{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:54:49Z","timestamp":1777892089431,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,14]]},"DOI":"10.1145\/3639478.3647634","type":"proceedings-article","created":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T10:49:26Z","timestamp":1716461366000},"page":"472-483","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["ReposVul: A Repository-Level High-Quality Vulnerability Dataset"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8915-6392","authenticated-orcid":false,"given":"Xinchen","family":"Wang","sequence":"first","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9221-2788","authenticated-orcid":false,"given":"Ruida","family":"Hu","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4774-2434","authenticated-orcid":false,"given":"Cuiyun","family":"Gao","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2115-9921","authenticated-orcid":false,"given":"Xin-Cheng","family":"Wen","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2901-0643","authenticated-orcid":false,"given":"Yujia","family":"Chen","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1012-5301","authenticated-orcid":false,"given":"Qing","family":"Liao","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, Harbin, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cisco. \"Cisco IOS XE Software Web UI Elevation of Privilege Vulnerability\" 2023. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-20198."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"key":"e_1_3_2_1_3_1","first-page":"1263","volume-title":"USENIX Security Symposium","author":"Bonett Richard","year":"2018","unstructured":"Richard Bonett, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, and Denys Poshyvanyk. Discovering flaws in security-focused static analysis tools for android using systematic mutation. In USENIX Security Symposium, pages 1263--1280. USENIX Association, 2018."},{"key":"e_1_3_2_1_4_1","first-page":"2577","volume-title":"USENIX Security Symposium","author":"Gan Shuitao","year":"2020","unstructured":"Shuitao Gan, Chao Zhang, Peng Chen, Bodong Zhao, Xiaojun Qin, Dong Wu, and Zuoning Chen. GREYONE: data flow sensitive fuzzing. In USENIX Security Symposium, pages 2577--2594. USENIX Association, 2020."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102813"},{"key":"e_1_3_2_1_6_1","first-page":"382","volume-title":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE 2022","author":"Wang Chaozheng","year":"2022","unstructured":"Chaozheng Wang, Yuanhang Yang, Cuiyun Gao, Yun Peng, Hongyu Zhang, and Michael R. Lyu. No more fine-tuning? an experimental evaluation of prompt tuning in code intelligence. In Abhik Roychoudhury, Cristian Cadar, and Miryung Kim, editors, Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE 2022, Singapore, Singapore, November 14--18, 2022, pages 382--394. ACM, 2022."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2881961"},{"key":"e_1_3_2_1_10_1","first-page":"121","volume-title":"ICSE","author":"Croft Roland","year":"2023","unstructured":"Roland Croft, Muhammad Ali Babar, and M. Mehdi Kholoosi. Data quality for software vulnerability datasets. In ICSE, pages 121--133. IEEE, 2023."},{"key":"e_1_3_2_1_11_1","first-page":"10197","volume-title":"NeurIPS","author":"Zhou Yaqin","year":"2019","unstructured":"Yaqin Zhou, Shangqing Liu, Jing Kai Siow, Xiaoning Du, and Yang Liu. Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks. In NeurIPS, pages 10197--10207, 2019."