ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1909.03496
  4. Cited By
Devign: Effective Vulnerability Identification by Learning Comprehensive
  Program Semantics via Graph Neural Networks

Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks

Neural Information Processing Systems (NeurIPS), 2019
8 September 2019
Yaqin Zhou
Shangqing Liu
J. Siow
Xiaoning Du
Yang Liu
    GNN
ArXiv (abs)PDFHTML

Papers citing "Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks"

50 / 260 papers shown
ChatGPT: A Study on its Utility for Ubiquitous Software Engineering
  Tasks
ChatGPT: A Study on its Utility for Ubiquitous Software Engineering Tasks
G. Sridhara
Ranjani H.G.
Sourav Mazumdar
LLMAGELMAI4MH
155
50
0
26 May 2023
AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing
  Software Vulnerabilities
AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software VulnerabilitiesEmpirical Software Engineering (EMSE), 2023
Michael Fu
Chakkrit Tantithamthavorn
Trung Le
Yukinori Kume
Van Nguyen
Dinh Q. Phung
John C. Grundy
219
49
0
26 May 2023
Learning to Quantize Vulnerability Patterns and Match to Locate
  Statement-Level Vulnerabilities
Learning to Quantize Vulnerability Patterns and Match to Locate Statement-Level Vulnerabilities
Michael Fu
Trung Le
Van Nguyen
Chakkrit Tantithamthavorn
Dinh Q. Phung
124
4
0
26 May 2023
A New Era in Software Security: Towards Self-Healing Software via Large
  Language Models and Formal Verification
A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal VerificationInternational Conference/Workshop on Automation of Software Test (AST), 2023
Norbert Tihanyi
Ridhi Jain
Yiannis Charalambous
M. Ferrag
Youcheng Sun
Lucas C. Cordeiro
295
77
0
24 May 2023
Sequential Graph Neural Networks for Source Code Vulnerability
  Identification
Sequential Graph Neural Networks for Source Code Vulnerability Identification
Ammar Ahmed
Anwar Said
Mudassir Shabbir
X. Koutsoukos
GNN
118
2
0
23 May 2023
TransCoder: Towards Unified Transferable Code Representation Learning
  Inspired by Human Skills
TransCoder: Towards Unified Transferable Code Representation Learning Inspired by Human SkillsInternational Conference on Language Resources and Evaluation (LREC), 2023
Qiushi Sun
Polydoros Giannouris
Jiadong Wang
Xiang Li
Ming Gao
256
12
0
23 May 2023
Transformer-based Vulnerability Detection in Code at EditTime:
  Zero-shot, Few-shot, or Fine-tuning?
Transformer-based Vulnerability Detection in Code at EditTime: Zero-shot, Few-shot, or Fine-tuning?
Aaron Chan
Anant Kharkar
Roshanak Zilouchian Moghaddam
Yevhen Mohylevskyy
Alec Helyar
Eslam Kamal
Mohamed Elkamhawy
Neel Sundaresan
190
31
0
23 May 2023
Neural Machine Translation for Code Generation
Neural Machine Translation for Code Generation
K. Dharma
Clayton T. Morrison
328
7
0
22 May 2023
Towards Tracing Code Provenance with Code Watermarking
Towards Tracing Code Provenance with Code Watermarking
Wei Li
Borui Yang
Yujie Sun
Suyu Chen
Ziyun Song
Liyao Xiang
Xinbing Wang
Cheng Zhou
WaLM
223
7
0
21 May 2023
CCT-Code: Cross-Consistency Training for Multilingual Clone Detection
  and Code Search
CCT-Code: Cross-Consistency Training for Multilingual Clone Detection and Code SearchNorth American Chapter of the Association for Computational Linguistics (NAACL), 2023
Nikita Sorokin
Dmitry Abulkhanov
Sergey I. Nikolenko
Valentin Malykh
169
4
0
19 May 2023
A Black-Box Attack on Code Models via Representation Nearest Neighbor
  Search
A Black-Box Attack on Code Models via Representation Nearest Neighbor SearchConference on Empirical Methods in Natural Language Processing (EMNLP), 2023
Jie M. Zhang
Wei Ma
Q. Hu
Shangqing Liu
Xiaofei Xie
Yves Le Traon
Yang Liu
AAML
261
11
0
10 May 2023
The EarlyBIRD Catches the Bug: On Exploiting Early Layers of Encoder
