{"id":"https://openalex.org/W4416441251","doi":"https://doi.org/10.1186/s42400-025-00383-4","title":"AMMF: cross-architectures vulnerability detection based on attention mechanism and multi-feature fusion","display_name":"AMMF: cross-architectures vulnerability detection based on attention mechanism and multi-feature fusion","publication_year":2025,"publication_date":"2025-11-21","ids":{"openalex":"https://openalex.org/W4416441251","doi":"https://doi.org/10.1186/s42400-025-00383-4"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00383-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00383-4","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00383-4","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00383-4","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023807587","display_name":"Yunghsiang S. Han","orcid":"https://orcid.org/0000-0002-3592-1681"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]},{"id":"https://openalex.org/I4210114608","display_name":"Songshan Lake Materials Laboratory","ror":"https://ror.org/020vtf184","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366","https://openalex.org/I19820366","https://openalex.org/I4210114608","https://openalex.org/I4210137180","https://openalex.org/I4210159876"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yingmei Han","raw_affiliation_strings":["College of Computer and Artificial Intelligence, Zhengzhou University, Zhengzhou, 450001, China","Songshan Laboratory, Zhengzhou, 450001, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Artificial Intelligence, Zhengzhou University, Zhengzhou, 450001, China","institution_ids":["https://openalex.org/I38877650"]},{"raw_affiliation_string":"Songshan Laboratory, Zhengzhou, 450001, China","institution_ids":["https://openalex.org/I4210114608"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108421969","display_name":"Bin Li","orcid":"https://orcid.org/0009-0000-6147-3301"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]},{"id":"https://openalex.org/I4210114608","display_name":"Songshan Lake Materials Laboratory","ror":"https://ror.org/020vtf184","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366","https://openalex.org/I19820366","https://openalex.org/I4210114608","https://openalex.org/I4210137180","https://openalex.org/I4210159876"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Li","raw_affiliation_strings":["College of Computer and Artificial Intelligence, Zhengzhou University, Zhengzhou, 450001, China","Songshan Laboratory, Zhengzhou, 450001, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Artificial Intelligence, Zhengzhou University, Zhengzhou, 450001, China","institution_ids":["https://openalex.org/I38877650"]},{"raw_affiliation_string":"Songshan Laboratory, Zhengzhou, 450001, China","institution_ids":["https://openalex.org/I4210114608"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100377555","display_name":"Kun Li","orcid":"https://orcid.org/0000-0002-6780-4391"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]},{"id":"https://openalex.org/I4210114608","display_name":"Songshan Lake Materials Laboratory","ror":"https://ror.org/020vtf184","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366","https://openalex.org/I19820366","https://openalex.org/I4210114608","https://openalex.org/I4210137180","https://openalex.org/I4210159876"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun Li","raw_affiliation_strings":["College of Computer and Artificial Intelligence, Zhengzhou University, Zhengzhou, 450001, China","Songshan Laboratory, Zhengzhou, 450001, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Artificial Intelligence, Zhengzhou University, Zhengzhou, 450001, China","institution_ids":["https://openalex.org/I38877650"]},{"raw_affiliation_string":"Songshan Laboratory, Zhengzhou, 450001, China","institution_ids":["https://openalex.org/I4210114608"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091337485","display_name":"Qinglei Zhou","orcid":"https://orcid.org/0000-0002-1156-1108"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]},{"id":"https://openalex.org/I4210158984","display_name":"National Supercomputing Center in Wuxi","ror":"https://ror.org/04ypjrs34","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210158984"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinglei Zhou","raw_affiliation_strings":["College of Computer and Artificial Intelligence, Zhengzhou University, Zhengzhou, 450001, China","National Supercomputing Center in Zhengzhou, Zhengzhou, 450001, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Artificial Intelligence, Zhengzhou University, Zhengzhou, 450001, China","institution_ids":["https://openalex.org/I38877650"]},{"raw_affiliation_string":"National Supercomputing Center in Zhengzhou, Zhengzhou, 450001, China","institution_ids":["https://openalex.org/I4210158984"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5023807587"],"corresponding_institution_ids":["https://openalex.org/I38877650","https://openalex.org/I4210114608"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.49655738,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.20479999482631683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.20479999482631683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.16850000619888306,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.08550000190734863,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7257999777793884},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5393999814987183},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.42500001192092896},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4000000059604645},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.3939000070095062},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.3675999939441681},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.349700003862381},{"id":"https://openalex.org/keywords/fusion-mechanism","display_name":"Fusion