
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Learning from what we know: How to perform vulnerability prediction using noisy historical data
Aayush Garg, Renzo Degiovanni, Matthieu Jimenez, et al.
Empirical Software Engineering (2022) Vol. 27, Iss. 7
Open Access | Times Cited: 18
Aayush Garg, Renzo Degiovanni, Matthieu Jimenez, et al.
Empirical Software Engineering (2022) Vol. 27, Iss. 7
Open Access | Times Cited: 18
Showing 18 citing articles:
Data Quality for Software Vulnerability Datasets
Roland Croft, M. Ali Babar, M. Mehdi Kholoosi
(2023), pp. 121-133
Open Access | Times Cited: 56
Roland Croft, M. Ali Babar, M. Mehdi Kholoosi
(2023), pp. 121-133
Open Access | Times Cited: 56
Predicting Vulnerabilities in Computer Source Code Using Non-Investigated Software Metrics
Francis Kwadzo Agbenyegah, Jinfu Chen, Micheal Asante, et al.
Software Quality Journal (2025) Vol. 33, Iss. 1
Closed Access
Francis Kwadzo Agbenyegah, Jinfu Chen, Micheal Asante, et al.
Software Quality Journal (2025) Vol. 33, Iss. 1
Closed Access
Early and Realistic Exploitability Prediction of Just-Disclosed Software Vulnerabilities: How Reliable Can It Be?
Emanuele Iannone, Giulia Sellitto, Emanuele Iaccarino, et al.
ACM Transactions on Software Engineering and Methodology (2024) Vol. 33, Iss. 6, pp. 1-41
Open Access | Times Cited: 3
Emanuele Iannone, Giulia Sellitto, Emanuele Iaccarino, et al.
ACM Transactions on Software Engineering and Methodology (2024) Vol. 33, Iss. 6, pp. 1-41
Open Access | Times Cited: 3
The Impact of hard and easy negative training data on vulnerability prediction performance
Fahad Al Debeyan, Lech Madeyski, Tracy Hall, et al.
Journal of Systems and Software (2024) Vol. 211, pp. 112003-112003
Open Access | Times Cited: 2
Fahad Al Debeyan, Lech Madeyski, Tracy Hall, et al.
Journal of Systems and Software (2024) Vol. 211, pp. 112003-112003
Open Access | Times Cited: 2
Syntactic Versus Semantic Similarity of Artificial and Real Faults in Mutation Testing Studies
Miloš Ojdanić, Aayush Garg, Ahmed Khanfir, et al.
IEEE Transactions on Software Engineering (2023) Vol. 49, Iss. 7, pp. 3922-3938
Open Access | Times Cited: 5
Miloš Ojdanić, Aayush Garg, Ahmed Khanfir, et al.
IEEE Transactions on Software Engineering (2023) Vol. 49, Iss. 7, pp. 3922-3938
Open Access | Times Cited: 5
An Empirical Study of the Imbalance Issue in Software Vulnerability Detection
Yuejun Guo, Qiang Hu, Qiang Tang, et al.
Lecture notes in computer science (2024), pp. 371-390
Closed Access | Times Cited: 1
Yuejun Guo, Qiang Hu, Qiang Tang, et al.
Lecture notes in computer science (2024), pp. 371-390
Closed Access | Times Cited: 1
Survey of source code vulnerability analysis based on deep learning
Liang Chen, Qiang Wei, Jiang Du, et al.
Computers & Security (2024) Vol. 148, pp. 104098-104098
Open Access | Times Cited: 1
Liang Chen, Qiang Wei, Jiang Du, et al.
Computers & Security (2024) Vol. 148, pp. 104098-104098
Open Access | Times Cited: 1
An Investigation of Quality Issues in Vulnerability Detection Datasets
Yuejun Guo, Seifeddine Bettaieb
(2023), pp. 29-33
Open Access | Times Cited: 4
Yuejun Guo, Seifeddine Bettaieb
(2023), pp. 29-33
Open Access | Times Cited: 4
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection
Xin-Cheng Wen, Xinchen Wang, Cuiyun Gao, et al.
2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) (2023), pp. 345-357
Open Access | Times Cited: 3
Xin-Cheng Wen, Xinchen Wang, Cuiyun Gao, et al.
2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) (2023), pp. 345-357
Open Access | Times Cited: 3
Enabling Efficient Assertion Inference
Aayush Garg, Renzo Degiovanni, Facundo Molina, et al.
(2023), pp. 623-634
Open Access | Times Cited: 2
Aayush Garg, Renzo Degiovanni, Facundo Molina, et al.
(2023), pp. 623-634
Open Access | Times Cited: 2
Adaptive Hybrid Learning for Websites Vulnerability prediction
Mohannad Hossain Hadi, Karim Hashim Al-Saedi
Journal of Al-Qadisiyah for Computer Science and Mathematics (2024) Vol. 16, Iss. 1
Open Access
Mohannad Hossain Hadi, Karim Hashim Al-Saedi
Journal of Al-Qadisiyah for Computer Science and Mathematics (2024) Vol. 16, Iss. 1
Open Access
Predicting software vulnerability based on software metrics: a deep learning approach
Francis Kwadzo Agbenyegah, Micheal Asante, Jinfu Chen, et al.
Iran Journal of Computer Science (2024)
Closed Access
Francis Kwadzo Agbenyegah, Micheal Asante, Jinfu Chen, et al.
Iran Journal of Computer Science (2024)
Closed Access
A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead
Yuejun Guo, Seifeddine Bettaieb, Fran Casino
International Journal of Information Security (2024) Vol. 23, Iss. 5, pp. 3311-3327
Open Access
Yuejun Guo, Seifeddine Bettaieb, Fran Casino
International Journal of Information Security (2024) Vol. 23, Iss. 5, pp. 3311-3327
Open Access
On the Coupling between Vulnerabilities and LLM-Generated Mutants: A Study on Vul4J Dataset
Aayush Garg, Renzo Degiovanni, Mike Papadakis, et al.
(2024), pp. 305-316
Closed Access
Aayush Garg, Renzo Degiovanni, Mike Papadakis, et al.
(2024), pp. 305-316
Closed Access
Automatic Data Labeling for Software Vulnerability Prediction Models: How Far Are We?
Triet Huynh Minh Le, Muhammad Ali Babar
(2024), pp. 131-142
Open Access
Triet Huynh Minh Le, Muhammad Ali Babar
(2024), pp. 131-142
Open Access
On Comparing Mutation Testing Tools through Learning-based Mutant Selection
Miloš Ojdanić, Ahmed Khanfir, Aayush Garg, et al.
(2023), pp. 35-46
Open Access | Times Cited: 1
Miloš Ojdanić, Ahmed Khanfir, Aayush Garg, et al.
(2023), pp. 35-46
Open Access | Times Cited: 1
The Impact of Hard and Easy Negative Training Data on Vulnerability Prediction Performance
Fahad Al Debeyan, Lech Madeyski, Tracy Hall, et al.
(2023)
Closed Access
Fahad Al Debeyan, Lech Madeyski, Tracy Hall, et al.
(2023)
Closed Access
MagicMirror: Towards High-Coverage Fuzzing of Smart Contracts
Huadong Feng, Xiaolei Ren, Qi-Ping Wei, et al.
(2023) Vol. 4963, pp. 141-152
Closed Access
Huadong Feng, Xiaolei Ren, Qi-Ping Wei, et al.
(2023) Vol. 4963, pp. 141-152
Closed Access