{"id":"https://openalex.org/W3008954441","doi":"https://doi.org/10.1109/ssci44817.2019.9002965","title":"Vulnerability Detection in Firmware Based on Clonal Selection Algorithm","display_name":"Vulnerability Detection in Firmware Based on Clonal Selection Algorithm","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3008954441","doi":"https://doi.org/10.1109/ssci44817.2019.9002965","mag":"3008954441"},"language":"en","primary_location":{"id":"doi:10.1109/ssci44817.2019.9002965","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssci44817.2019.9002965","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Symposium Series on Computational Intelligence (SSCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109286836","display_name":"Man Sun Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Man Yu","raw_affiliation_strings":["Hubei Key Laboratory of Transportation of Intent of Things, Wuhan University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Transportation of Intent of Things, Wuhan University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101936847","display_name":"Dongdong Zhao","orcid":"https://orcid.org/0000-0002-4697-6901"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongdong Zhao","raw_affiliation_strings":["Hubei Key Laboratory of Transportation of Intent of Things, Wuhan University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Transportation of Intent of Things, Wuhan University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054960059","display_name":"Dian Zhou","orcid":"https://orcid.org/0000-0002-2648-5232"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dian Zhou","raw_affiliation_strings":["Hubei Key Laboratory of Transportation of Intent of Things, Wuhan University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Transportation of Intent of Things, Wuhan University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015479524","display_name":"Linjun Ran","orcid":null},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linjun Ran","raw_affiliation_strings":["Hubei Key Laboratory of Transportation of Intent of Things, Wuhan University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Transportation of Intent of Things, Wuhan University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016677170","display_name":"Jianwen Xiang","orcid":"https://orcid.org/0000-0001-8440-4181"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianwen Xiang","raw_affiliation_strings":["Hubei Key Laboratory of Transportation of Intent of Things, Wuhan University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Transportation of Intent of Things, Wuhan University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015525771","display_name":"Zhongjin Liu","orcid":"https://orcid.org/0009-0006-0562-1094"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongjin Liu","raw_affiliation_strings":["National Computer Network, Emergency Response Technical Team/Coordination Center of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network, Emergency Response Technical Team/Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001721379","display_name":"Yanzhen Xing","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanzhen Xing","raw_affiliation_strings":["National Computer Network, Emergency Response Technical Team/Coordination Center of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network, Emergency Response Technical Team/Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5109286836"],"corresponding_institution_ids":["https://openalex.org/I196699116"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.19068369,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"53","issue":null,"first_page":"1915","last_page":"1921"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.9520453214645386},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7933425903320312},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7440056800842285},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5909396409988403},{"id":"https://openalex.org/keywords/microcode","display_name":"Microcode","score":0.46881890296936035},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.46783486008644104},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.45620983839035034},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4511420726776123},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.44562777876853943},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4270933270454407},{"id":"https://openalex.org/keywords/selection-algorithm","display_name":"Selection