{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T09:41:13Z","timestamp":1773999673233,"version":"3.50.1"},"reference-count":39,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100012659","name":"Foundation for Innovative Research Groups of the National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013088","name":"Qinglan Project of Jiangsu Province of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013088","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172194"],"award-info":[{"award-number":["62172194"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202206"],"award-info":[{"award-number":["62202206"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836116"],"award-info":[{"award-number":["U1836116"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Science of Computer Programming"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.scico.2026.103443","type":"journal-article","created":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T07:43:34Z","timestamp":1768981414000},"page":"103443","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["DATVD: A novel vulnerability detection method based on dynamic attention and hybrid convolutional pooling"],"prefix":"10.1016","volume":"251","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3124-5452","authenticated-orcid":false,"given":"Jinfu","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9513-6095","authenticated-orcid":false,"given":"Jinyu","family":"Mu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0743-1156","authenticated-orcid":false,"given":"Saihua","family":"Cai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3835-833X","authenticated-orcid":false,"given":"Jiapeng","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1378-6398","authenticated-orcid":false,"given":"Ziyan","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0240-6756","authenticated-orcid":false,"given":"Xinping","family":"Shi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.scico.2026.103443_bib0001","unstructured":"NVD - Statistics. (2024). https:\/\/nvd.nist.gov\/vuln\/search\/statistics?form_type=Basic&results_type=statistics&search_type=all&isCpeNameSearch=false."},{"issue":"1","key":"10.1016\/j.scico.2026.103443_sbref0002","first-page":"23","article-title":"A systematic literature review of software vulnerability detection","volume":"10","author":"Eberendu","year":"2022","journal-title":"Eur. J. Comput. Sci. Inf. Technol."},{"issue":"9","key":"10.1016\/j.scico.2026.103443_bib0003","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3556974","article-title":"Android source code vulnerability detection: a systematic literature review","volume":"55","author":"Senanayake","year":"2023","journal-title":"ACM Comput. Surv."},{"issue":"3","key":"10.1016\/j.scico.2026.103443_sbref0004","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1016\/j.sysarc.2010.06.003","article-title":"Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities","volume":"57","author":"Chowdhury","year":"2011","journal-title":"J. Syst. Archit."},{"issue":"9","key":"10.1016\/j.scico.2026.103443_bib0005","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3474553","article-title":"Efficiency and effectiveness of web application vulnerability detection approaches: a review","volume":"54","author":"Zhang","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.scico.2026.103443_bib0006","series-title":"2021 4th International Conference on Artificial Intelligence and Big Data (ICAIBD)","first-page":"76","article-title":"Static analysis of source code vulnerability using machine learning techniques: a survey","author":"Wang","year":"2021"},{"issue":"10","key":"10.1016\/j.scico.2026.103443_sbref0007","doi-asserted-by":"crossref","first-page":"1825","DOI":"10.1109\/JPROC.2020.2993293","article-title":"Software vulnerability detection using deep neural networks: a survey","volume":"108","author":"Lin","year":"2020","journal-title":"Proc. IEEE"},{"issue":"7","key":"10.1016\/j.scico.2026.103443_sbref0008","doi-asserted-by":"crossref","first-page":"1235","DOI":"10.1162\/neco_a_01199","article-title":"A review of recurrent neural networks: LSTM cells and network architectures","volume":"31","author":"Yu","year":"2019","journal-title":"Neural Comput."