{"id":"https://openalex.org/W7127880816","doi":"https://doi.org/10.3390/fi18020085","title":"CEVD: Cluster-Based Ensemble Learning for Cross-Project Vulnerability Detection","display_name":"CEVD: Cluster-Based Ensemble Learning for Cross-Project Vulnerability Detection","publication_year":2026,"publication_date":"2026-02-05","ids":{"openalex":"https://openalex.org/W7127880816","doi":"https://doi.org/10.3390/fi18020085"},"language":"en","primary_location":{"id":"doi:10.3390/fi18020085","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18020085","pdf_url":"https://www.mdpi.com/1999-5903/18/2/85/pdf?version=1770280558","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/18/2/85/pdf?version=1770280558","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125200361","display_name":"Yang Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Cao","raw_affiliation_strings":["School of Software, Northwestern Polytechnical University, Xi\u2019an 710129, China"],"raw_orcid":"https://orcid.org/0009-0005-3856-9184","affiliations":[{"raw_affiliation_string":"School of Software, Northwestern Polytechnical University, Xi\u2019an 710129, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122952853","display_name":"Yunwei Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yunwei Dong","raw_affiliation_strings":["School of Software, Northwestern Polytechnical University, Xi\u2019an 710129, China"],"raw_orcid":"https://orcid.org/0000-0001-9882-9121","affiliations":[{"raw_affiliation_string":"School of Software, Northwestern Polytechnical University, Xi\u2019an 710129, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5106670276","display_name":"Jianxing Liu","orcid":"https://orcid.org/0000-0002-2201-3887"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Liu","raw_affiliation_strings":["School of Software, Northwestern Polytechnical University, Xi\u2019an 710129, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Software, Northwestern Polytechnical University, Xi\u2019an 710129, China","institution_ids":["https://openalex.org/I17145004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5122952853"],"corresponding_institution_ids":["https://openalex.org/I17145004"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15981502,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"2","first_page":"85","last_page":"85"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.7642999887466431,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.7642999887466431,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.11339999735355377,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.01510000042617321,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.666100025177002},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6650999784469604},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.6254000067710876},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.5817999839782715},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5698000192642212},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.44179999828338623},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4180999994277954},{"id":"https://openalex.org/keywords/unsupervised-learning","display_name":"Unsupervised learning","score":0.37529999017715454}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9039999842643738},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.666100025177002},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6650999784469604},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6347000002861023},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.6254000067710876},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.586899995803833},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.5817999839782715},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5698000192642212},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.44179999828338623},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4180999994277954},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39899998903274536},{"id":"https://openalex.org/C8038995","wikidata":"https://www.wikidata.org/wiki/Q1152135","display_name":"Unsupervised learning","level":2,"score":0.37529999017715454},{"id":"https://openalex.org/C207685749","wikidata":"https://www.wikidata.org/wiki/Q2088941","display_name":"Domain knowledge","level":2,"score":0.33719998598098755},{"id":"https://openalex.org/C90312973","wikidata":"https://www.wikidata.org/wiki/Q7449052","display_name":"Semantic data model","level":2,"score":0.31520000100135803},{"id":"https://openalex.org/C190839683","wikidata":"https://www.wikidata.org/wiki/Q2448197","display_name":"Train","level":2,"score":0.30559998750686646},{"id":"https://openalex.org/C119898033","wikidata":"https://www.wikidata.org/wiki/Q3433888","display_name":"Ensemble forecasting","level":2,"score":0.2969000041484833},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2969000041484833},{"id":"https://openalex.org/C2776434776","wikidata":"https://www.wikidata.org/wiki/Q19246213","display_name":"Domain adaptation","level":3,"score":0.2863999903202057},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.28060001134872437},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.27489998936653137},{"id":"https://openalex.org/C170133592","wikidata":"https://www.wikidata.org/wiki/Q1806883","display_name":"Latent semantic analysis","level":2,"score":0.26930001378059387},{"id":"https://openalex.org/C105002631","wikidata":"https://www.wikidata.org/wiki/Q4833645","display_name":"Subject-matter