ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1909.03496
  4. Cited By
Devign: Effective Vulnerability Identification by Learning Comprehensive
  Program Semantics via Graph Neural Networks

Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks

Neural Information Processing Systems (NeurIPS), 2019
8 September 2019
Yaqin Zhou
Shangqing Liu
J. Siow
Xiaoning Du
Yang Liu
    GNN
ArXiv (abs)PDFHTML

Papers citing "Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks"

50 / 260 papers shown
Large Language Models Cannot Reliably Detect Vulnerabilities in JavaScript: The First Systematic Benchmark and Evaluation
Large Language Models Cannot Reliably Detect Vulnerabilities in JavaScript: The First Systematic Benchmark and Evaluation
Qingyuan Fei
Xin Liu
Song Li
Shujiang Wu
Jianwei Hou
Ping Chen
Zifeng Kang
ELM
112
0
0
01 Dec 2025
HYDRA: A Hybrid Heuristic-Guided Deep Representation Architecture for Predicting Latent Zero-Day Vulnerabilities in Patched Functions
HYDRA: A Hybrid Heuristic-Guided Deep Representation Architecture for Predicting Latent Zero-Day Vulnerabilities in Patched Functions
Mohammad Farhad
Sabbir Rahman
Shuvalaxmi Dass
53
0
0
09 Nov 2025
A Metamorphic Testing Perspective on Knowledge Distillation for Language Models of Code: Does the Student Deeply Mimic the Teacher?
A Metamorphic Testing Perspective on Knowledge Distillation for Language Models of Code: Does the Student Deeply Mimic the Teacher?
Md. Abdul Awal
Mrigank Rochan
Chanchal K. Roy
153
0
0
07 Nov 2025
On Selecting Few-Shot Examples for LLM-based Code Vulnerability Detection
On Selecting Few-Shot Examples for LLM-based Code Vulnerability Detection
Md Abdul Hannan
Ronghao Ni
Chi Zhang
Limin Jia
Ravi Mangal
Corina S. Pasareanu
128
0
0
31 Oct 2025
Learning to Triage Taint Flows Reported by Dynamic Program Analysis in Node.js Packages
Learning to Triage Taint Flows Reported by Dynamic Program Analysis in Node.js Packages
Ronghao Ni
Aidan Z. H. Yang
Min-Chien Hsu
Nuno Sabino
Limin Jia
Ruben Martins
Darion Cassel
Kevin Cheang
81
0
0
23 Oct 2025
BinCtx: Multi-Modal Representation Learning for Robust Android App Behavior Detection
BinCtx: Multi-Modal Representation Learning for Robust Android App Behavior Detection
Zichen Liu
Shao Yang
Xusheng Xiao
AAML
84
0
0
16 Oct 2025
One Bug, Hundreds Behind: LLMs for Large-Scale Bug Discovery
One Bug, Hundreds Behind: LLMs for Large-Scale Bug Discovery
Qiushi Wu
Yue Xiao
Dhilung Kirat
Kevin Eykholt
Jiyong Jang
D. Schales
120
0
0
15 Oct 2025
Signature in Code Backdoor Detection, how far are we?
Signature in Code Backdoor Detection, how far are we?
Quoc Hung Le
Thanh Le-Cong
Bach Le
Bowen Xu
AAML
76
0
0
15 Oct 2025
Evaluating Line-level Localization Ability of Learning-based Code Vulnerability Detection Models
Marco Pintore
Giorgio Piras
Angelo Sotgiu
Maura Pintor
Battista Biggio
AAML
79
0
0
13 Oct 2025
Distilling Lightweight Language Models for C/C++ Vulnerabilities
Distilling Lightweight Language Models for C/C++ Vulnerabilities
Zhiyuan Wei
Xiaoxuan Yang
Jing Sun
Zijian Zhang
AAML
121
0
0
08 Oct 2025
Vul-R2: A Reasoning LLM for Automated Vulnerability Repair
Vul-R2: A Reasoning LLM for Automated Vulnerability Repair
Xin-Cheng Wen
Zirui Lin
Yijun Yang
Cuiyun Gao
Deheng Ye
LRM
108
2
0
07 Oct 2025
MulVuln: Enhancing Pre-trained LMs with Shared and Language-Specific Knowledge for Multilingual Vulnerability Detection
MulVuln: Enhancing Pre-trained LMs with Shared and Language-Specific Knowledge for Multilingual Vulnerability Detection
Van Nguyen
Surya Nepal
Xingliang Yuan
Tingmin Wu
Fengchao Chen
Carsten Rudolph
AAML
124
0
0
05 Oct 2025
MAVUL: Multi-Agent Vulnerability Detection via Contextual Reasoning and Interactive Refinement
MAVUL: Multi-Agent Vulnerability Detection via Contextual Reasoning and Interactive Refinement
Youpeng Li
Kartik Joshi
Xinda Wang
Eric Wong
114
1
0
30 Sep 2025
SecureBERT 2.0: Advanced Language Model for Cybersecurity Intelligence
SecureBERT 2.0: Advanced Language Model for Cybersecurity Intelligence
