
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
VulCNN
Yueming Wu, Deqing Zou, Shihan Dou, et al.
Proceedings of the 44th International Conference on Software Engineering (2022)
Closed Access | Times Cited: 64
Yueming Wu, Deqing Zou, Shihan Dou, et al.
Proceedings of the 44th International Conference on Software Engineering (2022)
Closed Access | Times Cited: 64
Showing 1-25 of 64 citing articles:
An Empirical Study of Deep Learning Models for Vulnerability Detection
Benjamin Steenhoek, Md. Mahbubur Rahman, Richard Jiles, et al.
(2023), pp. 2237-2248
Open Access | Times Cited: 45
Benjamin Steenhoek, Md. Mahbubur Rahman, Richard Jiles, et al.
(2023), pp. 2237-2248
Open Access | Times Cited: 45
GRACE: Empowering LLM-based software vulnerability detection with graph structure and in-context learning
Guilong Lu, Xiaolin Ju, Xiang Chen, et al.
Journal of Systems and Software (2024) Vol. 212, pp. 112031-112031
Closed Access | Times Cited: 29
Guilong Lu, Xiaolin Ju, Xiang Chen, et al.
Journal of Systems and Software (2024) Vol. 212, pp. 112031-112031
Closed Access | Times Cited: 29
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
Xin-Cheng Wen, Yupan Chen, Cuiyun Gao, et al.
(2023), pp. 2275-2286
Open Access | Times Cited: 29
Xin-Cheng Wen, Yupan Chen, Cuiyun Gao, et al.
(2023), pp. 2275-2286
Open Access | Times Cited: 29
A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
Beatrice Casey, Joanna C. S. Santos, George Perry
ACM Computing Surveys (2025)
Open Access | Times Cited: 1
Beatrice Casey, Joanna C. S. Santos, George Perry
ACM Computing Surveys (2025)
Open Access | Times Cited: 1
Vulnerability Detection by Learning From Syntax-Based Execution Paths of Code
Junwei Zhang, Zhongxin Liu, Xing Hu, et al.
IEEE Transactions on Software Engineering (2023) Vol. 49, Iss. 8, pp. 4196-4212
Closed Access | Times Cited: 22
Junwei Zhang, Zhongxin Liu, Xing Hu, et al.
IEEE Transactions on Software Engineering (2023) Vol. 49, Iss. 8, pp. 4196-4212
Closed Access | Times Cited: 22
Hybrid semantics-based vulnerability detection incorporating a Temporal Convolutional Network and Self-attention Mechanism
Jinfu Chen, Weijia Wang, Bo Liu, et al.
Information and Software Technology (2024) Vol. 171, pp. 107453-107453
Closed Access | Times Cited: 5
Jinfu Chen, Weijia Wang, Bo Liu, et al.
Information and Software Technology (2024) Vol. 171, pp. 107453-107453
Closed Access | Times Cited: 5
VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses
Yu Nong, Richard Fang, Guangbei Yi, et al.
(2024), pp. 1-13
Open Access | Times Cited: 5
Yu Nong, Richard Fang, Guangbei Yi, et al.
(2024), pp. 1-13
Open Access | Times Cited: 5
Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?
Yutao Hu, Suyuan Wang, Wenke Li, et al.
(2023), pp. 1407-1419
Closed Access | Times Cited: 11
Yutao Hu, Suyuan Wang, Wenke Li, et al.
(2023), pp. 1407-1419
Closed Access | Times Cited: 11
A software vulnerability detection method based on deep learning with complex network analysis and subgraph partition
Wenjing Cai, Junlin Chen, Jiaping Yu, et al.
Information and Software Technology (2023) Vol. 164, pp. 107328-107328
Closed Access | Times Cited: 11
Wenjing Cai, Junlin Chen, Jiaping Yu, et al.
Information and Software Technology (2023) Vol. 164, pp. 107328-107328
Closed Access | Times Cited: 11
Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection
Xin-Cheng Wen, Cuiyun Gao, Jiaxin Ye, et al.
IEEE Transactions on Software Engineering (2023) Vol. 50, Iss. 3, pp. 360-375
Open Access | Times Cited: 11
Xin-Cheng Wen, Cuiyun Gao, Jiaxin Ye, et al.
IEEE Transactions on Software Engineering (2023) Vol. 50, Iss. 3, pp. 360-375
Open Access | Times Cited: 11
ProRLearn: boosting prompt tuning-based vulnerability detection by reinforcement learning
Zilong Ren, Xiaolin Ju, Xiang Chen, et al.
Automated Software Engineering (2024) Vol. 31, Iss. 2
Open Access | Times Cited: 4
Zilong Ren, Xiaolin Ju, Xiang Chen, et al.
Automated Software Engineering (2024) Vol. 31, Iss. 2
Open Access | Times Cited: 4
Vulnerability detection with graph enhancement and global dependency representation learning
Xuehai Jia, Junwei Du, Minying Fang, et al.