},{"key":"e_1_3_2_1_12_1","first-page":"508","volume-title":"MSR","author":"Fan Jiahao","year":"2020","unstructured":"Jiahao Fan, Yi Li, Shaohua Wang, and Tien N. Nguyen. A C\/C++ code vulnerability dataset with code changes and CVE summaries. In MSR, pages 508--512. ACM, 2020."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3087402"},{"key":"e_1_3_2_1_14_1","unstructured":"CWE-125: Out-of-bounds Read [n.d.]. https:\/\/cwe.mitre.org\/data\/definitions\/125.html."},{"key":"e_1_3_2_1_15_1","unstructured":"WhiteSource. \"Mend bolt\" 2023. https:\/\/www.mend.io\/free-developer-tools\/."},{"key":"e_1_3_2_1_16_1","unstructured":"\"GitHub\" 2023. https:\/\/github.com\/."},{"key":"e_1_3_2_1_17_1","unstructured":"\"GoogleGit\" 2023. https:\/\/code.googlesource.com\/git\/."},{"key":"e_1_3_2_1_18_1","unstructured":"\"Bugs.chromium\" 2023. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/list."},{"key":"e_1_3_2_1_19_1","unstructured":"Alibaba Cloud. \"Tongyi Qianwen\" [n.d.]. https:\/\/qianwen.aliyun.com\/."},{"key":"e_1_3_2_1_20_1","unstructured":"\"Tree-sitter\" [n.d.]. https:\/\/tree-sitter.github.io\/tree-sitter\/."},{"key":"e_1_3_2_1_21_1","first-page":"1381","volume-title":"MIPRO","author":"Kulenovic Melina","year":"2014","unstructured":"Melina Kulenovic and Dzenana Donko. A survey of static code analysis methods for security vulnerabilities detection. In MIPRO, pages 1381--1386. IEEE, 2014."},{"key":"e_1_3_2_1_22_1","unstructured":"Cppcheck-team. \"Cppcheck\" [n.d.]. http:\/\/cppcheck.sourceforge.net\/."},{"key":"e_1_3_2_1_23_1","unstructured":"D. A. Wheeler. \"Flawfinder\" [n.d.]. https:\/\/dwheeler.com\/flawfinder\/."},{"key":"e_1_3_2_1_24_1","unstructured":"andrew d. \"rough-auditing-tool-for-security\" 2023. https:\/\/github.com\/andrew-d\/rough-auditing-tool-for-security."},{"key":"e_1_3_2_1_25_1","unstructured":"r2c. \"Semgrep\" 2021. https:\/\/semgrep.dev."},{"key":"e_1_3_2_1_26_1","unstructured":"CWE-190: Integer Overflow or Wraparound [n.d.]. https:\/\/cwe.mitre.org\/data\/definitions\/190.html."},{"key":"e_1_3_2_1_27_1","unstructured":"Sergey Poznyakoff. \"GNU cflow\" 2005. https:\/\/www.gnu.org\/software\/cflow\/."},{"key":"e_1_3_2_1_28_1","unstructured":"\"java-all-call-graph\" [n.d.]. https:\/\/github.com\/Adrninistrator\/java-all-call-graph."},{"key":"e_1_3_2_1_29_1","first-page":"1646","volume-title":"ICSE","author":"Salis Vitalis","year":"2021","unstructured":"Vitalis Salis, Thodoris Sotiropoulos, Panos Louridas, Diomidis Spinellis, and Dimitris Mitropoulos. Pycg: Practical call graph generation in python. In ICSE, pages 1646--1657. IEEE, 2021."},{"key":"e_1_3_2_1_30_1","first-page":"111","volume-title":"ICSE (SEIP)","author":"Zheng Yunhui","year":"2021","unstructured":"Yunhui Zheng, Saurabh Pujar, Burn L. Lewis, Luca Buratti, Edward A. Epstein, Bo Yang, Jim Laredo, Alessandro Morari, and Zhong Su. D2A: A dataset built for ai-based vulnerability detection methods using differential analysis. In ICSE (SEIP), pages 111--120. IEEE, 2021."},{"key":"e_1_3_2_1_31_1","first-page":"1565","volume-title":"ESEC\/SIGSOFT FSE","author":"Nikitopoulos Georgios","year":"2021","unstructured":"Georgios Nikitopoulos, Konstantina Dritsa, Panos Louridas, and Dimitris Mitropoulos. Crossvul: a cross-language vulnerability dataset with commit data. In ESEC\/SIGSOFT FSE, pages 1565--1569. ACM, 2021."