{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:46:38Z","timestamp":1773085598429,"version":"3.50.1"},"reference-count":92,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Optoelectronic Information Technology Key Laboratory Open Project Fund of Yunnan Province, China","award":["YNOE-2020-01"],"award-info":[{"award-number":["YNOE-2020-01"]}]},{"name":"2019 Educational Research Project of Fujian Province, China","award":["KC20008P"],"award-info":[{"award-number":["KC20008P"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3034766","type":"journal-article","created":{"date-parts":[[2020,10,29]],"date-time":"2020-10-29T19:38:25Z","timestamp":1604000305000},"page":"197158-197172","source":"Crossref","is-referenced-by-count":70,"title":["Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey"],"prefix":"10.1109","volume":"8","author":[{"given":"Peng","family":"Zeng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3280-1307","authenticated-orcid":false,"given":"Guanjun","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4691-8330","authenticated-orcid":false,"given":"Lei","family":"Pan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9186-475X","authenticated-orcid":false,"given":"Yonghang","family":"Tai","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2885561"},{"key":"ref72","first-page":"2440","article-title":"End-to-end memory networks","author":"sukhbaatar","year":"2015","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375830"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-4032-5_59"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186066"},{"key":"ref77","article-title":"A systematic review of fuzzing based on machine learning techniques","author":"wang","year":"2019","journal-title":"arXiv 1908 01262"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00003"},{"key":"ref39","article-title":"On the replicability and reproducibility of deep learning in software engineering","author":"liu","year":"2020","journal-title":"arXiv 2006 14244"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2012.202"},{"key":"ref78","article-title":"Memory networks","author":"weston","year":"2014","journal-title":"arXiv 1410 3916"},{"key":"ref79","article-title":"Memory networks","author":"weston","year":"2014","journal-title":"arXiv 1410 3916"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2993293"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"ref31","article-title":"SySeVR: A framework for using deep learning to detect software vulnerabilities","author":"li","year":"2018","journal-title":"arXiv 1807 06756"},{"key":"ref30","article-title":"VulDeeLocator: A deep learning-based fine-grained vulnerability detector","author":"li","year":"2020","journal-title":"arXiv 2001 02350"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2821768"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3138840"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2954088"},{"key":"ref34","first-page":"219","article-title":"Deep learning-based vulnerable function detection: A benchmark","author":"lin","year":"2019","journal-title":"Proc Int Conf Inf Commun Secur"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/BF00993309"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2001.938448"},{"key":"ref61","article-title":"Explainable artificial intelligence: Understanding, visualizing and interpreting deep learning models","author":"samek","year":"2017","journal-title":"arXiv 1708 08296"},{"key":"ref63","year":"2018","journal-title":"Record-Breaking Number of Vulnerabilities Disclosed in 2017 Report"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923227"},{"key":"ref64","article-title":"Towards security defect prediction with AI","author":"sestili","year":"2018","journal-title":"arXiv 1808 09897"},{"key":"ref27","article-title":"Maximal divergence sequential autoencoder for binary software vulnerability detection","author":"le","year":"2018","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2373377"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351733"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/app10051692"},{"key":"ref67","first-page":"806","article-title":"CNN features Off-the-shelf: An astounding baseline for recognition","author":"razavian","year":"2014","journal-title":"Proc IEEE Conf Comp Vis Pattern Recognit"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.81"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9190-8"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2932228"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-011-9207-8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100270"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DISA.2018.8490530"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2018.00017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2387069"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3532474"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.007"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.500-297"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","article-title":"A survey on transfer learning","volume":"22","author":"jialin pan","year":"2010","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2942930"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46307-0_29"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380368"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"ref58","first-page":"1","article-title":"Anchors: High-precision model-agnostic explanations","author":"ribeiro","year":"2018","journal-title":"Proc 32nd AAAI Conf Artif Intell"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2019.12.012"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2900307"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.02.009"},{"key":"ref53","article-title":"Security analysis methods on ethereum smart contract vulnerabilities: A survey","author":"praitheeshan","year":"2019","journal-title":"arXiv 1908 08605"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1202"},{"key":"ref10","first-page":"4171","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"2019","journal-title":"Proc Conf North Amer Chapter Assoc Comput Linguistics Hum Lang Technol"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-5069-3"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2800740"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/6230953"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.31"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.371"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3092566"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101873"},{"key":"ref81","article-title":"Explainable deep learning: A field guide for the uninitiated","author":"xie","year":"2020","journal-title":"arXiv 2004 14545"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.52"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421003"},{"key":"ref18","article-title":"Automated software vulnerability detection with machine learning","author":"harer","year":"2018","journal-title":"arXiv 1803 04497"},{"key":"ref83","first-page":"13","article-title":"Vulnerability extrapolation: Assisted discovery of vulnerabilities using machine learning","author":"yamaguchi","year":"2011","journal-title":"Proc 5th USENIX Conf Offensive Technol"},{"key":"ref19","first-page":"2447","article-title":"A better way to pretrain deep Boltzmann machines","author":"hinton","year":"2012","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref89","first-page":"1","article-title":"Interpretable deep learning under fire","author":"zhang","year":"2020","journal-title":"Proc 29th USENIX Secur Symp (USENIX Secur )"},{"key":"ref4","article-title":"End-to-End prediction of buffer overruns from raw source code via neural memory networks","author":"jeong","year":"2017","journal-title":"arXiv 1703 02458"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2940940"},{"key":"ref5","first-page":"7059","article-title":"Cross-lingual language model pretraining","author":"conneau","year":"2019","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.014"},{"key":"ref86","first-page":"5753","article-title":"XLNet: Generalized autoregressive pretraining for language understanding","author":"yang","year":"2019","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.036"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.107139"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2320577"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.98"},{"key":"ref9","article-title":"Automatic feature learning for vulnerability prediction","author":"khanh dam","year":"2017","journal-title":"arXiv 1708 02368"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315311"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.11.023"},{"key":"ref48","year":"2018","journal-title":"Software Assurance Reference Dataset Project"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851923"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2019.2958558"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942800"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107332"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2984505"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09244140.pdf?arnumber=9244140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:57:46Z","timestamp":1642003066000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9244140\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":92,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3034766","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}