{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:25:09Z","timestamp":1770845109490,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,5]]},"DOI":"10.1109\/smc58881.2025.11343541","type":"proceedings-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:54:44Z","timestamp":1769633684000},"page":"2885-2892","source":"Crossref","is-referenced-by-count":0,"title":["CTVD: Collaborative Training of Deep Learning and Large Model for C\/C++ Source Code Vulnerability Detection"],"prefix":"10.1109","author":[{"given":"Yaning","family":"Zheng","sequence":"first","affiliation":[{"name":"Academy of Military Sciences, PLA,Institute of System Engineering,Beijing,China,100101"}]},{"given":"Dongxia","family":"Wang","sequence":"additional","affiliation":[{"name":"Academy of Military Sciences, PLA,Institute of System Engineering,Beijing,China,100101"}]},{"given":"Huayang","family":"Cao","sequence":"additional","affiliation":[{"name":"Academy of Military Sciences, PLA,Institute of System Engineering,Beijing,China,100101"}]},{"given":"Cheng","family":"Qian","sequence":"additional","affiliation":[{"name":"Academy of Military Sciences, PLA,Institute of System Engineering,Beijing,China,100101"}]},{"given":"Honglin","family":"Zhuang","sequence":"additional","affiliation":[{"name":"Academy of Military Sciences, PLA,Institute of System Engineering,Beijing,China,100101"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107303"},{"key":"ref2","first-page":"3971","article-title":"Dos and don\u2019ts of machine learning in computer security","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Arp"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC54236.2022.00281"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2993293"},{"key":"ref5","article-title":"Uncovering the limits of machine learning for automatic vulnerability detection","author":"Risse","year":"2024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104098"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387501"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3087402"},{"key":"ref9","volume-title":"Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks","author":"Zhou","year":"2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607242"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-024-02764-x"},{"key":"ref13","article-title":"Vulnerability detection with code language models: How far are we?","author":"Ding","year":"2024","journal-title":"ArXiv"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3076142"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2019.2942930"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00026"},{"key":"ref18","article-title":"Graph-bert: Only attention is needed for learning graph representations","author":"Zhang","year":"2020","journal-title":"ArXiv"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1145\/3597503.3639142","article-title":"Pre-training by predicting program dependencies for vulnerability analysis tasks","volume-title":"Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering, ICSE \u201924","author":"Liu"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468597"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3671016.3674807"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18293\/SEKE2023-115"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623345"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWAMTIP53232.2021.9674145"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.wnut-1.43"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558936"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00018"},{"key":"ref28","article-title":"Source code vulnerability detection: Combining code language models and code property graphs","author":"Liu","year":"2024","journal-title":"ArXiv"}],"event":{"name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","location":"Vienna, Austria","start":{"date-parts":[[2025,10,5]]},"end":{"date-parts":[[2025,10,8]]}},"container-title":["2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11342430\/11342431\/11343541.pdf?arnumber=11343541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:49:57Z","timestamp":1770842997000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11343541\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,5]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/smc58881.2025.11343541","relation":{},"subject":[],"published":{"date-parts":[[2025,10,5]]}}}