},{"key":"e_1_3_2_1_32_1","first-page":"654","volume-title":"RAID","author":"Chen Yizheng","year":"2023","unstructured":"Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, and David A. Wagner. Diversevul: A new vulnerable source code dataset for deep learning based vulnerability detection. In RAID, pages 654--668. ACM, 2023."},{"key":"e_1_3_2_1_33_1","volume-title":"Zixuan Ma, Yufei Xue, Jidong Zhai, Wenguang Chen, Peng Zhang, Yuxiao Dong, and Jie Tang. GLM-130B: an open bilingual pre-trained model. CoRR, abs\/2210.02414","author":"Zeng Aohan","year":"2022","unstructured":"Aohan Zeng, Xiao Liu, Zhengxiao Du, Zihan Wang, Hanyu Lai, Ming Ding, Zhuoyi Yang, Yifan Xu, Wendi Zheng, Xiao Xia, Weng Lam Tam, Zixuan Ma, Yufei Xue, Jidong Zhai, Wenguang Chen, Peng Zhang, Yuxiao Dong, and Jie Tang. GLM-130B: an open bilingual pre-trained model. CoRR, abs\/2210.02414, 2022."},{"key":"e_1_3_2_1_34_1","volume-title":"Baichuan 2: Open large-scale language models","author":"Yang Aiyuan","year":"2023","unstructured":"Aiyuan Yang, Bin Xiao, Bingning Wang, Borong Zhang, Ce Bian, Chao Yin, Chenxu Lv, Da Pan, Dian Wang, Dong Yan, Fan Yang, Fei Deng, Feng Wang, Feng Liu, Guangwei Ai, Guosheng Dong, Haizhou Zhao, Hang Xu, Haoze Sun, Hongda Zhang, Hui Liu, Jiaming Ji, Jian Xie, JunTao Dai, Kun Fang, Lei Su, Liang Song, Lifeng Liu, Liyun Ru, Luyao Ma, Mang Wang, Mickel Liu, MingAn Lin, Nuolan Nie, Peidong Guo, Ruiyang Sun, Tao Zhang, Tianpeng Li, Tianyu Li, Wei Cheng, Weipeng Chen, Xiangrong Zeng, Xiaochuan Wang, Xiaoxi Chen, Xin Men, Xin Yu, Xuehai Pan, Yanjun Shen, Yiding Wang, Yiyu Li, Youxin Jiang, Yuchen Gao, Yupeng Zhang, Zenan Zhou, and Zhiying Wu. Baichuan 2: Open large-scale language models, 2023."},{"key":"e_1_3_2_1_35_1","unstructured":"Hugo Touvron Louis Martin Kevin Stone Peter Albert Amjad Almahairi Yasmine Babaei Nikolay Bashlykov Soumya Batra Prajjwal Bhargava Shruti Bhosale Dan Bikel Lukas Blecher Cristian Canton Ferrer Moya Chen Guillem Cucurull David Esiobu Jude Fernandes Jeremy Fu Wenyin Fu Brian Fuller Cynthia Gao Vedanuj Goswami Naman Goyal Anthony Hartshorn Saghar Hosseini Rui Hou Hakan Inan Marcin Kardas Viktor Kerkez Madian Khabsa Isabel Kloumann Artem Korenev Punit Singh Koura Marie-Anne Lachaux Thibaut Lavril Jenya Lee Diana Liskovich Yinghai Lu Yuning Mao Xavier Martinet Todor Mihaylov Pushkar Mishra Igor Molybog Yixin Nie Andrew Poulton Jeremy Reizenstein Rashi Rungta Kalyan Saladi Alan Schelten Ruan Silva Eric Michael Smith Ranjan Subramanian Xiaoqing Ellen Tan Binh Tang Ross Taylor Adina Williams Jian Xiang Kuan Puxin Xu Zheng Yan Iliyan Zarov Yuchen Zhang Angela Fan Melanie Kambadur Sharan Narang Aurelien Rodriguez Robert Stojnic Sergey Edunov and Thomas Scialom. Llama 2: Open foundation and fine-tuned chat models 2023."},{"key":"e_1_3_2_1_36_1","volume-title":"Llama: Open and efficient foundation language models","author":"Touvron Hugo","year":"2023","unstructured":"Hugo Touvron, Thibaut Lavril, Gautier Izacard, Xavier Martinet, Marie-Anne Lachaux, Timoth\u00e9e Lacroix, Baptiste Rozi\u00e8re, Naman Goyal, Eric Hambro, Faisal Azhar, Aurelien Rodriguez, Armand Joulin, Edouard Grave, and Guillaume Lample. Llama: Open and efficient foundation language models, 2023."},{"key":"e_1_3_2_1_37_1","unstructured":"Baptiste Rozi\u00e8re Jonas Gehring Fabian Gloeckle Sten Sootla Itai Gat Xiaoqing Ellen Tan Yossi Adi Jingyu Liu Tal Remez J\u00e9r\u00e9my Rapin Artyom Kozhevnikov Ivan Evtimov Joanna Bitton Manish Bhatt Cristian Canton Ferrer Aaron Grattafiori Wenhan Xiong Alexandre D\u00e9fossez Jade Copet Faisal Azhar Hugo Touvron Louis Martin Nicolas Usunier Thomas Scialom and Gabriel Synnaeve. Code llama: Open foundation models for code 2023."