{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:29:48Z","timestamp":1730226588795,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T00:00:00Z","timestamp":1666828800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T00:00:00Z","timestamp":1666828800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,27]]},"DOI":"10.1109\/ialp57159.2022.9961240","type":"proceedings-article","created":{"date-parts":[[2022,12,2]],"date-time":"2022-12-02T21:07:51Z","timestamp":1670015271000},"page":"395-400","source":"Crossref","is-referenced-by-count":2,"title":["Software Defect Detection Method Based on Graph Structure and Deep Neural Network"],"prefix":"10.1109","author":[{"given":"Tianrun","family":"Qu","sequence":"first","affiliation":[{"name":"Beijing Jinghang Computation and Communication Institute,Beijing,China"}]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Jinghang Computation and Communication Institute,Beijing,China"}]},{"given":"Weining","family":"Zheng","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology,Faculty of Computing,Harbin,China"}]},{"given":"Wenxin","family":"Tao","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology,Faculty of Computing,Harbin,China"}]}],"member":"263","reference":[{"key":"ref10","first-page":"1165","article-title":"Software clone detection: A systematic review","author":"dhavleesh","year":"2013","journal-title":"Information and Software Technology 55"},{"key":"ref11","first-page":"1","article-title":"A summary of source code oriented software defect static detection","volume":"5","author":"zhen","year":"2019","journal-title":"Chinese Journal of Network and Information Security"},{"key":"ref12","article-title":"VulDeePecker: A Deep Learning-Based System for Vulnerability Detection","author":"zhen","year":"0","journal-title":"Symposium on Network and Distributed System Security"},{"key":"ref13","article-title":"Vuldeelocator: a deep learning-based fine-grained vulnerability detector","author":"li","year":"2021","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref14","first-page":"2224","article-title":"?VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection","author":"zou","year":"2019","journal-title":"IEEE Transactions on Dependable and Secure Computing 18 5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774504"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2010.06.003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315311"},{"key":"ref18","article-title":"Vulnerability extrapolation: Assisted discovery of vulnerabilities using machine learning","author":"fabian","year":"0","journal-title":"5th USENIX Workshop on Offensive Technologies (WOOT 11)"},{"key":"ref19","article-title":"Generalized vulnerability extrapolation using abstract syntax trees","author":"fabian","year":"0","journal-title":"Proceedings of the 28th Annual Computer Security Applications Conference"},{"key":"ref4","article-title":"On the use of open-source c\/c++ static analysis tools in large projects","author":"pereira","year":"0","journal-title":"2020 16th European Dependable Computing Conference (EDCC)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.29007\/mx3z"},{"key":"ref6","article-title":"Lessons learned: Using a static analysis tool within a continuous integration system","author":"claude","year":"0","journal-title":"2016 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2016.21"},{"key":"ref8","article-title":"How do developers act on static analysis alerts? an empirical study of coverity usage","author":"nasif","year":"0","journal-title":"2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE)"},{"key":"ref7","first-page":"32","article-title":"Savi: Static-analysis vulnerability indicator","author":"james","year":"2012","journal-title":"IEEE Security & Privacy 10 3"},{"key":"ref2","first-page":"1","article-title":"Mitigating program security vulnerabilities: Approaches and challenges","author":"hossain","year":"2012","journal-title":"ACM Computing Surveys (CSUR) 3"},{"key":"ref9","first-page":"101","article-title":"Pattern-based methods for vulnerability discovery","author":"fabian","year":"2017","journal-title":"it-Information Technology 59 2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898880"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3138840"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2821768"},{"key":"ref24","article-title":"Convolutional neural networks over control flow graphs for software defect prediction","author":"phan","year":"0","journal-title":"2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI)"},{"key":"ref23","article-title":"Lessons learned from using a deep treebased model for software defect prediction in practice","author":"dam","year":"0","journal-title":"2019 IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"}],"event":{"name":"2022 International Conference on Asian Language Processing (IALP)","start":{"date-parts":[[2022,10,27]]},"location":"Singapore, Singapore","end":{"date-parts":[[2022,10,28]]}},"container-title":["2022 International Conference on Asian Language Processing (IALP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9961216\/9961238\/09961240.pdf?arnumber=9961240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T20:03:53Z","timestamp":1671480233000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9961240\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,27]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ialp57159.2022.9961240","relation":{},"subject":[],"published":{"date-parts":[[2022,10,27]]}}}