OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Transformer-Based Language Models for Software Vulnerability Detection
Chandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, et al.
(2022)
Closed Access | Times Cited: 56

Showing 1-25 of 56 citing articles:

DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection
Yizheng Chen, Zhoujie Ding, Lamya Alowain, et al.
(2023), pp. 654-668
Open Access | Times Cited: 56

Revolutionizing Cyber Threat Detection With Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices
Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, et al.
IEEE Access (2024) Vol. 12, pp. 23733-23750
Open Access | Times Cited: 50

Refining ChatGPT-Generated Code: Characterizing and Mitigating Code Quality Issues
Yue Liu, Thanh Le-Cong, Ratnadira Widyasari, et al.
ACM Transactions on Software Engineering and Methodology (2024) Vol. 33, Iss. 5, pp. 1-26
Open Access | Times Cited: 28

Research Directions in Software Supply Chain Security
Laurie Williams, Giacomo Benedetti, Sivana Hamer, et al.
ACM Transactions on Software Engineering and Methodology (2025)
Closed Access | Times Cited: 2

From Vulnerability to Defense: The Role of Large Language Models in Enhancing Cybersecurity
Wafaa Kasri, Yassine Himeur, Hamzah Ali Alkhazaleh, et al.
Computation (2025) Vol. 13, Iss. 2, pp. 30-30
Open Access | Times Cited: 2

Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities
Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, et al.
Internet of Things and Cyber-Physical Systems (2025)
Open Access | Times Cited: 2

Malware Detection with Artificial Intelligence: A Systematic Literature Review
Matthew Gaber, Mohiuddin Ahmed, Helge Janicke
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-33
Open Access | Times Cited: 22

LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks
Saad Ullah, Mingji Han, Saurabh Pujar, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 862-880
Closed Access | Times Cited: 10

When geoscience meets generative AI and large language models: Foundations, trends, and future challenges
Abdenour Hadid, Tanujit Chakraborty, D. Busby
Expert Systems (2024) Vol. 41, Iss. 10
Closed Access | Times Cited: 9

VulDetect: A novel technique for detecting software vulnerabilities using Language Models
Marwan Omar, Stavros Shiaeles
(2023), pp. 105-110
Closed Access | Times Cited: 20

A New Approach to Web Application Security: Utilizing GPT Language Models for Source Code Inspection
Zoltán Szabó, Vilmos Bilicki
Future Internet (2023) Vol. 15, Iss. 10, pp. 326-326
Open Access | Times Cited: 20

Software Vulnerability Detection using Large Language Models
Moumita Das Purba, Arpita Ghosh, Benjamin J. Radford, et al.
(2023), pp. 112-119
Closed Access | Times Cited: 20

AIBugHunter: A Practical tool for predicting, classifying and repairing software vulnerabilities
Michael C. Fu, Chakkrit Tantithamthavorn, Trung Le, et al.
Empirical Software Engineering (2023) Vol. 29, Iss. 1
Open Access | Times Cited: 20

DP-CCL: A Supervised Contrastive Learning Approach Using CodeBERT Model in Software Defect Prediction
Sadia Sahar, Muhammad Younas, Muhammad Murad Khan, et al.
IEEE Access (2024) Vol. 12, pp. 22582-22594
Open Access | Times Cited: 5

Smart Contract Vulnerability Detection: The Role of Large Language Model (LLM)
Biagio Boi, Christian Esposito, Sokjoon Lee
ACM SIGAPP Applied Computing Review (2024) Vol. 24, Iss. 2, pp. 19-29
Closed Access | Times Cited: 5

Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis
Vasileios Kouliaridis, Γεώργιος Καρόπουλος, Georgios Kambourakis
Lecture notes in computer science (2025), pp. 139-154
Closed Access

Machine Learning Approaches in Software Vulnerability Detection: A Systematic Review and Analysis of Contemporary Methods
Jude E. Ameh, Abayomi Otebolaku, Alex Shenfield, et al.
Research Square (Research Square) (2025)
Closed Access

Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives
Sihao Hu, Tiansheng Huang, Fatih İlhan, et al.
(2023), pp. 297-306
Open Access | Times Cited: 12

Out of the Cage: How Stochastic Parrots Win in Cyber Security Environments
María Rigaki, Ondřej Lukáš, Carlos Catania, et al.
Proceedings of the 14th International Conference on Agents and Artificial Intelligence (2024), pp. 774-781
Open Access | Times Cited: 4

Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite
Xuewei Feng, Qi Li, Kun Sun, et al.
Communications of the ACM (2025)
Open Access

A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
Beatrice Casey, Joanna C. S. Santos, George Perry
ACM Computing Surveys (2025)
Open Access

Do LLMs consider security? an empirical study on responses to programming questions
Amirali Sajadi, Binh Le, Thu Anh Nguyen, et al.
Empirical Software Engineering (2025) Vol. 30, Iss. 3
Open Access

VulD-Transformer: Source Code Vulnerability Detection via Transformer
Xuejun Zhang, Fenghe Zhang, Bo Zhao, et al.
(2023)
Closed Access | Times Cited: 7

A Review of Hybrid Cyber Threats Modelling and Detection Using Artificial Intelligence in IIoT
Yifan Liu, Shancang Li, Xinheng Wang, et al.
Computer Modeling in Engineering & Sciences (2024) Vol. 140, Iss. 2, pp. 1233-1261
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top