{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T19:22:33Z","timestamp":1774380153788,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004775","name":"Natural Science Foundation of Gansu Province","doi-asserted-by":"publisher","award":["21JR7RA282"],"award-info":[{"award-number":["21JR7RA282"]}],"id":[{"id":"10.13039\/501100004775","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61762058"],"award-info":[{"award-number":["61762058"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Gansu Provincial Department of Education industry support project","award":["2022CYZC-38"],"award-info":[{"award-number":["2022CYZC-38"]}]},{"name":"State Grid Technology Project","award":["522722220013, W23KJ2722010"],"award-info":[{"award-number":["522722220013, W23KJ2722010"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,4]]},"DOI":"10.1145\/3609437.3609451","type":"proceedings-article","created":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T22:11:25Z","timestamp":1696543885000},"page":"185-193","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["VulD-Transformer: Source Code Vulnerability Detection via Transformer"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0350-359X","authenticated-orcid":false,"given":"Xuejun","family":"Zhang","sequence":"first","affiliation":[{"name":"Lanzhou Jiaotong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5767-0681","authenticated-orcid":false,"given":"Fenghe","family":"Zhang","sequence":"additional","affiliation":[{"name":"Lanzhou Jiaotong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7170-784X","authenticated-orcid":false,"given":"Bo","family":"Zhao","sequence":"additional","affiliation":[{"name":"State Grid Gansu Electric Power Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2675-0059","authenticated-orcid":false,"given":"Bo","family":"Zhou","sequence":"additional","affiliation":[{"name":"Lanzhou Jiaotong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0871-277X","authenticated-orcid":false,"given":"Boyang","family":"Xiao","sequence":"additional","affiliation":[{"name":"Central South University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/  [n. d.]. Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180197"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00068"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC54236.2022.00281"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106576"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3087402"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.13328\/j.cnki.jos.006696"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/648"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.37745\/ejcsit\/vol10.no1.pp23-37"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9163061"},{"key":"e_1_3_2_1_12_1","volume-title":"Graph Neural Network-based Vulnerability Predication. 2020 IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"Feng Qi","year":"2020","unstructured":"Qi Feng , Chendong Feng , and Weijiang Hong . 2020 . Graph Neural Network-based Vulnerability Predication. 2020 IEEE International Conference on Software Maintenance and Evolution (ICSME) (2020), 800\u2013801. Qi Feng, Chendong Feng, and Weijiang Hong. 2020. Graph Neural Network-based Vulnerability Predication. 2020 IEEE International Conference on Software Maintenance and Evolution (ICSME) (2020), 800\u2013801."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.11.053"},{"key":"e_1_3_2_1_15_1","volume-title":"GraphCodeBERT: Pre-training Code Representations with Data Flow. In 9th International Conference on Learning Representations. OpenReview.net. https:\/\/openreview.net\/forum?id=jLoC4ez43PZ","author":"Guo Daya","year":"2021","unstructured":"Daya Guo , Shuo Ren , Shuai Lu , Zhangyin Feng , Duyu Tang , Shujie Liu , Long Zhou , Nan Duan , Alexey Svyatkovskiy , Shengyu Fu , Michele Tufano , Shao\u00a0Kun Deng , Colin\u00a0 B. Clement , Dawn Drain , Neel Sundaresan , Jian Yin , Daxin Jiang , and Ming Zhou . 2021 . GraphCodeBERT: Pre-training Code Representations with Data Flow. In 9th International Conference on Learning Representations. OpenReview.net. https:\/\/openreview.net\/forum?id=jLoC4ez43PZ Daya Guo, Shuo Ren, Shuai Lu, Zhangyin Feng, Duyu Tang, Shujie Liu, Long Zhou, Nan Duan, Alexey Svyatkovskiy, Shengyu Fu, Michele Tufano, Shao\u00a0Kun Deng, Colin\u00a0B. Clement, Dawn Drain, Neel Sundaresan, Jian Yin, Daxin Jiang, and Ming Zhou. 2021. GraphCodeBERT: Pre-training Code Representations with Data Flow. In 9th International Conference on Learning Representations. OpenReview.net. https:\/\/openreview.net\/forum?id=jLoC4ez43PZ"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-2068"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2017.42"},{"key":"e_1_3_2_1_18_1","first-page":"2040","article-title":"Survey of software vulnerability mining methods based on machine learning","volume":"31","author":"Li Yun","year":"2020","unstructured":"Yun Li , Chenlin Huang , Zhongfeng Wang , Lu Yuan , and Xiaochuan Wang . 2020 . Survey of software vulnerability mining methods based on machine learning . Journal of Software 31 , 7 (2020), 2040 \u2013 2061 . Yun Li, Chenlin Huang, Zhongfeng Wang, Lu Yuan, and Xiaochuan Wang. 2020. Survey of software vulnerability mining methods based on machine learning. Journal of Software 31, 7 (2020), 2040\u20132061.","journal-title":"Journal of Software"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360588"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"e_1_3_2_1_21_1","volume-title":"VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. ArXiv abs\/1801.01681","author":"Li Z.","year":"2018","unstructured":"Z. Li , Deqing Zou , Shouhuai Xu , Xinyu Ou , Hai Jin , Sujuan Wang , Zhijun Deng , and Yuyi Zhong . 