{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:51:07Z","timestamp":1732038667055},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/iceccs.2019.00012","type":"proceedings-article","created":{"date-parts":[[2019,10,29]],"date-time":"2019-10-29T00:25:41Z","timestamp":1572308741000},"source":"Crossref","is-referenced-by-count":28,"title":["Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding"],"prefix":"10.1109","author":[{"given":"Xiao","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Haoyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiayi","family":"Hua","sequence":"additional","affiliation":[]},{"given":"Miao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Guoai","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Li","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Yulei","family":"Sui","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.38"},{"key":"ref32","first-page":"439","article-title":"Program slicing","author":"weiser","year":"1981","journal-title":"Proceedings of the 5th International Conference on Software Engineering ICSE ‘81"},{"key":"ref31","article-title":"Multi-modal attention network learning for semantic source code retrieval","author":"wan","year":"2019","journal-title":"ASE ‘11"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898880"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134620"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16558-0_44"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2014.6987569"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.005"},{"key":"ref12","article-title":"Fast graph representation learning with PyTorch Geometric","author":"fey","year":"0","journal-title":"ICLR Workshop on Representation Learning on Graphs and Manifolds"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.54"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.13"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.62"},{"key":"ref16","author":"kingma","year":"2014","journal-title":"Adam A method for stochastic optimization"},{"key":"ref17","author":"kipf","year":"2016","journal-title":"Semi-supervised classification with graph convolutional networks"},{"key":"ref18","first-page":"1188","article-title":"Distributed representations of sentences and documents","author":"le","year":"0","journal-title":"ICML volume 32 of JMLR Workshop and Conference Proceedings"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32304-2_3"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.81"},{"key":"ref4","year":"0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.01.008"},{"key":"ref3","year":"0"},{"key":"ref6","year":"0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"ref5","year":"0"},{"key":"ref8","year":"2017"},{"key":"ref7","year":"0"},{"key":"ref2","year":"0"},{"key":"ref9","year":"2019"},{"key":"ref1","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227183"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991102"},{"key":"ref24","article-title":"The beauty and the beast: Vulnerabilities in red hat's packages","author":"neuhaus","year":"0","journal-title":"In Proceedings of the 2009 USENIX Annual Technical Conference (USENIX ATC"},{"key":"ref23","first-page":"519","article-title":"Auc: A statistically consistent and more discriminating measure than accuracy","author":"ling","year":"0","journal-title":"Proceedings of IJCAI'03"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859089"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3005714"}],"event":{"name":"2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS)","location":"Guangzhou, China","start":{"date-parts":[[2019,11,10]]},"end":{"date-parts":[[2019,11,13]]}},"container-title":["2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8871108\/8882742\/08882745.pdf?arnumber=8882745","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:50:10Z","timestamp":1658155810000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8882745\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/iceccs.2019.00012","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}