{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T13:00:49Z","timestamp":1777899649512,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T00:00:00Z","timestamp":1670544000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,9]]},"DOI":"10.1145\/3598438.3598452","type":"proceedings-article","created":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T22:11:59Z","timestamp":1687817519000},"page":"90-95","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An Effective Software Vulnerability Detection Method Based On Devised Deep-Learning Model To Fix The Vague Separation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-3600-1586","authenticated-orcid":false,"given":"Yuankun","family":"Liu","sequence":"first","affiliation":[{"name":"North University of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7154-2440","authenticated-orcid":false,"given":"Yu","family":"Wang","sequence":"additional","affiliation":[{"name":"China Institute for Reform and Development, China and \rWorkers' Daily, China"}]}],"member":"320","published-online":{"date-parts":[[2023,6,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.159"},{"key":"e_1_3_2_1_2_1","first-page":"501","volume-title":"Shanghai","author":"LaToza TD","year":"2006","unstructured":"LaToza TD, Venolia G, DeLine R (2006) Maintaining mental models: a study of developer work habits. In: Osterweil LJ, Rombach HD, Soffa ML (eds) 28th International Conference on Software Engineering (ICSE 2006), Shanghai, China, May 20-28, 2006, ACM, pp 492\u2013501, DOI 10. 1145\/1134285.1134355"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381915"},{"key":"e_1_3_2_1_4_1","first-page":"224","volume-title":"OSDI 2008, December 8-10, 2008, San Diego, California, USA, Proceedings, USENIX Association","author":"Cadar C","year":"2008","unstructured":"Cadar C, Dunbar D, Engler DR (2008) KLEE: unassisted and automatic generation of highcoverage tests for complex systems programs. In: Draves R, van Renesse R (eds) 8th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2008, December 8-10, 2008, San Diego, California, USA, Proceedings, USENIX Association, pp 209\u2013224."},{"key":"e_1_3_2_1_5_1","first-page":"847","volume-title":"ICSE 2012","author":"Hindle A","year":"2012","unstructured":"Hindle A, Barr ET, Su Z, Gabel M, Devanbu PT (2012) On the naturalness of software. In: Glinz M, Murphy GC, Pezz\u00e8 M (eds) 34th International Conference on Software Engineering, ICSE 2012, June 2-9, 2012, Zurich, Switzerland, IEEE Computer Society, pp 837\u2013847, DOI 10.1109\/ICSE.2012.6227135"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111283"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10804"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3527949"},{"key":"e_1_3_2_1_11_1","first-page":"1547","volume-title":"Online Event, 1620 November 2020, Association for Computational Linguistics, Findings of ACL, vol EMNLP 2020","author":"Feng Z","year":"2020","unstructured":"Feng Z, Guo D, Tang D, Duan N, Feng X, Gong M, Shou L, Qin B, Liu T, Jiang D, Zhou M (2020) Codebert: A pre-trained model for programming and natural languages. In: Cohn T, He Y, Liu Y (eds) Findings of the Association for Computational Linguistics: EMNLP 2020, Online Event, 1620 November 2020, Association for Computational Linguistics, Findings of ACL, vol EMNLP 2020, pp 1536\u20131547, DOI 10.18653\/v1\/2020.findings-emnlp.139"},{"key":"e_1_3_2_1_12_1","first-page":"10207","volume-title":"Wallach HM, Larochelle H, Beygelzimer A, d'Alch\u00e9-Buc F, Fox EB, Garnett R (eds) Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems","author":"Zhou Y","year":"2019","unstructured":"Zhou Y, Liu S, Siow JK, Du X, Liu Y (2019) Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks. In: Wallach HM, Larochelle H, Beygelzimer A, d'Alch\u00e9-Buc F, Fox EB, Garnett R (eds) Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada, pp 10197\u201310207."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"e_1_3_2_1_14_1","first-page":"1179","volume-title":"Cortes C","author":"Bengio S","year":"2015","unstructured":"Bengio S, Vinyals O, Jaitly N, Shazeer N (2015) Scheduled sampling for sequence prediction with recurrent neural networks. In: Cortes C, Lawrence ND, Lee DD, Sugiyama M, Garnett R (eds) Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada, pp 1171\u20131179."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"e_1_3_2_1_16_1","first-page":"2680","volume-title":"Ghahramani Z, Welling M, Cortes C","author":"Goodfellow IJ","year":"2014","unstructured":"Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville AC, Bengio Y (2014) Generative adversarial nets. In: Ghahramani Z, Welling M, Cortes C, Lawrence ND, Weinberger KQ (eds) Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, December 8-13 2014, Montreal, Quebec, Canada, pp 2672\u20132680."