ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1909.03496
  4. Cited By
Devign: Effective Vulnerability Identification by Learning Comprehensive
  Program Semantics via Graph Neural Networks

Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks

Neural Information Processing Systems (NeurIPS), 2019
8 September 2019
Yaqin Zhou
Shangqing Liu
J. Siow
Xiaoning Du
Yang Liu
    GNN
ArXiv (abs)PDFHTML

Papers citing "Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks"

50 / 260 papers shown
Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium
  Approach for Binary Vulnerability Detection
Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability DetectionInternational Conference on Information and Knowledge Management (CIKM), 2024
Litao Li
Steven H. H. Ding
Andrew Walenstein
P. Charland
Benjamin C. M. Fung
160
1
0
03 Apr 2024
Evaluating Large Language Models for Line-Level Vulnerability Localization
Evaluating Large Language Models for Line-Level Vulnerability Localization
Jian Zhang
Chong Wang
Anran Li
Weisong Sun
Cen Zhang
Wei Ma
Yang Liu
207
25
0
30 Mar 2024
Vulnerability Detection with Code Language Models: How Far Are We?
Vulnerability Detection with Code Language Models: How Far Are We?
Yangruibo Ding
Yanjun Fu
Omniyyah Ibrahim
Chawin Sitawarin
Xinyun Chen
Basel Alomair
David Wagner
Baishakhi Ray
Yizheng Chen
AAML
266
147
0
27 Mar 2024
Genetic Auto-prompt Learning for Pre-trained Code Intelligence Language
  Models
Genetic Auto-prompt Learning for Pre-trained Code Intelligence Language Models
Chengzhe Feng
Yanan Sun
Ke Li
Pan Zhou
Jiancheng Lv
Aojun Lu
314
4
0
20 Mar 2024
A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
A Survey of Source Code Representations for Machine Learning-Based Cybersecurity TasksACM Computing Surveys (ACM CSUR), 2024
B.K. Casey
Joanna C. S. Santos
George Perry
335
13
0
15 Mar 2024
VulMCI : Code Splicing-based Pixel-row Oversampling for More Continuous
  Vulnerability Image Generation
VulMCI : Code Splicing-based Pixel-row Oversampling for More Continuous Vulnerability Image Generation
Tao Peng
Ling Gui
Yi Sun
152
1
0
28 Feb 2024
Chain-of-Thought Prompting of Large Language Models for Discovering and
  Fixing Software Vulnerabilities
Chain-of-Thought Prompting of Large Language Models for Discovering and Fixing Software Vulnerabilities
Yu Nong
Mohammed Aldeen
Long Cheng
Hongxin Hu
Feng Chen
Haipeng Cai
LRM
268
58
0
27 Feb 2024
On Trojan Signatures in Large Language Models of Code
On Trojan Signatures in Large Language Models of Code
Aftab Hussain
Md Rafiqul Islam Rabin
Mohammad Amin Alipour
222
3
0
23 Feb 2024
COMET: Generating Commit Messages using Delta Graph Context
  Representation
COMET: Generating Commit Messages using Delta Graph Context Representation
Abhinav Reddy Mandli
Saurabhsingh Rajput
Tushar Sharma
125
4
0
02 Feb 2024
NoFunEval: Funny How Code LMs Falter on Requirements Beyond Functional
  Correctness
NoFunEval: Funny How Code LMs Falter on Requirements Beyond Functional Correctness
Manav Singhal
Tushar Aggarwal
Abhijeet Awasthi
Nagarajan Natarajan
Aditya Kanade
284
24
0
29 Jan 2024
LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning
LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning
Yuqiang Sun
Daoyuan Wu
Yue Xue
Han Liu
Wei Ma
Lyuye Zhang
Miaolei Shi
Yingjiu Li
ELM
1.1K