Ehsan Aghaei
Sarthak Jain
Prashanth Arun
Arjun Sambamoorthy
168
1
0
30 Sep 2025
From Trace to Line: LLM Agent for Real-World OSS Vulnerability Localization
From Trace to Line: LLM Agent for Real-World OSS Vulnerability Localization
Haoran Xi
Minghao Shao
Brendan Dolan-Gavitt
Muhammad Shafique
Ramesh Karri
LLMAG
327
0
0
30 Sep 2025
LLM-based Vulnerability Discovery through the Lens of Code Metrics
LLM-based Vulnerability Discovery through the Lens of Code Metrics
Felix Weissberg
Lukas Pirch
Erik Imgrund
Jonas Moller
Thorsten Eisenhofer
Konrad Rieck
100
1
0
23 Sep 2025
LLaVul: A Multimodal LLM for Interpretable Vulnerability Reasoning about Source Code
LLaVul: A Multimodal LLM for Interpretable Vulnerability Reasoning about Source CodeInternational Computer Science Conference (ICSC), 2025
Ala Jararweh
Michael Adams
Avinash Sahu
Abdullah Mueen
Afsah Anwar
LRM
144
0
0
22 Sep 2025
"Digital Camouflage": The LLVM Challenge in LLM-Based Malware Detection
"Digital Camouflage": The LLVM Challenge in LLM-Based Malware DetectionJournal of Systems and Software (JSS), 2025
Ekin Böke
Simon Torka
76
1
0
20 Sep 2025
Large Language Models for Security Operations Centers: A Comprehensive Survey
Large Language Models for Security Operations Centers: A Comprehensive Survey
Ali Habibzadeh
Farid Feyzi
Reza Ebrahimi Atani
300
2
0
13 Sep 2025
Probing Pre-trained Language Models on Code Changes: Insights from ReDef, a High-Confidence Just-in-Time Defect Prediction Dataset
Probing Pre-trained Language Models on Code Changes: Insights from ReDef, a High-Confidence Just-in-Time Defect Prediction Dataset
Doha Nam
Taehyoun Kim
Duksan Ryu
Jongmoon Baik
AAML
88
0
0
11 Sep 2025
PatchSeeker: Mapping NVD Records to their Vulnerability-fixing Commits with LLM Generated Commits and Embeddings
PatchSeeker: Mapping NVD Records to their Vulnerability-fixing Commits with LLM Generated Commits and Embeddings
Huu Hung Nguyen
Anh Tuan Nguyen
Thanh Le-Cong
Yikun Li
Han Wei Ang
...
Frank Liauw
Shar Lwin Khin
Ouh Eng Lieh
Ting Zhang
David Lo
77
0
0
09 Sep 2025
Using Contrastive Learning to Improve Two-Way Reasoning in Large Language Models: The Obfuscation Task as a Case Study
Using Contrastive Learning to Improve Two-Way Reasoning in Large Language Models: The Obfuscation Task as a Case Study
Serge Lionel Nikiema
Jordan Samhi
Micheline Bénédicte Moumoula
Albérick Euraste Djiré
Abdoul Kader Kaboré
Jacques Klein
Tegawende F. Bissyande
LRM
48
0
0
06 Sep 2025
From CVE Entries to Verifiable Exploits: An Automated Multi-Agent Framework for Reproducing CVEs
From CVE Entries to Verifiable Exploits: An Automated Multi-Agent Framework for Reproducing CVEs
Saad Ullah
Praneeth Balasubramanian
Wenbo Guo
Amanda Burnett
Hammond Pearce
Christopher Kruegel
Giovanni Vigna
Gianluca Stringhini
241
3
0
01 Sep 2025
VULSOLVER: Vulnerability Detection via LLM-Driven Constraint Solving
VULSOLVER: Vulnerability Detection via LLM-Driven Constraint Solving
Xiang Li
Yueci Su
Jiahao Liu
Zhiwei Lin
Yuebing Hou
Peiming Gao
Y. Zhang
282
0
0
31 Aug 2025
VISION: Robust and Interpretable Code Vulnerability Detection Leveraging Counterfactual Augmentation
VISION: Robust and Interpretable Code Vulnerability Detection Leveraging Counterfactual Augmentation
David Egea
Barproda Halder
Sanghamitra Dutta
AAML
133
1
0
26 Aug 2025
When Machine Learning Meets Vulnerability Discovery: Challenges and Lessons Learned
When Machine Learning Meets Vulnerability Discovery: Challenges and Lessons Learned
Sima Arasteh
Christophe Hauser
AAML
88
0
0
20 Aug 2025
Data and Context Matter: Towards Generalizing AI-based Software Vulnerability Detection
Data and Context Matter: Towards Generalizing AI-based Software Vulnerability Detection
Rijha Safdar
Danyail Mateen
Syed Taha Ali
M. Umer Ashfaq
Wajahat Hussain
172
1
0
14 Aug 2025
PurpCode: Reasoning for Safer Code Generation
PurpCode: Reasoning for Safer Code Generation
Jiawei Liu
Nirav Diwan
Zhe Wang
Haoyu Zhai
Xiaona Zhou
...
