwest University,ChongQing,China","institution_ids":["https://openalex.org/I142108993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100423402","display_name":"Xiaomeng Wang","orcid":"https://orcid.org/0000-0003-2424-0626"},"institutions":[{"id":"https://openalex.org/I142108993","display_name":"Southwest University","ror":"https://ror.org/01kj4z117","country_code":"CN","type":"education","lineage":["https://openalex.org/I142108993"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaomeng Wang","raw_affiliation_strings":["College of computer and info science, Southwest University,ChongQing,China"],"affiliations":[{"raw_affiliation_string":"College of computer and info science, Southwest University,ChongQing,China","institution_ids":["https://openalex.org/I142108993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100325033","display_name":"Hong Lai","orcid":"https://orcid.org/0000-0003-2918-2381"},"institutions":[{"id":"https://openalex.org/I142108993","display_name":"Southwest University","ror":"https://ror.org/01kj4z117","country_code":"CN","type":"education","lineage":["https://openalex.org/I142108993"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lai Hong","raw_affiliation_strings":["College of computer and info science, Southwest University,ChongQing,China"],"affiliations":[{"raw_affiliation_string":"College of computer and info science, Southwest University,ChongQing,China","institution_ids":["https://openalex.org/I142108993"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019949140","display_name":"Tao Jia","orcid":"https://orcid.org/0000-0002-2337-2857"},"institutions":[{"id":"https://openalex.org/I142108993","display_name":"Southwest University","ror":"https://ror.org/01kj4z117","country_code":"CN","type":"education","lineage":["https://openalex.org/I142108993"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Jia","raw_affiliation_strings":["College of computer and info science, Southwest University,ChongQing,China"],"affiliations":[{"raw_affiliation_string":"College of computer and info science, Southwest University,ChongQing,China","institution_ids":["https://openalex.org/I142108993"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5117309352"],"corresponding_institution_ids":["https://openalex.org/I142108993"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31015693,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"141","last_page":"150"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9668999910354614,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9172999858856201,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7342216968536377},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.6602391004562378},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5318073034286499},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4835071861743927},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4580179750919342},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.24980789422988892},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24899345636367798},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24884137511253357},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.20529338717460632}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7342216968536377},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.6602391004562378},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5318073034286499},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4835071861743927},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4580179750919342},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.24980789422988892},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24899345636367798},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24884137511253357},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.20529338717460632},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apsec65559.2024.00025","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsec65559.2024.00025","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 31st Asia-Pacific Software Engineering Conference (APSEC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1965238604","https://openalex.org/W2064675550","https://openalex.org/W2157331557","https://openalex.org/W2250662230","https://openalex.org/W2344444819","https://openalex.org/W2487875201","https://openalex.org/W2618635610","https://openalex.org/W2781491433","https://openalex.org/W2790664081","https://openalex.org/W2885030880","https://openalex.org/W2962960733","https://openalex.org/W2967191362","https://openalex.org/W2980135568","https://openalex.org/W2990045899","https://openalex.org/W3004040842","https://openalex.org/W3033777149","https://openalex.org/W3035568641","https://openalex.org/W3091995628","https://openalex.org/W3098605233","https://openalex.org/W3166095789","https://openalex.org/W4294170691","https://openalex.org/W4310276499","https://openalex.org/W4312436517","https://openalex.org/W4312757223","https://openalex.org/W4387766336","https://openalex.org/W4389161980","https://openalex.org/W4393406709","https://openalex.org/W6738964360","https://openalex.org/W6742725575","https://openalex.org/W6745537798","https://openalex.org/W6755207826","https://openalex.org/W6767260250","https://openalex.org/W6778883912"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4388335561","https://openalex.org/W2970530566","https://openalex.org/W4288261899","https://openalex.org/W4307309205","https://openalex.org/W2967478618","https://openalex.org/W4385009901","https://openalex.org/W4385572700"],"abstract_inverted_index":{"In":[0,27,129],"modern":[1],"society,":[2],"software":[3],"systems":[4],"are":[5],"integral":[6],"to":[7,68,102,136,181,248],"various":[8,74],"aspects":[9],"of":[10,151,199,209],"life.":[11],"Finding":[12],"an":[13,113],"efficient":[14],"vulnerability":[15,40,115,251],"identification":[16],"approach":[17,117],"is":[18],"crucial":[19],"for":[20],"ensuring":[21],"security":[22],"and":[23,57,100,160,177,194,207,225,236],"preventing":[24],"malicious":[25],"attacks.":[26],"recent":[28],"years,":[29],"many":[30],"deep":[31],"learning-based":[32],"methods":[33,45,50,84],"have":[34,47],"shown":[35],"outstanding":[36],"performance":[37,206,258],"in":[38,62],"the":[39,70,138,143,147,165,169,183,188,192,196,200,205],"detection":[41,116,252],"task.":[42],"However,":[43],"these":[44,80,108],"still":[46],"limitations.":[48],"Some":[49],"consider":[51],"code":[52,75,140],"input":[53],"as":[54,142],"token":[55],"sequences":[56],"apply":[58],"architectures":[59],"typically":[60],"used":[61],"natural":[63],"language":[64],"processing.":[65],"They":[66],"fail":[67,101],"utilize":[69],"structural":[71,94,162],"information":[72,163],"from":[73,164,242],"components'":[76],"interactions,":[77],"which":[78,227],"limits":[79],"models'":[81],"performance.":[82],"Other":[83],"based":[85,123,156],"on":[86,124,157,187,215],"graph":[87,170,193],"neural":[88],"networks,":[89],"although":[90],"better":[91],"at":[92],"learning":[93,171],"information,":[95],"treat":[96],"each":[97],"node":[98],"equally":[99],"emphasize":[103],"key":[104,189],"elements.":[105],"To":[106,202],"overcome":[107],"limitations,":[109],"we":[110,132,173,212],"propose":[111],"CTGGSG,":[112],"effective":[114],"over":[118],"Code":[119],"Token":[120],"Graph":[121],"(CTG)":[122],"GCN":[125,175],"with":[126],"score":[127,178],"gate.":[128],"our":[130,210,254],"model,":[131,211],"use":[133],"PLE-CG-SE":[134],"module":[135],"represent":[137],"source":[139,166],"samples":[141],"CTGs,":[144],"effectively":[145],"utilizing":[146],"high-quality":[148],"feature":[149],"representation":[150],"PL-PLM":[152],"(Pre-trained":[153],"Language":[154],"Model":[155],"Program":[158],"Languages)":[159],"retaining":[161],"code.":[167],"During":[168],"process,":[172],"combine":[174],"convolution":[176],"gate":[179],"mechanism":[180],"make":[182],"model":[184,255],"focus":[185],"more":[186],"nodes":[190],"within":[191],"increase":[195],"receptive":[197],"field":[198],"nodes.":[201],"comprehensively":[203],"evaluate":[204],"scalability":[208],"conducted":[213],"experiments":[214],"two":[216],"real-world":[217,245],"datasets:":[218],"CodeX":[219],"Glue,which":[220],"contains":[221,228],"balanced":[222],"sample":[223,230],"labels,":[224],"Re-veal,":[226],"imbalanced":[229],"labels.":[231],"These":[232],"datasets":[233],"contain":[234],"27,318":[235],"22,734":[237],"function-level":[238],"samples,":[239],"respectively,":[240],"derived":[241],"large-scale,":[243],"popular":[244],"projects.":[246],"Compared":[247],"existing":[249],"advanced":[250],"methods,":[253],"achieved":[256],"state-of-the-art":[257],"overall.":[259]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
