{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T21:06:11Z","timestamp":1763154371991,"version":"3.45.0"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Science and Technology Major Project of China","award":["2022ZD0120303"],"award-info":[{"award-number":["2022ZD0120303"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tdsc.2025.3601228","type":"journal-article","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:32:22Z","timestamp":1755801142000},"page":"7890-7907","source":"Crossref","is-referenced-by-count":0,"title":["Real-World Code Vulnerability Detection Framework: From Data Preprocessing to Multi-Feature Fusion Detection"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-7221-5106","authenticated-orcid":false,"given":"Jixian","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-7990-062X","authenticated-orcid":false,"given":"Qingfeng","family":"Du","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"given":"Sheng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"given":"Zhongda","family":"Lu","sequence":"additional","affiliation":[{"name":"Beijing Baolande Software Corporation, Beijing, China"}]},{"given":"Ting","family":"He","sequence":"additional","affiliation":[{"name":"Beijing Baolande Software Corporation, Beijing, China"}]},{"given":"Chengwei","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Baolande Software Corporation, Beijing, China"}]}],"member":"263","reference":[{"year":"2024","key":"ref1","article-title":"CWE-2023 CWE top 25 most dangerous software weaknesses"},{"year":"2025","key":"ref2","article-title":"CWE-2024 CWE top 25 most dangerous software weaknesses"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3354789"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3721977"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607242"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00888-y"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3436877"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-024-10519-8"},{"year":"2024","key":"ref9","article-title":"NIST Software Assurance Reference Dataset \u2014 samate.nist.gov"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/648"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00078"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9163061"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3285910"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103469"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3338162"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103247"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121865"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2024.107442"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103787"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3076142"},{"key":"ref21","first-page":"10197","article-title":"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Zhou"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3087402"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473122"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3475960.3475985"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387501"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3643991.3644886"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111623"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108296"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-024-00440-1"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103994"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727508"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2699220"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9539-8"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom56396.2022.00217"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC51732.2021.9376145"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00189"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111941"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111450"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3276517"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2821768"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00096"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103732"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567985"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME52107.2021.00044"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"author":"Pinnaparaju","key":"ref47","article-title":"Stable code 3B"},{"article-title":"Code Llama: Open foundation models for code","year":"2023","author":"Roziere","key":"ref48"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3626772.3657878"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.68"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.859"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P15-1150"},{"article-title":"Graph attention networks","year":"2017","author":"Veli\u010dkovi\u0107","key":"ref55"},{"article-title":"How powerful are graph neural networks?","year":"2018","author":"Xu","key":"ref56"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401063"},{"article-title":"CodeSearchNet challenge: Evaluating the state of semantic code search","year":"2019","author":"Husain","key":"ref58"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11242243\/11134102.pdf?arnumber=11134102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T21:01:14Z","timestamp":1763154074000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11134102\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":58,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3601228","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}