97
0
29 Jan 2024
Coca: Improving and Explaining Graph Neural Network-Based Vulnerability
  Detection Systems
Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection SystemsInternational Conference on Software Engineering (ICSE), 2024
Sicong Cao
Xiaobing Sun
Xiaoxue Wu
David Lo
Lili Bo
Bin Li
Wei Liu
AAML
229
38
0
26 Jan 2024
Structured Code Representations Enable Data-Efficient Adaptation of Code
  Language Models
Structured Code Representations Enable Data-Efficient Adaptation of Code Language Models
Mayank Agarwal
Songlin Yang
Bailin Wang
Yoon Kim
Jie Chen
193
7
0
19 Jan 2024
Your Instructions Are Not Always Helpful: Assessing the Efficacy of
  Instruction Fine-tuning for Software Vulnerability Detection
Your Instructions Are Not Always Helpful: Assessing the Efficacy of Instruction Fine-tuning for Software Vulnerability Detection
Imam Nur Bani Yusuf
Lingxiao Jiang
AAML
229
8
0
15 Jan 2024
Use of Graph Neural Networks in Aiding Defensive Cyber Operations
Use of Graph Neural Networks in Aiding Defensive Cyber Operations
Shaswata Mitra
Trisha Chakraborty
Subash Neupane
Aritran Piplai
Sudip Mittal
AAML
281
13
0
11 Jan 2024
PythonSaga: Redefining the Benchmark to Evaluate Code Generating LLMs
PythonSaga: Redefining the Benchmark to Evaluate Code Generating LLMsConference on Empirical Methods in Natural Language Processing (EMNLP), 2024
Ankit Yadav
Himanshu Beniwal
Mayank Singh
LRMALM
274
16
0
08 Jan 2024
Beyond Fidelity: Explaining Vulnerability Localization of Learning-based
  Detectors
Beyond Fidelity: Explaining Vulnerability Localization of Learning-based Detectors
Baijun Cheng
Shengming Zhao
Kailong Wang
Meizhen Wang
Guangdong Bai
Ruitao Feng
Yao Guo
Lei Ma
Haoyu Wang
FAttAAML
232
11
0
05 Jan 2024
AST-T5: Structure-Aware Pretraining for Code Generation and
  Understanding
AST-T5: Structure-Aware Pretraining for Code Generation and Understanding
Linyuan Gong
Mostafa Elhoushi
Alvin Cheung
455
32
0
05 Jan 2024
Astraios: Parameter-Efficient Instruction Tuning Code Large Language
  Models
Astraios: Parameter-Efficient Instruction Tuning Code Large Language Models
Terry Yue Zhuo
A. Zebaze
Nitchakarn Suppattarachai
Leandro von Werra
H. D. Vries
Qian Liu
Niklas Muennighoff
ALM
276
29
0
01 Jan 2024
Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit
Deep Learning for Code Intelligence: Survey, Benchmark and ToolkitACM Computing Surveys (ACM Comput. Surv.), 2023
Yao Wan
Yang He
Zhangqian Bi
Jianguo Zhang
Hongyu Zhang
Yulei Sui
Guandong Xu
Hai Jin
Philip S. Yu
277
42
0
30 Dec 2023
LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities
  (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks
LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks
Saad Ullah
Mingji Han
Saurabh Pujar
Hammond Pearce
Ayse K. Coskun
Gianluca Stringhini
ELMLRM
309
133
0
19 Dec 2023
Graph Convolutions Enrich the Self-Attention in Transformers!
Graph Convolutions Enrich the Self-Attention in Transformers!
Jeongwhan Choi
Hyowon Wi
Jayoung Kim
Yehjin Shin
Kookjin Lee
Nathaniel Trask
Noseong Park
408
12
0
07 Dec 2023
Abstract Syntax Tree for Programming Language Understanding and
  Representation: How Far Are We?
Abstract Syntax Tree for Programming Language Understanding and Representation: How Far Are We?
Weisong Sun
Chunrong Fang
Yun Miao
Yudu You
Mengzhe Yuan
...
