{"id":"https://openalex.org/W4401350805","doi":"https://doi.org/10.3390/software3030016","title":"Towards a Block-Level Conformer-Based Python Vulnerability Detection","display_name":"Towards a Block-Level Conformer-Based Python Vulnerability Detection","publication_year":2024,"publication_date":"2024-07-31","ids":{"openalex":"https://openalex.org/W4401350805","doi":"https://doi.org/10.3390/software3030016"},"language":"en","primary_location":{"id":"doi:10.3390/software3030016","is_oa":true,"landing_page_url":"https://doi.org/10.3390/software3030016","pdf_url":"https://www.mdpi.com/2674-113X/3/3/16/pdf?version=1722417635","source":{"id":"https://openalex.org/S4210183365","display_name":"Software","issn_l":"2674-113X","issn":["2674-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Software","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.mdpi.com/2674-113X/3/3/16/pdf?version=1722417635","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050924555","display_name":"Amirreza Bagheri","orcid":"https://orcid.org/0000-0001-9691-7937"},"institutions":[{"id":"https://openalex.org/I227486990","display_name":"University of Szeged","ror":"https://ror.org/01pnej532","country_code":"HU","type":"education","lineage":["https://openalex.org/I227486990"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"Amirreza Bagheri","raw_affiliation_strings":["Department of Software Engineering, University of Szeged, 6720 Szeged, Hungary"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, University of Szeged, 6720 Szeged, Hungary","institution_ids":["https://openalex.org/I227486990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021558521","display_name":"P\u00e9ter Heged\u0171s","orcid":"https://orcid.org/0000-0003-4592-6504"},"institutions":[{"id":"https://openalex.org/I227486990","display_name":"University of Szeged","ror":"https://ror.org/01pnej532","country_code":"HU","type":"education","lineage":["https://openalex.org/I227486990"]}],"countries":["HU"],"is_corresponding":true,"raw_author_name":"P\u00e9ter Heged\u0171s","raw_affiliation_strings":["Department of Software Engineering, University of Szeged, 6720 Szeged, Hungary"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, University of Szeged, 6720 Szeged, Hungary","institution_ids":["https://openalex.org/I227486990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5021558521"],"corresponding_institution_ids":["https://openalex.org/I227486990"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18688951,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"3","issue":"3","first_page":"310","last_page":"327"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.8685445189476013},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8101990818977356},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.629018247127533},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5899782180786133},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5719692707061768},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5708383917808533},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.435469388961792},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39549028873443604},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.34190303087234497},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1718670129776001},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09002989530563354}],"concepts":[{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.8685445189476013},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8101990818977356},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.629018247127533},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5899782180786133},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5719692707061768},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5708383917808533},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.435469388961792},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39549028873443604},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.34190303087234497},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1718670129776001},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09002989530563354}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/software3030016","is_oa":true,"landing_page_url":"https://doi.org/10.3390/software3030016","pdf_url":"https://www.mdpi.com/2674-113X/3/3/16/pdf?version=1722417635","source":{"id":"https://openalex.org/S4210183365","display_name":"Software","issn_l":"2674-113X","issn":["2674-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Software","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1060a86092f345e4b21e2750528ca315","is_oa":true,"landing_page_url":"https://doaj.org/article/1060a86092f345e4b21e2750528ca315","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Software, Vol 