Automated Software Engineering (2025) Vol. 32, Iss. 1
Closed Access
Xuehai Jia, Junwei Du, Minying Fang, et al.
Automated Software Engineering (2025) Vol. 32, Iss. 1
Closed Access
Towards cost-efficient vulnerability detection with cross-modal adversarial reprogramming
Zhenzhou Tian, Rui Qiu, Yong Teng, et al.
Journal of Systems and Software (2025), pp. 112365-112365
Closed Access
Zhenzhou Tian, Rui Qiu, Yong Teng, et al.
Journal of Systems and Software (2025), pp. 112365-112365
Closed Access
Source Code Vulnerability Detection Based on Joint Graph and Multimodal Feature Fusion
Dun Jin, Chengwan He, Quan Zou, et al.
Electronics (2025) Vol. 14, Iss. 5, pp. 975-975
Open Access
Dun Jin, Chengwan He, Quan Zou, et al.
Electronics (2025) Vol. 14, Iss. 5, pp. 975-975
Open Access
Machine Learning Approaches in Software Vulnerability Detection: A Systematic Review and Analysis of Contemporary Methods
Jude E. Ameh, Abayomi Otebolaku, Alex Shenfield, et al.
Research Square (Research Square) (2025)
Closed Access
Jude E. Ameh, Abayomi Otebolaku, Alex Shenfield, et al.
Research Square (Research Square) (2025)
Closed Access
Transformer-based statement level vulnerability detection by cross-modal fine-grained features capture
Wenxin Tao, Xiaohong Su, Yang Ke, et al.
Knowledge-Based Systems (2025), pp. 113341-113341
Closed Access
Wenxin Tao, Xiaohong Su, Yang Ke, et al.
Knowledge-Based Systems (2025), pp. 113341-113341
Closed Access
VULOC: Vulnerability location framework based on assembly code slicing
Xinghang Lv, Jianming Fu, Peng Tao
Journal of Systems and Software (2025), pp. 112459-112459
Closed Access
Xinghang Lv, Jianming Fu, Peng Tao
Journal of Systems and Software (2025), pp. 112459-112459
Closed Access
A Novel Vulnerability‐Detection Method Based on the Semantic Features of Source Code and the LLVM Intermediate Representation
Jinfu Chen, Jiapeng Zhou, Wei Lin, et al.
Journal of Software Evolution and Process (2025) Vol. 37, Iss. 5
Closed Access
Jinfu Chen, Jiapeng Zhou, Wei Lin, et al.
Journal of Software Evolution and Process (2025) Vol. 37, Iss. 5
Closed Access
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
Zhen Li, N. Y. Wang, Deqing Zou, et al.
(2024), pp. 1-12
Open Access | Times Cited: 3
Zhen Li, N. Y. Wang, Deqing Zou, et al.
(2024), pp. 1-12
Open Access | Times Cited: 3
Software vulnerability detection under poisoning attacks using CNN-based image processing
Lorena González‐Manzano, Joaquin Garcia‐Alfaro
International Journal of Information Security (2025) Vol. 24, Iss. 2
Open Access
Lorena González‐Manzano, Joaquin Garcia‐Alfaro
International Journal of Information Security (2025) Vol. 24, Iss. 2
Open Access
A software vulnerability detection method based on multi-modality with unified processing
Wenjing Cai, Junlin Chen, Jiaping Yu, et al.
Information and Software Technology (2025), pp. 107703-107703
Closed Access
Wenjing Cai, Junlin Chen, Jiaping Yu, et al.
Information and Software Technology (2025), pp. 107703-107703
Closed Access
XGV-BERT: Leveraging contextualized language model and graph neural network for efficient software vulnerability detection
Vu Le Anh Quan, Chau Thuan Phat, Kiet Van Nguyen, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 6
Closed Access
Vu Le Anh Quan, Chau Thuan Phat, Kiet Van Nguyen, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 6
Closed Access
Detecting Condition-Related Bugs with Control Flow Graph Neural Network
Jian Zhang, Xu Wang, Hongyu Zhang, et al.
(2023)
Closed Access | Times Cited: 8
Jian Zhang, Xu Wang, Hongyu Zhang, et al.
(2023)
Closed Access | Times Cited: 8
SCL-CVD: Supervised contrastive learning for code vulnerability detection via GraphCodeBERT
Rongcun Wang, Senlei Xu, Yuan Tian, et al.
Computers & Security (2024) Vol. 145, pp. 103994-103994
Closed Access | Times Cited: 3
Rongcun Wang, Senlei Xu, Yuan Tian, et al.
Computers & Security (2024) Vol. 145, pp. 103994-103994
Closed Access | Times Cited: 3
Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model
Bin Yuan, Yifan Lu, Yilin Fang, et al.
(2023)
Closed Access | Times Cited: 7
Bin Yuan, Yifan Lu, Yilin Fang, et al.
(2023)
Closed Access | Times Cited: 7