},{"key":"e_1_3_2_1_17_1","volume-title":"Generative adversarial networks for text","author":"Goodfellow IJ","year":"2016","unstructured":"Goodfellow IJ (2016) Generative adversarial networks for text, http:\/\/goo.gl\/Wg9DR7"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992696"},{"key":"e_1_3_2_1_19_1","volume-title":"Understanding lstm networks, github blo","author":"Olah C","year":"2015","unstructured":"Olah C (2015) Understanding lstm networks, github blo, vol. 27, aug. 2015, http:\/\/goo.gl\/Wg9DR7"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2012.2186810"},{"key":"e_1_3_2_1_21_1","volume-title":"A sensitivity analysis of (and practitioners","author":"Zhang Y","year":"2015","unstructured":"Zhang Y, Wallace B (2015) A sensitivity analysis of (and practitioners\u2019 guide to) convolutional neural networks for sentence classification. arXiv preprint arXiv:151003820"},{"key":"e_1_3_2_1_22_1","volume-title":"DOI 10.1145\/3417978","author":"Qiu J","year":"2021","unstructured":"Qiu J, Zhang J, Luo W, Pan L, Nepal S, Xiang Y (2021) A survey of android malware detection with deep neural models. ACM Comput Surv 53(6):126:1\u2013126:36, DOI 10.1145\/3417978"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-05954-3"},{"key":"e_1_3_2_1_24_1","first-page":"1751, DOI 10.31","volume-title":"EMNLP 2014, October 25-29, 2014, Doha, Qatar, A meeting of SIGDAT, a Special Interest Group of the ACL, ACL","author":"Kim Y","year":"2014","unstructured":"Kim Y (2014) Convolutional neural networks for sentence classification. In: Moschitti A, Pang B, Daelemans W (eds) Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, EMNLP 2014, October 25-29, 2014, Doha, Qatar, A meeting of SIGDAT, a Special Interest Group of the ACL, ACL, pp 1746\u20131751, DOI 10.3115\/v1\/d14-1181"},{"key":"e_1_3_2_1_25_1","series-title":"Lecture Notes in Computer Science","first-page":"711","volume-title":"Lauw HW, Wong RC, Ntoulas A, Lim E, Ng S, Pan SJ (eds) Advances in Knowledge Discovery and Data Mining - 24th Pacific-Asia Conference, PAKDD","author":"Nguyen V","year":"2020","unstructured":"Nguyen V, Le T, de Vel OY, Montague P, Grundy JC, Phung D (2020) Dual-component deep domain adaptation: A new approach for cross project software vulnerability detection. In: Lauw HW, Wong RC, Ntoulas A, Lim E, Ng S, Pan SJ (eds) Advances in Knowledge Discovery and Data Mining - 24th Pacific-Asia Conference, PAKDD 2020, Singapore, May 11-14, 2020, Proceedings, Part I, Springer, Lecture Notes in Computer Science, vol 12084, pp 699\u2013711, DOI 10.1007\/978-3-030-47426-3\\_54"},{"key":"e_1_3_2_1_26_1","first-page":"368","volume-title":"ACSAC 2012","author":"Yamaguchi F","year":"2012","unstructured":"Yamaguchi F, Lottmann M, Rieck K (2012) Generalized vulnerability extrapolation using abstract syntax trees. In: Zakon RH (ed) 28th Annual Computer Security Applications Conference, ACSAC 2012, Orlando, FL, USA, 37 December 2012, ACM, pp 359\u2013368. DOI 10. 1145\/2420950.2421003"},{"key":"e_1_3_2_1_27_1","first-page":"13","volume-title":"WCRE\u201901","author":"Moonen L","year":"2001","unstructured":"Moonen L (2001) Generating robust parsers using island grammars. In: Burd E, Aiken P, Koschke R (eds) Proceedings of the Eighth Working Conference on Reverse Engineering, WCRE\u201901, Stuttgart, Germany, October 2-5, 2001, IEEE Computer Society, p 13, DOI 10.1109\/WCRE.2001.957806"},{"key":"e_1_3_2_1_28_1","volume-title":"Deep learning based vulnerability detection: Are we there yet? CoRR abs\/2009.07235","author":"Chakraborty S","year":"2020","unstructured":"Chakraborty S, Krishna R, Ding Y, Ray B (2020) Deep learning based vulnerability detection: Are we there yet? CoRR abs\/2009.07235"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2821768"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.232"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092566"},{"issue":"2605","key":"e_1_3_2_1_32_1","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"Van der Maaten L","year":"2008","unstructured":"Van der Maaten L, Hinton G (2008) Visualizing data using t-sne. Journal of Machine Learning Research 9(2605):2579\u20132605","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"ISBDAI 2022: 2022 3rd International Symposium on Big Data and Artificial Intelligence","location":"Singapore Singapore","acronym":"ISBDAI 2022"},"container-title":["Proceedings of the 2022 3rd International Symposium on Big Data and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3598438.3598452","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3598438.3598452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:43:42Z","timestamp":1750286622000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3598438.3598452"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,9]]},"references-count":32,"alternative-id":["10.1145\/3598438.3598452","10.1145\/3598438"],"URL":"https:\/\/doi.org\/10.1145\/3598438.3598452","relation":{},"subject":[],"published":{"date-parts":[[2022,12,9]]},"assertion":[{"value":"2023-06-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}