  Models for More Efficient Code Classification
The EarlyBIRD Catches the Bug: On Exploiting Early Layers of Encoder Models for More Efficient Code Classification
Anastasiia Grishina
Max Hort
Leon Moonen
228
12
0
08 May 2023
An Unbiased Transformer Source Code Learning with Semantic Vulnerability
  Graph
An Unbiased Transformer Source Code Learning with Semantic Vulnerability GraphEuropean Symposium on Security and Privacy (Euro S&P), 2023
Nafis Tanveer Islam
G. Parra
Dylan Manuel
E. Bou-Harb
Peyman Najafirad
193
14
0
17 Apr 2023
Graph Mining for Cybersecurity: A Survey
Graph Mining for Cybersecurity: A SurveyACM Transactions on Knowledge Discovery from Data (TKDD), 2023
Bo Yan
Cheng Yang
Chuan Shi
Yong Fang
Qi Li
Yanfang Ye
Junping Du
326
28
0
02 Apr 2023
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based
  Vulnerability Detection
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability DetectionInternational Symposium on Recent Advances in Intrusion Detection (RAID), 2023
Yizheng Chen
Zhoujie Ding
Lamya Alowain
Xinyun Chen
David Wagner
AAML
310
243
0
01 Apr 2023
Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity
  Analysis
Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity AnalysisEuropean Symposium on Security and Privacy (Euro S&P), 2022
Haoyu He
Yuede Ji
H. H. Huang
178
28
0
26 Mar 2023
Software Vulnerability Prediction Knowledge Transferring Between
  Programming Languages
Software Vulnerability Prediction Knowledge Transferring Between Programming LanguagesInternational Conference on Evaluation of Novel Approaches to Software Engineering (ENASE), 2023
Khadija Hanifi
R. Fouladi
Basak Gencer Unsalver
Goksu Karadag
AAML
102
4
0
10 Mar 2023
xCodeEval: A Large Scale Multilingual Multitask Benchmark for Code
  Understanding, Generation, Translation and Retrieval
xCodeEval: A Large Scale Multilingual Multitask Benchmark for Code Understanding, Generation, Translation and RetrievalAnnual Meeting of the Association for Computational Linguistics (ACL), 2023
Mohammad Abdullah Matin Khan
M Saiful Bari
Xuan Long Do
Weishi Wang
Md. Rizwan Parvez
Shafiq Joty
ALMELM
461
49
0
06 Mar 2023
Detecting software vulnerabilities using Language Models
Detecting software vulnerabilities using Language Models
Marwan Omar
180
11
0
23 Feb 2023
Large Language Models for Code: Security Hardening and Adversarial
  Testing
Large Language Models for Code: Security Hardening and Adversarial TestingConference on Computer and Communications Security (CCS), 2023
Jingxuan He
Martin Vechev
ELMAAML
386
199
0
10 Feb 2023
Code Difference Guided Adversarial Example Generation for Deep Code
  Models
Code Difference Guided Adversarial Example Generation for Deep Code ModelsInternational Conference on Automated Software Engineering (ASE), 2023
Zhao Tian
Junjie Chen
Zhi Jin
AAML
369
39
0
06 Jan 2023
A Survey on Pretrained Language Models for Neural Code Intelligence
A Survey on Pretrained Language Models for Neural Code Intelligence
Yichen Xu
Yanqiao Zhu
150
19
0
20 Dec 2022
Unveiling Code Pre-Trained Models: Investigating Syntax and Semantics
  Capacities
Unveiling Code Pre-Trained Models: Investigating Syntax and Semantics CapacitiesACM Transactions on Software Engineering and Methodology (TOSEM), 2022
Wei Ma
Shangqing Liu
Mengjie Zhao
Xiaofei Xie
Wenhan Wang
Q. Hu
Jiexin Zhang
Yang Liu
386
37
0
20 Dec 2022
CoCoMIC: Code Completion By Jointly Modeling In-file and Cross-file
  Context
CoCoMIC: Code Completion By Jointly Modeling In-file and Cross-file ContextInternational Conference on Language Resources and Evaluation (LREC), 2022
Yangruibo Ding
Zijian Wang
Wasi Uddin Ahmad
M. K. Ramanathan
Ramesh Nallapati
Parminder Bhatia
Dan Roth
Bing Xiang
325
91
0
20 Dec 2022
JEMMA: An Extensible Java Dataset for ML4Code Applications
