ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.02350
  4. Cited By
VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector
v1v2 (latest)

VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector

IEEE Transactions on Dependable and Secure Computing (TDSC), 2020
8 January 2020
Zhuguo Li
Deqing Zou
Shouhuai Xu
Zhaoxuan Chen
Yawei Zhu
Hai Jin
ArXiv (abs)PDFHTML

Papers citing "VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector"

45 / 45 papers shown
Evaluating Line-level Localization Ability of Learning-based Code Vulnerability Detection Models
Marco Pintore
Giorgio Piras
Angelo Sotgiu
Maura Pintor
Battista Biggio
AAML
89
0
0
13 Oct 2025
Revisiting Pre-trained Language Models for Vulnerability Detection
Revisiting Pre-trained Language Models for Vulnerability Detection
Youpeng Li
Weiliang Qi
Xuyu Wang
Fuxun Yu
Xinda Wang
AAML
261
1
0
22 Jul 2025
AI-Based Software Vulnerability Detection: A Systematic Literature Review
AI-Based Software Vulnerability Detection: A Systematic Literature Review
Samiha Shimmi
Hamed Okhravi
Mona Rahimi
302
3
0
12 Jun 2025
Vulnerability Detection: From Formal Verification to Large Language Models and Hybrid Approaches: A Comprehensive Overview
Norbert Tihanyi
Tamás Bisztray
M. Ferrag
Bilel Cherif
Richard A. Dubniczky
Ridhi Jain
Lucas C. Cordeiro
277
7
0
13 Mar 2025
Similar but Patched Code Considered Harmful -- The Impact of Similar but Patched Code on Recurring Vulnerability Detection and How to Remove Them
Similar but Patched Code Considered Harmful -- The Impact of Similar but Patched Code on Recurring Vulnerability Detection and How to Remove ThemInternational Conference on Software Engineering (ICSE), 2024
Zixuan Tan
Jiayuan Zhou
Xing Hu
Shengyi Pan
Kui Liu
Xin Xia
253
1
0
31 Dec 2024
Can Neural Decompilation Assist Vulnerability Prediction on Binary Code?
Can Neural Decompilation Assist Vulnerability Prediction on Binary Code?European Workshop on System Security (EuroSec), 2024
D. Cotroneo
F. C. Grasso
R. Natella
V. Orbinato
316
0
0
10 Dec 2024
EnStack: An Ensemble Stacking Framework of Large Language Models for
  Enhanced Vulnerability Detection in Source Code
EnStack: An Ensemble Stacking Framework of Large Language Models for Enhanced Vulnerability Detection in Source CodeBigData Congress [Services Society] (BSS), 2024
Shahriyar Zaman Ridoy
Md. Shazzad Hossain Shaon
A. Cuzzocrea
Mst. Shapna Akter
249
6
0
25 Nov 2024
StagedVulBERT: Multi-Granular Vulnerability Detection with a Novel
  Pre-trained Code Model
StagedVulBERT: Multi-Granular Vulnerability Detection with a Novel Pre-trained Code ModelIEEE Transactions on Software Engineering (TSE), 2024
Yuan Jiang
Yujian Zhang
Xiaohong Su
Christoph Treude
Tiantian Wang
225
5
0
08 Oct 2024
CLNX: Bridging Code and Natural Language for C/C++
  Vulnerability-Contributing Commits Identification
CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits IdentificationAAAI Conference on Artificial Intelligence (AAAI), 2024
Zeqing Qin
Yiwei Wu
Lansheng Han
193
1
0
11 Sep 2024
Enhancing Source Code Security with LLMs: Demystifying The Challenges
  and Generating Reliable Repairs
Enhancing Source Code Security with LLMs: Demystifying The Challenges and Generating Reliable Repairs
Nafis Tanveer Islam
Joseph Khoury
Andrew Seong
E. Bou-Harb
Peyman Najafirad
AAML
311
5
0
01 Sep 2024
Unintentional Security Flaws in Code: Automated Defense via Root Cause
  Analysis
Unintentional Security Flaws in Code: Automated Defense via Root Cause Analysis
Nafis Tanveer Islam
Mazal Bethany
Dylan Manuel
Murtuza Jadliwala
Peyman Najafirad
241
0
0
30 Aug 2024
Learning-based Models for Vulnerability Detection: An Extensive Study
Learning-based Models for Vulnerability Detection: An Extensive Study
Chao Ni
Liyu Shen
Xiaodan Xu
Xin Yin
Shaohua Wang
96
1
0
14 Aug 2024
Harnessing the Power of LLMs in Source Code Vulnerability Detection
Harnessing the Power of LLMs in Source Code Vulnerability DetectionIEEE Military Communications Conference (MILCOM), 2024
Andrew A Mahyari
199
16
0
07 Aug 2024
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion
  Models: Injecting Disguised Vulnerabilities against Strong Detection
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection
Shenao Yan
Shen Wang
Yue Duan
Hanbin Hong
Kiho Lee