mechanism","score":0.33869999647140503}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7592999935150146},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7257999777793884},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5461999773979187},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5393999814987183},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5116000175476074},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.42500001192092896},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4000000059604645},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.3939000070095062},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.3675999939441681},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.349700003862381},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34279999136924744},{"id":"https://openalex.org/C173414695","wikidata":"https://www.wikidata.org/wiki/Q5510276","display_name":"Fusion mechanism","level":4,"score":0.33869999647140503},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.3296999931335449},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.31859999895095825},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2928999960422516},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.2757999897003174},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.2743000090122223},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.26190000772476196},{"id":"https://openalex.org/C2993807640","wikidata":"https://www.wikidata.org/wiki/Q103709453","display_name":"Attention network","level":2,"score":0.25600001215934753},{"id":"https://openalex.org/C27458966","wikidata":"https://www.wikidata.org/wiki/Q1187693","display_name":"Control flow graph","level":2,"score":0.25220000743865967}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00383-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00383-4","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00383-4","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b2ca81e222ee4f01a21f85680af14903","is_oa":true,"landing_page_url":"https://doaj.org/article/b2ca81e222ee4f01a21f85680af14903","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-20 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00383-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00383-4","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00383-4","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416441251.pdf","grobid_xml":"https://content.openalex.org/works/W4416441251.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1677182931","https://openalex.org/W2064675550","https://openalex.org/W2097117768","https://openalex.org/W2141461755","https://openalex.org/W2602815560","https://openalex.org/W2749008552","https://openalex.org/W2901689459","https://openalex.org/W2963341956","https://openalex.org/W2963608065","https://openalex.org/W2968479675","https://openalex.org/W3007413911","https://openalex.org/W3031273498","https://openalex.org/W3080427797","https://openalex.org/W3094568574","https://openalex.org/W3109206613","https://openalex.org/W3133719257","https://openalex.org/W3177052299","https://openalex.org/W3193122818","https://openalex.org/W4210918116","https://openalex.org/W4281744374","https://openalex.org/W4285490409","https://openalex.org/W4285586654","https://openalex.org/W4309892485","https://openalex.org/W4324007217","https://openalex.org/W4401076654","https://openalex.org/W4402457354","https://openalex.org/W4403212384"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Binary":[1],"vulnerability":[2,20,33,43,66,74,107,140,153,183],"detection":[3,21,75,184],"plays":[4],"an":[5,163],"important":[6],"role":[7],"in":[8,182,185],"the":[9,40,117,127,176],"field":[10],"of":[11,42,129,165,170],"program":[12],"security.":[13],"In":[14],"order":[15],"to":[16,31,63,112,119,150],"deal":[17],"with":[18],"large-scale":[19],"tasks,":[22],"more":[23,25],"and":[24,61,81,98,104,114,123,132,135,142,167,179],"neural":[26,147],"network":[27,148],"technologies":[28,36],"are":[29],"applied":[30],"cross-architectures":[32,65,73],"detection.":[34,44,67,108,154],"These":[35],"have":[37],"significantly":[38],"improved":[39],"accuracy":[41,164],"However,":[45],"existing":[46,177],"methods":[47,178],"still":[48],"face":[49],"problems":[50],"such":[51,90],"as":[52,91],"single":[53],"extracted":[54],"information,":[55],"poor":[56],"robustness":[57],"against":[58],"compilation":[59],"optimization,":[60],"inability":[62],"perform":[64,151],"Therefore,":[68],"this":[69,160],"paper":[70],"proposes":[71],"a":[72,168],"method":[76,85,161],"based":[77],"on":[78],"attention":[79,110],"mechanism":[80,111],"multi-feature":[82],"fusion.":[83],"This":[84],"can":[86],"simultaneously":[87],"obtain":[88,120],"information":[89,122,125],"assembly":[92],"code,":[93],"attribute":[94,124],"control":[95],"flow":[96],"graph":[97,143],"function-level":[99,133],"features":[100],"for":[101,137],"cross-architecture,":[102],"cross-compilers":[103],"cross-optimization":[105],"options":[106],"Adding":[109],"GRU":[113],"GoogleNet":[115],"improves":[116],"model":[118,149],"semantic":[121],"after":[126],"fusion":[128],"basic":[130],"block-level":[131],"features,":[134],"searches":[136],"Top-K":[138],"suspected":[139],"functions":[141],"matching":[144],"through":[145],"deep":[146],"phased":[152],"The":[155],"experimental":[156],"results":[157],"show":[158],"that":[159],"achieves":[162],"95.79%":[166],"Recall":[169],"97.06%,":[171],"which":[172],"is":[173],"better":[174],"than":[175],"performs":[180],"well":[181],"real":[186],"environments.":[187]},"counts_by_year":[],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-11-23T00:00:00"}
