{"id":"https://openalex.org/W4400117359","doi":"https://doi.org/10.1145/3674729","title":"<i>DSHGT</i> : Dual-Supervisors Heterogeneous Graph Transformer\u2014A Pioneer Study of Using Heterogeneous Graph Learning for Detecting Software Vulnerabilities","display_name":"<i>DSHGT</i> : Dual-Supervisors Heterogeneous Graph Transformer\u2014A Pioneer Study of Using Heterogeneous Graph Learning for Detecting Software Vulnerabilities","publication_year":2024,"publication_date":"2024-06-28","ids":{"openalex":"https://openalex.org/W4400117359","doi":"https://doi.org/10.1145/3674729"},"language":"en","primary_location":{"id":"doi:10.1145/3674729","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3674729","pdf_url":null,"source":{"id":"https://openalex.org/S142627899","display_name":"ACM Transactions on Software Engineering and Methodology","issn_l":"1049-331X","issn":["1049-331X","1557-7392"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Software Engineering and Methodology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020793859","display_name":"Tiehua Zhang","orcid":"https://orcid.org/0000-0002-7195-4472"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tiehua Zhang","raw_affiliation_strings":["Tongji University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Tongji University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102886487","display_name":"Rui Xu","orcid":"https://orcid.org/0009-0006-0391-9890"},"institutions":[{"id":"https://openalex.org/I4401726822","display_name":"Ping An (China)","ror":"https://ror.org/004yv2z91","country_code":null,"type":"company","lineage":["https://openalex.org/I4401726822"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Xu","raw_affiliation_strings":["Ping An Technology, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Ping An Technology, Shanghai, China","institution_ids":["https://openalex.org/I4401726822"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107748776","display_name":"J. S. Zhang","orcid":"https://orcid.org/0009-0007-2607-3178"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianping Zhang","raw_affiliation_strings":["Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072556657","display_name":"Yuze Liu","orcid":"https://orcid.org/0009-0002-6903-0294"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuze Liu","raw_affiliation_strings":["Ant Group, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114032155","display_name":"Xin Chen","orcid":"https://orcid.org/0009-0006-1044-810X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xin Chen","raw_affiliation_strings":["Ant Group, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103227507","display_name":"Jun Yin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jun Yin","raw_affiliation_strings":["Ant Group, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, Shanghai, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081182489","display_name":"Xi Zheng","orcid":"https://orcid.org/0000-0002-2572-2355"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xi Zheng","raw_affiliation_strings":["Macquarie University, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"Macquarie University, Sydney, Australia","institution_ids":["https://openalex.org/I99043593"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5020793859"],"corresponding_institution_ids":["https://openalex.org/I116953780"],"apc_list":null,"apc_paid":null,"fwci":1.6284,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.86489831,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"33","issue":"8","first_page":"1","last_page":"31"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8291151523590088},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.49895787239074707},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.48027992248535156},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.47336289286613464},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4532115161418915},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.44016233086586},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3379601836204529},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.32562440633773804},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2457326352596283},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.1635144054889679},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09861460328102112}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8291151523590088},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.49895787239074707},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.48027992248535156},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.