Doowon Kim
Yuan Hong
AAMLSILM
202
52
0
10 Jun 2024
Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in
  Lifted Compiled Code
Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code
Gary A. McCully
John D. Hastings
Shengjie Xu
Adam Fortier
261
7
0
31 May 2024
IRIS: LLM-Assisted Static Analysis for Detecting Security Vulnerabilities
IRIS: LLM-Assisted Static Analysis for Detecting Security Vulnerabilities
Ziyang Li
Saikat Dutta
Mayur Naik
398
121
0
27 May 2024
AI for DevSecOps: A Landscape and Future Opportunities
AI for DevSecOps: A Landscape and Future Opportunities
Michael Fu
Jirat Pasuksmit
Chakkrit Tantithamthavorn
197
22
0
07 Apr 2024
Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium
  Approach for Binary Vulnerability Detection
Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability DetectionInternational Conference on Information and Knowledge Management (CIKM), 2024
Litao Li
Steven H. H. Ding
Andrew Walenstein
P. Charland
Benjamin C. M. Fung
163
1
0
03 Apr 2024
Evaluating Large Language Models for Line-Level Vulnerability Localization
Evaluating Large Language Models for Line-Level Vulnerability Localization
Jian Zhang
Chong Wang
Anran Li
Weisong Sun
Cen Zhang
Wei Ma
Yang Liu
216
25
0
30 Mar 2024
A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
A Survey of Source Code Representations for Machine Learning-Based Cybersecurity TasksACM Computing Surveys (ACM CSUR), 2024
B.K. Casey
Joanna C. S. Santos
George Perry
341
13
0
15 Mar 2024
VulMCI : Code Splicing-based Pixel-row Oversampling for More Continuous
  Vulnerability Image Generation
VulMCI : Code Splicing-based Pixel-row Oversampling for More Continuous Vulnerability Image Generation
Tao Peng
Ling Gui
Yi Sun
153
1
0
28 Feb 2024
Code Security Vulnerability Repair Using Reinforcement Learning with
  Large Language Models
Code Security Vulnerability Repair Using Reinforcement Learning with Large Language Models
Nafis Tanveer Islam
Mohammad Bahrami Karkevandi
Peyman Najafirad
281
17
0
13 Jan 2024
LLM-Powered Code Vulnerability Repair with Reinforcement Learning and
  Semantic Reward
LLM-Powered Code Vulnerability Repair with Reinforcement Learning and Semantic Reward
Nafis Tanveer Islam
Joseph Khoury
Andrew Seong
Mohammad Bahrami Karkevandi
G. Parra
E. Bou-Harb
Peyman Najafirad
AAML
263
32
0
07 Jan 2024
Beyond Fidelity: Explaining Vulnerability Localization of Learning-based
  Detectors
Beyond Fidelity: Explaining Vulnerability Localization of Learning-based Detectors
Baijun Cheng
Shengming Zhao
Kailong Wang
Meizhen Wang
Guangdong Bai
Ruitao Feng
Yao Guo
Lei Ma
Haoyu Wang
FAttAAML
237
12
0
05 Jan 2024
How Far Have We Gone in Vulnerability Detection Using Large Language
  Models
How Far Have We Gone in Vulnerability Detection Using Large Language Models
Zeyu Gao
Hao Wang
Yuchen Zhou
Wenyu Zhu
Chao Zhang
328
40
0
21 Nov 2023
Understanding the Effectiveness of Large Language Models in Detecting
  Security Vulnerabilities
Understanding the Effectiveness of Large Language Models in Detecting Security Vulnerabilities
Avishree Khare
Saikat Dutta
Ziyang Li
Alaia Solko-Breslin
Rajeev Alur
Mayur Naik
ELM
374
86
0
16 Nov 2023
Large Language Models for Software Engineering: A Systematic Literature
  Review
Large Language Models for Software Engineering: A Systematic Literature ReviewACM Transactions on Software Engineering and Methodology (TOSEM), 2023
Xinying Hou
Yanjie Zhao
Yue Liu
Zhou Yang
Kailong Wang
Li Li
Xiapu Luo
David Lo
John C. Grundy
Haoyu Wang
358
773
0
21 Aug 2023
DSHGT: Dual-Supervisors Heterogeneous Graph Transformer -- A pioneer
  study of using heterogeneous graph learning for detecting software
  vulnerabilities
DSHGT: Dual-Supervisors Heterogeneous Graph Transformer -- A pioneer study of using heterogeneous graph learning for detecting software vulnerabilitiesACM Transactions on Software Engineering and Methodology (TOSEM), 2023
Tiehua Zhang
Ruiqian Xu
Jianping Zhang
Yuze Liu
Xin Chen
Jun-Jian Yin
Xi Zheng
280
6
0
02 Jun 2023
Sequential Graph Neural Networks for Source Code Vulnerability
  Identification
Sequential Graph Neural Networks for Source Code Vulnerability Identification
Ammar Ahmed
Anwar Said
Mudassir Shabbir
X. Koutsoukos
GNN
126
2
0
23 May 2023
VMCDL: Vulnerability Mining Based on Cascaded Deep Learning Under Source Control Flow
