{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T00:52:24Z","timestamp":1775523144240,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T00:00:00Z","timestamp":1653091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61872312, 61972335, 62002309G@61902329"],"award-info":[{"award-number":["61872312, 61972335, 62002309G@61902329"]}]},{"name":"Yangzhou University Top-level Talents Support Program"},{"name":"Yangzhou city-Yangzhou University Science and Technology Cooperation Fund Project","award":["YZ2021157"],"award-info":[{"award-number":["YZ2021157"]}]},{"name":"Six Talent Peaks Project in Jiangsu Province","award":["RJFW-053"],"award-info":[{"award-number":["RJFW-053"]}]},{"name":"Jiangsu \"333\" Project"},{"name":"Natural Science Foundation of the Jiangsu Higher Education Institutions of China","award":["20KJB520016"],"award-info":[{"award-number":["20KJB520016"]}]},{"name":"Open Funds of State Key Laboratory for Novel Software Technology of Nanjing University","award":["KFKT2020B15, KFKT2020B16"],"award-info":[{"award-number":["KFKT2020B15, KFKT2020B16"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,21]]},"DOI":"10.1145\/3510003.3510219","type":"proceedings-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T22:42:59Z","timestamp":1657060979000},"page":"1456-1468","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":99,"title":["MVD"],"prefix":"10.1145","author":[{"given":"Sicong","family":"Cao","sequence":"first","affiliation":[{"name":"Yangzhou University, Yangzhou, China"}]},{"given":"Xiaobing","family":"Sun","sequence":"additional","affiliation":[{"name":"Yangzhou University, Yangzhou, China"}]},{"given":"Lili","family":"Bo","sequence":"additional","affiliation":[{"name":"Yangzhou University, Yangzhou, China"}]},{"given":"Rongxin","family":"Wu","sequence":"additional","affiliation":[{"name":"Xiamen University, Xiamen, China"}]},{"given":"Bin","family":"Li","sequence":"additional","affiliation":[{"name":"Yangzhou University, Yangzhou, China"}]},{"given":"Chuanqi","family":"Tao","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview.net.","author":"Allamanis Miltiadis","year":"2018","unstructured":"Miltiadis Allamanis, Marc Brockschmidt, and Mahmoud Khademi. 2018. Learning to Represent Programs with Graphs. In 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview.net."},{"key":"e_1_3_2_1_2_1","unstructured":"August. 2021 (last accessed). Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"August. 2021 (last accessed). Common Weakness Enumeration. https:\/\/cwe.mitre.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"August. 2021 (last accessed). CVE-2016-10200. https:\/\/github.com\/torvalds\/linux\/commit\/32c231164b762dddefa13af5a0101032c70b50ef."},{"key":"e_1_3_2_1_5_1","unstructured":"August. 2021 (last accessed). CVE-2019-15920. https:\/\/github.com\/torvalds\/linux\/commit\/088aaf17aa79300cab14dbee2569c58cfafd7d6e."},{"key":"e_1_3_2_1_6_1","unstructured":"August. 2021 (last accessed). CVE-2019-19083. https:\/\/github.com\/torvalds\/linux\/commit\/055e547478a11a6360c7ce05e2afc3e366968a12."},{"key":"e_1_3_2_1_7_1","unstructured":"August. 2021 (last accessed). CVE-2019-19448. https:\/\/github.com\/bobfuzzer\/CVE\/tree\/master\/CVE-2019-19448."},{"key":"e_1_3_2_1_8_1","unstructured":"August. 2021 (last accessed). Flawfinder. http:\/\/www.dwheeler.com\/flawfinder."},{"key":"e_1_3_2_1_9_1","unstructured":"August. 2021 (last accessed). Infer. https:\/\/fbinfer.com."},{"key":"e_1_3_2_1_10_1","unstructured":"August. 2021 (last accessed). Linux Kernel. https:\/\/www.kernel.org\/."},{"key":"e_1_3_2_1_11_1","unstructured":"August. 2021 (last accessed). PyTorch. https:\/\/pytorch.org\/."},{"key":"e_1_3_2_1_12_1","unstructured":"August. 2021 (last accessed). Rough Audit Tool for Security. https:\/\/code.google.com\/archive\/p\/rough-auditing-tool-for-security."},{"key":"e_1_3_2_1_13_1","unstructured":"August. 2021 (last accessed). Software Assurance Reference Dataset. https:\/\/samate.nist.gov\/SARD\/index.php."},{"key":"e_1_3_2_1_14_1","volume-title":"Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems","author":"Bordes Antoine","year":"2013","unstructured":"Antoine Bordes, Nicolas Usunier, Alberto Garc\u00eda-Dur\u00e1n, Jason Weston, and Oksana Yakhnenko. 2013. Translating Embeddings for Modeling Multi-relational Data. In Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held December 5--8, 2013, Lake Tahoe, Nevada, United States. 2787--2795."