3, Iss 3, Pp 310-327 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/software3030016","is_oa":true,"landing_page_url":"https://doi.org/10.3390/software3030016","pdf_url":"https://www.mdpi.com/2674-113X/3/3/16/pdf?version=1722417635","source":{"id":"https://openalex.org/S4210183365","display_name":"Software","issn_l":"2674-113X","issn":["2674-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Software","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.6800000071525574,"display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4401350805.pdf"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1989657183","https://openalex.org/W1997646511","https://openalex.org/W2003529494","https://openalex.org/W2069268700","https://openalex.org/W2404482714","https://openalex.org/W2527999453","https://openalex.org/W2740329368","https://openalex.org/W2748690817","https://openalex.org/W2940895343","https://openalex.org/W2964150020","https://openalex.org/W2964210007","https://openalex.org/W2970862273","https://openalex.org/W2985495886","https://openalex.org/W3022049116","https://openalex.org/W3086007799","https://openalex.org/W3097777922","https://openalex.org/W3098605233","https://openalex.org/W3111602563","https://openalex.org/W3139023885","https://openalex.org/W3189983761","https://openalex.org/W3198685994","https://openalex.org/W4211263275","https://openalex.org/W4214525227","https://openalex.org/W4226145659","https://openalex.org/W4308410075","https://openalex.org/W4312969325","https://openalex.org/W4384345698","https://openalex.org/W4385187279","https://openalex.org/W6739901393","https://openalex.org/W6768314674"],"related_works":["https://openalex.org/W2341492732","https://openalex.org/W3187193180","https://openalex.org/W106542691","https://openalex.org/W1699080303","https://openalex.org/W4297799326","https://openalex.org/W3116064965","https://openalex.org/W4287027380","https://openalex.org/W3193760048","https://openalex.org/W4285822516","https://openalex.org/W4380075502"],"abstract_inverted_index":{"Software":[0],"vulnerabilities":[1,25,121],"pose":[2],"a":[3,56,61,106],"significant":[4],"threat":[5],"to":[6,33,42,71,115,141,170],"computer":[7],"systems":[8],"because":[9,37],"they":[10,85],"can":[11,78],"jeopardize":[12],"the":[13,52,94,117,136,143,163,168,172,183,209],"integrity":[14],"of":[15,38,63,97,119,138,148,174,185,202],"both":[16,124],"software":[17,102,120],"and":[18,59,128,145,200,213],"hardware.":[19],"The":[20],"existing":[21],"tools":[22],"for":[23],"detecting":[24],"are":[26],"inadequate.":[27],"Machine":[28],"learning":[29,221],"algorithms":[30],"may":[31],"struggle":[32],"interpret":[34],"enormous":[35],"datasets":[36,193],"their":[39],"limited":[40],"ability":[41],"understand":[43],"intricate":[44],"linkages":[45],"within":[46],"high-dimensional":[47],"data.":[48,75,90],"Traditional":[49],"procedures,":[50],"on":[51,155],"other":[53],"hand,":[54],"take":[55],"long":[57],"time":[58],"require":[60],"lot":[62],"manual":[64],"labor.":[65],"Furthermore,":[66],"earlier":[67],"deep-learning":[68],"approaches":[69,165],"failed":[70],"acquire":[72],"adequate":[73],"feature":[74],"Self-attention":[76],"mechanisms":[77],"process":[79],"information":[80],"across":[81],"large":[82],"distances,":[83],"but":[84],"do":[86],"not":[87],"collect":[88],"structural":[89],"This":[91],"work":[92],"addresses":[93],"critical":[95],"problem":[96],"inadequate":[98],"vulnerability":[99,149,192],"detection":[100,118,150],"in":[101,135,208],"systems.":[103,222],"We":[104,181],"propose":[105],"novel":[107],"method":[108],"that":[109],"combines":[110],"self-attention":[111,164],"with":[112,204],"convolutional":[113],"networks":[114],"enhance":[116],"by":[122,166,219],"capturing":[123],"localized,":[125],"position-specific":[126],"features":[127],"global,":[129],"content-driven":[130],"interactions.":[131],"Our":[132,197],"contribution":[133],"lies":[134],"integration":[137],"these":[139],"methodologies":[140],"improve":[142,162],"precision":[144],"F1":[146,214],"score":[147,215],"systems,":[151],"achieving":[152],"unprecedented":[153],"results":[154],"complex":[156,190],"Python":[157,191],"datasets.":[158],"In":[159],"addition,":[160],"we":[161],"changing":[167],"denominator":[169],"address":[171],"issue":[173],"excessive":[175],"attention":[176],"heads":[177],"creating":[178],"irrelevant":[179],"disturbances.":[180],"assessed":[182],"effectiveness":[184],"this":[186],"strategy":[187],"using":[188],"six":[189],"obtained":[194],"from":[195],"GitHub.":[196],"rigorous":[198],"study":[199],"comparison":[201],"data":[203],"previous":[205],"studies":[206],"resulted":[207],"most":[210],"precise":[211],"outcomes":[212],"(99%)":[216],"ever":[217],"attained":[218],"machine":[220]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
