{"id":"https://openalex.org/W2903103213","doi":"https://doi.org/10.1145/3274694.3274742","title":"ICSD","display_name":"ICSD","publication_year":2018,"publication_date":"2018-12-03","ids":{"openalex":"https://openalex.org/W2903103213","doi":"https://doi.org/10.1145/3274694.3274742","mag":"2903103213"},"language":"en","primary_location":{"id":"doi:10.1145/3274694.3274742","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3274694.3274742","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101586436","display_name":"Yanfang Ye","orcid":"https://orcid.org/0000-0001-8376-7239"},"institutions":[{"id":"https://openalex.org/I12097938","display_name":"West Virginia University","ror":"https://ror.org/011vxgd24","country_code":"US","type":"education","lineage":["https://openalex.org/I12097938"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yanfang Ye","raw_affiliation_strings":["Department of Computer Science and Electrical Engineering, West Virginia University, WV, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Electrical Engineering, West Virginia University, WV, USA","institution_ids":["https://openalex.org/I12097938"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110964699","display_name":"Shifu Hou","orcid":null},"institutions":[{"id":"https://openalex.org/I12097938","display_name":"West Virginia University","ror":"https://ror.org/011vxgd24","country_code":"US","type":"education","lineage":["https://openalex.org/I12097938"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shifu Hou","raw_affiliation_strings":["Department of Computer Science and Electrical Engineering, West Virginia University, WV, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Electrical Engineering, West Virginia University, WV, USA","institution_ids":["https://openalex.org/I12097938"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017524689","display_name":"Lingwei Chen","orcid":"https://orcid.org/0000-0003-1550-6170"},"institutions":[{"id":"https://openalex.org/I12097938","display_name":"West Virginia University","ror":"https://ror.org/011vxgd24","country_code":"US","type":"education","lineage":["https://openalex.org/I12097938"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lingwei Chen","raw_affiliation_strings":["Department of Computer Science and Electrical Engineering, West Virginia University, WV, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Electrical Engineering, West Virginia University, WV, USA","institution_ids":["https://openalex.org/I12097938"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100353875","display_name":"Xin Li","orcid":"https://orcid.org/0009-0004-2158-5404"},"institutions":[{"id":"https://openalex.org/I12097938","display_name":"West Virginia University","ror":"https://ror.org/011vxgd24","country_code":"US","type":"education","lineage":["https://openalex.org/I12097938"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xin Li","raw_affiliation_strings":["Department of Computer Science and Electrical Engineering, West Virginia University, WV, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Electrical Engineering, West Virginia University, WV, USA","institution_ids":["https://openalex.org/I12097938"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048756500","display_name":"Liang Zhao","orcid":"https://orcid.org/0000-0002-2648-9989"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Liang Zhao","raw_affiliation_strings":["Department of Information Science and Technology, George Mason University, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Science and Technology, George Mason University, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019179799","display_name":"Shouhuai Xu","orcid":"https://orcid.org/0000-0001-8034-0942"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shouhuai Xu","raw_affiliation_strings":["Department of Computer Science, University of Texas at San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Texas at San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100731525","display_name":"Jiabin Wang","orcid":"https://orcid.org/0000-0003-4870-3744"},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiabin Wang","raw_affiliation_strings":["Tencent Security Lab, Tencent, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Tencent Security Lab, Tencent, Guangdong, China","institution_ids":["https://openalex.org/I2250653659"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000664704","display_name":"Qi Xiong","orcid":"https://orcid.org/0000-0001-8690-565X"},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Xiong","raw_affiliation_strings":["Tencent Security Lab, Tencent, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Tencent Security Lab, Tencent, Guangdong, China","institution_ids":["https://openalex.org/I2250653659"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5101586436"],"corresponding_institution_ids":["https://openalex.org/I12097938"],"apc_list":null,"apc_paid":null,"fwci":1.8166,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.86686999,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"542","last_page":"552"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.853010356426239},{"id":"https://openalex.org/keywords/snippet","display_name":"Snippet","score":0.6238961815834045},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.568359911441803},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4942793846130371},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4573580026626587},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.421478807926178},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4119741916656494},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.35819894075393677},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.22095513343811035},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1992603838443756},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.131477952003479},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.09564