{"id":"https://openalex.org/W2979183801","doi":"https://doi.org/10.1109/ijcnn.2019.8851923","title":"Deep Domain Adaptation for Vulnerable Code Function Identification","display_name":"Deep Domain Adaptation for Vulnerable Code Function Identification","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2979183801","doi":"https://doi.org/10.1109/ijcnn.2019.8851923","mag":"2979183801"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn.2019.8851923","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2019.8851923","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100769134","display_name":"Van Nguyen","orcid":"https://orcid.org/0000-0002-5838-3409"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Van Nguyen","raw_affiliation_strings":["Faculty of Information Technology, Monash University, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Monash University, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102780660","display_name":"Trung Le","orcid":"https://orcid.org/0000-0003-0414-9067"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Trung Le","raw_affiliation_strings":["AI Research Lab, Trusting Social, Australia","Faculty of Information Technology, Monash University, Australia"],"affiliations":[{"raw_affiliation_string":"AI Research Lab, Trusting Social, Australia","institution_ids":[]},{"raw_affiliation_string":"Faculty of Information Technology, Monash University, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014374360","display_name":"T. Kim Le","orcid":"https://orcid.org/0000-0001-5755-7473"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Tue Le","raw_affiliation_strings":["AI Research Lab, Trusting Social, Australia","Faculty of Information Technology, Monash University, Australia"],"affiliations":[{"raw_affiliation_string":"AI Research Lab, Trusting Social, Australia","institution_ids":[]},{"raw_affiliation_string":"Faculty of Information Technology, Monash University, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101639120","display_name":"Khanh Nguyen","orcid":"https://orcid.org/0000-0002-0684-9406"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Khanh Nguyen","raw_affiliation_strings":["AI Research Lab, Trusting Social, Australia"],"affiliations":[{"raw_affiliation_string":"AI Research Lab, Trusting Social, Australia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026180696","display_name":"Olivier De Vel","orcid":"https://orcid.org/0000-0001-5179-3707"},"institutions":[{"id":"https://openalex.org/I1303474014","display_name":"Defence Science and Technology Group","ror":"https://ror.org/05ddrvt52","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1303474014","https://openalex.org/I2801453606","https://openalex.org/I3139952251"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Olivier DeVel","raw_affiliation_strings":["Defence Science and Technology Group, Australia"],"affiliations":[{"raw_affiliation_string":"Defence Science and Technology Group, Australia","institution_ids":["https://openalex.org/I1303474014"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024595046","display_name":"Paul Montague","orcid":"https://orcid.org/0000-0001-9461-7471"},"institutions":[{"id":"https://openalex.org/I1303474014","display_name":"Defence Science and Technology Group","ror":"https://ror.org/05ddrvt52","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1303474014","https://openalex.org/I2801453606","https://openalex.org/I3139952251"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Paul Montague","raw_affiliation_strings":["Defence Science and Technology Group, Australia"],"affiliations":[{"raw_affiliation_string":"Defence Science and Technology Group, Australia","institution_ids":["https://openalex.org/I1303474014"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008486397","display_name":"Lizhen Qu","orcid":"https://orcid.org/0000-0002-7764-431X"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Lizhen Qu","raw_affiliation_strings":["Data61 Group, Australia"],"affiliations":[{"raw_affiliation_string":"Data61 Group, Australia","institution_ids":["https://openalex.org/I42894916"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036447132","display_name":"Dinh Phung","orcid":"https://orcid.org/0000-0002-9977-8247"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dinh Phung","raw_affiliation_strings":["Faculty of Information Technology, Monash University, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Monash University, Australia","institution_ids":["https://openalex.org/I56590836"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5100769134"],"corresponding_institution_ids":["https://openalex.org/I56590836"],"apc_list":null,"apc_paid":null,"fwci":5.6371,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.96197763,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.833301305770874},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6513199806213379},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6243563890457153},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5806734561920166},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.5740270614624023},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.56308913230896},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5095820426940918},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.48769983649253845},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.45520758628845215},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.44401922821998596},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4362943470478058},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4244266748428345},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.41680198907852173},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39051511883735657},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12411072850227356}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.833301