algorithm","score":0.4218948781490326},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3254234194755554},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1953757107257843},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10158100724220276}],"concepts":[{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.9520453214645386},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7933425903320312},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7440056800842285},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5909396409988403},{"id":"https://openalex.org/C22174128","wikidata":"https://www.wikidata.org/wiki/Q175869","display_name":"Microcode","level":2,"score":0.46881890296936035},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.46783486008644104},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.45620983839035034},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4511420726776123},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44562777876853943},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4270933270454407},{"id":"https://openalex.org/C2775973920","wikidata":"https://www.wikidata.org/wiki/Q3252726","display_name":"Selection algorithm","level":3,"score":0.4218948781490326},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3254234194755554},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1953757107257843},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10158100724220276},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ssci44817.2019.9002965","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssci44817.2019.9002965","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Symposium Series on Computational Intelligence (SSCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W11219134","https://openalex.org/W1484602321","https://openalex.org/W1555363900","https://openalex.org/W1583700199","https://openalex.org/W1604459715","https://openalex.org/W1767160258","https://openalex.org/W1942295288","https://openalex.org/W1965297308","https://openalex.org/W1979400615","https://openalex.org/W2000594030","https://openalex.org/W2010841095","https://openalex.org/W2029491280","https://openalex.org/W2059556229","https://openalex.org/W2076526693","https://openalex.org/W2105324851","https://openalex.org/W2109473289","https://openalex.org/W2112725702","https://openalex.org/W2149674423","https://openalex.org/W2151586550","https://openalex.org/W2170770919","https://openalex.org/W2180970301","https://openalex.org/W2343921789","https://openalex.org/W2414803796","https://openalex.org/W2532962075","https://openalex.org/W2577142429","https://openalex.org/W2600950714","https://openalex.org/W2601005640","https://openalex.org/W2728955665","https://openalex.org/W2749008552","https://openalex.org/W2786699140","https://openalex.org/W2787184788","https://openalex.org/W2803328845","https://openalex.org/W2806715823","https://openalex.org/W2806869036","https://openalex.org/W2882992559","https://openalex.org/W2888955192","https://openalex.org/W2898779098","https://openalex.org/W2910153088","https://openalex.org/W2911432304","https://openalex.org/W2918032733","https://openalex.org/W3005609520","https://openalex.org/W3010126799","https://openalex.org/W3010314744","https://openalex.org/W3011088748","https://openalex.org/W3105926539","https://openalex.org/W4232872328","https://openalex.org/W4285719527","https://openalex.org/W6633398199","https://openalex.org/W6636411187","https://openalex.org/W6637847285","https://openalex.org/W6756116550"],"related_works":["https://openalex.org/W1966431236","https://openalex.org/W608147619","https://openalex.org/W1984676852","https://openalex.org/W2068967940","https://openalex.org/W270731569","https://openalex.org/W4252104358","https://openalex.org/W2062160093","https://openalex.org/W2025981307","https://openalex.org/W1998626163","https://openalex.org/W2056006243"],"abstract_inverted_index":{"With":[0],"the":[1,9,38,60,65,84,87,90,106,110,122,134,142],"security":[2],"breaches":[3],"in":[4,55],"Internet":[5],"of":[6,11,86,92,98,124],"Things":[7],"devices,":[8],"detection":[10,25,39],"firmware":[12,23],"vulnerability":[13,24,53,103,111],"is":[14,131,139],"more":[15,69],"crucial":[16],"than":[17],"ever.":[18],"Presently,":[19],"many":[20],"methods":[21],"for":[22,35,71,101],"have":[26],"been":[27],"proposed,":[28],"but":[29],"there":[30],"are":[31,68],"still":[32],"some":[33],"room":[34],"improvement":[36],"on":[37,127,141],"precision.":[40],"In":[41,89,105],"this":[42],"paper,":[43],"we":[44,58,76,94,108],"propose":[45],"to":[46,51,63,82,133],"use":[47,59],"clonal":[48,72],"selection":[49,73],"algorithm":[50,62,81,136],"detect":[52,109],"functions":[54,112],"firmware.":[56],"Firstly,":[57],"Relief":[61],"select":[64],"features":[66],"that":[67,121],"suitable":[70],"algorithm.":[74],"Then,":[75],"utilize":[77],"principal":[78],"component":[79],"analysis":[80],"calculate":[83],"weights":[85],"features.":[88],"process":[91],"detection,":[93],"establish":[95],"a":[96],"set":[97],"specific":[99,115],"detectors":[100],"each":[102],"function.":[104],"end,":[107],"through":[113],"these":[114],"detectors.":[116],"The":[117],"experimental":[118],"results":[119],"show":[120],"precision":[123],"our":[125],"approach":[126],"detecting":[128],"real":[129],"vulnerabilities":[130],"competitive":[132],"typical":[135],"VDNS":[137],"which":[138],"based":[140],"neural":[143],"network.":[144]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