},{"key":"e_1_3_2_1_15_1","volume-title":"Memory. In Proceedings of the CGO 2011, The 9th International Symposium on Code Generation and Optimization","author":"Bruening Derek","year":"2011","unstructured":"Derek Bruening and Qin Zhao. 2011. Practical memory checking with Dr. Memory. In Proceedings of the CGO 2011, The 9th International Symposium on Code Generation and Optimization, Chamonix, France, April 2--6, 2011. IEEE Computer Society, 213--223."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106576"},{"key":"e_1_3_2_1_17_1","volume-title":"Deep Learning based Vulnerability Detection: Are We There Yet? arXiv preprint arXiv:2009.07235","author":"Chakraborty Saikat","year":"2020","unstructured":"Saikat Chakraborty, Rahul Krishna, Yangruibo Ding, and Baishakhi Ray. 2020. Deep Learning based Vulnerability Detection: Are We There Yet? arXiv preprint arXiv:2009.07235 (2020)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464807"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3436877"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250789"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering -","volume":"1","author":"James","year":"2010","unstructured":"James A. Clause and Alessandro Orso. 2010. LEAKPOINT: pinpointing the causes of memory leaks. In Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering - Volume 1, ICSE 2010, Cape Town, South Africa, 1--8 May 2010. ACM, 515--524."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2881961"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00025"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387501"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"e_1_3_2_1_27_1","volume-title":"Learning To Predict Vulnerabilities From Vulnerability-Fixes: A Machine Translation Approach. arXiv preprint arXiv:2012.11701","author":"Garg Aayush","year":"2020","unstructured":"Aayush Garg, Renzo Degiovanni, Matthieu Jimenez, Maxime Cordy, Mike Papadakis, and Yves Le Traon. 2020. Learning To Predict Vulnerabilities From Vulnerability-Fixes: A Machine Translation Approach. arXiv preprint arXiv:2012.11701 (2020)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.11.053"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196454"},{"key":"e_1_3_2_1_30_1","volume-title":"Joint Prediction of Multiple Vulnerability Characteristics Through Multi-Task Learning. In 24th International Conference on Engineering of Complex Computer Systems, ICECCS 2019","author":"Gong Xi","year":"2019","unstructured":"Xi Gong, Zhenchang Xing, Xiaohong Li, Zhiyong Feng, and Zhuobing Han. 2019. Joint Prediction of Multiple Vulnerability Characteristics Through Multi-Task Learning. In 24th International Conference on Engineering of Complex Computer Systems, ICECCS 2019, Guangzhou, China, November 10--13, 2019. IEEE, 31--40."},{"key":"e_1_3_2_1_31_1","volume-title":"28th International Conference on Software Engineering (ICSE 2006","author":"David","year":"2006","unstructured":"David L. Heine and Monica S. Lam. 2006. Static detection of leaks in polymorphic containers. In 28th International Conference on Software Engineering (ICSE 2006), Shanghai, China, May 20--28, 2006. ACM, 252--261."},{"key":"e_1_3_2_1_32_1","first-page":"28","article-title":"SPEC CPU2000","volume":"33","author":"Henning John L.","year":"2000","unstructured":"John L. Henning. 2000. SPEC CPU2000: Measuring CPU Performance in the New Millennium. Computer 33, 7 (2000), 28--35.","journal-title":"Measuring CPU Performance in the New Millennium. Computer"},{"key":"e_1_3_2_1_33_1","volume-title":"Williams","author":"Imtiaz Nasif","year":"2021","unstructured":"Nasif Imtiaz and Laurie A. Williams. 2021. Memory Error Detection in Security Testing. arXiv preprint arXiv:2104.04385 (2021)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430475.2430494"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568311"},{"key":"e_1_3_2_1_36_1","volume-title":"Adam: A Method for Stochastic Optimization. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7--9, 2015, Conference Track Proceedings.","author":"Diederik","unstructured":"Diederik P. Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7--9, 2015, Conference Track Proceedings."},{"key":"e_1_3_2_1_37_1","volume-title":"Kipf and Max Welling","author":"Thomas","year":"2017","unstructured":"Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In 5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24--26, 2017, Conference Track Proceedings. OpenReview.net."