{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T00:52:31Z","timestamp":1775523151633,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["226-2022-00064"],"award-info":[{"award-number":["226-2022-00064"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202419"],"award-info":[{"award-number":["62202419"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ningbo Natural Science Foundation","award":["2022J184"],"award-info":[{"award-number":["2022J184"]}]},{"name":"State Street Zhejiang University Technology Center","award":[""],"award-info":[{"award-number":[""]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616358","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"1611-1622","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Distinguishing Look-Alike Innocent and Vulnerable Code by Subtle Semantic Representation Learning and Explanation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2906-0598","authenticated-orcid":false,"given":"Chao","family":"Ni","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3396-0571","authenticated-orcid":false,"given":"Xin","family":"Yin","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5039-4082","authenticated-orcid":false,"given":"Kaiwen","family":"Yang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3637-4939","authenticated-orcid":false,"given":"Dehai","family":"Zhao","sequence":"additional","affiliation":[{"name":"CSIRO, Data61, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7663-1421","authenticated-orcid":false,"given":"Zhenchang","family":"Xing","sequence":"additional","affiliation":[{"name":"CSIRO, Data61, Canberra, Australia \/ Australian National University, Canberra, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6302-3256","authenticated-orcid":false,"given":"Xin","family":"Xia","sequence":"additional","affiliation":[{"name":"Huawei, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2023. Checkmarx. https:\/\/www.checkmarx.com\/"},{"key":"e_1_3_2_2_2_1","unstructured":"2023. FlawFinder. https:\/\/dwheeler.com\/flawfinder\/"},{"key":"e_1_3_2_2_3_1","unstructured":"2023. Hugging Face. https:\/\/huggingface.co"},{"key":"e_1_3_2_2_4_1","unstructured":"2023. Joern. https:\/\/github.com\/joernio\/joern"},{"key":"e_1_3_2_2_5_1","unstructured":"2023. Replication. https:\/\/github.com\/jacknichao\/SVulD"},{"key":"e_1_3_2_2_6_1","volume-title":"Principal component analysis","author":"Abdi Herv\u00e9","year":"2010","unstructured":"Herv\u00e9 Abdi and Lynne J Williams. 2010. Principal component analysis. Wiley interdisciplinary reviews: computational statistics, 2, 4 (2010), 433\u2013459."},{"key":"e_1_3_2_2_7_1","volume-title":"MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks. arXiv preprint arXiv:2203.02660.","author":"Cao Sicong","year":"2022","unstructured":"Sicong Cao, Xiaobing Sun, Lili Bo, Rongxin Wu, Bin Li, and Chuanqi Tao. 2022. MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks. arXiv preprint arXiv:2203.02660."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3087402"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510162"},{"key":"e_1_3_2_2_10_1","volume-title":"International conference on machine learning. 1597\u20131607","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In International conference on machine learning. 1597\u20131607."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3436877"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534371"},{"key":"e_1_3_2_2_13_1","volume-title":"John Grundy, and Aditya Ghose.","author":"Dam Hoa Khanh","year":"2017","unstructured":"Hoa Khanh Dam, Truyen Tran, Trang Pham, Shien Wee Ng, John Grundy, and Aditya Ghose. 2017. Automatic feature learning for vulnerability prediction. arXiv preprint arXiv:1708.02368."},{"key":"e_1_3_2_2_14_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805.","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805."},{"key":"e_1_3_2_2_15_1","unstructured":"Yangruibo Ding Sahil Suneja Yunhui Zheng Jim Laredo Alessandro Morari Gail Kaiser and Baishakhi Ray. 2021. VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements. arXiv preprint arXiv:2112.10893."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Xu Duan Jingzheng Wu Shouling Ji Zhiqing Rui Tianyue Luo Mutian Yang and Yanjun Wu. 2019. VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities.. In IJCAI. 4665\u20134671.","DOI":"10.24963\/ijcai.2019\/648"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00025"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387501"},{"key":"e_1_3_2_2_19_1","unstructured":"Michael Fu and Chakkrit Tantithamthavorn. 2022. LineVul: A Transformer-based Line-Level Vulnerability Prediction."},{"key":"e_1_3_2_2_20_1","volume-title":"Simcse: Simple contrastive learning of sentence embeddings. arXiv preprint arXiv:2104.08821.","author":"Gao Tianyu","year":"2021","unstructured":"Tianyu Gao, Xingcheng Yao, and Danqi Chen. 2021. Simcse: Simple contrastive learning of sentence embeddings. arXiv preprint arXiv:2104.08821."},{"key":"e_1_3_2_2_21_1","unstructured":"The Tcpdump Group. 