The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2021
DOI: 10.1109/ase51524.2021.9678622
|View full text |Cite
|
Sign up to set email alerts
|

DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 66 publications
0
15
0
Order By: Relevance
“…Due to the long-tailed distribution of CWE categories, we use three metrics, i.e., Macro F1, Weighted F1 and the multi-class version of Matthews Correlation Coefficient (MCC) [23], for evaluation. These metrics are also used by other vulnerability-related studies [28,38]. Macro F1 is the unweighted mean of the F1-scores of all categories, whereas Weighted F1 considers weighted mean.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Due to the long-tailed distribution of CWE categories, we use three metrics, i.e., Macro F1, Weighted F1 and the multi-class version of Matthews Correlation Coefficient (MCC) [23], for evaluation. These metrics are also used by other vulnerability-related studies [28,38]. Macro F1 is the unweighted mean of the F1-scores of all categories, whereas Weighted F1 considers weighted mean.…”
Section: Methodsmentioning
confidence: 99%
“…It is crucial to detect, categorize and assess vulnerabilities. Due to the rapid increase in the number of software vulnerabilities and the success of deep learning techniques, researchers have proposed diverse deep-learning-based approaches to automate vulnerability analysis, such as vulnerability detection [14,68], classification [8,70], patch identification [66,69] and assessment [37,38], and achieved promising results.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For this example, line 2-4, line 8 and line 10 are unrelated to the content and intent of this code change. As discussed in Section I, existing code change representation approaches either ignore the context [3], [8], [16], do not highlight the changed code [2], [13], [18], or consider all the context without adaptive information selection [14], [17]. These hinder their effectiveness and generality, and motivate us to propose the query-back mechanism to explicitly highlight the changed code and learn to adaptively capture information from the code change.…”
Section: Motivation Of Query-back Mechanismmentioning
confidence: 99%
“…However, many of them adopt task-specific architectures and are trained from scratch, which makes it non-trivial to adapt them to other tasks, especially the tasks with only small datasets. In addition, existing learning-based techniques either only focus on the changed code [3], [8], [16], separately encode the changed code and its context [14], [17], or encode the code change as a whole [2], [13], [18]. Some of them ignore the context or do not highlight the changed code.…”
Section: Introductionmentioning
confidence: 99%