},{"key":"e_1_3_2_1_38_1","volume-title":"TACAS 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5--13, 2014. Proceedings (Lecture Notes in Computer Science","volume":"391","author":"Kroening Daniel","year":"2014","unstructured":"Daniel Kroening and Michael Tautschnig. 2014. CBMC - C Bounded Model Checker - (Competition Contribution). In Tools and Algorithms for the Construction and Analysis of Systems - 20th International Conference, TACAS 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5--13, 2014. Proceedings (Lecture Notes in Computer Science, Vol. 8413). Springer, 389--391."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 31th International Conference on Machine Learning, ICML 2014, Beijing, China, 21--26 June 2014 (JMLR Workshop and Conference Proceedings","volume":"1196","author":"Quoc","unstructured":"Quoc V. Le and Tom\u00e1s Mikolov. 2014. Distributed Representations of Sentences and Documents. In Proceedings of the 31th International Conference on Machine Learning, ICML 2014, Beijing, China, 21--26 June 2014 (JMLR Workshop and Conference Proceedings, Vol. 32). JMLR.org, 1188--1196."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417923"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276511"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381915"},{"key":"e_1_3_2_1_43_1","volume-title":"Gated Graph Sequence Neural Networks. In 4th International Conference on Learning Representations, ICLR 2016, San Juan, Puerto Rico, May 2--4, 2016, Conference Track Proceedings.","author":"Li Yujia","unstructured":"Yujia Li, Daniel Tarlow, Marc Brockschmidt, and Richard S. Zemel. 2016. Gated Graph Sequence Neural Networks. In 4th International Conference on Learning Representations, ICLR 2016, San Juan, Puerto Rico, May 2--4, 2016, Conference Track Proceedings."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468597"},{"key":"e_1_3_2_1_45_1","volume-title":"SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. arXiv preprint arXiv:1807.06756","author":"Li Zhen","year":"2018","unstructured":"Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen, Sujuan Wang, and Jialai Wang. 2018. SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. arXiv preprint arXiv:1807.06756 (2018)."},{"key":"e_1_3_2_1_46_1","volume-title":"VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Li Zhen","year":"2018","unstructured":"Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, and Yuyi Zhong. 2018. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18--21, 2018. The Internet Society."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 38th International Conference on Software Engineering, ICSE 2016","author":"Liu Tongping","year":"2016","unstructured":"Tongping Liu, Charlie Curtsinger, and Emery D. Berger. 2016. DoubleTake: fast and precise error detection via evidence-based dynamic analysis. In Proceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14--22, 2016. ACM, 911--922."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468580"},{"key":"e_1_3_2_1_49_1","volume-title":"28th USENIX Security Symposium, USENIX Security 2019","author":"Lu Kangjie","year":"2019","unstructured":"Kangjie Lu, Aditya Pakki, and Qiushi Wu. 2019. Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints Inferences. In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14--16, 2019. USENIX Association, 1769--1786."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106614"},{"key":"e_1_3_2_1_52_1","volume-title":"13th International Symposium, SAS 2006, Seoul, Korea, August 29--31, 2006, Proceedings (Lecture Notes in Computer Science","volume":"424","author":"Orlovich Maksim","year":"2006","unstructured":"Maksim Orlovich and Radu Rugina. 2006. Memory Leak Analysis by Contradiction. In Static Analysis, 13th International Symposium, SAS 2006, Seoul, Korea, August 29--31, 2006, Proceedings (Lecture Notes in Computer Science, Vol. 4134). Springer, 405--424."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1979.234183"},{"key":"e_1_3_2_1_54_1","volume-title":"ESWC 2018, Heraklion, Crete, Greece, June 3--7, 2018, Proceedings (Lecture Notes in Computer Science","volume":"607","author":"Schlichtkrull Michael Sejr","unstructured":"Michael Sejr Schlichtkrull, Thomas N. Kipf, Peter Bloem, Rianne van den Berg, Ivan Titov, and Max Welling. 2018. Modeling Relational Data with Graph Convolutional Networks. In The Semantic Web - 15th International Conference, ESWC 2018, Heraklion, Crete, Greece, June 3--7, 2018, Proceedings (Lecture Notes in Computer Science, Vol. 10843). Springer, 593--607."