{"id":"https://openalex.org/W7125983622","doi":"https://doi.org/10.1109/smc58881.2025.11343244","title":"VulSCS: A Source Code Vulnerability Detection System Using Secondary Code Slicing","display_name":"VulSCS: A Source Code Vulnerability Detection System Using Secondary Code Slicing","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125983622","doi":"https://doi.org/10.1109/smc58881.2025.11343244"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11343244","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343244","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022694543","display_name":"Yong Zhong","orcid":"https://orcid.org/0000-0002-2673-856X"},"institutions":[{"id":"https://openalex.org/I14894300","display_name":"Foshan University","ror":"https://ror.org/02xvvvp28","country_code":"CN","type":"education","lineage":["https://openalex.org/I14894300"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yong Zhong","raw_affiliation_strings":["Foshan University,School of Computer Science and Artificial Intelligence,Foshan,China,528225"],"affiliations":[{"raw_affiliation_string":"Foshan University,School of Computer Science and Artificial Intelligence,Foshan,China,528225","institution_ids":["https://openalex.org/I14894300"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124064303","display_name":"Bin Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I14894300","display_name":"Foshan University","ror":"https://ror.org/02xvvvp28","country_code":"CN","type":"education","lineage":["https://openalex.org/I14894300"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Liu","raw_affiliation_strings":["Foshan University,School of Computer Science and Artificial Intelligence,Foshan,China,528225"],"affiliations":[{"raw_affiliation_string":"Foshan University,School of Computer Science and Artificial Intelligence,Foshan,China,528225","institution_ids":["https://openalex.org/I14894300"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121754927","display_name":"Wenyin Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I14894300","display_name":"Foshan University","ror":"https://ror.org/02xvvvp28","country_code":"CN","type":"education","lineage":["https://openalex.org/I14894300"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenyin Yang","raw_affiliation_strings":["Foshan University,School of Computer Science and Artificial Intelligence,Foshan,China,528225"],"affiliations":[{"raw_affiliation_string":"Foshan University,School of Computer Science and Artificial Intelligence,Foshan,China,528225","institution_ids":["https://openalex.org/I14894300"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020662765","display_name":"Junxian Ye","orcid":null},"institutions":[{"id":"https://openalex.org/I14894300","display_name":"Foshan University","ror":"https://ror.org/02xvvvp28","country_code":"CN","type":"education","lineage":["https://openalex.org/I14894300"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junxian Ye","raw_affiliation_strings":["Foshan University,School of Computer Science and Artificial Intelligence,Foshan,China,528225"],"affiliations":[{"raw_affiliation_string":"Foshan University,School of Computer Science and Artificial Intelligence,Foshan,China,528225","institution_ids":["https://openalex.org/I14894300"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124086012","display_name":"Jihui Liand Fen Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I14894300","display_name":"Foshan University","ror":"https://ror.org/02xvvvp28","country_code":"CN","type":"education","lineage":["https://openalex.org/I14894300"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jihui Liand Fen Liu","raw_affiliation_strings":["Foshan University,School of Computer Science and Artificial Intelligence,Foshan,China,528225"],"affiliations":[{"raw_affiliation_string":"Foshan University,School of Computer Science and Artificial Intelligence,Foshan,China,528225","institution_ids":["https://openalex.org/I14894300"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5022694543"],"corresponding_institution_ids":["https://openalex.org/I14894300"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.82138291,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1882","last_page":"1887"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.4237000048160553,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.4237000048160553,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.1817999929189682,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.12870000302791595,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/program-slicing","display_name":"Program slicing","score":0.770799994468689},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.725600004196167},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5968000292778015},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5565000176429749},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5241000056266785},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5016999840736389},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4749999940395355},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4569999873638153}],"concepts":[{"id":"https://openalex.org/C91071405","wikidata":"https://www.wikidata.org/wiki/Q1413145","display_name":"Program