{"id":"https://openalex.org/W4389070179","doi":"https://doi.org/10.1002/stvr.1867","title":"Tensor\u2010based gated graph neural network for automatic vulnerability detection in source code","display_name":"Tensor\u2010based gated graph neural network for automatic vulnerability detection in source code","publication_year":2023,"publication_date":"2023-11-27","ids":{"openalex":"https://openalex.org/W4389070179","doi":"https://doi.org/10.1002/stvr.1867"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/stvr.1867","pdf_url":null,"source":{"id":"https://openalex.org/S83624231","display_name":"Software Testing Verification and Reliability","issn_l":"0960-0833","issn":["0960-0833","1099-1689"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":"https://doi.org/10.1002/stvr.1867","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101657623","display_name":"Jia Yang","orcid":"https://orcid.org/0000-0003-1469-0789"},"institutions":[{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jia Yang","raw_affiliation_strings":["School of Computer Science Hubei University of Technology Wuhan China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science Hubei University of Technology Wuhan China","institution_ids":["https://openalex.org/I74525822"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040080410","display_name":"Ou Ruan","orcid":"https://orcid.org/0000-0001-8189-3258"},"institutions":[{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ou Ruan","raw_affiliation_strings":["School of Computer Science Hubei University of Technology Wuhan China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science Hubei University of Technology Wuhan China","institution_ids":["https://openalex.org/I74525822"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052576161","display_name":"JiXin Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"JiXin Zhang","raw_affiliation_strings":["School of Computer Science Hubei University of Technology Wuhan China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science Hubei University of Technology Wuhan China","institution_ids":["https://openalex.org/I74525822"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":3760,"currency":"USD","value_usd":3760,"provenance":"doaj"},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":69},"biblio":{"volume":"34","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9875,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9875,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":0.9859,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Empirical Studies in Software Engineering","score":0.9786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.62460685},{"id":"https://openalex.org/keywords/code-clone-detection","display_name":"Code Clone Detection","score":0.549392},{"id":"https://openalex.org/keywords/intrusion-detection","display_name":"Intrusion Detection","score":0.546147},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5290978},{"id":"https://openalex.org/keywords/source-code-analysis","display_name":"Source Code Analysis","score":0.524509},{"id":"https://openalex.org/keywords/botnet-detection","display_name":"Botnet Detection","score":0.522161},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.51362866},{"id":"https://openalex.org/keywords/software-defect-prediction","display_name":"Software Defect Prediction","score":0.510765}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.80054903},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.74785376},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.62460685},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5290978},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.51362866},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.48786092},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.47897267},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.47093526},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46430424},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.44797742},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.42342848},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4121038},{"id":"https://openalex.org/C155281189","wikidata":"https://www.wikidata.org/wiki/Q3518150","display_name":"Tensor (intrinsic definition)","level":2,"score":0.41134754},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35659546},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17697448},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14117497},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08951223},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/stvr.1867","pdf_url":null,"source":{"id":"https://openalex.org/S83624231","display_name":"Software Testing Verification and Reliability","issn_l":"0960-0833","issn":["0960-0833","1099-1689"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/stvr.1867","pdf_url":null,"source":{"id":"https://openalex.org/S83624231","display_name":"Software Testing Verification and