{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T04:25:11Z","timestamp":1778041511329,"version":"3.51.4"},"reference-count":76,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2022YFB3103900"],"award-info":[{"award-number":["2022YFB3103900"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002084"],"award-info":[{"award-number":["62002084"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20B2046"],"award-info":[{"award-number":["U20B2046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2023A1515011959"],"award-info":[{"award-number":["2023A1515011959"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Basic Research","award":["JCYJ20220531095214031"],"award-info":[{"award-number":["JCYJ20220531095214031"]}]},{"name":"Shenzhen International Science and Technology Cooperation","award":["GJHZ20220913143008015"],"award-info":[{"award-number":["GJHZ20220913143008015"]}]},{"name":"Major Key Project of PCL","award":["PCL2022A03"],"award-info":[{"award-number":["PCL2022A03"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1109\/tse.2023.3340267","type":"journal-article","created":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T19:28:58Z","timestamp":1703791738000},"page":"360-375","source":"Crossref","is-referenced-by-count":26,"title":["Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection"],"prefix":"10.1109","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2115-9921","authenticated-orcid":false,"given":"Xin-Cheng","family":"Wen","sequence":"first","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8513-6836","authenticated-orcid":false,"given":"Cuiyun","family":"Gao","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5523-809X","authenticated-orcid":false,"given":"Jiaxin","family":"Ye","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8370-644X","authenticated-orcid":false,"given":"Yichen","family":"Li","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9409-5359","authenticated-orcid":false,"given":"Zhihong","family":"Tian","sequence":"additional","affiliation":[{"name":"Guangzhou University, Guangzhou, China"}]},{"given":"Yan","family":"Jia","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3512-0649","authenticated-orcid":false,"given":"Xuan","family":"Wang","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3092566"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-128-2011"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2376"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3174003"},{"key":"ref5","article-title":"Priority one report","year":"2022"},{"key":"ref6","article-title":"Log4shell","year":"2021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315311"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2340398"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.81"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510229"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3527949"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528452"},{"key":"ref14","first-page":"10 197","article-title":"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst. 32, Annu. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Zhou","year":"2019"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510219"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3044773"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3087402"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468597"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/saner53432.2022.00073"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083143"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5844"},{"key":"ref24","first-page":"2244","article-title":"ProGraML: A graph-based program representation for data flow analysis and compiler optimizations","volume-title":"Proc. 38th Int. Conf. Mach. Learn. (ICML)","volume":"139","author":"Cummins","year":"2021"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"ref26","article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"Proc. 5th Int. Conf. Learn. Representations (ICLR)","author":"Kipf","year":"2017"},{"key":"ref27","article-title":"Gated graph sequence neural networks","volume-title":"Proc. 4th Int. Conf. Learn. Representations (ICLR)","author":"Li","year":"2016"},{"key":"ref28","article-title":"Graph attention networks","author":"Velickovic","year":"2017"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3524610.3527896"},{"issue":"6","key":"ref30","article-title":"Source code vulnerability detection based on relational graph convolution network","volume":"42","author":"Min","year":"2022","journal-title":"J. Comput. Appl."},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449986"},{"key":"ref32","article-title":"On the bottleneck of graph neural networks and its practical implications","volume-title":"Proc. 9th Int. Conf. Learn. Representations (ICLR)","author":"Alon","year":"2021"},{"key":"ref33","article-title":"GraphCodeBERT: Pre-training code representations with data flow","volume-title":"Proc. 9th Int. Conf. Learn. Representations (ICLR)","author":"Guo","year":"2021"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-020-0142-x"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11604"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2947458"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387501"},{"key":"ref38","article-title":"CWE-839: Numeric range comparison without minimum check","year":"2022"},{"key":"ref39","article-title":"CWE-476: Null pointer dereference","year":"2022"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1017\/S1351324916000334"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106552"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5469"},{"key":"ref43","article-title":"Learning to represent programs with graphs","volume-title":"Proc. 6th Int. Conf. Learn. Representations (ICLR)","author":"Allamanis","year":"2018"},{"key":"ref44","first-page":"821","article-title":"SCDetector: Software functional clone detection based on semantic tokens analysis","volume-title":"Proc. 35th IEEE\/ACM Int. Conf. Automated Softw. Eng. (ASE)","author":"Wu","year":"2020"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054857"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3001918"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2004.823672"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.14778\/3402707.3402736"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/6.4.308"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-018-0581-y"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557244"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_38"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3054471"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1807.06521"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.neuro.26.041002.131047"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-005-5724-z"},{"key":"ref57","first-page":"8024","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Proc. Adv. Neural Inf. Process. Syst. 32, Annu. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Paszke","year":"2019"},{"key":"ref58","article-title":"Deep graph library: Towards efficient and scalable deep learning on graphs","volume-title":"Proc. ICLR Workshop Representation Learn. Graphs Manifolds","author":"Wang","year":"2019"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624183"},{"issue":"11","key":"ref60","article-title":"Visualizing data using t-SNE","volume":"9","author":"der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref61","first-page":"478","article-title":"Metric learning for adversarial robustness","volume-title":"Proc. Adv. Neural Inf. Process. Syst. 32, Annu. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Mao","year":"2019"},{"key":"ref62","article-title":"Common weakness enumeratio","year":"2022"},{"key":"ref63","article-title":"2021 CWE top 25 most dangerous software weaknesses","year":"2022"},{"key":"ref64","article-title":"CWE-119: Improper restriction of operations within the bounds of a memory buffer","year":"2022"},{"key":"ref65","article-title":"CWE-20: Improper input validation","year":"2022"},{"key":"ref66","article-title":"CWE-287: Improper authentication","year":"2022"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref68","article-title":"code2seq: Generating sequences from structured representations of code","volume-title":"Proc. 7th Int. Conf. Learn. Representations (ICLR)","author":"Alon","year":"2019"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533907"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/d14-1181"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/d15-1167"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.06.042"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2019.00012"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00114"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3360588"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10473597\/10376026.pdf?arnumber=10376026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T13:05:57Z","timestamp":1711458357000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10376026\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":76,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tse.2023.3340267","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3]]}}}