},{"key":"e_1_3_2_1_55_1","volume-title":"AddressSanitizer: A Fast Address Sanity Checker. In 2012 USENIX Annual Technical Conference","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker. In 2012 USENIX Annual Technical Conference, Boston, MA, USA, June 13--15, 2012. USENIX Association, 309--318."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192418"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1971.4308316"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2810116"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09931-7"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336784"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2302311"},{"key":"e_1_3_2_1_62_1","volume-title":"How security bugs are fixed and what can be improved: an empirical study with Mozilla. Sci. China Inf. Sci. 62, 1","author":"Sun Xiaobing","year":"2019","unstructured":"Xiaobing Sun, Xin Peng, Kai Zhang, Yang Liu, and Yuanfang Cai. 2019. How security bugs are fixed and what can be improved: an empirical study with Mozilla. Sci. China Inf. Sci. 62, 1 (2019), 19102:1--19102:3."},{"key":"e_1_3_2_1_63_1","volume-title":"SoK: Eternal War in Memory. In 2013 IEEE Symposium on Security and Privacy, SP 2013","author":"Szekeres Laszlo","year":"2013","unstructured":"Laszlo Szekeres, Mathias Payer, Tao Wei, and Dawn Song. 2013. SoK: Eternal War in Memory. In 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19--22, 2013. IEEE Computer Society, 48--62."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3044773"},{"key":"e_1_3_2_1_65_1","volume-title":"Detecting Code Clones with Graph Neural Network and Flow-Augmented Abstract Syntax Tree. In 27th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2020","author":"Wang Wenhan","year":"2020","unstructured":"Wenhan Wang, Ge Li, Bo Ma, Xin Xia, and Zhi Jin. 2020. Detecting Code Clones with Graph Neural Network and Flow-Augmented Abstract Syntax Tree. In 27th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2020, London, ON, Canada, February 18--21, 2020. IEEE, 261--271."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2376"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"e_1_3_2_1_68_1","volume-title":"Modeling and Discovering Vulnerabilities with Code Property Graphs. In 2014 IEEE Symposium on Security and Privacy, SP 2014","author":"Yamaguchi Fabian","year":"2014","unstructured":"Fabian Yamaguchi, Nico Golde, Daniel Arp, and Konrad Rieck. 2014. Modeling and Discovering Vulnerabilities with Code Property Graphs. In 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18--21, 2014. IEEE Computer Society, 590--604."},{"key":"e_1_3_2_1_69_1","volume-title":"GraphSMOTE: Imbalanced Node Classification on Graphs with Graph Neural Networks. In WSDM '21, The Fourteenth ACM International Conference on Web Search and Data Mining","author":"Zhao Tianxiang","year":"2021","unstructured":"Tianxiang Zhao, Xiang Zhang, and Suhang Wang. 2021. GraphSMOTE: Imbalanced Node Classification on Graphs with Graph Neural Networks. In WSDM '21, The Fourteenth ACM International Conference on Web Search and Data Mining, Virtual Event, Israel, March 8--12, 2021. ACM, 833--841."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.07.003"},{"key":"e_1_3_2_1_71_1","volume-title":"Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019","author":"Zhou Yaqin","year":"2019","unstructured":"Yaqin Zhou, Shangqing Liu, Jing Kai Siow, Xiaoning Du, and Yang Liu. 2019. Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks. In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, 8--14 December 2019, Vancouver, BC, Canada. 10197--10207."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2942930"}],"event":{"name":"ICSE '22: 44th International Conference on Software Engineering","location":"Pittsburgh Pennsylvania","acronym":"ICSE '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 44th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510219","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510003.3510219","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:24Z","timestamp":1750191144000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510219"}},"subtitle":["memory-related vulnerability detection based on flow-sensitive graph neural networks"],"short-title":[],"issued":{"date-parts":[[2022,5,21]]},"references-count":72,"alternative-id":["10.1145\/3510003.3510219","10.1145\/3510003"],"URL":"https:\/\/doi.org\/10.1145\/3510003.3510219","relation":{},"subject":[],"published":{"date-parts":[[2022,5,21]]},"assertion":[{"value":"2022-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}