305770874},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6513199806213379},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6243563890457153},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5806734561920166},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.5740270614624023},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.56308913230896},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5095820426940918},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.48769983649253845},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.45520758628845215},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.44401922821998596},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4362943470478058},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4244266748428345},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.41680198907852173},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39051511883735657},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12411072850227356},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn.2019.8851923","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2019.8851923","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W92894758","https://openalex.org/W133470593","https://openalex.org/W1522301498","https://openalex.org/W1594039573","https://openalex.org/W1607167266","https://openalex.org/W1882958252","https://openalex.org/W1934241014","https://openalex.org/W1990334093","https://openalex.org/W2043837581","https://openalex.org/W2046830558","https://openalex.org/W2099471712","https://openalex.org/W2119821739","https://openalex.org/W2128053425","https://openalex.org/W2145494108","https://openalex.org/W2158751697","https://openalex.org/W2159291411","https://openalex.org/W2164943005","https://openalex.org/W2166336492","https://openalex.org/W2187089797","https://openalex.org/W2214409633","https://openalex.org/W2293363371","https://openalex.org/W2297419069","https://openalex.org/W2559935471","https://openalex.org/W2634106992","https://openalex.org/W2743517242","https://openalex.org/W2781491433","https://openalex.org/W2786559811","https://openalex.org/W2796200341","https://openalex.org/W2911964244","https://openalex.org/W2962970380","https://openalex.org/W2963449430","https://openalex.org/W2963826681","https://openalex.org/W2964121744","https://openalex.org/W2964159205","https://openalex.org/W3101228802","https://openalex.org/W4210997624","https://openalex.org/W4239510810","https://openalex.org/W4320013936","https://openalex.org/W6603760306","https://openalex.org/W6605468800","https://openalex.org/W6631190155","https://openalex.org/W6639480849","https://openalex.org/W6681588610","https://openalex.org/W6683245480","https://openalex.org/W6683633756","https://openalex.org/W6736346607","https://openalex.org/W6742725575","https://openalex.org/W6745986955","https://openalex.org/W6748312029"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W2906845177","https://openalex.org/W4200107511","https://openalex.org/W2891427086","https://openalex.org/W1968625315","https://openalex.org/W4386541577"],"abstract_inverted_index":{"Due":[0],"to":[1,38,55,118,232],"the":[2,15,20,46,57,66,108,112,160,173,199,214,224,229,233],"ubiquity":[3],"of":[4,22,49,59,69,235],"computer":[5,23],"software,":[6],"software":[7,16,72,99,190],"vulnerability":[8,50,100],"detection":[9,51],"(SVD)":[10],"has":[11],"become":[12],"crucial":[13,82],"in":[14,19,28,62,152,163,181,242],"industry":[17],"and":[18,52,110,128,148,198,246],"field":[21],"security.":[24],"Two":[25],"significant":[26],"issues":[27],"SVD":[29,125],"arise":[30],"when":[31],"using":[32,187,201],"machine":[33],"learning,":[34],"namely:":[35],"i)":[36],"how":[37,54],"learn":[39],"automatic":[40,95],"features":[41],"that":[42,64,120,144,194],"can":[43,145],"help":[44],"improve":[45],"predictive":[47,206],"performance":[48,207],"ii)":[53],"overcome":[56],"scarcity":[58],"labeled":[60],"vulnerabilities":[61],"projects":[63],"require":[65],"laborious":[67],"labeling":[68],"code":[70],"by":[71,84,156,208],"security":[73],"experts.":[74],"In":[75],"this":[76,104],"paper,":[77],"we":[78,106,131],"address":[79],"these":[80],"two":[81],"concerns":[83],"proposing":[85],"a":[86,134,164,178,209],"novel":[87,135],"architecture":[88,203],"which":[89,176,231],"leverages":[90],"deep":[91,114,121,243],"domain":[92,115,122,221,244],"adaptation":[93,116,123,245],"with":[94,213],"feature":[96],"learning":[97,166],"for":[98,124],"identification.":[101],"Based":[102],"on":[103],"architecture,":[105],"keep":[107],"principles":[109],"reapply":[111],"state-of-the-art":[113],"methods":[117],"indicate":[119],"is":[126,177,238],"plausible":[127],"promising.":[129],"Moreover,":[130],"further":[132],"propose":[133],"method":[136,171,197,219,241],"named":[137],"Semi-supervised":[138],"Code":[139,216],"Domain":[140],"Adaptation":[141],"Network":[142,217],"(SCDAN)":[143],"efficiently":[146],"utilize":[147],"exploit":[149],"information":[150],"carried":[151],"unlabeled":[153,161],"target":[154],"data":[155],"considering":[157],"them":[158],"as":[159],"portion":[162],"semi-supervised":[165,182],"context.":[167],"The":[168,184],"proposed":[169,225],"SCDAN":[170,196,226],"enforces":[172],"clustering":[174],"assumption,":[175],"key":[179],"principle":[180],"learning.":[183],"experimental":[185],"results":[186],"six":[188],"real-world":[189],"project":[191],"datasets":[192],"show":[193],"our":[195,202,236],"baselines":[200],"have":[204],"better":[205],"wide":[210],"margin":[211],"compared":[212],"Deep":[215],"(VulDeePecker)":[218],"without":[220],"adaptation.":[222],"Also,":[223],"significantly":[227],"outperforms":[228],"DIRT-T":[230],"best":[234],"knowledge":[237],"currently":[239],"the-state-of-the-art":[240],"other":[247],"baselines.":[248]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":5}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