JEMMA: An Extensible Java Dataset for ML4Code ApplicationsEmpirical Software Engineering (EMSE), 2022
Anjan Karmakar
Miltiadis Allamanis
Romain Robbes
VLM
174
4
0
18 Dec 2022
An Empirical Study of Deep Learning Models for Vulnerability Detection
An Empirical Study of Deep Learning Models for Vulnerability DetectionInternational Conference on Software Engineering (ICSE), 2022
Benjamin Steenhoek
Md. Mahbubur Rahman
Richard Jiles
Wei Le
ELMAAML
324
125
0
15 Dec 2022
Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability
  Detection
Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability DetectionInternational Conference on Software Engineering (ICSE), 2022
Benjamin Steenhoek
Hongyang Gao
Wei Le
348
69
0
15 Dec 2022
DexBERT: Effective, Task-Agnostic and Fine-grained Representation
  Learning of Android Bytecode
DexBERT: Effective, Task-Agnostic and Fine-grained Representation Learning of Android BytecodeIEEE Transactions on Software Engineering (TSE), 2022
Tiezhu Sun
Kevin Allix
Kisub Kim
Xin Zhou
Dongsun Kim
David Lo
Tegawende F. Bissyande
Jacques Klein
200
20
0
12 Dec 2022
A Survey on Natural Language Processing for Programming
A Survey on Natural Language Processing for ProgrammingInternational Conference on Language Resources and Evaluation (LREC), 2022
Qingfu Zhu
Xianzhen Luo
Fang Liu
Cuiyun Gao
Wanxiang Che
185
5
0
12 Dec 2022
ICSPatch: Automated Vulnerability Localization and Non-Intrusive
  Hotpatching in Industrial Control Systems using Data Dependence Graphs
ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence GraphsUSENIX Security Symposium (USENIX Security), 2022
Prashant Hari Narayan Rajput
Constantine Doumanidis
Michail Maniatakos
119
21
0
08 Dec 2022
DeepVulSeeker: A Novel Vulnerability Identification Framework via Code
  Graph Structure and Pre-training Mechanism
DeepVulSeeker: A Novel Vulnerability Identification Framework via Code Graph Structure and Pre-training MechanismFuture generations computer systems (FGCS), 2022
Jin Wang
Hui Xiao
Shuwen Zhong
Yinhao Xiao
145
16
0
23 Nov 2022
Poison Attack and Defense on Deep Source Code Processing Models
Poison Attack and Defense on Deep Source Code Processing Models
Jia Li
Zhuo Li
Huangzhao Zhang
Ge Li
Zhi Jin
Xing Hu
Xin Xia
AAML
164
24
0
31 Oct 2022
A Novel Feature Representation for Malware Classification
A Novel Feature Representation for Malware Classification
John Musgrave
T. Kebede
David Kapp
Anca L. Ralescu
147
1
0
18 Oct 2022
Empirical Network Structure of Malicious Programs
Empirical Network Structure of Malicious ProgramsAdvances in Artificial Intelligence and Machine Learning (AAIML), 2022
John Musgrave
A. Campan
T. Kebede
David Kapp
Anca L. Ralescu
147
2
0
14 Oct 2022
MIXCODE: Enhancing Code Classification by Mixup-Based Data Augmentation
MIXCODE: Enhancing Code Classification by Mixup-Based Data AugmentationIEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2022
Zeming Dong
Qiang Hu
Yuejun Guo
Maxime Cordy
Mike Papadakis
Zhenya Zhang
Yves Le Traon
Jianjun Zhao
268
10
0
06 Oct 2022
On the Effectiveness of Hybrid Pooling in Mixup-Based Graph Learning for
  Language Processing
On the Effectiveness of Hybrid Pooling in Mixup-Based Graph Learning for Language ProcessingJournal of Systems and Software (JSS), 2022
Zeming Dong
Qiang Hu
Zhenya Zhang
Yuejun Guo
Maxime Cordy
Mike Papadakis
Yves Le Traon
Jianjun Zhao
296
4
0
06 Oct 2022
Semantic-Preserving Adversarial Code Comprehension
Semantic-Preserving Adversarial Code ComprehensionInternational Conference on Computational Linguistics (COLING), 2022
Yiyang Li
Hongqiu Wu
Hai Zhao
AAML
150
9
0
12 Sep 2022
Evaluating the Future Device Security Risk Indicator for Hundreds of IoT
  Devices
