{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T23:11:48Z","timestamp":1778195508480,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T00:00:00Z","timestamp":1629244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union's Horizon 2020","award":["825328"],"award-info":[{"award-number":["825328"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,20]]},"DOI":"10.1145\/3468264.3473122","type":"proceedings-article","created":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T01:40:37Z","timestamp":1629337237000},"page":"1565-1569","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":67,"title":["CrossVul: a cross-language vulnerability dataset with commit data"],"prefix":"10.1145","author":[{"given":"Georgios","family":"Nikitopoulos","sequence":"first","affiliation":[{"name":"University of Thessaly, Greece"}]},{"given":"Konstantina","family":"Dritsa","sequence":"additional","affiliation":[{"name":"Athens University of Economics and Business, Greece"}]},{"given":"Panos","family":"Louridas","sequence":"additional","affiliation":[{"name":"Athens University of Economics and Business, Greece"}]},{"given":"Dimitris","family":"Mitropoulos","sequence":"additional","affiliation":[{"name":"University of Athens, Greece"}]}],"member":"320","published-online":{"date-parts":[[2021,8,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"CVE - Common Vulnerability and Exposures. https:\/\/cve.mitre.org\/ [Online","year":"2021","unstructured":"[n.d.]. CVE - Common Vulnerability and Exposures. https:\/\/cve.mitre.org\/ [Online ; accessed 02- May - 2021 ]. [n.d.]. CVE - Common Vulnerability and Exposures. https:\/\/cve.mitre.org\/ [Online; accessed 02-May-2021]."},{"key":"e_1_3_2_1_2_1","volume-title":"CVSS - Common Vulnerability Scoring System SIG. https:\/\/www.first.org\/cvss\/ [Online","year":"2021","unstructured":"[n.d.]. CVSS - Common Vulnerability Scoring System SIG. https:\/\/www.first.org\/cvss\/ [Online ; accessed 02- May - 2021 ]. [n.d.]. CVSS - Common Vulnerability Scoring System SIG. https:\/\/www.first.org\/cvss\/ [Online; accessed 02-May-2021]."},{"key":"e_1_3_2_1_3_1","volume-title":"NVD - National Vulnerability Database. https:\/\/nvd.nist.gov\/ [Online","year":"2021","unstructured":"[n.d.]. NVD - National Vulnerability Database. https:\/\/nvd.nist.gov\/ [Online ; accessed 02- May - 2021 ]. [n.d.]. NVD - National Vulnerability Database. https:\/\/nvd.nist.gov\/ [Online; accessed 02-May-2021]."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387501"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196454"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380361"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10051692"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338975"},{"key":"e_1_3_2_1_9_1","unstructured":"Zhen Li Deqing Zou Shouhuai Xu Xinyu Ou Hai Jin Sujuan Wang Zhijun Deng and Yuyi Zhong. 2018. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. arXiv e-prints Article arXiv:1801.01681 Jan. arXiv:1801.01681 pages. arxiv:1801.01681.  Zhen Li Deqing Zou Shouhuai Xu Xinyu Ou Hai Jin Sujuan Wang Zhijun Deng and Yuyi Zhong. 2018. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. arXiv e-prints Article arXiv:1801.01681 Jan. arXiv:1801.01681 pages. arxiv:1801.01681."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/101306.101310"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00064"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10041270"},{"key":"e_1_3_2_1_13_1","volume-title":"McConley","author":"Russell Rebecca L.","year":"2018","unstructured":"Rebecca L. Russell , Louis Kim , Lei H. Hamilton , Tomo Lazovich , Jacob A. Harer , Onur Ozdemir , Paul M. Ellingwood , and Marc W . McConley . 2018 . Automated Vulnerability Detection in Source Code Using Deep Representation Learning. arXiv e-prints, Article arXiv:1807.04320, July, arXiv:1807.04320 pages. arxiv:1807.04320. Rebecca L. Russell, Louis Kim, Lei H. Hamilton, Tomo Lazovich, Jacob A. Harer, Onur Ozdemir, Paul M. Ellingwood, and Marc W. McConley. 2018. Automated Vulnerability Detection in Source Code Using Deep Representation Learning. arXiv e-prints, Article arXiv:1807.04320, July, arXiv:1807.04320 pages. arxiv:1807.04320."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.500-297"},{"key":"e_1_3_2_1_15_1","unstructured":"Yaqin Zhou Shangqing Liu Jingkai Siow Xiaoning Du and Yang Liu. 2019. Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks. In Advances in Neural Information Processing Systems H. Wallach H. Larochelle A. Beygelzimer F. d' Alch\u00e9-Buc E. Fox and R. Garnett (Eds.). 32 Curran Associates Inc. 10197\u201310207.  Yaqin Zhou Shangqing Liu Jingkai Siow Xiaoning Du and Yang Liu. 2019. Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks. In Advances in Neural Information Processing Systems H. Wallach H. Larochelle A. Beygelzimer F. d' Alch\u00e9-Buc E. Fox and R. Garnett (Eds.). 32 Curran Associates Inc. 10197\u201310207."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3117771"}],"event":{"name":"ESEC\/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Athens Greece","acronym":"ESEC\/FSE '21","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468264.3473122","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468264.3473122","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:22Z","timestamp":1750191442000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468264.3473122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,18]]},"references-count":16,"alternative-id":["10.1145\/3468264.3473122","10.1145\/3468264"],"URL":"https:\/\/doi.org\/10.1145\/3468264.3473122","relation":{},"subject":[],"published":{"date-parts":[[2021,8,18]]},"assertion":[{"value":"2021-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}