ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2101.01431
  4. Cited By
Generating Informative CVE Description From ExploitDB Posts by
  Extractive Summarization

Generating Informative CVE Description From ExploitDB Posts by Extractive Summarization

5 January 2021
Jiamou Sun
Zhenchang Xing
Hao Guo
Deheng Ye
Xiaohong Li
Xiwei Xu
Liming Zhu
ArXiv (abs)PDFHTML

Papers citing "Generating Informative CVE Description From ExploitDB Posts by Extractive Summarization"

6 / 6 papers shown
Using LLMs for Security Advisory Investigations: How Far Are We?
Using LLMs for Security Advisory Investigations: How Far Are We?
Bayu Fedra Abdullah
Yusuf Sulistyo Nugroho
Brittany Reid
R. Kula
Kazumasa Shimari
Kenichi Matsumoto
191
0
0
16 Jun 2025
Towards the generation of hierarchical attack models from cybersecurity
  vulnerabilities using language models
Towards the generation of hierarchical attack models from cybersecurity vulnerabilities using language modelsApplied Soft Computing (Appl. Soft Comput.), 2024
Kacper Sowka
Vasile Palade
Xiaorui Jiang
Hesam Jadidbonab
272
2
0
07 Oct 2024
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key
  Aspect Explanation
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect ExplanationInternational Conference on Software Engineering (ICSE), 2023
Jiamou Sun
Zhenchang Xing
Qinghua Lu
Xiwei Xu
Liming Zhu
Thong Hoang
Dehai Zhao
255
24
0
15 Feb 2023
Few-Sample Named Entity Recognition for Security Vulnerability Reports
  by Fine-Tuning Pre-Trained Language Models
Few-Sample Named Entity Recognition for Security Vulnerability Reports by Fine-Tuning Pre-Trained Language Models
Guanqun Yang
Shay Dineen
Zhipeng Lin
Xueqing Liu
AAML
251
19
0
14 Aug 2021
Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK
  Framework: A Self-Distillation Approach
Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach
Benjamin Ampel
Sagar Samtani
Steven Ullman
Hsinchun Chen
271
53
0
03 Aug 2021
A Survey on Data-driven Software Vulnerability Assessment and
  Prioritization
A Survey on Data-driven Software Vulnerability Assessment and PrioritizationACM Computing Surveys (CSUR), 2021
T. H. Le
Huaming Chen
Muhammad Ali Babar
562
121
0
18 Jul 2021
1
Page 1 of 1