ResearchTrend.AI
  • Papers
  • Communities
  • Organizations
  • Events
  • Blog
  • Pricing
  • Feedback
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.02350
  4. Cited By
VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector
v1v2 (latest)

VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector

8 January 2020
Zhuguo Li
Deqing Zou
Shouhuai Xu
Zhaoxuan Chen
Yawei Zhu
Hai Jin
ArXiv (abs)PDFHTML

Papers citing "VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector"

43 / 43 papers shown
Title
Revisiting Pre-trained Language Models for Vulnerability Detection
Revisiting Pre-trained Language Models for Vulnerability Detection
Youpeng Li
Weiliang Qi
Xuyu Wang
Fuxun Yu
Xinda Wang
AAML
48
0
0
22 Jul 2025
AI-Based Software Vulnerability Detection: A Systematic Literature Review
AI-Based Software Vulnerability Detection: A Systematic Literature Review
Samiha Shimmi
Hamed Okhravi
Mona Rahimi
183
0
0
12 Jun 2025
Vulnerability Detection: From Formal Verification to Large Language Models and Hybrid Approaches: A Comprehensive Overview
Norbert Tihanyi
Tamás Bisztray
M. Ferrag
Bilel Cherif
Richard A. Dubniczky
Ridhi Jain
Lucas C. Cordeiro
132
1
0
13 Mar 2025
Similar but Patched Code Considered Harmful -- The Impact of Similar but Patched Code on Recurring Vulnerability Detection and How to Remove Them
Similar but Patched Code Considered Harmful -- The Impact of Similar but Patched Code on Recurring Vulnerability Detection and How to Remove Them
Zixuan Tan
Jiayuan Zhou
Xing Hu
Shengyi Pan
Kui Liu
Xin Xia
119
1
0
31 Dec 2024
Can Neural Decompilation Assist Vulnerability Prediction on Binary Code?
Can Neural Decompilation Assist Vulnerability Prediction on Binary Code?
D. Cotroneo
F. C. Grasso
R. Natella
V. Orbinato
212
0
0
10 Dec 2024
EnStack: An Ensemble Stacking Framework of Large Language Models for
  Enhanced Vulnerability Detection in Source Code
EnStack: An Ensemble Stacking Framework of Large Language Models for Enhanced Vulnerability Detection in Source Code
Shahriyar Zaman Ridoy
Md. Shazzad Hossain Shaon
A. Cuzzocrea
Mst. Shapna Akter
129
1
0
25 Nov 2024
StagedVulBERT: Multi-Granular Vulnerability Detection with a Novel
  Pre-trained Code Model
StagedVulBERT: Multi-Granular Vulnerability Detection with a Novel Pre-trained Code Model
Yuan Jiang
Yujian Zhang
Xiaohong Su
Christoph Treude
Tiantian Wang
97
1
0
08 Oct 2024
CLNX: Bridging Code and Natural Language for C/C++
  Vulnerability-Contributing Commits Identification
CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification
Zeqing Qin
Yiwei Wu
Lansheng Han
85
0
0
11 Sep 2024
Enhancing Source Code Security with LLMs: Demystifying The Challenges
  and Generating Reliable Repairs
Enhancing Source Code Security with LLMs: Demystifying The Challenges and Generating Reliable Repairs
Nafis Tanveer Islam
Joseph Khoury
Andrew Seong
E. Bou-Harb
Peyman Najafirad
AAML
141
4
0
01 Sep 2024
Unintentional Security Flaws in Code: Automated Defense via Root Cause
  Analysis
Unintentional Security Flaws in Code: Automated Defense via Root Cause Analysis
Nafis Tanveer Islam
Mazal Bethany
Dylan Manuel
Murtuza Jadliwala
Peyman Najafirad
116
0
0
30 Aug 2024
Harnessing the Power of LLMs in Source Code Vulnerability Detection
Harnessing the Power of LLMs in Source Code Vulnerability Detection
Andrew A Mahyari
115
8
0
07 Aug 2024
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion
  Models: Injecting Disguised Vulnerabilities against Strong Detection
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection
Shenao Yan
Shen Wang
Yue Duan
Hanbin Hong
Kiho Lee
Doowon Kim
Yuan Hong
AAMLSILM
113
31
0
10 Jun 2024
Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in
  Lifted Compiled Code
Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code
Gary A. McCully
John D. Hastings
Shengjie Xu
Adam Fortier
104
2
0
31 May 2024
IRIS: LLM-Assisted Static Analysis for Detecting Security Vulnerabilities
IRIS: LLM-Assisted Static Analysis for Detecting Security Vulnerabilities
Ziyang Li
Saikat Dutta
Mayur Naik
168
84
0
27 May 2024
AI for DevSecOps: A Landscape and Future Opportunities
AI for DevSecOps: A Landscape and Future Opportunities
Michael Fu
Jirat Pasuksmit
Chakkrit Tantithamthavorn
114
11
0
07 Apr 2024
Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium
  Approach for Binary Vulnerability Detection
Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection
Litao Li
Steven H. H. Ding
Andrew Walenstein
P. Charland
Benjamin C. M. Fung
86
1
0
03 Apr 2024
An Empirical Study of Automated Vulnerability Localization with Large
  Language Models
An Empirical Study of Automated Vulnerability Localization with Large Language Models
Jian Zhang
Chong Wang
Anran Li
Weisong Sun
Cen Zhang
Wei Ma
Yang Liu
128
20
0
30 Mar 2024
A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
B.K. Casey
Joanna C. S. Santos
George Perry
109
6
0
15 Mar 2024
VulMCI : Code Splicing-based Pixel-row Oversampling for More Continuous
  Vulnerability Image Generation
VulMCI : Code Splicing-based Pixel-row Oversampling for More Continuous Vulnerability Image Generation
Tao Peng
Ling Gui
Yi Sun
51
1
0
28 Feb 2024
Code Security Vulnerability Repair Using Reinforcement Learning with
  Large Language Models
Code Security Vulnerability Repair Using Reinforcement Learning with Large Language Models
Nafis Tanveer Islam
Mohammad Bahrami Karkevandi
Peyman Najafirad
136
10
0
13 Jan 2024
LLM-Powered Code Vulnerability Repair with Reinforcement Learning and
  Semantic Reward
LLM-Powered Code Vulnerability Repair with Reinforcement Learning and Semantic Reward
Nafis Tanveer Islam
Joseph Khoury
Andrew Seong
Mohammad Bahrami Karkevandi
G. Parra
E. Bou-Harb
Peyman Najafirad
AAML
134
25
0
07 Jan 2024
Beyond Fidelity: Explaining Vulnerability Localization of Learning-based
  Detectors
Beyond Fidelity: Explaining Vulnerability Localization of Learning-based Detectors
Baijun Cheng
Shengming Zhao
Kailong Wang
Meizhen Wang
Guangdong Bai
Ruitao Feng
Yao Guo
Lei Ma
Haoyu Wang
FAttAAML
108
10
0
05 Jan 2024
How Far Have We Gone in Vulnerability Detection Using Large Language
  Models
How Far Have We Gone in Vulnerability Detection Using Large Language Models
Zeyu Gao
Hao Wang
Yuchen Zhou
Wenyu Zhu
Chao Zhang
122
27
0
21 Nov 2023
Understanding the Effectiveness of Large Language Models in Detecting
  Security Vulnerabilities
Understanding the Effectiveness of Large Language Models in Detecting Security Vulnerabilities
Avishree Khare
Saikat Dutta
Ziyang Li
Alaia Solko-Breslin
Rajeev Alur
Mayur Naik
ELM
154
62
0
16 Nov 2023
Large Language Models for Software Engineering: A Systematic Literature
  Review
Large Language Models for Software Engineering: A Systematic Literature Review
Xinying Hou
Yanjie Zhao
Yue Liu
Zhou Yang
Kailong Wang
Li Li
Xiapu Luo
David Lo
John C. Grundy
Haoyu Wang
226
547
0
21 Aug 2023
DSHGT: Dual-Supervisors Heterogeneous Graph Transformer -- A pioneer
  study of using heterogeneous graph learning for detecting software
  vulnerabilities
DSHGT: Dual-Supervisors Heterogeneous Graph Transformer -- A pioneer study of using heterogeneous graph learning for detecting software vulnerabilities
Tiehua Zhang
Ruiqian Xu
Jianping Zhang
Yuze Liu
Xin Chen
Jun-Jian Yin
Xi Zheng
147
2
0
02 Jun 2023
Sequential Graph Neural Networks for Source Code Vulnerability
  Identification
Sequential Graph Neural Networks for Source Code Vulnerability Identification
Ammar Ahmed
Anwar Said