Reliability","issn_l":"0960-0833","issn":["0960-0833","1099-1689"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"62202146"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"62002106"},{"funder":"https://openalex.org/F4320322186","funder_display_name":"Natural Science Foundation of Hubei Province","award_id":"Q20293410"},{"funder":"https://openalex.org/F4320322186","funder_display_name":"Natural Science Foundation of Hubei Province","award_id":"2022CFB914"}],"datasets":[],"versions":[],"referenced_works_count":36,"referenced_works":["https://openalex.org/W1992114977","https://openalex.org/W2024165284","https://openalex.org/W2043571470","https://openalex.org/W2118278564","https://openalex.org/W2119412403","https://openalex.org/W2168135317","https://openalex.org/W2361194808","https://openalex.org/W2469491375","https://openalex.org/W2556095944","https://openalex.org/W2604687138","https://openalex.org/W2634106992","https://openalex.org/W2765858138","https://openalex.org/W2796200341","https://openalex.org/W2799848529","https://openalex.org/W2962960733","https://openalex.org/W2965861627","https://openalex.org/W2967191362","https://openalex.org/W2968544084","https://openalex.org/W2973006233","https://openalex.org/W2997162759","https://openalex.org/W3003036212","https://openalex.org/W3005144047","https://openalex.org/W3010305562","https://openalex.org/W3011564318","https://openalex.org/W3014724452","https://openalex.org/W3031273498","https://openalex.org/W3098605233","https://openalex.org/W3099302725","https://openalex.org/W3101228802","https://openalex.org/W3111602563","https://openalex.org/W3121707215","https://openalex.org/W3122465122","https://openalex.org/W3125307739","https://openalex.org/W3136874603","https://openalex.org/W3167284599","https://openalex.org/W4312969325"],"related_works":["https://openalex.org/W4378510483","https://openalex.org/W4376166922","https://openalex.org/W4362597605","https://openalex.org/W4297676672","https://openalex.org/W4281702477","https://openalex.org/W4221142204","https://openalex.org/W3009056573","https://openalex.org/W2922073769","https://openalex.org/W2490526372","https://openalex.org/W1574414179"],"abstract_inverted_index":{"Abstract":[0],"The":[1],"rapid":[2],"expansion":[3],"of":[4,72,82,132,177,193,221,224,230,234],"smart":[5],"devices":[6],"leads":[7],"to":[8,26,50,62,77,107,140],"the":[9,16,58,68,79,130,137,146,222],"increasing":[10],"demand":[11],"for":[12,111,121],"vulnerability":[13,32,65,113,194],"detection":[14,33,66,195],"in":[15,191],"cyber":[17],"security":[18],"field.":[19],"Writing":[20],"secure":[21],"source":[22,53,73],"codes":[23,90],"is":[24],"crucial":[25],"protect":[27],"applications":[28],"and":[29,40,75,97,156,170,197,207,226,247],"software.":[30],"Recent":[31],"methods":[34],"are":[35,45],"mainly":[36],"using":[37,67,145,243],"machine":[38],"learning":[39],"deep":[41],"learning.":[42],"However,":[43],"there":[44],"still":[46],"some":[47],"challenges,":[48],"how":[49,61,76],"learn":[51],"accurate":[52,142],"code":[54,74,109,124,143,160],"semantic":[55,70],"embedding":[56,71,110],"at":[57],"function":[59],"level,":[60],"effectively":[63],"perform":[64],"learned":[69],"solve":[78],"overfitting":[80],"problem":[81],"learning\u2010based":[83],"models.":[84],"In":[85],"this":[86],"paper,":[87],"we":[88,116,135],"consider":[89],"as":[91],"various":[92],"graphs":[93],"with":[94,212],"node":[95],"features":[96],"propose":[98,117,136],"a":[99,118],"tensor\u2010based":[100],"gated":[101],"graph":[102,125,147],"neural":[103],"network":[104],"called":[105],"TensorGNN":[106,138,180,201,238],"produce":[108,141],"function\u2010level":[112],"detection.":[114],"First,":[115],"high\u2010dimensional":[119],"tensor":[120,133],"combining":[122],"different":[123],"representations.":[126],"Second,":[127],"inspired":[128],"by":[129,187],"work":[131],"technology,":[134],"model":[139,152,181,202,208,217],"representations":[144],"tensor.":[148],"We":[149],"evaluate":[150],"our":[151,200,216],"on":[153,183,189],"7":[154],"C":[155],"C++":[157],"large":[158],"open\u2010source":[159],"corpus":[161],"(e.g.":[162],"SARD&NVD,":[163],"Debian,":[164],"SATE":[165],"IV,":[166],"FFmpeg,":[167],"libpng&LibTiff,":[168],"Wireshark":[169],"Github":[171],"datasets),":[172],"which":[173],"contains":[174],"13":[175],"types":[176],"vulnerabilities.":[178],"Our":[179],"improves":[182],"existing":[184,214],"state\u2010of\u2010the\u2010art":[185],"works":[186],"10%\u201330%":[188],"average":[190],"terms":[192],"accuracy":[196],"F1,":[198],"while":[199,242],"needs":[203],"less":[204,248],"training":[205,231,245,249],"time":[206],"parameters.":[209],"Specifically,":[210],"compared":[211],"other":[213],"works,":[215],"reduces":[218],"25\u201347":[219],"times":[220,229],"number":[223],"parameters":[225,246],"decreases":[227],"3\u201310":[228],"time.":[232,250],"Results":[233],"evaluations":[235],"show":[236],"that":[237],"has":[239],"better":[240],"performance":[241],"fewer":[244]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4389070179","counts_by_year":[],"updated_date":"2024-11-26T15:16:18.764090","created_date":"2023-11-28"}