602375030518}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.853010356426239},{"id":"https://openalex.org/C2777822670","wikidata":"https://www.wikidata.org/wiki/Q1120538","display_name":"Snippet","level":2,"score":0.6238961815834045},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.568359911441803},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4942793846130371},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4573580026626587},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.421478807926178},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4119741916656494},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.35819894075393677},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.22095513343811035},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1992603838443756},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.131477952003479},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.09564602375030518},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3274694.3274742","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3274694.3274742","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5199999809265137,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W103340358","https://openalex.org/W1776735834","https://openalex.org/W1888005072","https://openalex.org/W1975296856","https://openalex.org/W1975563293","https://openalex.org/W2014390890","https://openalex.org/W2023110617","https://openalex.org/W2065071081","https://openalex.org/W2066459332","https://openalex.org/W2090438906","https://openalex.org/W2109480754","https://openalex.org/W2123246351","https://openalex.org/W2145658888","https://openalex.org/W2154851992","https://openalex.org/W2331224188","https://openalex.org/W2488638018","https://openalex.org/W2511044583","https://openalex.org/W2531296565","https://openalex.org/W2545778708","https://openalex.org/W2546547051","https://openalex.org/W2577741565","https://openalex.org/W2594180237","https://openalex.org/W2628359750","https://openalex.org/W2732916693","https://openalex.org/W2743104969","https://openalex.org/W2743159750","https://openalex.org/W2744097819","https://openalex.org/W2749727272","https://openalex.org/W2766375028","https://openalex.org/W2767481173","https://openalex.org/W2767560037","https://openalex.org/W2767774008","https://openalex.org/W2772265308","https://openalex.org/W2795866244","https://openalex.org/W2802690542","https://openalex.org/W2808154606","https://openalex.org/W2808927717","https://openalex.org/W2898252236","https://openalex.org/W2913646842","https://openalex.org/W2950133940","https://openalex.org/W2950577311","https://openalex.org/W2962756421","https://openalex.org/W2963041836","https://openalex.org/W2963919031","https://openalex.org/W3028642772","https://openalex.org/W3104097132","https://openalex.org/W3104717349","https://openalex.org/W3105705953","https://openalex.org/W3148981562"],"related_works":["https://openalex.org/W4386541577","https://openalex.org/W4385719733","https://openalex.org/W3085047896","https://openalex.org/W4384811727","https://openalex.org/W2292865721","https://openalex.org/W4319165526","https://openalex.org/W2241929320","https://openalex.org/W2979496624","https://openalex.org/W2469491375","https://openalex.org/W2297096600"],"abstract_inverted_index":{"As":[0],"the":[1,67,77,101,150,172,179,192,204,214,217],"popularity":[2],"of":[3,57,85,174,216],"modern":[4,197],"social":[5,46,187],"coding":[6,47,188,199],"paradigm":[7],"such":[8],"as":[9,18],"Stack":[10,62,97,208],"Overflow":[11,209],"grows,":[12],"its":[13],"potential":[14],"security":[15,194],"risks":[16],"increase":[17],"well":[19],"(e.g.,":[20],"insecure":[21,58,167,227],"codes":[22],"could":[23],"be":[24],"easily":[25],"embedded":[26],"and":[27,94,116,153,186],"distributed).":[28],"To":[29,64,99,171],"address":[30,191],"this":[31,36,177],"largely":[32],"overlooked":[33],"issue,":[34],"in":[35,49,61,96,146,196,226],"paper,":[37],"we":[38,73,105,134],"bring":[39],"an":[40],"important":[41],"new":[42],"insight":[43],"to":[44,51,122,126,190,212],"exploit":[45],"properties":[48,189],"addition":[50],"code":[52,59,69,78,92,131,168,184,193,228],"content":[53,185],"for":[54,114,143,166],"automatic":[55],"detection":[56,230],"snippets":[60,70,93],"Overflow.":[63,98],"determine":[65],"if":[66],"given":[68],"are":[71,155,210],"insecure,":[72],"not":[74],"only":[75],"analyze":[76],"content,":[79],"but":[80],"also":[81],"utilize":[82],"various":[83],"kinds":[84],"relations":[86],"among":[87],"users,":[88],"badges,":[89],"questions,":[90],"answers,":[91],"keywords":[95],"model":[100,140],"rich":[102],"semantic":[103],"relationships,":[104],"first":[106,180],"introduce":[107],"a":[108,136,160],"structured":[109],"heterogeneous":[110],"information":[111],"network":[112,138],"(HIN)":[113],"representation":[115,144],"then":[117],"use":[118],"meta-path":[119],"based":[120],"approach":[121],"incorporate":[123],"higher-level":[124],"semantics":[125,154],"build":[127],"up":[128],"relatedness":[129],"over":[130],"snippets.":[132],"Later,":[133],"propose":[135],"novel":[137],"embedding":[139],"named":[141],"snippet2vec":[142],"learning":[145],"HIN":[147,151],"where":[148],"both":[149,183],"structures":[152],"maximally":[156],"preserved.":[157],"After":[158],"that,":[159],"multi-view":[161],"fusion":[162],"classifier":[163],"is":[164,178],"constructed":[165],"snippet":[169,229],"detection.":[170],"best":[173],"our":[175,223],"knowledge,":[176],"work":[181],"utilizing":[182],"issues":[195],"software":[198],"platforms.":[200],"Comprehensive":[201],"experiments":[202],"on":[203],"data":[205],"collections":[206],"from":[207],"conducted":[211],"validate":[213],"effectiveness":[215],"developed":[218],"system":[219],"ICSD":[220],"which":[221],"integrates":[222],"proposed":[224],"method":[225],"by":[231],"comparisons":[232],"with":[233],"alternative":[234],"approaches.":[235]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2018-12-11T00:00:00"}
