Deep learning based vulnerability detection: Are we there yet?

S Chakraborty, R Krishna, Y Ding… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Automated detection of software vulnerabilities is a fundamental problem in software
security. Existing program analysis techniques either suffer from high false positives or false …

A survey of android malware detection with deep neural models

J Qiu, J Zhang, W Luo, L Pan, S Nepal… - ACM Computing Surveys …, 2020 - dl.acm.org
Deep Learning (DL) is a disruptive technology that has changed the landscape of cyber
security research. Deep learning models have many advantages over traditional Machine …

Software vulnerability detection using deep neural networks: a survey

G Lin, S Wen, QL Han, J Zhang… - Proceedings of the …, 2020 - ieeexplore.ieee.org
The constantly increasing number of disclosed security vulnerabilities have become an
important concern in the software industry and in the field of cybersecurity, suggesting that …

Sysevr: A framework for using deep learning to detect software vulnerabilities

Z Li, D Zou, S Xu, H Jin, Y Zhu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The detection of software vulnerabilities (or vulnerabilities for short) is an important problem
that has yet to be tackled, as manifested by the many vulnerabilities reported on a daily …

VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection

D Zou, S Wang, S Xu, Z Li, H Jin - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Fine-grained software vulnerability detection is an important and challenging problem.
Ideally, a detection system (or detector) not only should be able to detect whether or not a …

Vulcnn: An image-inspired scalable vulnerability detection system

Y Wu, D Zou, S Dou, W Yang, D Xu, H Jin - Proceedings of the 44th …, 2022 - dl.acm.org
Since deep learning (DL) can automatically learn features from source code, it has been
widely used to detect source code vulnerability. To achieve scalable vulnerability scanning …

Vuldeelocator: a deep learning-based fine-grained vulnerability detector

Z Li, D Zou, S Xu, Z Chen, Y Zhu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Automatically detecting software vulnerabilities is an important problem that has attracted
much attention from the academic research community. However, existing vulnerability …

Cross-project transfer representation learning for vulnerable function discovery

G Lin, J Zhang, W Luo, L Pan, Y Xiang… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Machine learning is now widely used to detect security vulnerabilities in the software, even
before the software is released. But its potential is often severely compromised at the early …

Cyber resilience in healthcare digital twin on lung cancer

J Zhang, L Li, G Lin, D Fang, Y Tai, J Huang - IEEE access, 2020 - ieeexplore.ieee.org
As a key service of the future 6G network, healthcare digital twin is the virtual replica of a
person, which employs Internet of Things (IoT) technologies and AI-powered models to …

Data-driven cyber security in perspective—Intelligent traffic analysis

R Coulter, QL Han, L Pan, J Zhang… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Social and Internet traffic analysis is fundamental in detecting and defending cyber attacks.
Traditional approaches resorting to manually defined rules are gradually replaced by …