{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T14:01:29Z","timestamp":1776175289870,"version":"3.50.1"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"NVIDIA Corporation"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2021,9,1]]},"DOI":"10.1109\/tdsc.2019.2954088","type":"journal-article","created":{"date-parts":[[2019,11,19]],"date-time":"2019-11-19T15:53:28Z","timestamp":1574178808000},"page":"2469-2485","source":"Crossref","is-referenced-by-count":98,"title":["Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3280-1307","authenticated-orcid":false,"given":"Guanjun","family":"Lin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2189-7801","authenticated-orcid":false,"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4711-7543","authenticated-orcid":false,"given":"Wei","family":"Luo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4691-8330","authenticated-orcid":false,"given":"Lei","family":"Pan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5179-3707","authenticated-orcid":false,"given":"Olivier","family":"De Vel","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Montague","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5252-0831","authenticated-orcid":false,"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9190-8"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.81"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813604"},{"key":"ref32","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref31","article-title":"Understanding LSTM networks","volume":"27","author":"olah","year":"2015","journal-title":"GITHUB blog posted on August"},{"key":"ref30","article-title":"Software assurance reference dataset project","year":"2019","journal-title":"Inf Technol Lab Softw Syst Div"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2373377"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2340398"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"ref34","first-page":"45","article-title":"Software framework for topic modelling with large corpora","author":"?eh??ek","year":"2010","journal-title":"Proc LREC Workshop New Challenges NLP Frameworks"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315311"},{"key":"ref27","first-page":"3882","article-title":"Phased LSTM: Accelerating recurrent network training for long or event-based sequences","author":"neil","year":"2016","journal-title":"Proc 30th Int Conf Neural Inf Process Syst"},{"key":"ref29","article-title":"National vulnerability database (NVD)","year":"2019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3212695"},{"key":"ref1","first-page":"265","article-title":"Tensorflow: A system for large-scale machine learning","volume":"16","author":"abadi","year":"2016","journal-title":"Proc 10th USENIX Conf Operat Syst Des Implementation"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2821768"},{"key":"ref22","article-title":"Macroexpressions products: Snob &#x2013; A simple name obfuscator","year":"2019"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2800740"},{"key":"ref24","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"2013","journal-title":"arXiv 1301 3781 [cs]"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"ref26","article-title":"The common vulnerability and exposures (CVE)","year":"2019"},{"key":"ref25","article-title":"Recurrent neural network based language model","author":"mikolov","year":"2010","journal-title":"Proc 11th Annu Conf Int Speech Commun Assoc"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421003"},{"key":"ref51","article-title":"American fuzzy lop (AFL)","author":"zalewski","year":"2019"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.98"},{"key":"ref52","article-title":"Learning to execute","author":"zaremba","year":"2014","journal-title":"arXiv 1410 4615"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2582924"},{"key":"ref11","article-title":"Automated software vulnerability detection with machine learning","author":"harer","year":"2018","journal-title":"arXiv 1803 04497"},{"key":"ref40","article-title":"Rough audit tool for security (RATS)","author":"software","year":"2019"},{"key":"ref12","article-title":"Gradient flow in recurrent nets: The difficulty of learning long-term dependencies","author":"hochreiter","year":"2001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.13"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.62"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.pan.a004868"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23165"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3138840"},{"key":"ref4","first-page":"209","article-title":"Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs","volume":"8","author":"cadar","year":"2008","journal-title":"Proc 8th USENIX Conf Operating Syst Des Implementation"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2010.06.003"},{"key":"ref5","article-title":"Keras","author":"chollet","year":"2015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.181"},{"key":"ref7","author":"christopher","year":"2009","journal-title":"Introduction to Information Retrieval"},{"key":"ref49","first-page":"13","article-title":"Vulnerability extrapolation: Assisted discovery of vulnerabilities using machine learning","author":"yamaguchi","year":"2011","journal-title":"Proc 5th USENIX Conf Offensive Technol"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502041"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.2295802"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"ref47","article-title":"Flawfinder","author":"wheeler","year":"2019"},{"key":"ref42","author":"sutton","year":"2007","journal-title":"Fuzzing Brute Force Vulnerability Discovery"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2885561"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00003"},{"key":"ref43","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"hinton","year":"2008","journal-title":"J Mach Learn Res"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9523876\/08906156.pdf?arnumber=8906156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:37:46Z","timestamp":1641987466000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8906156\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,1]]},"references-count":53,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2019.2954088","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,1]]}}}