Evaluating the Future Device Security Risk Indicator for Hundreds of IoT DevicesInternational Workshop on Security and Trust Management (STM), 2022
Pascal Oser
Felix Engelmann
S. Lüders
F. Kargl
135
2
0
08 Sep 2022
Learning Program Representations with a Tree-Structured Transformer
Learning Program Representations with a Tree-Structured TransformerIEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2022
Wenhan Wang
Kechi Zhang
Ge Li
Shangqing Liu
Anran Li
Zhi Jin
Yang Liu
231
10
0
18 Aug 2022
A Library for Representing Python Programs as Graphs for Machine
  Learning
A Library for Representing Python Programs as Graphs for Machine Learning
David Bieber
Kensen Shi
Petros Maniatis
Charles Sutton
Vincent J. Hellendoorn
Daniel D. Johnson
Daniel Tarlow
GNNAI4CE
138
5
0
15 Aug 2022
Finding Reusable Machine Learning Components to Build Programming
  Language Processing Pipelines
Finding Reusable Machine Learning Components to Build Programming Language Processing PipelinesEuropean Conference on Software Architecture (ECSA), 2022
Patrick Flynn
T. Vanderbruggen
C. Liao
Pei-Hung Lin
M. Emani
Xipeng Shen
208
5
0
11 Aug 2022
Multi-View Pre-Trained Model for Code Vulnerability Identification
Multi-View Pre-Trained Model for Code Vulnerability IdentificationWireless Algorithms, Systems, and Applications (WASA), 2022
Xuxia Jiang
Yinhao Xiao
Jun Wang
Wei Zhang
99
2
0
10 Aug 2022
BlockScope: Detecting and Investigating Propagated Vulnerabilities in
  Forked Blockchain Projects
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain ProjectsNetwork and Distributed System Security Symposium (NDSS), 2022
Xiao Yi
Yuzhou Fang
Daoyuan Wu
Lingxiao Jiang
244
24
0
30 Jul 2022
No More Fine-Tuning? An Experimental Evaluation of Prompt Tuning in Code
  Intelligence
No More Fine-Tuning? An Experimental Evaluation of Prompt Tuning in Code Intelligence
Chaozheng Wang
Yuanhang Yang
Cuiyun Gao
Yun Peng
Hongyu Zhang
Michael R. Lyu
AAML
196
177
0
24 Jul 2022
Aries: Efficient Testing of Deep Neural Networks via Labeling-Free
  Accuracy Estimation
Aries: Efficient Testing of Deep Neural Networks via Labeling-Free Accuracy EstimationInternational Conference on Software Engineering (ICSE), 2022
Qiang Hu
Yuejun Guo
Xiaofei Xie
Maxime Cordy
Lei Ma
Mike Papadakis
Yves Le Traon
AAML
114
23
0
22 Jul 2022
Enhancing Security Patch Identification by Capturing Structures in
  Commits
Enhancing Security Patch Identification by Capturing Structures in CommitsIEEE Transactions on Dependable and Secure Computing (TDSC), 2022
Bozhi Wu
Shangqing Liu
Ruitao Feng
Xiaofei Xie
J. Siow
Shang-Wei Lin
140
42
0
19 Jul 2022
Evaluation of Contrastive Learning with Various Code Representations for
  Code Clone Detection
Evaluation of Contrastive Learning with Various Code Representations for Code Clone DetectionSocial Science Research Network (SSRN), 2022
Maksim Zubkov
Egor Spirin
Egor Bogomolov
T. Bryksin
154
7
0
17 Jun 2022
MetaTPTrans: A Meta Learning Approach for Multilingual Code
  Representation Learning
MetaTPTrans: A Meta Learning Approach for Multilingual Code Representation LearningAAAI Conference on Artificial Intelligence (AAAI), 2022
Weiguo Pian
Hanyu Peng
Xunzhu Tang
Tiezhu Sun
Haoye Tian
Andrew Habib
Jacques Klein
Tegawende F. Bissyande
149
17
0
13 Jun 2022
Fault-Aware Neural Code Rankers
Fault-Aware Neural Code RankersNeural Information Processing Systems (NeurIPS), 2022
J. Inala
Chenglong Wang
Mei Yang
Andrés Codas
Mark Encarnación
Shuvendu K. Lahiri
Madan Musuvathi
Jianfeng Gao
ALM
269
51
0
04 Jun 2022
CodeAttack: Code-Based Adversarial Attacks for Pre-trained Programming
  Language Models
CodeAttack: Code-Based Adversarial Attacks for Pre-trained Programming Language ModelsAAAI Conference on Artificial Intelligence (AAAI), 2022
Akshita Jha
Chandan K. Reddy
SILMELMAAML
374
95
0
31 May 2022
Previous
123456
Next