{"id":"https://openalex.org/W4400746575","doi":"https://doi.org/10.32604/cmc.2024.041949","title":"Software Vulnerability Mining and Analysis Based on Deep Learning","display_name":"Software Vulnerability Mining and Analysis Based on Deep Learning","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4400746575","doi":"https://doi.org/10.32604/cmc.2024.041949"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2024.041949","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.041949","pdf_url":"https://file.techscience.com/files/cmc/2024/TSP_CMC-80-2/TSP_CMC_41949/TSP_CMC_41949.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://file.techscience.com/files/cmc/2024/TSP_CMC-80-2/TSP_CMC_41949/TSP_CMC_41949.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109166544","display_name":"Shibin Zhao","orcid":"https://orcid.org/0000-0001-5143-8481"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shibin Zhao","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing , Zhengzhou , 450001 , China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450001, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing , Zhengzhou , 450001 , China","institution_ids":["https://openalex.org/I38877650"]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450001, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102489106","display_name":"Junhu Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junhu Zhu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing , Zhengzhou , 450001 , China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450001, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing , Zhengzhou , 450001 , China","institution_ids":["https://openalex.org/I38877650"]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450001, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078173956","display_name":"Jianshan Peng","orcid":"https://orcid.org/0009-0009-4941-1250"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianshan Peng","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing , Zhengzhou , 450001 , China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450001, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing , Zhengzhou , 450001 , China","institution_ids":["https://openalex.org/I38877650"]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450001, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5109166544"],"corresponding_institution_ids":["https://openalex.org/I38877650"],"apc_list":null,"apc_paid":null,"fwci":2.857,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.9210199,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"80","issue":"2","first_page":"3263","last_page":"3287"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.8492000102996826,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.8492000102996826,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.623245894908905},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5545182824134827},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.48975062370300293},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4276147186756134},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.42172369360923767},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3810846209526062},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.37531420588493347},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16107895970344543},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.10915148258209229},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07613635063171387}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.623245894908905},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5545182824134827},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.48975062370300293},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4276147186756134},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.42172369360923767},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3810846209526062},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.37531420588493347},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16107895970344543},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.10915148258209229},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07613635063171387},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2024.041949","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.041949","pdf_url":"https://file.techscience.com/files/cmc/2024/TSP_CMC-80-2/TSP_CMC_41949/TSP_CMC_41949.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2024.041949","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2024.041949","pdf_url":"https://file.techscience.com/files/cmc/2024/TSP_CMC-80-2/TSP_CMC_41949/TSP_CMC_41949.pdf","source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4400746575.pdf","grobid_xml":"https://content.openalex.org/works/W4400746575.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W2131571251","https://openalex.org/W2144344516","https://openalex.org/W2154398797","https://openalex.org/W2781491433","https://openalex.org/W2885030880","https://openalex.org/W2889225139","https://openalex.org/W2897534038","https://openalex.org/W2899726766","https://openalex.org/W2906579670","https://openalex.org/W2972135640","https://openalex.org/W2976184969","https://openalex.org/W3009129408","https://openalex.org/W3023999875","https://openalex.org/W3048901179","https://openalex.org/W3097867666","https://openalex.org/W3101228802","https://openalex.org/W3104849875","https://openalex.org/W3130200998","https://openalex.org/W3130732469","https://openalex.org/W3132428961","https://openalex.org/W3132728051","https://openalex.org/W3136874603","https://openalex.org/W3146366485","https://openalex.org/W4200410776","https://openalex.org/W4224325369","https://openalex.org/W4231677362","https://openalex.org/W4283835231","https://openalex.org/W4285197826","https://openalex.org/W4296097326","https://openalex.org/W4308154132","https://openalex.org/W6682731695","https://openalex.org/W6754575879","https://openalex.org/W6757474954","https://openalex.org/W6767260250","https://openalex.org/W6781958542","https://openalex.org/W6790598696","https://openalex.org/W6790971721","https://openalex.org/W6790988715","https://openalex.org/W6791122208","https://openalex.org/W6791189199","https://openalex.org/W6811093268","https://openalex.org/W6842958648"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W1756374135","https://openalex.org/W2947584067","https://openalex.org/W3118510577","https://openalex.org/W2280562859","https://openalex.org/W230721595","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2062873522"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"the":[3,55,106,113,122,126,133,148,152,198,205,212,215],"rapid":[4],"development":[5,56],"of":[6,57,157,214],"computer":[7],"software":[8,16],"has":[9,52],"led":[10,53],"to":[11,24,41,54,68,82,111,124,179],"numerous":[12],"security":[13,30],"problems,":[14],"particularly":[15],"vulnerabilities.":[17],"These":[18],"flaws":[19],"can":[20],"cause":[21],"significant":[22],"harm":[23],"users\u2019":[25],"privacy":[26],"and":[27,44,75,99,131,171,190],"property.":[28],"Current":[29],"defect":[31,87],"detection":[32,43,47,88],"technology":[33,51],"relies":[34],"on":[35,62,121],"manual":[36],"or":[37,65],"professional":[38],"reasoning,":[39],"leading":[40],"missed":[42,73],"high":[45],"false":[46,76],"rates.":[48],"Artificial":[49],"intelligence":[50],"neural":[58,153],"network":[59],"models":[60],"based":[61],"machine":[63],"learning":[64,67,149],"deep":[66,119],"intelligently":[69],"mine":[70],"holes,":[71],"reducing":[72],"alarms":[74],"alarms.":[77],"So,":[78],"this":[79],"project":[80,107],"aims":[81],"study":[83],"Java":[84,114,134],"source":[85,115,135],"code":[86,136,182],"methods":[89],"for":[90,151,208],"defects":[91],"like":[92],"null":[93],"pointer":[94,186],"reference":[95,187],"exception,":[96,188],"XSS":[97],"(Transform),":[98],"Structured":[100],"Query":[101],"Language":[102],"(SQL)":[103],"injection.":[104],"Also,":[105],"uses":[108],"open-source":[109],"Javalang":[110],"translate":[112],"code,":[116],"conducts":[117],"a":[118,138],"search":[120],"AST":[123],"obtain":[125],"empty":[127],"syntax":[128],"feature":[129,142],"library,":[130],"converts":[132],"into":[137],"dependency":[139],"graph.":[140],"The":[141],"vector":[143],"is":[144,204],"then":[145],"used":[146,178],"as":[147],"target":[150],"network.":[154],"Four":[155],"types":[156],"Convolutional":[158],"Neural":[159],"Networks":[160],"(CNN),":[161],"Long":[162,167],"Short-Term":[163,168],"Memory":[164,169],"(LSTM),":[165],"Bi-directional":[166],"(BiLSTM),":[170],"Attention":[172],"Mechanism":[173],"+":[174],"Bidirectional":[175],"LSTM,":[176],"are":[177],"investigate":[180],"various":[181],"defects,":[183],"including":[184],"blank":[185],"XSS,":[189],"SQL":[191],"injection":[192],"defects.":[193],"Experimental":[194],"results":[195],"show":[196],"that":[197],"attention":[199],"mechanism":[200],"in":[201],"two-dimensional":[202],"BLSTM":[203],"most":[206],"effective":[207],"object":[209],"recognition,":[210],"verifying":[211],"correctness":[213],"method.":[216]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