expert","level":3,"score":0.2687000036239624},{"id":"https://openalex.org/C51167844","wikidata":"https://www.wikidata.org/wiki/Q4422623","display_name":"Latent variable","level":2,"score":0.2639999985694885}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/fi18020085","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18020085","pdf_url":"https://www.mdpi.com/1999-5903/18/2/85/pdf?version=1770280558","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:988de6670d784cd79d44c5f98fed60ed","is_oa":false,"landing_page_url":"https://doaj.org/article/988de6670d784cd79d44c5f98fed60ed","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 18, Iss 2, p 85 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/fi18020085","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18020085","pdf_url":"https://www.mdpi.com/1999-5903/18/2/85/pdf?version=1770280558","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3446613798","display_name":null,"funder_award_id":"62192730","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8449925957","display_name":null,"funder_award_id":"62192733","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7127880816.pdf"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W974986761","https://openalex.org/W1731081199","https://openalex.org/W1971733255","https://openalex.org/W1992419399","https://openalex.org/W2033635261","https://openalex.org/W2043837581","https://openalex.org/W2885030880","https://openalex.org/W2955230520","https://openalex.org/W2962960733","https://openalex.org/W2963625477","https://openalex.org/W2979183801","https://openalex.org/W2986396948","https://openalex.org/W2988217457","https://openalex.org/W3014780393","https://openalex.org/W3048901179","https://openalex.org/W3091588759","https://openalex.org/W3098605233","https://openalex.org/W3166095789","https://openalex.org/W4225407062","https://openalex.org/W4309484938","https://openalex.org/W4312436517","https://openalex.org/W4312690534","https://openalex.org/W4318562265","https://openalex.org/W4380520352","https://openalex.org/W4384345661","https://openalex.org/W4393166720","https://openalex.org/W4394769550","https://openalex.org/W4394994998","https://openalex.org/W4399837262","https://openalex.org/W4403318507"],"related_works":[],"abstract_inverted_index":{"Deep":[0],"learning":[1,154],"has":[2],"become":[3],"an":[4,152],"important":[5],"approach":[6],"for":[7,96,231],"automated":[8],"software":[9],"vulnerability":[10,80,185,236],"detection.":[11,237],"However,":[12],"due":[13],"to":[14,27,43,60,109,133,193],"domain":[15,127,164,181],"shift,":[16],"existing":[17],"models":[18,161],"often":[19],"suffer":[20],"from":[21],"significant":[22],"performance":[23],"degradation":[24],"when":[25],"applied":[26],"unseen":[28,188],"projects.":[29],"To":[30,72],"address":[31],"this":[32,76],"issue,":[33],"prior":[34],"studies":[35],"have":[36],"widely":[37],"adopted":[38],"Domain":[39,89],"Adaptation":[40],"(DA)":[41],"techniques":[42],"improve":[44],"cross-project":[45,235],"generalization.":[46],"Nevertheless,":[47],"these":[48,74,169],"methods":[49],"typically":[50],"rely":[51],"on":[52,105,175,187,198],"the":[53,135,176,180,216],"implicit":[54],"\u201cproject-as-domain\u201d":[55],"assumption":[56],"and":[57,162,226],"require":[58],"access":[59,192],"target":[61,194],"project":[62,118],"data":[63],"during":[64],"training,":[65],"which":[66],"limits":[67],"their":[68],"applicability":[69],"in":[70,139,222,234],"practice.":[71],"overcome":[73],"limitations,":[75],"paper":[77],"proposes":[78],"a":[79,163,228],"detection":[81,186],"framework":[82,155],"that":[83,116,156,202],"combines":[84],"semantic":[85,107,114,143,219],"clustering":[86,104],"with":[87,122],"ensemble-based":[88],"Generalization":[90],"(DG),":[91],"termed":[92],"Cluster-based":[93],"Ensemble":[94],"Learning":[95],"Vulnerability":[97],"Detection":[98],"(CEVD).":[99],"CEVD":[100,150,203],"first":[101],"performs":[102],"unsupervised":[103],"code":[106],"embeddings":[108],"automatically":[110,111],"identify":[112],"latent":[113,224],"structures":[115],"transcend":[117],"boundaries,":[119],"constructing":[120],"pseudo-domains":[121],"intra-domain":[123],"homogeneity.":[124],"A":[125],"soft":[126],"labeling":[128],"strategy":[129],"is":[130],"further":[131],"introduced":[132],"model":[134],"membership":[136],"of":[137,168,218],"samples":[138],"multiple":[140,159],"pseudo-domains,":[141],"preserving":[142],"overlap":[144],"across":[145,208],"boundaries.":[146],"Building":[147],"upon":[148],"this,":[149],"employs":[151],"ensemble":[153],"jointly":[157],"trains":[158],"expert":[160],"classifier.":[165],"The":[166],"predictions":[167],"experts":[170],"are":[171],"dynamically":[172],"fused":[173],"based":[174],"weights":[177],"generated":[178],"by":[179],"classifier,":[182],"enabling":[183],"effective":[184],"projects":[189],"without":[190],"requiring":[191],"data.":[195],"Extensive":[196],"experiments":[197],"real-world":[199],"datasets":[200],"demonstrate":[201],"consistently":[204],"outperforms":[205],"state-of-the-art":[206],"baselines":[207],"different":[209],"pre-trained":[210],"backbone":[211],"models.":[212],"This":[213],"work":[214],"demonstrates":[215],"effectiveness":[217],"structure":[220],"mining":[221],"capturing":[223],"domains":[225],"offers":[227],"practical":[229],"solution":[230],"improving":[232],"generalization":[233]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-02-07T00:00:00"}