47336289286613464},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4532115161418915},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.44016233086586},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3379601836204529},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.32562440633773804},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2457326352596283},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.1635144054889679},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09861460328102112},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3674729","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3674729","pdf_url":null,"source":{"id":"https://openalex.org/S142627899","display_name":"ACM Transactions on Software Engineering and Methodology","issn_l":"1049-331X","issn":["1049-331X","1557-7392"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Software Engineering and Methodology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1992114977","https://openalex.org/W2004758929","https://openalex.org/W2043837581","https://openalex.org/W2743104969","https://openalex.org/W2792256830","https://openalex.org/W2885030880","https://openalex.org/W2912296587","https://openalex.org/W2993781365","https://openalex.org/W2998496395","https://openalex.org/W2998879504","https://openalex.org/W3004040842","https://openalex.org/W3012871709","https://openalex.org/W3108202858","https://openalex.org/W3111602563","https://openalex.org/W3127782461","https://openalex.org/W3161071537","https://openalex.org/W3170092793","https://openalex.org/W3189653670","https://openalex.org/W3211801722","https://openalex.org/W4206307994","https://openalex.org/W4237602468","https://openalex.org/W4312106615"],"related_works":["https://openalex.org/W2562550268","https://openalex.org/W1589188624","https://openalex.org/W2299966422","https://openalex.org/W2050231625","https://openalex.org/W2504378244","https://openalex.org/W2121513851","https://openalex.org/W2903766092","https://openalex.org/W2126513753","https://openalex.org/W2545999784","https://openalex.org/W101576598"],"abstract_inverted_index":{"Vulnerability":[0],"detection":[1,63,178],"is":[2,21],"a":[3,65,80,135,141],"critical":[4],"problem":[5],"in":[6,49,126,176,184],"software":[7,19,37,69],"security":[8,20],"and":[9,16,133,163,187],"attracts":[10],"growing":[11],"attention":[12],"both":[13,160],"from":[14,36,190],"academia":[15],"industry.":[17],"Traditionally,":[18],"safeguarded":[22],"by":[23],"designated":[24],"rule-based":[25],"detectors":[26],"that":[27],"heavily":[28],"rely":[29],"on":[30,95,159],"empirical":[31],"expertise,":[32],"requiring":[33],"tremendous":[34],"effort":[35],"experts":[38],"to":[39,121,193],"generate":[40],"rule":[41],"repositories":[42],"for":[43,85,144],"large":[44],"code":[45],"corpus.":[46],"Recent":[47],"advances":[48],"deep":[50],"learning,":[51],"especially":[52],"Graph":[53,132],"Neural":[54],"Networks":[55],"(GNN),":[56],"have":[57,155],"uncovered":[58],"the":[59,119,127,145,151,168,171],"feasibility":[60],"of":[61,64,68,82,89,105,118,129],"automatic":[62],"wide":[66],"range":[67],"vulnerabilities.":[70],"However,":[71],"prior":[72],"learning-based":[73],"works":[74],"only":[75],"break":[76],"programs":[77],"down":[78],"into":[79],"sequence":[81],"word":[83],"tokens":[84],"extracting":[86],"contextual":[87],"features":[88],"codes,":[90],"or":[91],"apply":[92],"GNN":[93],"largely":[94],"homogeneous":[96],"graph":[97,124,138,147],"representation":[98,125],"(e.g.,":[99,109],"AST)":[100],"without":[101],"discerning":[102],"complex":[103],"types":[104],"underlying":[106],"program":[107],"entities":[108],"methods,":[110],"variables).":[111],"In":[112],"this":[113],"work,":[114],"we":[115,154],"are":[116],"one":[117],"first":[120],"explore":[122],"heterogeneous":[123,137],"form":[128],"Code":[130],"Property":[131],"adapt":[134],"well-known":[136],"network":[139],"with":[140,167],"dual-supervisor":[142],"structure":[143],"corresponding":[146],"learning":[148],"task.":[149],"Using":[150],"prototype":[152],"built,":[153],"conducted":[156],"extensive":[157],"experiments":[158],"synthetic":[161],"datasets":[162],"real-world":[164,185],"projects.":[165],"Compared":[166],"state-of-the-art":[169],"baselines,":[170],"results":[172],"demonstrate":[173],"superior":[174],"performance":[175],"vulnerability":[177],"(average":[179,197],"F1":[180,198],"improvements":[181,199],"over":[182,200],"10%":[183],"projects)":[186],"language-agnostic":[188],"transferability":[189],"C/C":[191],"\\({+}{+}\\)":[192],"other":[194],"programming":[195],"languages":[196],"11%).":[201]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
