{"id":"https://openalex.org/W4400798836","doi":"https://doi.org/10.1145/3671016.3671388","title":"DFEPT: Data Flow Embedding for Enhancing Pre-Trained Model Based Vulnerability Detection","display_name":"DFEPT: Data Flow Embedding for Enhancing Pre-Trained Model Based Vulnerability Detection","publication_year":2024,"publication_date":"2024-07-17","ids":{"openalex":"https://openalex.org/W4400798836","doi":"https://doi.org/10.1145/3671016.3671388"},"language":"en","primary_location":{"id":"doi:10.1145/3671016.3671388","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3671016.3671388","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th Asia-Pacific Symposium on Internetware","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2410.18479","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104799575","display_name":"Zhonghao Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhonghao Jiang","raw_affiliation_strings":["Chongqing University, China","School of Big Data and Software Engineering, Chongqing University China"],"raw_orcid":"https://orcid.org/0009-0005-4774-2225","affiliations":[{"raw_affiliation_string":"Chongqing University, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"School of Big Data and Software Engineering, Chongqing University China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101650869","display_name":"Weifeng Sun","orcid":"https://orcid.org/0000-0001-6013-1369"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weifeng Sun","raw_affiliation_strings":["Chongqing University, China"],"raw_orcid":"https://orcid.org/0000-0001-6013-1369","affiliations":[{"raw_affiliation_string":"Chongqing University, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108327070","display_name":"Xiaoyan Gu","orcid":null},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyan Gu","raw_affiliation_strings":["Chongqing University, China","School of Big Data and Software Engineering, Chongqing University China"],"raw_orcid":"https://orcid.org/0009-0009-5379-985X","affiliations":[{"raw_affiliation_string":"Chongqing University, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"School of Big Data and Software Engineering, Chongqing University China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108957349","display_name":"Jiaxin Wu","orcid":"https://orcid.org/0009-0008-6715-5513"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaxin Wu","raw_affiliation_strings":["Chongqing University, China","School of Big Data and Software Engineering, Chongqing University China"],"raw_orcid":"https://orcid.org/0009-0007-2004-3509","affiliations":[{"raw_affiliation_string":"Chongqing University, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"School of Big Data and Software Engineering, Chongqing University China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111262033","display_name":"Tao Wen","orcid":null},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Wen","raw_affiliation_strings":["Chongqing University, China","School of Big Data and Software Engineering, Chongqing University China"],"raw_orcid":"https://orcid.org/0009-0009-5308-3229","affiliations":[{"raw_affiliation_string":"Chongqing University, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"School of Big Data and Software Engineering, Chongqing University China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101536207","display_name":"Haibo Hu","orcid":"https://orcid.org/0000-0001-8442-5222"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haibo Hu","raw_affiliation_strings":["Chongqing University, China","School of Big Data and Software Engineering, Chongqing University China"],"raw_orcid":"https://orcid.org/0000-0001-8442-5222","affiliations":[{"raw_affiliation_string":"Chongqing University, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"School of Big Data and Software Engineering, Chongqing University China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070783668","display_name":"Meng Yan","orcid":"https://orcid.org/0000-0002-9538-9121"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Yan","raw_affiliation_strings":["Chongqing University, China","School of Big Data and Software Engineering, Chongqing University China"],"raw_orcid":"https://orcid.org/0000-0002-9538-9121","affiliations":[{"raw_affiliation_string":"Chongqing University, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"School of Big Data and Software Engineering, Chongqing University China","institution_ids":["https://openalex.org/I158842170"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5104799575"],"corresponding_institution_ids":["https://openalex.org/I158842170"],"apc_list":null,"apc_paid":null,"fwci":4.476,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.94881389,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"95","last_page":"104"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6882327198982239},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6792240142822266},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5778864622116089},{"id":"https://openalex.org/keywords/flow","display_name":"Flow (mathematics)","score":0.4349004626274109},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27352607250213623},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20083704590797424},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.06003573536872864},{"id":"https://openalex.org/keywords/mechanics","display_name":"Mechanics","score":0.05580329895019531}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6882327198982239},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6792240142822266},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5778864622116089},{"id":"https://openalex.org/C38349280","wikidata":"https://www.wikidata.org/wiki/Q1434290","display_name":"Flow (mathematics)","level":2,"score":0.4349004626274109},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27352607250213623},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20083704590797424},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.06003573536872864},{"id":"https://openalex.org/C57879066","wikidata":"https://www.wikidata.org/wiki/Q41217","display_name":"Mechanics","level":1,"score":0.05580329895019531}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3671016.3671388","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3671016.3671388","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th Asia-Pacific Symposium on Internetware","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2410.18479","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2410.18479","pdf_url":"https://arxiv.org/pdf/2410.18479","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2410.18479","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2410.18479","pdf_url":"https://arxiv.org/pdf/2410.18479","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1959641361","display_name":null,"funder_award_id":"2023CDJKYJH013","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G6572571148","display_name":null,"funder_award_id":"62372071","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327639","display_name":"Centre Scientifique et Technique du B\u00e2timent","ror":"https://ror.org/02fsd1928"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4400798836.pdf","grobid_xml":"https://content.openalex.org/works/W4400798836.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W2022695357","https://openalex.org/W2043837581","https://openalex.org/W2166336492","https://openalex.org/W3139023885","https://openalex.org/W3161071537","https://openalex.org/W3163206498","https://openalex.org/W3191605668","https://openalex.org/W4225673889","https://openalex.org/W4287673430","https://openalex.org/W4308410075","https://openalex.org/W4308644396","https://openalex.org/W4311165836","https://openalex.org/W4312436517","https://openalex.org/W4312757223","https://openalex.org/W4318562265","https://openalex.org/W4380763529","https://openalex.org/W4384345698","https://openalex.org/W4394730857"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2081900870","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890"],"abstract_inverted_index":{"Software":[0],"vulnerabilities":[1,13,113],"represent":[2],"one":[3],"of":[4,64,107,112],"the":[5,96,105,117,121],"most":[6],"pressing":[7],"threats":[8],"to":[9,38,59,93,116],"computing":[10],"systems.":[11],"Identifying":[12],"in":[14,36,57],"source":[15],"code":[16,66,79,102],"is":[17],"crucial":[18],"for":[19,42,74,134],"protecting":[20],"user":[21],"privacy":[22],"and":[23,50,53,98,125],"reducing":[24],"economic":[25],"losses.":[26],"Traditional":[27],"static":[28],"analysis":[29],"tools":[30],"rely":[31],"on":[32,85],"experts":[33],"with":[34],"knowledge":[35],"security":[37],"manually":[39],"build":[40],"rules":[41],"operation,":[43],"a":[44,71,131],"process":[45],"that":[46],"requires":[47],"substantial":[48],"time":[49],"manpower":[51],"costs":[52],"also":[54],"faces":[55],"challenges":[56],"adapting":[58],"new":[60,72],"vulnerabilities.":[61],"The":[62],"emergence":[63],"pre-trained":[65,135],"language":[67],"models":[68,81],"has":[69],"provided":[70],"solution":[73],"automated":[75],"vulnerability":[76,128],"detection.":[77],"However,":[78],"pre-training":[80],"are":[82,114],"typically":[83],"based":[84],"token-level":[86],"large-scale":[87],"pre-training,":[88],"which":[89],"hampers":[90],"their":[91],"ability":[92],"effectively":[94],"capture":[95],"structural":[97],"dependency":[99,118],"relationships":[100,119],"among":[101],"segments.":[103],"In":[104],"context":[106],"software":[108],"vulnerabilities,":[109],"certain":[110],"types":[111],"related":[115],"within":[120],"code.":[122],"Consequently,":[123],"identifying":[124],"analyzing":[126],"these":[127],"samples":[129],"presents":[130],"significant":[132],"challenge":[133],"models.":[136]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