2023. tcpdump. https:\/\/github.com\/the-tcpdump-group\/tcpdump"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Daya Guo Shuai Lu Nan Duan Yanlin Wang Ming Zhou and Jian Yin. 2022. UniXcoder: Unified Cross-Modal Pre-training for Code Representation. arXiv preprint arXiv:2203.03850.","DOI":"10.18653\/v1\/2022.acl-long.499"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"David Hin Andrey Kan Huaming Chen and M Ali Babar. 2022. LineVD: Statement-level Vulnerability Detection using Graph Neural Networks. arXiv preprint arXiv:2203.05181.","DOI":"10.1145\/3524842.3527949"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24261-3_7"},{"key":"e_1_3_2_2_25_1","unstructured":"Secure Software Inc.. 2023. Rough Auditing Tool for Security (RATS). https:\/\/code.google.com\/p\/rough-auditing-tool-for-security\/"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417923"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468597"},{"key":"e_1_3_2_2_28_1","article-title":"Vuldeelocator: a deep learning-based fine-grained vulnerability detector","author":"Li Zhen","year":"2021","unstructured":"Zhen Li, Deqing Zou, Shouhuai Xu, Zhaoxuan Chen, Yawei Zhu, and Hai Jin. 2021. Vuldeelocator: a deep learning-based fine-grained vulnerability detector. IEEE Transactions on Dependable and Secure Computing.","journal-title":"IEEE Transactions on Dependable and Secure Computing."},{"key":"e_1_3_2_2_29_1","article-title":"Sysevr: A framework for using deep learning to detect software vulnerabilities","author":"Li Zhen","year":"2021","unstructured":"Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, and Zhaoxuan Chen. 2021. Sysevr: A framework for using deep learning to detect software vulnerabilities. IEEE Transactions on Dependable and Secure Computing.","journal-title":"IEEE Transactions on Dependable and Secure Computing."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3138840"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3105906"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549165"},{"key":"e_1_3_2_2_34_1","unstructured":"Chao Ni Kaiwen Yang Xin Xia David Lo Xiang Chen and Xiaohu Yang. 2022. Defect Identification Categorization and Repair: Better Together. arXiv preprint arXiv:2204.04856."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473122"},{"key":"e_1_3_2_2_36_1","unstructured":"Aaron van den Oord Yazhe Li and Oriol Vinyals. 2018. Representation learning with contrastive predictive coding. arXiv preprint arXiv:1807.03748."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3144348"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"e_1_3_2_2_39_1","unstructured":"Jiamou Sun Zhenchang Xing Hao Guo Deheng Ye Xiaohong Li Xiwei Xu and Liming Zhu. 2022. Generating informative CVE description from ExploitDB posts by extractive summarization. ACM Transactions on Software Engineering and Methodology (TOSEM)."},{"key":"e_1_3_2_2_40_1","volume-title":"Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation. In IEEE\/ACM 45st International Conference on Software Engineering (ICSE).","author":"Sun Jiamou","year":"2023","unstructured":"Jiamou Sun, Zhenchang Xing, Qinghua Lu, Xiwei (Sherry) Xu, Liming Zhu, Thong Hoang, and Dehai Zhao. 2023. Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation. In IEEE\/ACM 45st International Conference on Software Engineering (ICSE)."},{"key":"e_1_3_2_2_41_1","unstructured":"Synopsys. 2023. Coverity. https:\/\/scan.coverity.com\/"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3044773"},{"key":"e_1_3_2_2_43_1","unstructured":"Yueming Wu Deqing Zou Shihan Dou Wei Yang Duo Xu and Hai Jin. 2022. VulCNN: An Image-inspired Scalable Vulnerability Detection System."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"e_1_3_2_2_45_1","volume-title":"In Proceedings of the 33rd International Conference on Neural Information Processing Systems. 10197\u201310207","author":"Zhou Yaqin","year":"2019","unstructured":"Yaqin Zhou, Shangqing Liu, Jingkai Siow, Xiaoning Du, and Yang Liu. 2019. Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks. In In Proceedings of the 33rd International Conference on Neural Information Processing Systems. 10197\u201310207."},{"key":"e_1_3_2_2_46_1","unstructured":"Yuxiang Zhu and Minxue Pan. 2019. Automatic code summarization: A systematic literature review. arXiv preprint arXiv:1909.04352."},{"key":"e_1_3_2_2_47_1","first-page":"1","article-title":"Interpreting deep learning-based vulnerability detector predictions based on heuristic searching","volume":"30","author":"Zou Deqing","year":"2021","unstructured":"Deqing Zou, Yawei Zhu, Shouhuai Xu, Zhen Li, Hai Jin, and Hengkai Ye. 2021. Interpreting deep learning-based vulnerability detector predictions based on heuristic searching. ACM Transactions on Software Engineering and Methodology (TOSEM), 30, 2 (2021), 1\u201331.","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616358","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:11Z","timestamp":1750178171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616358"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":47,"alternative-id":["10.1145\/3611643.3616358","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616358","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}