},{"key":"10.1016\/j.scico.2026.103443_bib0009","first-page":"1","article-title":"Code vulnerability detection based on deep sequence and graph models: a survey","volume":"2022","author":"Wu","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.scico.2026.103443_sbref0010","series-title":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","first-page":"69","article-title":"Vuldebert: a vulnerability detection system using bert","author":"Kim","year":"2022"},{"key":"10.1016\/j.scico.2026.103443_bib0011","doi-asserted-by":"crossref","unstructured":"Z. Li, D. Zou, S. Xu, X. Ou, H. Jin, S. Wang, Z. Deng, Y. Zhong, Vuldeepecker: a deep learning-based system for vulnerability detection, arXiv preprintarXiv preprint arXiv:1801.01681 (2018).","DOI":"10.14722\/ndss.2018.23158"},{"key":"10.1016\/j.scico.2026.103443_sbref0012","series-title":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","first-page":"539","article-title":"FTCLNet: Convolutional LSTM with fourier transform for vulnerability detection","author":"Cao","year":"2020"},{"key":"10.1016\/j.scico.2026.103443_sbref0013","series-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE)","first-page":"783","article-title":"A novel neural source code representation based on abstract syntax tree","author":"Zhang","year":"2019"},{"key":"10.1016\/j.scico.2026.103443_sbref0014","series-title":"2018 10th International Conference on Advanced Infocomm Technology (ICAIT)","first-page":"184","article-title":"CPGVA: Code property graph based vulnerability analysis by deep learning","author":"Xiaomeng","year":"2018"},{"key":"10.1016\/j.scico.2026.103443_sbref0015","series-title":"NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","first-page":"1","article-title":"E-Graphsage: a graph neural network based intrusion detection system for iot","author":"Lo","year":"2022"},{"key":"10.1016\/j.scico.2026.103443_bib0016","series-title":"Proceedings of the 9th India Software Engineering Conference","first-page":"151","article-title":"Logopt: static feature extraction from source code for automated catch block logging prediction","author":"Lal","year":"2016"},{"key":"10.1016\/j.scico.2026.103443_bib0017","unstructured":"S. Brody, U. Alon, E. Yahav, How Attentive are Graph Attention Networks?, 2022, arXiv: 2105.14491 [cs]."},{"key":"10.1016\/j.scico.2026.103443_sbref0018","series-title":"International Conference on Learning Representations (ICLR)","article-title":"Graph attention networks","author":"Veli\u010dkovi\u0107","year":"2018"},{"key":"10.1016\/j.scico.2026.103443_sbref0019","series-title":"Advances in Neural Information Processing Systems (NeurIPS)","first-page":"4800","article-title":"Hierarchical graph representation learning with differentiable pooling","author":"Ying","year":"2018"},{"key":"10.1016\/j.scico.2026.103443_sbref0020","series-title":"International Conference on Machine Learning (ICML)","first-page":"2083","article-title":"Graph U-Nets","author":"Gao","year":"2019"},{"key":"10.1016\/j.scico.2026.103443_sbref0021","series-title":"2018 5th International Conference on Systems and Informatics (ICSAI)","first-page":"1225","article-title":"Vulnerability detection for source code using contextual LSTM","author":"Xu","year":"2018"},{"key":"10.1016\/j.scico.2026.103443_bib0022","series-title":"Proceedings of the 44th International Conference on Software Engineering","first-page":"2365","article-title":"VulCNN: an image-inspired scalable vulnerability detection system","author":"Wu","year":"2022"},{"issue":"9","key":"10.1016\/j.scico.2026.103443_bib0023","doi-asserted-by":"crossref","first-page":"3280","DOI":"10.1109\/TSE.2021.3087402","article-title":"Deep learning based vulnerability detection: are we there yet?","volume":"48","author":"Chakraborty","year":"2021","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.scico.2026.103443_bib0024","series-title":"Proceedings of the 19th International Conference on Mining Software Repositories","first-page":"596","article-title":"LineVD: statement-level vulnerability detection using graph neural networks","author":"Hin","year":"2022"},{"key":"10.1016\/j.scico.2026.103443_bib0025","series-title":"Proceedings of the 19th International Conference on Mining Software Repositories","first-page":"608","article-title":"LineVul: a transformer-based line-level vulnerability prediction","author":"Fu","year":"2022"},{"key":"10.1016\/j.scico.2026.103443_bib0026","series-title":"Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","first-page":"292","article-title":"Vulnerability