{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:39Z","timestamp":1750220199754,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T00:00:00Z","timestamp":1654905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172194 and U1836116"],"award-info":[{"award-number":["62172194 and U1836116"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,11]]},"DOI":"10.1145\/3545258.3545283","type":"proceedings-article","created":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T16:09:39Z","timestamp":1663258179000},"page":"212-220","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An adaptive search optimization algorithm for improving the detection capability of software vulnerability"],"prefix":"10.1145","author":[{"given":"Bo","family":"Liu","sequence":"first","affiliation":[{"name":"Jiangsu University, China"}]},{"given":"Jinfu","family":"Chen","sequence":"additional","affiliation":[{"name":"Jiangsu University, China"}]},{"given":"Weijia","family":"Wang","sequence":"additional","affiliation":[{"name":"Jiangsu University, China"}]},{"given":"Saihua","family":"Cai","sequence":"additional","affiliation":[{"name":"Jiangsu university, China"}]},{"given":"Jingyi","family":"Chen","sequence":"additional","affiliation":[{"name":"Jiangsu University, China"}]},{"given":"Qiaowei","family":"Feng","sequence":"additional","affiliation":[{"name":"Jiangsu university, China"}]}],"member":"320","published-online":{"date-parts":[[2022,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"AIdetectorX: A Vulnerability Detector Based on TCN and Self-attention Mechanism. In International Symposium on Dependable Software Engineering: Theories, Tools, and Applications. 161\u2013177","author":"Chen Jinfu","year":"2021","unstructured":"Jinfu Chen , Bo Liu , Saihua Cai , Weijia Wang , and Shengran Wang . 2021 . AIdetectorX: A Vulnerability Detector Based on TCN and Self-attention Mechanism. In International Symposium on Dependable Software Engineering: Theories, Tools, and Applications. 161\u2013177 . Jinfu Chen, Bo Liu, Saihua Cai, Weijia Wang, and Shengran Wang. 2021. AIdetectorX: A Vulnerability Detector Based on TCN and Self-attention Mechanism. In International Symposium on Dependable Software Engineering: Theories, Tools, and Applications. 161\u2013177."},{"key":"e_1_3_2_1_2_1","unstructured":"Jacob\u00a0A Harer Louis\u00a0Y Kim Rebecca\u00a0L Russell 2018. Automated software vulnerability detection with machine learning. arXiv preprint arXiv:1803.04497(2018).  Jacob\u00a0A Harer Louis\u00a0Y Kim Rebecca\u00a0L Russell 2018. Automated software vulnerability detection with machine learning. arXiv preprint arXiv:1803.04497(2018)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.62"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49409-8_7"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337260"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2821768"},{"key":"e_1_3_2_1_8_1","volume-title":"CD-VulD: Cross-domain vulnerability discovery based on deep domain adaptation","author":"Liu Shigang","year":"2020","unstructured":"Shigang Liu , Guanjun Lin , Lizhen Qu , Jun Zhang , Olivier De\u00a0Vel , Paul Montague , and Yang Xiang . 2020. CD-VulD: Cross-domain vulnerability discovery based on deep domain adaptation . IEEE Transactions on Dependable and Secure Computing ( 2020 ), 1\u201314. Shigang Liu, Guanjun Lin, Lizhen Qu, Jun Zhang, Olivier De\u00a0Vel, Paul Montague, and Yang Xiang. 2020. CD-VulD: Cross-domain vulnerability discovery based on deep domain adaptation. IEEE Transactions on Dependable and Secure Computing (2020), 1\u201314."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1109\/TSMCB.2008.2007853","article-title":"Exploratory undersampling for class-imbalance learning","volume":"39","author":"Liu Xu-Ying","year":"2008","unstructured":"Xu-Ying Liu , Jianxin Wu , and Zhi-Hua Zhou . 2008 . Exploratory undersampling for class-imbalance learning . IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 39 , 2(2008), 539 \u2013 550 . Xu-Ying Liu, Jianxin Wu, and Zhi-Hua Zhou. 2008. Exploratory undersampling for class-imbalance learning. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 39, 2(2008), 539\u2013550.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)"},{"key":"e_1_3_2_1_10_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg\u00a0S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111\u20133119.  Tomas Mikolov Ilya Sutskever Kai Chen Greg\u00a0S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111\u20133119."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813604"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2340398"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.04.002"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11928"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/3295222.3295349"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.32"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.54"}],"event":{"name":"Internetware 2022: 13th Asia-Pacific Symposium on Internetware","acronym":"Internetware 2022","location":"Hohhot China"},"container-title":["Proceedings of the 13th Asia-Pacific Symposium on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545258.3545283","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545258.3545283","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:45Z","timestamp":1750186965000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545258.3545283"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,11]]},"references-count":18,"alternative-id":["10.1145\/3545258.3545283","10.1145\/3545258"],"URL":"https:\/\/doi.org\/10.1145\/3545258.3545283","relation":{},"subject":[],"published":{"date-parts":[[2022,6,11]]},"assertion":[{"value":"2022-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}