Wen Zhou
84
0
0
13 Mar 2023
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key
  Aspect Explanation
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect ExplanationInternational Conference on Software Engineering (ICSE), 2023
Jiamou Sun
Zhenchang Xing
Qinghua Lu
Xiwei Xu
Liming Zhu
Thong Hoang
Dehai Zhao
178
19
0
15 Feb 2023
An Empirical Study of Deep Learning Models for Vulnerability Detection
An Empirical Study of Deep Learning Models for Vulnerability DetectionInternational Conference on Software Engineering (ICSE), 2022
Benjamin Steenhoek
Md. Mahbubur Rahman
Richard Jiles
Wei Le
ELMAAML
334
129
0
15 Dec 2022
Deep-Learning-based Vulnerability Detection in Binary Executables
Deep-Learning-based Vulnerability Detection in Binary ExecutablesFoundations and Practice of Security (FPS), 2022
A. Schaad
Dominik Binder
168
13
0
25 Nov 2022
A Hierarchical Deep Neural Network for Detecting Lines of Codes with
  Vulnerabilities
A Hierarchical Deep Neural Network for Detecting Lines of Codes with VulnerabilitiesIEEE International Conference on Software Quality, Reliability and Security Companion (QRS), 2022
A. Mahyari
129
9
0
15 Nov 2022
Statement-Level Vulnerability Detection: Learning Vulnerability Patterns
  Through Information Theory and Contrastive Learning
Statement-Level Vulnerability Detection: Learning Vulnerability Patterns Through Information Theory and Contrastive Learning
Van Nguyen
Trung Le
Chakkrit Tantithamthavorn
Michael Fu
John C. Grundy
Hung Nguyen
S. Çamtepe
Paul Quirk
Dinh Q. Phung
164
6
0
20 Sep 2022
MANDO: Multi-Level Heterogeneous Graph Embeddings for Fine-Grained
  Detection of Smart Contract Vulnerabilities
MANDO: Multi-Level Heterogeneous Graph Embeddings for Fine-Grained Detection of Smart Contract VulnerabilitiesInternational Conference on Data Science and Advanced Analytics (DSAA), 2022
Hoang H. Nguyen
Nhat-Minh Nguyen
Chunyao Xie
Zahra Ahmadi
Daniel Kudendo
Thanh-Nam Doan
Lingxiao Jiang
168
33
0
28 Aug 2022
BlockScope: Detecting and Investigating Propagated Vulnerabilities in
  Forked Blockchain Projects
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain ProjectsNetwork and Distributed System Security Symposium (NDSS), 2022
Xiao Yi
Yuzhou Fang
Daoyuan Wu
Lingxiao Jiang
257
25
0
30 Jul 2022
No More Fine-Tuning? An Experimental Evaluation of Prompt Tuning in Code
  Intelligence
No More Fine-Tuning? An Experimental Evaluation of Prompt Tuning in Code Intelligence
Chaozheng Wang
Yuanhang Yang
Cuiyun Gao
Yun Peng
Hongyu Zhang
Michael R. Lyu
AAML
211
179
0
24 Jul 2022
Transformer-Based Language Models for Software Vulnerability Detection
Transformer-Based Language Models for Software Vulnerability DetectionAsia-Pacific Computer Systems Architecture Conference (ACSA), 2022
Chandra Thapa
Seung Ick Jang
Muhammad Ejaz Ahmed
S. Çamtepe
J. Pieprzyk
Surya Nepal
314
134
0
07 Apr 2022
LineVD: Statement-level Vulnerability Detection using Graph Neural
  Networks
LineVD: Statement-level Vulnerability Detection using Graph Neural NetworksIEEE Working Conference on Mining Software Repositories (MSR), 2022
David Hin
Andrey Kan
Huaming Chen
M. Babar
217
227
0
10 Mar 2022
VELVET: a noVel Ensemble Learning approach to automatically locate
  VulnErable sTatements
VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatementsIEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2021
Yangruibo Ding
Sahil Suneja
Yunhui Zheng
Jim Laredo
Alessandro Morari
Gail E. Kaiser
Baishakhi Ray
AAML
237
64
0
20 Dec 2021
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity
Huashan Chen
H. Çam
Shouhuai Xu
125
6
0
15 Dec 2021
The Threat of Offensive AI to Organizations
The Threat of Offensive AI to OrganizationsComputers & security (CS), 2021
Yisroel Mirsky
Ambra Demontis
J. Kotak
Ram Shankar
Deng Gelei
Liu Yang
Xinming Zhang
Wenke Lee
Yuval Elovici
Battista Biggio
209
101
0
30 Jun 2021
Literature review on vulnerability detection using NLP technology
Literature review on vulnerability detection using NLP technology
Jiajie Wu
381
16
0
23 Apr 2021
Multimodal Deep Learning for Flaw Detection in Software Programs
Multimodal Deep Learning for Flaw Detection in Software Programs
S. Heidbrink
Kathryn N. Rodhouse
Daniel M. Dunlavy
125
9
0
09 Sep 2020
1
Page 1 of 1