detection with fine-grained interpretations","author":"Li","year":"2021"},{"key":"10.1016\/j.scico.2026.103443_bib0027","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2021.106576","article-title":"BGNN4Vd : constructing bidirectional graph neural-network for vulnerability detection","volume":"136","author":"Cao","year":"2021","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.scico.2026.103443_sbref0028","article-title":"Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks","volume":"32","author":"Zhou","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.scico.2026.103443_sbref0029","doi-asserted-by":"crossref","first-page":"1943","DOI":"10.1109\/TIFS.2020.3044773","article-title":"Combining graph-based learning with automated data collection for code vulnerability detection","volume":"16","author":"Wang","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.scico.2026.103443_sbref0030","series-title":"2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)","first-page":"457","article-title":"Vu1SPG: vulnerability detection based on slice property graph representation learning","author":"Zheng","year":"2021"},{"key":"10.1016\/j.scico.2026.103443_bib0031","unstructured":"S. Suneja, Y. Zheng, Y. Zhuang, J. Laredo, A. Morari, Learning to map source code to software vulnerability using code-as-a-graph, 2020, arXiv: 2006.08614 [cs]."},{"key":"10.1016\/j.scico.2026.103443_sbref0032","series-title":"2020 IEEE International Conference on Software Maintenance and Evolution (ICSME)","first-page":"800","article-title":"Graph neural network-based vulnerability predication","author":"Feng","year":"2020"},{"issue":"3","key":"10.1016\/j.scico.2026.103443_bib0033","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3436877","article-title":"Deepwukong: statically detecting software vulnerabilities using deep graph neural network","volume":"30","author":"Cheng","year":"2021","journal-title":"ACM Trans. Softw. Eng. Method."},{"key":"10.1016\/j.scico.2026.103443_bib0034","unstructured":"Y. Li, D. Tarlow, M. Brockschmidt, R. Zemel, et al., Gated Graph Sequence Neural Networks, 2017, arXiv: 1511.05493 [cs, stat]."},{"issue":"1","key":"10.1016\/j.scico.2026.103443_sbref0035","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1109\/TGRS.2020.2995575","article-title":"Hyperspectral image classification using mixed convolutions and covariance pooling","volume":"59","author":"Zheng","year":"2020","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"10.1016\/j.scico.2026.103443_bib0036","unstructured":"H. Gholamalinezhad, H. Khosravi, Pooling Methods in Deep Neural Networks, a Review, 2020, arXiv: 2009.07485 [cs]."},{"key":"10.1016\/j.scico.2026.103443_bib0037","series-title":"International Conference on Machine Learning (ICML)","article-title":"Hierarchical graph pooling with structure learning","author":"Zhang","year":"2019"},{"issue":"1","key":"10.1016\/j.scico.2026.103443_sbref0038","doi-asserted-by":"crossref","first-page":"66","DOI":"10.2991\/ijcis.d.200120.002","article-title":"RunPool: a dynamic pooling layer for convolution neural network:","volume":"13","author":"Jie","year":"2020","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"10.1016\/j.scico.2026.103443_sbref0039","series-title":"International Conference on Machine Learning","first-page":"874","article-title":"Spectral clustering with graph neural networks for graph pooling","author":"Bianchi","year":"2020"}],"container-title":["Science of Computer Programming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167642326000080?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167642326000080?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T06:17:18Z","timestamp":1773987438000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167642326000080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":39,"alternative-id":["S0167642326000080"],"URL":"https:\/\/doi.org\/10.1016\/j.scico.2026.103443","relation":{},"ISSN":["0167-6423"],"issn-type":[{"value":"0167-6423","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"DATVD: A novel vulnerability detection method based on dynamic attention and hybrid convolutional pooling","name":"articletitle","label":"Article Title"},{"value":"Science of Computer Programming","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.scico.2026.103443","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"103443"}}