},{"key":"e_1_3_2_1_38_1","unstructured":"OpenAI. \"ChatGPT\" [n.d.]. https:\/\/openai.com\/blog\/chatgpt."},{"key":"e_1_3_2_1_39_1","unstructured":"OpenAI. \"GPT4\" [n.d.]. https:\/\/openai.com\/research\/gpt-4."},{"key":"e_1_3_2_1_40_1","unstructured":"CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer [n.d.]. https:\/\/cwe.mitre.org\/data\/definitions\/119.html."},{"key":"e_1_3_2_1_41_1","unstructured":"CWE-787: Out-of-bounds Write [n.d.]. https:\/\/cwe.mitre.org\/data\/definitions\/787.html."},{"key":"e_1_3_2_1_42_1","first-page":"1225","volume-title":"ICSAI","author":"Xu Aidong","year":"2018","unstructured":"Aidong Xu, Tao Dai, Huajun Chen, Zhe Ming, and Weining Li. Vulnerability detection for source code using contextual LSTM. In ICSAI, pages 1225--1230. IEEE, 2018."},{"key":"e_1_3_2_1_43_1","first-page":"4665","volume-title":"IJCAI","author":"Duan Xu","year":"2019","unstructured":"Xu Duan, Jingzheng Wu, Shouling Ji, Zhiqing Rui, Tianyue Luo, Mutian Yang, and Yanjun Wu. Vulsniper: Focus your attention to shoot fine-grained vulnerabilities. In IJCAI, pages 4665--4671. ijcai.org, 2019."},{"key":"e_1_3_2_1_44_1","first-page":"114","volume-title":"ASE Workshops","author":"Saccente Nicholas","year":"2019","unstructured":"Nicholas Saccente, Josh Dehlinger, Lin Deng, Suranjan Chakraborty, and Yin Xiong. Project achilles: A prototype tool for static method-level vulnerability detection of java source code using a recurrent neural network. In ASE Workshops, pages 114--121. IEEE, 2019."},{"key":"e_1_3_2_1_45_1","first-page":"722","volume-title":"INFOCOM Workshops","author":"Feng Hantao","year":"2020","unstructured":"Hantao Feng, Xiaotong Fu, Hongyu Sun, He Wang, and Yuqing Zhang. Efficient vulnerability detection based on abstract syntax tree and deep learning. In INFOCOM Workshops, pages 722--727. IEEE, 2020."},{"key":"e_1_3_2_1_46_1","volume-title":"SARD: Software assurance reference dataset","author":"NIST.","year":"2022","unstructured":"NIST. SARD: Software assurance reference dataset., 2022. https:\/\/samate.nist.gov\/SRD\/index.php."},{"key":"e_1_3_2_1_47_1","volume-title":"Proc. ACM Program. Lang., 2(OOPSLA):147:1--147:25","author":"Pradel Michael","year":"2018","unstructured":"Michael Pradel and Koushik Sen. Deepbugs: a learning approach to name-based bug detection. Proc. ACM Program. Lang., 2(OOPSLA):147:1--147:25, 2018."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/3475960.3475985","volume-title":"PROMISE","author":"Bhandari Guru Prasad","year":"2021","unstructured":"Guru Prasad Bhandari, Amara Naseer, and Leon Moonen. Cvefixes: automated collection of vulnerabilities and their fixes from open-source software. In PROMISE, pages 30--39. ACM, 2021."},{"key":"e_1_3_2_1_49_1","unstructured":"NIST. \"National Vulnerability Database (NVD)\" 2022. https:\/\/nvd.nist.gov\/."},{"key":"e_1_3_2_1_50_1","unstructured":"Facebook. \"Infer static analyzer\" [n.d.]. https:\/\/fbinfer.com\/."},{"key":"e_1_3_2_1_51_1","first-page":"757","volume-title":"ICMLA","author":"Russell Rebecca L.","year":"2018","unstructured":"Rebecca L. Russell, Louis Y. Kim, Lei H. Hamilton, Tomo Lazovich, Jacob Harer, Onur Ozdemir, Paul M. Ellingwood, and Marc W. McConley. Automated vulnerability detection in source code using deep representation learning. In ICMLA, pages 757--762. IEEE, 2018."