Hadjer Benkraouda
Yuxiang Wei
Lingming Zhang
Ismini Lourentzou
Gang Wang
SILMLRMELM
422
6
0
25 Jul 2025
Learning to Locate: GNN-Powered Vulnerability Path Discovery in Open Source Code
Learning to Locate: GNN-Powered Vulnerability Path Discovery in Open Source Code
Nima Atashin
Behrouz Tork Ladani
Mohammadreza Sharbaf
95
0
0
23 Jul 2025
Revisiting Pre-trained Language Models for Vulnerability Detection
Revisiting Pre-trained Language Models for Vulnerability Detection
Youpeng Li
Weiliang Qi
Xuyu Wang
Fuxun Yu
Xinda Wang
AAML
236
1
0
22 Jul 2025
Growing with Experience: Growing Neural Networks in Deep Reinforcement Learning
Growing with Experience: Growing Neural Networks in Deep Reinforcement Learning
Lukas Fehring
Marius Lindauer
Theresa Eimer
OffRL
147
1
0
13 Jun 2025
Today's Cat Is Tomorrow's Dog: Accounting for Time-Based Changes in the Labels of ML Vulnerability Detection Approaches
Today's Cat Is Tomorrow's Dog: Accounting for Time-Based Changes in the Labels of ML Vulnerability Detection Approaches
Ranindya Paramitha
Yuan Feng
Fabio Massacci
MLAU
185
0
0
13 Jun 2025
AI-Based Software Vulnerability Detection: A Systematic Literature Review
AI-Based Software Vulnerability Detection: A Systematic Literature Review
Samiha Shimmi
Hamed Okhravi
Mona Rahimi
278
1
0
12 Jun 2025
DefenderBench: A Toolkit for Evaluating Language Agents in Cybersecurity Environments
DefenderBench: A Toolkit for Evaluating Language Agents in Cybersecurity Environments
Chiyu Zhang
Marc-Alexandre Cote
Michael Albada
Anush Sankaran
Jack W. Stokes
Tong Wang
Amir H. Abdi
William Blum
Muhammad Abdul-Mageed
LLMAGAAMLELM
367
1
0
31 May 2025
SV-TrustEval-C: Evaluating Structure and Semantic Reasoning in Large Language Models for Source Code Vulnerability Analysis
SV-TrustEval-C: Evaluating Structure and Semantic Reasoning in Large Language Models for Source Code Vulnerability AnalysisIEEE Symposium on Security and Privacy (S&P), 2025
Yansong Li
Paula Branco
Alexander M. Hoole
Manish Marwah
Hari Manassery Koduvely
Guy-Vincent Jourdan
Stephan Jou
ELMLRM
158
8
0
27 May 2025
VADER: A Human-Evaluated Benchmark for Vulnerability Assessment, Detection, Explanation, and Remediation
VADER: A Human-Evaluated Benchmark for Vulnerability Assessment, Detection, Explanation, and Remediation
Ethan TS. Liu
Austin Wang
Spencer Mateega
Carlos Georgescu
Danny Tang
ELM
150
1
0
26 May 2025
Frontier AI's Impact on the Cybersecurity Landscape
Frontier AI's Impact on the Cybersecurity Landscape
Wenbo Guo
Wenbo Guo
Tianneng Shi
Yu Yang
Andy Zhang
Patrick Gage Kelley
Kurt Thomas
Kurt Thomas
Dawn Song
527
12
0
07 Apr 2025
Block Toeplitz Sparse Precision Matrix Estimation for Large-Scale Interval-Valued Time Series Forecasting
Block Toeplitz Sparse Precision Matrix Estimation for Large-Scale Interval-Valued Time Series Forecasting
Wan Tian
Zhongfeng Qin
AI4TS
213
1
0
04 Apr 2025
Semantic-Preserving Transformations as Mutation Operators: A Study on Their Effectiveness in Defect Detection
Semantic-Preserving Transformations as Mutation Operators: A Study on Their Effectiveness in Defect Detection
Max Hort
Linas Vidziunas
