{"id":"https://openalex.org/W4318147418","doi":"https://doi.org/10.1109/bigdata55660.2022.10020813","title":"Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms","display_name":"Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms","publication_year":2022,"publication_date":"2022-12-17","ids":{"openalex":"https://openalex.org/W4318147418","doi":"https://doi.org/10.1109/bigdata55660.2022.10020813"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata55660.2022.10020813","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata55660.2022.10020813","pdf_url":null,"source":{"id":"https://openalex.org/S4363607709","display_name":"2022 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2306.08060","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015055011","display_name":"Mst Shapna Akter","orcid":"https://orcid.org/0000-0002-9859-6265"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mst Shapna Akter","raw_affiliation_strings":["Kennesaw State University,Department of Computer Science,USA","Department of Computer Science, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University,Department of Computer Science,USA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Department of Computer Science, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007582133","display_name":"Md Jobair Hossain Faruk","orcid":"https://orcid.org/0000-0002-6316-5334"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Md Jobair Hossain Faruk","raw_affiliation_strings":["Kennesaw State University,Department of Computer Science,USA","Department of Computer Science, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University,Department of Computer Science,USA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Department of Computer Science, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009454024","display_name":"Nafisa Anjum","orcid":"https://orcid.org/0000-0002-8674-1189"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nafisa Anjum","raw_affiliation_strings":["Kennesaw State University,Department of Information Technology,USA","Department of Information Technology, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University,Department of Information Technology,USA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Department of Information Technology, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083502477","display_name":"Mohammad Masum","orcid":"https://orcid.org/0000-0001-9974-6950"},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad Masum","raw_affiliation_strings":["San Jose State University,Department of Applied Data Science,USA","Department of Applied Data Science, San Jose State University, USA"],"affiliations":[{"raw_affiliation_string":"San Jose State University,Department of Applied Data Science,USA","institution_ids":["https://openalex.org/I51504820"]},{"raw_affiliation_string":"Department of Applied Data Science, San Jose State University, USA","institution_ids":["https://openalex.org/I51504820"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052820694","display_name":"Hossain Shahriar","orcid":"https://orcid.org/0000-0003-1021-7986"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hossain Shahriar","raw_affiliation_strings":["Kennesaw State University,Department of Information Technology,USA","Department of Information Technology, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University,Department of Information Technology,USA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Department of Information Technology, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064445643","display_name":"Nazmus Sakib","orcid":"https://orcid.org/0000-0001-7671-9888"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nazmus Sakib","raw_affiliation_strings":["Kennesaw State University,Department of Information Technology,USA","Department of Information Technology, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University,Department of Information Technology,USA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Department of Information Technology, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069063267","display_name":"Akond Rahman","orcid":"https://orcid.org/0000-0002-5056-757X"},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Akond Rahman","raw_affiliation_strings":["Auburn University,Department of Computer Science and Software Engineering,USA","Department of Computer Science and Software Engineering, Auburn University, USA"],"affiliations":[{"raw_affiliation_string":"Auburn University,Department of Computer Science and Software Engineering,USA","institution_ids":["https://openalex.org/I82497590"]},{"raw_affiliation_string":"Department of Computer Science and Software Engineering, Auburn University, USA","institution_ids":["https://openalex.org/I82497590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101803324","display_name":"Fan Wu","orcid":"https://orcid.org/0000-0002-6248-2784"},"institutions":[{"id":"https://openalex.org/I6026837","display_name":"Tuskegee University","ror":"https://ror.org/0137n4m74","country_code":"US","type":"education","lineage":["https://openalex.org/I6026837"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fan Wu","raw_affiliation_strings":["Tuskegee University,Department of Computer Science,USA","Department of Computer Science, Tuskegee University, USA"],"affiliations":[{"raw_affiliation_string":"Tuskegee University,Department of Computer Science,USA","institution_ids":["https://openalex.org/I6026837"]},{"raw_affiliation_string":"Department of Computer Science, Tuskegee University, USA","institution_ids":["https://openalex.org/I6026837"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053225136","display_name":"Alfredo Cuzzocrea","orcid":"https://orcid.org/0000-0002-7104-6415"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Alfredo Cuzzocrea","raw_affiliation_strings":["University of Calabria,iDEA Lab,Rende,Italy","iDEA Lab, University of Calabria, Rende, Italy"],"affiliations":[{"raw_affiliation_string":"University of Calabria,iDEA Lab,Rende,Italy","institution_ids":["https://openalex.org/I45204951"]},{"raw_affiliation_string":"iDEA Lab, University of Calabria, Rende, Italy","institution_ids":["https://openalex.org/I45204951"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5015055011"],"corresponding_institution_ids":["https://openalex.org/I172980758"],"apc_list":null,"apc_paid":null,"fwci":1.5799,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.86307838,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"5639","last_page":"5645"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10558","display_name":"Advancements in Semiconductor Devices and Circuit