2018. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. ArXiv abs\/1801.01681 ( 2018 ). Z. Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, and Yuyi Zhong. 2018. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. ArXiv abs\/1801.01681 (2018)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2821768"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813604"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276517"},{"key":"e_1_3_2_1_25_1","unstructured":"Alec Radford and Karthik Narasimhan. 2018. Improving Language Understanding by Generative Pre-Training.  Alec Radford and Karthik Narasimhan. 2018. Improving Language Understanding by Generative Pre-Training."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1458"},{"key":"e_1_3_2_1_28_1","volume-title":"The Economic Impacts of Inadequate Infrastructure for Software Testing","author":"Gregory Tassey","year":"2002","unstructured":"Tassey and Gregory . 2002. The Economic Impacts of Inadequate Infrastructure for Software Testing . National Institute of Standards and Technology ( 2002 ). Tassey and Gregory. 2002. The Economic Impacts of Inadequate Infrastructure for Software Testing. National Institute of Standards and Technology (2002)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567985"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/3295222.3295349"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2020.01.001"},{"key":"e_1_3_2_1_32_1","first-page":"2065","article-title":"Review and outlook of information security vulnerability analysis","volume":"49","author":"Wu Shizhong","year":"2009","unstructured":"Shizhong Wu . 2009 . Review and outlook of information security vulnerability analysis . Journal of Tsinghua University (Science and Technology) 49 (2009), 2065 \u2013 2072 . Shizhong Wu. 2009. Review and outlook of information security vulnerability analysis. Journal of Tsinghua University (Science and Technology) 49 (2009), 2065\u20132072.","journal-title":"Journal of Tsinghua University (Science and Technology)"},{"key":"e_1_3_2_1_33_1","first-page":"1309","article-title":"Progress in software vulnerability analysis technology","volume":"52","author":"Wu Shizhong","year":"2012","unstructured":"Shizhong Wu , Tao Guo , Guowei Dong , and Jiajie Wang . 2012 . Progress in software vulnerability analysis technology . Journal of Tsinghua University (Science and Technology) 52 , 10 (2012), 1309 \u2013 1319 . Shizhong Wu, Tao Guo, Guowei Dong, and Jiajie Wang. 2012. Progress in software vulnerability analysis technology. Journal of Tsinghua University (Science and Technology) 52, 10 (2012), 1309\u20131319.","journal-title":"Journal of Tsinghua University (Science and Technology)"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 5th USENIX Conference on Offensive Technologies","author":"Yamaguchi Fabian","year":"2011","unstructured":"Fabian Yamaguchi , Felix Lindner , and Konrad Rieck . 2011 . Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning . In Proceedings of the 5th USENIX Conference on Offensive Technologies ( San Francisco, CA) (WOOT\u201911). USENIX Association, USA, 13. Fabian Yamaguchi, Felix Lindner, and Konrad Rieck. 2011. Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning. In Proceedings of the 5th USENIX Conference on Offensive Technologies (San Francisco, CA) (WOOT\u201911). USENIX Association, USA, 13."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W54100.2022.00039"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME52107.2021.00044"},{"key":"e_1_3_2_1_37_1","first-page":"32","volume-title":"NIPS Proceedings - Advances in Neural Information Processing Systems 32 (NIPS 2019)","author":"Zhou Yaqin","year":"2019","unstructured":"Yaqin Zhou , Shangqing Liu , Jingkai Siow , Xiaoning Du , and Yang Liu . 2019 . Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks . In NIPS Proceedings - Advances in Neural Information Processing Systems 32 (NIPS 2019) (Advances in Neural Information Processing Systems, Vol.\u00a032). Neural Information Processing Systems (NIPS). https:\/\/nips.cc\/Conferences\/ 2019, https:\/\/papers.nips.cc\/book\/advances-in-neural-information-processing-systems- 32 - 2019 Yaqin Zhou, Shangqing Liu, Jingkai Siow, Xiaoning Du, and Yang Liu. 2019. Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks. In NIPS Proceedings - Advances in Neural Information Processing Systems 32 (NIPS 2019)(Advances in Neural Information Processing Systems, Vol.\u00a032). Neural Information Processing Systems (NIPS). https:\/\/nips.cc\/Conferences\/2019, https:\/\/papers.nips.cc\/book\/advances-in-neural-information-processing-systems-32-2019"}],"event":{"name":"Internetware 2023: 14th Asia-Pacific Symposium on Internetware","location":"Hangzhou China","acronym":"Internetware 2023"},"container-title":["Proceedings of the 14th Asia-Pacific Symposium on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609437.3609451","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3609437.3609451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:24Z","timestamp":1750178784000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609437.3609451"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":37,"alternative-id":["10.1145\/3609437.3609451","10.1145\/3609437"],"URL":"https:\/\/doi.org\/10.1145\/3609437.3609451","relation":{},"subject":[],"published":{"date-parts":[[2023,8,4]]},"assertion":[{"value":"2023-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}