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1145\/2664243.2664269","volume-title":"ACSAC","author":"Pewny Jannik","year":"2014","unstructured":"Jannik Pewny, Felix Schuster, Lukas Bernhard, Thorsten Holz, and Christian Rossow. Leveraging semantic signatures for bug search in binary programs. In ACSAC, pages 406--415. ACM, 2014."},{"key":"e_1_3_2_1_53_1","first-page":"345","volume-title":"ASE","author":"Wen Xin-Cheng","year":"2023","unstructured":"Xin-Cheng Wen, Xinchen Wang, Cuiyun Gao, Shaohua Wang, Yang Liu, and Zhaoquan Gu. When less is enough: Positive and unlabeled learning model for vulnerability detection. In ASE, pages 345--357. IEEE, 2023."},{"key":"e_1_3_2_1_54_1","first-page":"184","volume-title":"ICAIT","author":"Wang Xiaomeng","year":"2018","unstructured":"Xiaomeng Wang, Tao Zhang, Runpu Wu, Wei Xin, and Changyu Hou. CPGVA: code property graph based vulnerability analysis by deep learning. In ICAIT, pages 184--188. IEEE, 2018."},{"key":"e_1_3_2_1_55_1","volume-title":"Meta-path based attentional graph learning model for vulnerability detection. CoRR, abs\/2212.14274","author":"Wen Xin-Cheng","year":"2022","unstructured":"Xin-Cheng Wen, Cuiyun Gao, Jiaxin Ye, Zhihong Tian, Yan Jia, and Xuan Wang. Meta-path based attentional graph learning model for vulnerability detection. CoRR, abs\/2212.14274, 2022."},{"key":"e_1_3_2_1_56_1","volume-title":"LIVABLE: exploring long-tailed classification of software vulnerability types. CoRR, abs\/2306.06935","author":"Wen Xin-Cheng","year":"2023","unstructured":"Xin-Cheng Wen, Cuiyun Gao, Feng Luo, Haoyu Wang, Ge Li, and Qing Liao. LIVABLE: exploring long-tailed classification of software vulnerability types. CoRR, abs\/2306.06935, 2023."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/6448"},{"key":"e_1_3_2_1_58_1","first-page":"234","volume-title":"Reliable Software","author":"Boyer Robert S.","year":"1975","unstructured":"Robert S. Boyer, Bernard Elspas, and Karl N. Levitt. SELECT - a formal system for testing and debugging programs by symbolic execution. In Reliable Software, pages 234--245. ACM, 1975."},{"key":"e_1_3_2_1_59_1","first-page":"143","volume-title":"2017 IEEE Security and Privacy Workshops (SPW)","author":"Aniqua","year":"2017","unstructured":"Aniqua Z. Baset and Tamara Denning. Ide plugins for detecting input-validation vulnerabilities. In 2017 IEEE Security and Privacy Workshops (SPW), pages 143--146, 2017."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.1"},{"key":"e_1_3_2_1_61_1","volume-title":"SecDev, page 153","author":"Baloglu Bill","year":"2016","unstructured":"Bill Baloglu. How to find and fix software vulnerabilities with coverity static analysis. In SecDev, page 153. IEEE Computer Society, 2016."},{"key":"e_1_3_2_1_62_1","volume-title":"Automated whitebox fuzz testing","author":"Godefroid Patrice","year":"2008","unstructured":"Patrice Godefroid, Michael Y. Levin, and David A. Molnar. Automated whitebox fuzz testing. In NDSS. The Internet Society, 2008."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950396"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1109\/SNPD.2016.7515932","volume-title":"2016 17th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","author":"Liang Hongliang","year":"2016","unstructured":"Hongliang Liang, Lei Wang, Dongyang Wu, and Jiuyun Xu. Mlsa: A static bugs analysis tool based on llvm ir. In 2016 17th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD), pages 407--412, 2016."