OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities
Zhen Li, Deqing Zou, Shouhuai Xu, et al.
IEEE Transactions on Dependable and Secure Computing (2021) Vol. 19, Iss. 4, pp. 2244-2258
Open Access | Times Cited: 201

Showing 1-25 of 201 citing articles:

A Survey on Ethereum Systems Security
Huashan Chen, Marcus Pendleton, Laurent Njilla, et al.
ACM Computing Surveys (2020) Vol. 53, Iss. 3, pp. 1-43
Open Access | Times Cited: 357

Software Vulnerability Detection Using Deep Neural Networks: A Survey
Guanjun Lin, Sheng Wen, Qing‐Long Han, et al.
Proceedings of the IEEE (2020) Vol. 108, Iss. 10, pp. 1825-1848
Closed Access | Times Cited: 342

Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection
Huanting Wang, Guixin Ye, Zhanyong Tang, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 16, pp. 1943-1958
Open Access | Times Cited: 215

BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection
Sicong Cao, Xiaobing Sun, Lili Bo, et al.
Information and Software Technology (2021) Vol. 136, pp. 106576-106576
Closed Access | Times Cited: 162

Vulnerability detection with fine-grained interpretations
Yi Li, Shaohua Wang, Tien N. Nguyen
(2021)
Open Access | Times Cited: 159

LineVul
Michael C. Fu, Chakkrit Tantithamthavorn
(2022), pp. 608-620
Open Access | Times Cited: 138

LineVD
David Hin, Andrey Kan, Huaming Chen, et al.
(2022), pp. 596-607
Open Access | Times Cited: 105

Data Quality for Software Vulnerability Datasets
Roland Croft, M. Ali Babar, M. Mehdi Kholoosi
(2023), pp. 121-133
Open Access | Times Cited: 57

An Abstract Syntax Tree based static fuzzing mutation for vulnerability evolution analysis
Zheng Wei, Peiran Deng, Kui Gui, et al.
Information and Software Technology (2023) Vol. 158, pp. 107194-107194
Closed Access | Times Cited: 46

Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection
Tommaso Zoppi, Andrea Ceccarelli, Tommaso Puccetti, et al.
Computers & Security (2023) Vol. 127, pp. 103107-103107
Open Access | Times Cited: 41

The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
Hazim Hanif, Mohd Hairul Nizam Md Nasir, Mohd Faizal Ab Razak, et al.
Journal of Network and Computer Applications (2021) Vol. 179, pp. 103009-103009
Closed Access | Times Cited: 98

Cyber Resilience in Healthcare Digital Twin on Lung Cancer
Jun Zhang, Lin Li, Guanjun Lin, et al.
IEEE Access (2020) Vol. 8, pp. 201900-201913
Open Access | Times Cited: 97

A Comparative Study of Deep Learning-Based Vulnerability Detection System
Zhen Li, Deqing Zou, Jing Tang, et al.
IEEE Access (2019) Vol. 7, pp. 103184-103197
Open Access | Times Cited: 84

VulCNN
Yueming Wu, Deqing Zou, Shihan Dou, et al.
Proceedings of the 44th International Conference on Software Engineering (2022)
Closed Access | Times Cited: 62

VulBERTa: Simplified Source Code Pre-Training for Vulnerability Detection
Hazim Hanif, Sergio Maffeis
2022 International Joint Conference on Neural Networks (IJCNN) (2022), pp. 1-8
Open Access | Times Cited: 59

VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector
Zhen Li, Deqing Zou, Shouhuai Xu, et al.
IEEE Transactions on Dependable and Secure Computing (2021) Vol. 19, Iss. 4, pp. 2821-2837
Open Access | Times Cited: 56

Transformer-Based Language Models for Software Vulnerability Detection
Chandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, et al.
(2022)
Closed Access | Times Cited: 56

MVD
Sicong Cao, Xiaobing Sun, Lili Bo, et al.
Proceedings of the 44th International Conference on Software Engineering (2022), pp. 1456-1468
Open Access | Times Cited: 53

A Survey of Learning-based Automated Program Repair
Quanjun Zhang, Chunrong Fang, Yuxiang Ma, et al.
ACM Transactions on Software Engineering and Methodology (2023) Vol. 33, Iss. 2, pp. 1-69
Open Access | Times Cited: 37

Code-centric learning-based just-in-time vulnerability detection
Son Nguyen, Thu-Trang Nguyen, Thanh Trong Vu, et al.
Journal of Systems and Software (2024) Vol. 214, pp. 112014-112014
Open Access | Times Cited: 11

A deep learning framework for predicting cyber attacks rates
Xing Fang, Maochao Xu, Shouhuai Xu, et al.
EURASIP Journal on Information Security (2019) Vol. 2019, Iss. 1
Open Access | Times Cited: 70

Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey
Peng Zeng, Guanjun Lin, Lei Pan, et al.
IEEE Access (2020) Vol. 8, pp. 197158-197172
Open Access | Times Cited: 60

Deep Learning for Software Vulnerabilities Detection Using Code Metrics
Mohammed Zagane, Mustapha Kamel Abdi, Mamdouh Alenezi
IEEE Access (2020) Vol. 8, pp. 74562-74570
Open Access | Times Cited: 50

VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches
Hao Sun, Lei Cui, Lun Li, et al.
Computers & Security (2021) Vol. 110, pp. 102417-102417
Closed Access | Times Cited: 47

Prediction of software vulnerability based deep symbiotic genetic algorithms: Phenotyping of dominant-features
Canan Batur Şahin, Özlem BATUR DİNLER, Laith Abualigah
Applied Intelligence (2021) Vol. 51, Iss. 11, pp. 8271-8287
Closed Access | Times Cited: 43

Page 1 - Next Page

Scroll to top