Quanjun Zhang
An Guo
Xiang Chen
Yang Liu
Zhenyu Chen
286
16
0
01 Dec 2023
How Far Have We Gone in Vulnerability Detection Using Large Language
  Models
How Far Have We Gone in Vulnerability Detection Using Large Language Models
Zeyu Gao
Hao Wang
Yuchen Zhou
Wenyu Zhu
Chao Zhang
327
40
0
21 Nov 2023
Understanding the Effectiveness of Large Language Models in Detecting
  Security Vulnerabilities
Understanding the Effectiveness of Large Language Models in Detecting Security Vulnerabilities
Avishree Khare
Saikat Dutta
Ziyang Li
Alaia Solko-Breslin
Rajeev Alur
Mayur Naik
ELM
368
86
0
16 Nov 2023
TransformCode: A Contrastive Learning Framework for Code Embedding via
  Subtree Transformation
TransformCode: A Contrastive Learning Framework for Code Embedding via Subtree TransformationIEEE Transactions on Software Engineering (TSE), 2023
Zixiang Xian
Rubing Huang
Dave Towey
Chunrong Fang
Zhenyu Chen
223
11
0
10 Nov 2023
Learning Defect Prediction from Unrealistic Data
Learning Defect Prediction from Unrealistic DataIEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2023
Kamel Alrashedy
Vincent J. Hellendoorn
Alessandro Orso
248
8
0
02 Nov 2023
Vignat: Vulnerability identification by learning code semantics via
  graph attention networks
Vignat: Vulnerability identification by learning code semantics via graph attention networks
Shuo Liu
Gail Kaiser
43
0
0
30 Oct 2023
Towards Causal Deep Learning for Vulnerability Detection
Towards Causal Deep Learning for Vulnerability DetectionInternational Conference on Software Engineering (ICSE), 2023
Md. Mahbubur Rahman
Ira Ceka
Chengzhi Mao
Saikat Chakraborty
Baishakhi Ray
Wei Le
413
36
0
12 Oct 2023
Large Language Models for Test-Free Fault Localization
Large Language Models for Test-Free Fault LocalizationInternational Conference on Software Engineering (ICSE), 2023
Aidan Z. H. Yang
Ruben Martins
Claire Le Goues
Vincent J. Hellendoorn
LRM
225
159
0
03 Oct 2023
DefectHunter: A Novel LLM-Driven Boosted-Conformer-based Code
  Vulnerability Detection Mechanism
DefectHunter: A Novel LLM-Driven Boosted-Conformer-based Code Vulnerability Detection Mechanism
Jin Wang
Zishan Huang
Hengli Liu
Nianyi Yang
Yinhao Xiao
191
24
0
27 Sep 2023
Code Representation Pre-training with Complements from Program
  Executions
Code Representation Pre-training with Complements from Program Executions
Jiabo Huang
Jianyu Zhao
Yuyang Rong
Yiwen Guo
Yifeng He
Hao Chen
274
7
0
04 Sep 2023
Using ChatGPT as a Static Application Security Testing Tool
Using ChatGPT as a Static Application Security Testing Tool
Atieh Bakhshandeh
Abdalsamad Keramatfar
Amir Norouzi
Mohammad Mahdi Chekidehkhoun
174
23
0
28 Aug 2023
Benchmarking Causal Study to Interpret Large Language Models for Source
  Code
Benchmarking Causal Study to Interpret Large Language Models for Source CodeIEEE International Conference on Software Maintenance and Evolution (ICSME), 2023
Daniel Rodríguez-Cárdenas
David Nader-Palacio
Dipin Khati
Henry Burke
Denys Poshyvanyk
CMLELM
223
19
0
23 Aug 2023
Large Language Models for Software Engineering: A Systematic Literature
  Review
Large Language Models for Software Engineering: A Systematic Literature ReviewACM Transactions on Software Engineering and Methodology (TOSEM), 2023
Xinying Hou
Yanjie Zhao
Yue Liu
Zhou Yang
Kailong Wang
Li Li
Xiapu Luo
David Lo
John C. Grundy
Haoyu Wang
358
756
0
21 Aug 2023
When Less is Enough: Positive and Unlabeled Learning Model for
  Vulnerability Detection
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability DetectionInternational Conference on Automated Software Engineering (ASE), 2023
Xinjie Wen
Xinche Wang
Cuiyun Gao
Shaohua Wang
Yang Liu
Zhaoquan Gu
152
28
0
21 Aug 2023
Evaluating Instruction-Tuned Large Language Models on Code Comprehension
  and Generation
Evaluating Instruction-Tuned Large Language Models on Code Comprehension and Generation
Zhiqiang Yuan
Junwei Liu
Qiancheng Zi
Wentai Deng
Xin Peng
Xin Peng
ALMELMLRM
218
102
0
02 Aug 2023
LaFiCMIL: Rethinking Large File Classification from the Perspective of
  Correlated Multiple Instance Learning
LaFiCMIL: Rethinking Large File Classification from the Perspective of Correlated Multiple Instance LearningInternational Conference on Applications of Natural Language to Data Bases (NLDB), 2023
Tiezhu Sun
Weiguo Pian
N. Daoudi
Kevin Allix
Tegawende F. Bissyande
Jacques Klein
397
4
0
30 Jul 2023
CodeLens: An Interactive Tool for Visualizing Code Representations
CodeLens: An Interactive Tool for Visualizing Code Representations
Yuejun Guo
Seifeddine Bettaieb
Qiang Hu
Yves Le Traon
Qian Tang
104
0
0
27 Jul 2023
SecureFalcon: Are We There Yet in Automated Software Vulnerability Detection with LLMs?