},{"key":"e_1_3_2_1_65_1","first-page":"1298","volume-title":"2017 3rd IEEE International Conference on Computer and Communications (ICCC)","author":"Wu Fang","year":"2017","unstructured":"Fang Wu, Jigang Wang, Jiqiang Liu, and Wei Wang. Vulnerability detection with deep learning. In 2017 3rd IEEE International Conference on Computer and Communications (ICCC), pages 1298--1302, 2017."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857720"},{"key":"e_1_3_2_1_67_1","first-page":"2365","volume-title":"ICSE","author":"Wu Yueming","year":"2022","unstructured":"Yueming Wu, Deqing Zou, Shihan Dou, Wei Yang, Duo Xu, and Hai Jin. Vulcnn: An image-inspired scalable vulnerability detection system. In ICSE, pages 2365--2376. ACM, 2022."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3044773"},{"key":"e_1_3_2_1_69_1","first-page":"45","volume-title":"ICTAI","author":"Phan Anh Viet","year":"2017","unstructured":"Anh Viet Phan, Minh Le Nguyen, and Lam Thu Bui. Convolutional neural networks over control flow graphs for software defect prediction. In ICTAI, pages 45--52. IEEE Computer Society, 2017."},{"key":"e_1_3_2_1_70_1","first-page":"2275","volume-title":"45th IEEE\/ACM International Conference on Software Engineering, ICSE 2023","author":"Wen Xin-Cheng","year":"2023","unstructured":"Xin-Cheng Wen, Yupan Chen, Cuiyun Gao, Hongyu Zhang, Jie M. Zhang, and Qing Liao. Vulnerability detection with graph simplification and enhanced graph representation learning. In 45th IEEE\/ACM International Conference on Software Engineering, ICSE 2023, Melbourne, Australia, May 14--20, 2023, pages 2275--2286. IEEE, 2023."},{"key":"e_1_3_2_1_71_1","volume-title":"Vuldeepecker: A deep learning-based system for vulnerability detection","author":"Li Zhen","year":"2018","unstructured":"Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, and Yuyi Zhong. Vuldeepecker: A deep learning-based system for vulnerability detection. In NDSS. The Internet Society, 2018."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2942930"},{"key":"e_1_3_2_1_73_1","first-page":"480","volume-title":"CCS","author":"Feng Qian","year":"2016","unstructured":"Qian Feng, Rundong Zhou, Chengcheng Xu, Yao Cheng, Brian Testa, and Heng Yin. Scalable graph-based bug search for firmware images. In CCS, pages 480--491. ACM, 2016."}],"event":{"name":"ICSE-Companion '24: 2024 IEEE\/ACM 46th International Conference on Software Engineering: Companion Proceedings","location":"Lisbon Portugal","acronym":"ICSE-Companion '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","Faculty of Engineering of University of Porto"]},"container-title":["Proceedings of the 2024 IEEE\/ACM 46th International Conference on Software Engineering: Companion Proceedings"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3639478.3647634","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3639478.3647634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:55Z","timestamp":1750291435000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3639478.3647634"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,14]]},"references-count":73,"alternative-id":["10.1145\/3639478.3647634","10.1145\/3639478"],"URL":"https:\/\/doi.org\/10.1145\/3639478.3647634","relation":{},"subject":[],"published":{"date-parts":[[2024,4,14]]},"assertion":[{"value":"2024-05-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}