Mudassir Shabbir
X. Koutsoukos
GNN
68
2
0
23 May 2023
VMCDL: Vulnerability Mining Based on Cascaded Deep Learning Under Source Control Flow
Wen Zhou
60
0
0
13 Mar 2023
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key
  Aspect Explanation
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation
Jiamou Sun
Zhenchang Xing
Qinghua Lu
Xiwei Xu
Liming Zhu
Thong Hoang
Dehai Zhao
93
16
0
15 Feb 2023
An Empirical Study of Deep Learning Models for Vulnerability Detection
An Empirical Study of Deep Learning Models for Vulnerability Detection
Benjamin Steenhoek
Md. Mahbubur Rahman
Richard Jiles
Wei Le
ELMAAML
133
105
0
15 Dec 2022
Deep-Learning-based Vulnerability Detection in Binary Executables
Deep-Learning-based Vulnerability Detection in Binary Executables
A. Schaad
Dominik Binder
87
10
0
25 Nov 2022
A Hierarchical Deep Neural Network for Detecting Lines of Codes with
  Vulnerabilities
A Hierarchical Deep Neural Network for Detecting Lines of Codes with Vulnerabilities
A. Mahyari
85
5
0
15 Nov 2022
Statement-Level Vulnerability Detection: Learning Vulnerability Patterns
  Through Information Theory and Contrastive Learning
Statement-Level Vulnerability Detection: Learning Vulnerability Patterns Through Information Theory and Contrastive Learning
Van Nguyen
Trung Le
Chakkrit Tantithamthavorn
Michael Fu
John C. Grundy
Hung Nguyen
S. Çamtepe
Paul Quirk
Dinh Q. Phung
110
4
0
20 Sep 2022
MANDO: Multi-Level Heterogeneous Graph Embeddings for Fine-Grained
  Detection of Smart Contract Vulnerabilities
MANDO: Multi-Level Heterogeneous Graph Embeddings for Fine-Grained Detection of Smart Contract Vulnerabilities
Hoang H. Nguyen
Nhat-Minh Nguyen
Chunyao Xie
Zahra Ahmadi
Daniel Kudendo
Thanh-Nam Doan
Lingxiao Jiang
87
23
0
28 Aug 2022
BlockScope: Detecting and Investigating Propagated Vulnerabilities in
  Forked Blockchain Projects
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects
Xiao Yi
Yuzhou Fang
Daoyuan Wu
Lingxiao Jiang
100
22
0
30 Jul 2022
No More Fine-Tuning? An Experimental Evaluation of Prompt Tuning in Code
  Intelligence
No More Fine-Tuning? An Experimental Evaluation of Prompt Tuning in Code Intelligence
Chaozheng Wang
Yuanhang Yang
Cuiyun Gao
Yun Peng
Hongyu Zhang
Michael R. Lyu
AAML
144
151
0
24 Jul 2022
Transformer-Based Language Models for Software Vulnerability Detection
Transformer-Based Language Models for Software Vulnerability Detection
Chandra Thapa
Seung Ick Jang
Muhammad Ejaz Ahmed
S. Çamtepe
J. Pieprzyk
Surya Nepal
144
113
0
07 Apr 2022
LineVD: Statement-level Vulnerability Detection using Graph Neural
  Networks
LineVD: Statement-level Vulnerability Detection using Graph Neural Networks
David Hin
Andrey Kan
Huaming Chen
M. Babar
108
187
0
10 Mar 2022
VELVET: a noVel Ensemble Learning approach to automatically locate
  VulnErable sTatements
VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Yangruibo Ding
Sahil Suneja
Yunhui Zheng
Jim Laredo
Alessandro Morari
Gail E. Kaiser
Baishakhi Ray
AAML
151
51
0
20 Dec 2021
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity
Huashan Chen
H. Çam
Shouhuai Xu
75
6
0
15 Dec 2021
The Threat of Offensive AI to Organizations
The Threat of Offensive AI to Organizations
Yisroel Mirsky
Ambra Demontis
J. Kotak
Ram Shankar
Deng Gelei
Liu Yang
Xinming Zhang
Wenke Lee
Yuval Elovici
Battista Biggio
138
90
0
30 Jun 2021
Literature review on vulnerability detection using NLP technology
Literature review on vulnerability detection using NLP technology
Jiajie Wu
182
15
0
23 Apr 2021
Multimodal Deep Learning for Flaw Detection in Software Programs
Multimodal Deep Learning for Flaw Detection in Software Programs
S. Heidbrink
Kathryn N. Rodhouse
Daniel M. Dunlavy
59
7
0
09 Sep 2020
1