Leon Moonen
255
1
0
30 Mar 2025
ObscuraCoder: Powering Efficient Code LM Pre-Training Via Obfuscation Grounding
ObscuraCoder: Powering Efficient Code LM Pre-Training Via Obfuscation GroundingInternational Conference on Learning Representations (ICLR), 2025
Indraneil Paul
Haoyi Yang
Goran Glavaš
Kristian Kersting
Iryna Gurevych
AAMLSyDa
259
3
0
27 Mar 2025
Reasoning with LLMs for Zero-Shot Vulnerability Detection
Reasoning with LLMs for Zero-Shot Vulnerability Detection
Arastoo Zibaeirad
Marco Vieira
AAMLLRM
208
10
0
22 Mar 2025
XOXO: Stealthy Cross-Origin Context Poisoning Attacks against AI Coding Assistants
XOXO: Stealthy Cross-Origin Context Poisoning Attacks against AI Coding Assistants
Adam Štorek
Mukur Gupta
Noopur Bhatt
Aditya Gupta
Janie Kim
Prashast Srivastava
Suman Jana
AAML
541
4
0
18 Mar 2025
You Only Train Once: A Flexible Training Framework for Code Vulnerability Detection Driven by Vul-Vector
You Only Train Once: A Flexible Training Framework for Code Vulnerability Detection Driven by Vul-Vector
Bowen Tian
Zhengyang Xu
Mingqiang Wu
Bowen Tian
Yutai Yue
AAML
169
0
0
12 Mar 2025
CASTLE: Benchmarking Dataset for Static Code Analyzers and LLMs towards CWE Detection
CASTLE: Benchmarking Dataset for Static Code Analyzers and LLMs towards CWE DetectionTheoretical Aspects of Software Engineering (TASE), 2025
Richard A. Dubniczky
Krisztofer Zoltán Horvát
Tamás Bisztray
M. Ferrag
Lucas C. Cordeiro
Norbert Tihanyi
324
6
0
12 Mar 2025
Evaluating LLaMA 3.2 for Software Vulnerability DetectionEuropean Interdisciplinary Cybersecurity Conference (IC), 2025
José Gonçalves
Miguel Silva
Bernardo Cabral
Tiago Dias
Eva Maia
Isabel Praça
Ricardo Severino
Luis Lino Ferreira
170
5
0
10 Mar 2025
EuroBERT: Scaling Multilingual Encoders for European Languages
EuroBERT: Scaling Multilingual Encoders for European Languages
Nicolas Boizard
Hippolyte Gisserot-Boukhlef
Duarte M. Alves
André F. T. Martins
Ayoub Hammal
...
Maxime Peyrard
Nuno M. Guerreiro
Patrick Fernandes
Ricardo Rei
Pierre Colombo
1.0K
13
0
07 Mar 2025
Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code Repositories
Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code RepositoriesAnnual Meeting of the Association for Computational Linguistics (ACL), 2025
Alperen Yildiz
Sin G. Teo
Yiling Lou
Yebo Feng
Chong Wang
Dinil M. Divakaran
413
14
0
05 Mar 2025
Detecting Code Vulnerabilities with Heterogeneous GNN Training
Detecting Code Vulnerabilities with Heterogeneous GNN Training
Yu Luo
Weifeng Xu
Dianxiang Xu
321
1
0
24 Feb 2025
GNN-Coder: Boosting Semantic Code Retrieval with Combined GNNs and Transformer
GNN-Coder: Boosting Semantic Code Retrieval with Combined GNNs and Transformer
Yufan Ye
Pu Pang
Ting Zhang
Hua Huang
446
1
0
24 Feb 2025
Show Me Your Code! Kill Code Poisoning: A Lightweight Method Based on Code Naturalness
Show Me Your Code! Kill Code Poisoning: A Lightweight Method Based on Code NaturalnessInternational Conference on Software Engineering (ICSE), 2025
Weisong Sun
Yuchen Chen
Mengzhe Yuan
Chunrong Fang
Zhenpeng Chen
Chong Wang
Yang Liu
Baowen Xu
Zhenyu Chen
AAML
274
3
0
20 Feb 2025
123456
Next