SecureFalcon: Are We There Yet in Automated Software Vulnerability Detection with LLMs?IEEE Transactions on Software Engineering (TSE), 2023
M. Ferrag
A. Battah
Norbert Tihanyi
Ridhi Jain
Diana Maimut
...
Thierry Lestable
Narinderjit Singh Thandi
Abdechakour Mechri
Merouane Debbah
Lucas C. Cordeiro
217
31
0
13 Jul 2023
COMEX: A Tool for Generating Customized Source Code Representations
COMEX: A Tool for Generating Customized Source Code RepresentationsInternational Conference on Automated Software Engineering (ASE), 2023
Debeshee Das
N. Mathews
Alex Mathai
Srikanth G. Tamilselvam
Kranthi Sedamaki
S. Chimalakonda
Atul Kumar
VLM
127
8
0
10 Jul 2023
The FormAI Dataset: Generative AI in Software Security Through the Lens
  of Formal Verification
The FormAI Dataset: Generative AI in Software Security Through the Lens of Formal VerificationInternational Conference on Predictive Models in Software Engineering (PROMISE), 2023
Norbert Tihanyi
Tamás Bisztray
Ridhi Jain
M. Ferrag
Lucas C. Cordeiro
Vasileios Mavroeidis
321
65
0
05 Jul 2023
Natural Language Generation and Understanding of Big Code for
  AI-Assisted Programming: A Review
Natural Language Generation and Understanding of Big Code for AI-Assisted Programming: A ReviewEntropy (Entropy), 2023
M. Wong
Shangxin Guo
Ching Nam Hang
Siu-Wai Ho
C. Tan
239
124
0
04 Jul 2023
Uncovering the Limits of Machine Learning for Automatic Vulnerability
  Detection
Uncovering the Limits of Machine Learning for Automatic Vulnerability DetectionUSENIX Security Symposium (USENIX Security), 2023
Niklas Risse
Marcel Bohme
AAML
370
52
0
28 Jun 2023
Multi-target Backdoor Attacks for Code Pre-trained Models
Multi-target Backdoor Attacks for Code Pre-trained ModelsAnnual Meeting of the Association for Computational Linguistics (ACL), 2023
Yanzhou Li
Shangqing Liu
Kangjie Chen
Xiaofei Xie
Tianwei Zhang
Yang Liu
AAMLSILM
217
32
0
14 Jun 2023
LIVABLE: Exploring Long-Tailed Classification of Software Vulnerability
  Types
LIVABLE: Exploring Long-Tailed Classification of Software Vulnerability TypesIEEE Transactions on Software Engineering (TSE), 2023
Xinjie Wen
Cuiyun Gao
Feng Luo
Hao Wang
Ge Li
Qing Liao
176
22
0
12 Jun 2023
DSHGT: Dual-Supervisors Heterogeneous Graph Transformer -- A pioneer
  study of using heterogeneous graph learning for detecting software
  vulnerabilities
DSHGT: Dual-Supervisors Heterogeneous Graph Transformer -- A pioneer study of using heterogeneous graph learning for detecting software vulnerabilitiesACM Transactions on Software Engineering and Methodology (TOSEM), 2023
Tiehua Zhang
Ruiqian Xu
Jianping Zhang
Yuze Liu
Xin Chen
Jun-Jian Yin
Xi Zheng
275
6
0
02 Jun 2023
UNGOML: Automated Classification of unsafe Usages in Go
UNGOML: Automated Classification of unsafe Usages in GoIEEE Working Conference on Mining Software Repositories (MSR), 2023
A. Wickert
C. Damke
Lars Baumgärtner
Eyke Hüllermeier
Mira Mezini
185
1
0
01 Jun 2023
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in
  Source Code Using Neural Networks
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural NetworksAnnual International Computer Software and Applications Conference (COMPSAC), 2023
Mst. Shapna Akter
Hossain Shahriar
Juan Rodriguez Cardenas
S. Ahamed
A. Cuzzocrea
208
2
0
01 Jun 2023
SPGNN-API: A Transferable Graph Neural Network for Attack Paths
  Identification and Autonomous Mitigation
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous MitigationIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2023
Houssem Jmal
Firas Hmida
Nardine Basta
Muhammad Ikram
M. Kâafar
Andy Walker
AAML
165
6
0
31 May 2023
Previous
123456
Next