{"id":"https://openalex.org/W7138160981","doi":"https://doi.org/10.1609/aaai.v40i1.36976","title":"VFCionX: Bridging Large and Small Models for Robust Vulnerability-Fixing Commit Identification","display_name":"VFCionX: Bridging Large and Small Models for Robust Vulnerability-Fixing Commit Identification","publication_year":2026,"publication_date":"2026-03-14","ids":{"openalex":"https://openalex.org/W7138160981","doi":"https://doi.org/10.1609/aaai.v40i1.36976"},"language":null,"primary_location":{"id":"doi:10.1609/aaai.v40i1.36976","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i1.36976","pdf_url":null,"source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1609/aaai.v40i1.36976","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129695572","display_name":"Xing Cui","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xing Cui","raw_affiliation_strings":["Institute of Software, Chinese Academy of Sciences, Beijing 100190, China\nUniversity of Chinese Academy of Sciences, Beijing 100190, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, Chinese Academy of Sciences, Beijing 100190, China\nUniversity of Chinese Academy of Sciences, Beijing 100190, China","institution_ids":["https://openalex.org/I4210128818"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129741890","display_name":"Jingzheng Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingzheng Wu","raw_affiliation_strings":["Institute of Software, Chinese Academy of Sciences, Beijing 100190, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, Chinese Academy of Sciences, Beijing 100190, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5118197150","display_name":"Wenxiang Ou","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenxiang Ou","raw_affiliation_strings":["Institute of Software, Chinese Academy of Sciences, Beijing 100190, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, Chinese Academy of Sciences, Beijing 100190, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129740246","display_name":"Tianyue Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianyue Luo","raw_affiliation_strings":["Institute of Software, Chinese Academy of Sciences, Beijing 100190, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, Chinese Academy of Sciences, Beijing 100190, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129739241","display_name":"Zhiyuan Li","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiyuan Li","raw_affiliation_strings":["Institute of Software, Chinese Academy of Sciences, Beijing 100190, China\nUniversity of Chinese Academy of Sciences, Beijing 100190, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, Chinese Academy of Sciences, Beijing 100190, China\nUniversity of Chinese Academy of Sciences, Beijing 100190, China","institution_ids":["https://openalex.org/I4210128818"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129737553","display_name":"Xiang Ling","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiang Ling","raw_affiliation_strings":["Institute of Software, Chinese Academy of Sciences, Beijing 100190, China\nQuan Cheng Laboratory, Jinan 250103, Shandong, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, Chinese Academy of Sciences, Beijing 100190, China\nQuan Cheng Laboratory, Jinan 250103, Shandong, China","institution_ids":["https://openalex.org/I4210128818"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5129695572"],"corresponding_institution_ids":["https://openalex.org/I4210128818"],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.50837989,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"40","issue":"1","first_page":"166","last_page":"174"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.5530999898910522,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.5530999898910522,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.13609999418258667,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.09430000185966492,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/commit","display_name":"Commit","score":0.7559000253677368},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5922999978065491},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.461899995803833},{"id":"https://openalex.org/keywords/spurious-relationship","display_name":"Spurious relationship","score":0.45649999380111694},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4368000030517578},{"id":"https://openalex.org/keywords/bridging","display_name":"Bridging (networking)","score":0.3709000051021576}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8070999979972839},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.7559000253677368},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5922999978065491},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5523999929428101},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4952999949455261},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.461899995803833},{"id":"https://openalex.org/C97256817","wikidata":"https://www.wikidata.org/wiki/Q1462316","display_name":"Spurious relationship","level":2,"score":0.45649999380111694},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4368000030517578},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4284000098705292},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.3709000051021576},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3492000102996826},{"id":"https://openalex.org/C141404830","wikidata":"https://www.wikidata.org/wiki/Q2823869","display_name":"AdaBoost","level":3,"score":0.31529998779296875},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.30309998989105225},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.2563999891281128},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.2549999952316284}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1609/aaai.v40i1.36976","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i1.36976","pdf_url":null,"source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1609/aaai.v40i1.36976","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i1.36976","pdf_url":null,"source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Vulnerability-Fixing":[0],"Commit":[1],"Identification(VFCI)":[2],"is":[3],"a":[4,47,59,79,111,123,208],"critical":[5],"task":[6],"in":[7,27,58,100],"software":[8],"security":[9,20],"maintenance":[10],"that":[11,18,51,171],"aims":[12],"to":[13,84,115,132],"automatically":[14],"identify":[15],"code":[16,141],"commits":[17,169],"patch":[19,216],"vulnerabilities.":[21],"However,":[22],"existing":[23],"approaches":[24],"face":[25],"challenges":[26],"handling":[28],"low-quality":[29],"commit":[30,89],"messages":[31,90],"and":[32,54,72,91,121,130,139,158,202,210],"entangled":[33,119],"commits,":[34,120],"which":[35],"limit":[36],"their":[37],"identification":[38],"performance.":[39],"To":[40],"address":[41],"these":[42],"issues,":[43],"we":[44],"propose":[45],"VFCionX,":[46],"novel":[48],"VFCI":[49],"framework":[50],"integrates":[52,146],"large":[53],"small":[55],"language":[56],"models":[57],"collaborative":[60],"architecture.":[61],"VFCionX":[62,172],"consists":[63],"of":[64,88,176,189],"three":[65],"core":[66],"modules:":[67],"Message":[68,76],"Classifier,":[69,71],"Patch":[70,105],"Ensemble":[73,144],"Classifier.":[74],"The":[75,104,143],"Classifier":[77,106,145],"employs":[78],"multi-source":[80],"contextual":[81],"augmentation":[82],"strategy":[83],"enhance":[85],"the":[86,93,101,152,179,187],"quality":[87],"fine-tunes":[92],"Qwen2.5-1.5B":[94],"model,":[95],"significantly":[96],"improving":[97],"classification":[98],"performance":[99,201],"textual":[102],"modality.":[103],"combines":[107],"heuristic":[108],"rules":[109],"with":[110],"Qwen2.5-Coder-7B-driven":[112],"file":[113],"selector":[114],"filter":[116],"noise":[117,203],"from":[118,148],"incorporates":[122],"line-level":[124],"feature":[125],"extractor":[126],"based":[127],"on":[128,162],"CodeBERT":[129],"CNN":[131],"capture":[133],"local":[134],"pattern":[135],"differences":[136],"between":[137],"added":[138],"deleted":[140],"lines.":[142],"predictions":[147],"both":[149],"channels":[150],"using":[151],"AdaBoost":[153],"algorithm,":[154],"enhancing":[155],"model":[156],"robustness":[157],"generalization.":[159],"Experimental":[160],"results":[161],"five":[163],"popular":[164],"C/C++":[165],"repositories":[166],"comprising":[167],"24,630":[168],"show":[170],"achieves":[173],"an":[174],"F1-score":[175],"81.47%,":[177],"outperforming":[178],"best":[180],"baseline":[181],"by":[182],"9.42%.":[183],"Ablation":[184],"studies":[185],"validate":[186],"effectiveness":[188],"each":[190],"component,":[191],"while":[192],"sensitivity":[193],"analysis":[194],"reveals":[195],"optimal":[196],"parameter":[197],"settings":[198],"for":[199,213],"balancing":[200],"resilience.":[204],"This":[205],"work":[206],"provides":[207],"new":[209],"effective":[211],"solution":[212],"robust":[214],"vulnerability":[215],"identification.":[217]},"counts_by_year":[],"updated_date":"2026-03-20T20:47:17.329874","created_date":"2026-03-18T00:00:00"}