Design","score":0.9740999937057495,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7876164317131042},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6924996376037598},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.6291793584823608},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6013455390930176},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4786318838596344},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4601796865463257},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.44794511795043945},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4371689558029175}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7876164317131042},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6924996376037598},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.6291793584823608},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6013455390930176},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4786318838596344},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4601796865463257},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.44794511795043945},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4371689558029175},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/bigdata55660.2022.10020813","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata55660.2022.10020813","pdf_url":null,"source":{"id":"https://openalex.org/S4363607709","display_name":"2022 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2306.08060","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2306.08060","pdf_url":"https://arxiv.org/pdf/2306.08060","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:digitalcommons.kennesaw.edu:undergradsymposiumksu-2516","is_oa":false,"landing_page_url":"https://digitalcommons.kennesaw.edu/undergradsymposiumksu/Fall2022/presentations/258","pdf_url":null,"source":{"id":"https://openalex.org/S4377196456","display_name":"DigitalCommons - Kennesaw State University (Kennesaw State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172980758","host_organization_name":"Kennesaw State University","host_organization_lineage":["https://openalex.org/I172980758"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symposium of Student Scholars","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2306.08060","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2306.08060","pdf_url":"https://arxiv.org/pdf/2306.08060","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2008476844","display_name":"Authentic Learning Modules for DevOps Security Education","funder_award_id":"2209636","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3638487882","display_name":null,"funder_award_id":"2209637","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8842007880","display_name":"Authentic Learning Modules for DevOps Security Education","funder_award_id":"2209638","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4318147418.pdf"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W1631356911","https://openalex.org/W2015811642","https://openalex.org/W2051446825","https://openalex.org/W2076257979","https://openalex.org/W2275410481","https://openalex.org/W2342408547","https://openalex.org/W2583918649","https://openalex.org/W2736592352","https://openalex.org/W2861867928","https://openalex.org/W2911423727","https://openalex.org/W3017183736","https://openalex.org/W3037853801","https://openalex.org/W3081464307","https://openalex.org/W3096052452","https://openalex.org/W3101925575","https://openalex.org/W3102885034","https://openalex.org/W3106887093","https://openalex.org/W3108671495","https://openalex.org/W3129458892","https://openalex.org/W3200172539","https://openalex.org/W3201352919","https://openalex.org/W4200237812","https://openalex.org/W4200634434","https://openalex.org/W4205416355","https://openalex.org/W4205796731","https://openalex.org/W4210475786","https://openalex.org/W4210779195","https://openalex.org/W4214850595","https://openalex.org/W4225663048","https://openalex.org/W4283820465","https://openalex.org/W4293103696","https://openalex.org/W4296884727","https://openalex.org/W4299363674","https://openalex.org/W4312423228","https://openalex.org/W6683235873","https://openalex.org/W6765925142","https://openalex.org/W6805310409"],"related_works":["https://openalex.org/W4375867731","https://openalex.org/W2611989081","https://openalex.org/W4230611425","https://openalex.org/W2731899572","https://openalex.org/W4294635752","https://openalex.org/W4304166257","https://openalex.org/W4383066092","https://openalex.org/W3215138031","https://openalex.org/W2804383999","https://openalex.org/W2802049774"],"abstract_inverted_index":{"The":[0,195],"software":[1,23,33,40,58,114],"supply":[2,115],"chain":[3,116],"(SSC)":[4],"attack":[5,117],"has":[6],"become":[7],"one":[8],"of":[9,21,90,163,169,192,212,223],"the":[10,19,22,32,74,88,91,127,136,161,170,175,185,190],"crucial":[11],"issues":[12],"that":[13,199],"are":[14,52],"being":[15],"increased":[16],"rapidly":[17],"with":[18,112,166,208],"advancement":[20],"development":[24,34],"domain.":[25],"In":[26,94],"general,":[27],"SSC":[28,71],"attacks":[29],"execute":[30],"during":[31],"processes":[35],"lead":[36],"to":[37,125,134,173,188,215,229],"vulnerabilities":[38],"in":[39,54,69,218,234],"products":[41],"targeting":[42],"downstream":[43],"customers":[44],"and":[45,56,78,107,131,133,145,152,154,180],"even":[46],"involved":[47],"stakeholders.":[48],"Machine":[49],"Learning":[50],"approaches":[51],"proven":[53],"detecting":[55],"preventing":[57],"security":[59],"vulnerabilities.":[60],"Besides,":[61],"emerging":[62],"quantum":[63,79,103,151],"machine":[64,80],"learning":[65],"can":[66],"be":[67,84,226],"promising":[68],"addressing":[70],"attacks.":[72],"Considering":[73],"distinction":[75],"between":[76,102,129],"traditional":[77,157],"learning,":[81],"performance":[82,128,162],"could":[83],"varies":[85],"based":[86],"on":[87],"proportions":[89,168],"experimenting":[92],"dataset.":[93],"this":[95],"paper,":[96],"we":[97,138],"conduct":[98,135],"a":[99,113,209,220],"comparative":[100],"analysis":[101],"neural":[104,109],"networks":[105,110],"(QNN)":[106],"conventional":[108],"(NN)":[111],"dataset":[118,172],"known":[119],"as":[120],"ClaMP.":[121],"Our":[122],"goal":[123],"is":[124,204],"distinguish":[126],"QNN":[130,144,203],"NN":[132,146,207],"experiment,":[137],"develop":[139],"two":[140],"different":[141,167],"models":[142,165,232],"for":[143,150,156,202],"by":[147],"utilizing":[148],"Pennylane":[149],"TensorFlow":[153],"Keras":[155],"respectively.":[158],"We":[159,182],"evaluated":[160],"both":[164,193,231],"ClaMP":[171],"identify":[174],"f1":[176],"score,":[177],"recall,":[178],"precision,":[179],"accuracy.":[181],"also":[183],"measure":[184],"execution":[186,200],"time":[187,201],"check":[189],"efficiency":[191],"models.":[194],"demonstration":[196],"result":[197],"indicates":[198],"slower":[205],"than":[206],"higher":[210],"percentage":[211],"datasets.":[213],"Due":[214],"recent":[216],"advancements":[217],"QNN,":[219],"large":[221],"level":[222],"experiments":[224],"shall":[225],"carried":[227],"out":[228],"understand":[230],"accurately":[233],"our":[235],"future":[236],"research.":[237]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