slicing","level":3,"score":0.770799994468689},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.725600004196167},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7085000276565552},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5968000292778015},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5565000176429749},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5241000056266785},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5016999840736389},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49709999561309814},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4749999940395355},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4569999873638153},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.3898000121116638},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.38029998540878296},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3682999908924103},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3610000014305115},{"id":"https://openalex.org/C2777526511","wikidata":"https://www.wikidata.org/wiki/Q691543","display_name":"Pace","level":2,"score":0.35989999771118164},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.34779998660087585},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3089999854564667},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.29499998688697815},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.2930000126361847},{"id":"https://openalex.org/C133237599","wikidata":"https://www.wikidata.org/wiki/Q2295111","display_name":"Code smell","level":5,"score":0.2856999933719635},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.2849999964237213},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.28139999508857727},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2605000138282776}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11343244","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343244","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4073232114315033,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1563577331","https://openalex.org/W1990762361","https://openalex.org/W1992114977","https://openalex.org/W2027887391","https://openalex.org/W2056944867","https://openalex.org/W2128782367","https://openalex.org/W2130790725","https://openalex.org/W2138110817","https://openalex.org/W2138756793","https://openalex.org/W2165004968","https://openalex.org/W2166336492","https://openalex.org/W2559935471","https://openalex.org/W2604705980","https://openalex.org/W2608178897","https://openalex.org/W2634106992","https://openalex.org/W2734726005","https://openalex.org/W2781491433","https://openalex.org/W2802785025","https://openalex.org/W2885030880","https://openalex.org/W2962960733","https://openalex.org/W2965861627","https://openalex.org/W2976184969","https://openalex.org/W3098605233","https://openalex.org/W3147107715","https://openalex.org/W3161071537","https://openalex.org/W4284667406","https://openalex.org/W4301168982","https://openalex.org/W4388427144"],"related_works":[],"abstract_inverted_index":{"In":[0,76],"the":[1,4,7,32,37,56,63],"context":[2],"of":[3,10,39,59,65],"information":[5],"age,":[6],"frequent":[8],"occurrence":[9],"software":[11,48,172],"vulnerabilities":[12],"has":[13,43,87],"emerged":[14],"as":[15],"a":[16],"critical":[17],"issue":[18],"demanding":[19],"immediate":[20],"resolution.":[21],"Traditional":[22],"vulnerability":[23,49,81,103,146,173],"detection":[24,82,104,147,151,157],"methods":[25],"have":[26],"struggled":[27],"to":[28,47,144],"keep":[29],"pace":[30],"with":[31,130],"escalating":[33],"security":[34],"demands,":[35],"while":[36],"advent":[38],"deep":[40,85,170],"learning":[41,52,86],"technology":[42],"introduced":[44],"novel":[45],"solutions":[46],"detection.":[50,174],"Deep":[51],"not":[53],"only":[54],"facilitates":[55],"automatic":[57],"extraction":[58],"features,":[60],"thereby":[61,134],"reducing":[62],"cost":[64],"manual":[66],"intervention,":[67],"but":[68],"also":[69],"demonstrates":[70],"remarkable":[71],"advantages":[72],"across":[73],"various":[74],"domains.":[75],"recent":[77],"years,":[78],"research":[79,163],"on":[80,84,100,112,119],"based":[83,111],"achieved":[88],"notable":[89],"progress,":[90],"yet":[91],"it":[92],"still":[93],"faces":[94],"several":[95],"limitations.":[96],"This":[97,162],"study":[98],"focuses":[99],"C/C++":[101],"program":[102],"and":[105,155,167],"proposes":[106],"an":[107],"enhanced":[108],"approach,":[109],"VulSCS,":[110],"secondary":[113,117],"slicing.":[114],"By":[115],"performing":[116],"slicing":[118],"source":[120],"code":[121,128],"exhibiting":[122],"vulnerable":[123],"behaviors,":[124],"this":[125],"method":[126],"extracts":[127],"segments":[129],"higher":[131],"representational":[132],"value,":[133],"capturing":[135],"richer":[136],"vulnerability-related":[137],"features.":[138],"Experimental":[139],"results":[140],"indicate":[141],"that,":[142],"compared":[143],"state-of-the-art":[145],"tools,":[148],"VulSCS":[149],"improves":[150],"accuracy":[152],"by":[153,159],"3.2%":[154],"enhances":[156],"efficiency":[158],"approximately":[160],"threefold.":[161],"offers":[164],"new":[165],"perspectives":[166],"methodologies":[168],"for":[169],"learningbased":[171]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-29T00:00:00"}
