{"id":"https://openalex.org/W2047468043","doi":"https://doi.org/10.1109/icinfa.2013.6720316","title":"Automatic classification for vulnerability based on machine learning","display_name":"Automatic classification for vulnerability based on machine learning","publication_year":2013,"publication_date":"2013-08-01","ids":{"openalex":"https://openalex.org/W2047468043","doi":"https://doi.org/10.1109/icinfa.2013.6720316","mag":"2047468043"},"language":"en","primary_location":{"id":"doi:10.1109/icinfa.2013.6720316","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icinfa.2013.6720316","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Information and Automation (ICIA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026989743","display_name":"Bo Shuai","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bo Shuai","raw_affiliation_strings":["School of Electronic Science and Engineering, National University of Defense Technology, Changsha, Hunan, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Science and Engineering, National University of Defense Technology, Changsha, Hunan, P. R. China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100398348","display_name":"Haifeng Li","orcid":"https://orcid.org/0000-0002-5088-4735"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haifeng Li","raw_affiliation_strings":["School of Electronic Science and Engineering, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Science and Engineering, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100621785","display_name":"Mengjun Li","orcid":"https://orcid.org/0000-0003-4478-8242"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengjun Li","raw_affiliation_strings":["School of Electronic Science and Engineering, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Science and Engineering, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100406666","display_name":"Quan Zhang","orcid":"https://orcid.org/0000-0001-7778-4243"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Quan Zhang","raw_affiliation_strings":["School of Electronic Science and Engineering, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Science and Engineering, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101867084","display_name":"Chaojing Tang","orcid":"https://orcid.org/0000-0002-9025-2791"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chaojing Tang","raw_affiliation_strings":["School of Electronic Science and Engineering, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Science and Engineering, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5026989743"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.3625,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.65484497,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"312","last_page":"318"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13832","display_name":"Advanced Decision-Making Techniques","score":0.9319999814033508,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.768460750579834},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.7651163935661316},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7272889614105225},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6322103142738342},{"id":"https://openalex.org/keywords/huffman-coding","display_name":"Huffman coding","score":0.6147861480712891},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5210370421409607},{"id":"https://openalex.org/keywords/structured-support-vector-machine","display_name":"Structured support vector machine","score":0.47838273644447327},{"id":"https://openalex.org/keywords/one-class-classification","display_name":"One-class classification","score":0.46710219979286194},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.43686509132385254},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42404860258102417},{"id":"https://openalex.org/keywords/multiclass-classification","display_name":"Multiclass classification","score":0.4119735062122345}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.768460750579834},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.7651163935661316},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7272889614105225},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6322103142738342},{"id":"https://openalex.org/C46900642","wikidata":"https://www.wikidata.org/wiki/Q2647","display_name":"Huffman coding","level":3,"score":0.6147861480712891},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5210370421409607},{"id":"https://openalex.org/C125168437","wikidata":"https://www.wikidata.org/wiki/Q7625184","display_name":"Structured support vector machine","level":3,"score":0.47838273644447327},{"id":"https://openalex.org/C34872919","wikidata":"https://www.wikidata.org/wiki/Q7092302","display_name":"One-class classification","level":3,"score":0.46710219979286194},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.43686509132385254},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42404860258102417},{"id":"https://openalex.org/C123860398","wikidata":"https://www.wikidata.org/wiki/Q6934605","display_name":"Multiclass classification","level":3,"score":0.4119735062122345},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icinfa.2013.6720316","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icinfa.2013.6720316","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Information and Automation (ICIA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W80079294","https://openalex.org/W107774953","https://openalex.org/W120838261","https://openalex.org/W1503609498","https://openalex.org/W1787566923","https://openalex.org/W1880262756","https://openalex.org/W1970196573","https://openalex.org/W1971694273","https://openalex.org/W1978394996","https://openalex.org/W1994094966","https://openalex.org/W2015302978","https://openalex.org/W2052029850","https://openalex.org/W2067685804","https://openalex.org/W2089697111","https://openalex.org/W2091944322","https://openalex.org/W2093780939","https://openalex.org/W2096029627","https://openalex.org/W2100973285","https://openalex.org/W2119821739","https://openalex.org/W2120078192","https://openalex.org/W2153104898","https://openalex.org/W2153635508","https://openalex.org/W2157239837","https://openalex.org/W2165612380","https://openalex.org/W2168228682","https://openalex.org/W2962888028","https://openalex.org/W3103864159","https://openalex.org/W4237791300","https://openalex.org/W4239510810","https://openalex.org/W4241992701","https://openalex.org/W4250428025","https://openalex.org/W6642815535","https://openalex.org/W6683380652","https://openalex.org/W6891733691"],"related_works":["https://openalex.org/W2215801697","https://openalex.org/W4376528628","https://openalex.org/W2377594824","https://openalex.org/W2098385475","https://openalex.org/W2181322573","https://openalex.org/W1537592868","https://openalex.org/W1921594662","https://openalex.org/W1629394991","https://openalex.org/W2076300071","https://openalex.org/W174416256"],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2],"solve":[3],"the":[4,84,90,97],"problems":[5],"of":[6,14,83,89,92],"traditional":[7],"machine":[8,21],"learning":[9,22],"methods":[10],"for":[11],"automatic":[12],"classification":[13,78,102],"vulnerability,":[15],"this":[16],"paper":[17],"presents":[18],"a":[19,60,73],"novel":[20],"method":[23,98],"based":[24],"on":[25,53,57],"LDA":[26,37],"model":[27,38],"and":[28,75,104],"SVM.":[29],"Firstly,":[30],"word":[31],"location":[32],"information":[33],"is":[34,68],"introduced":[35],"into":[36],"called":[39,63],"WL-LDA":[40],"(Weighted":[41],"Location":[42],"LDA),":[43],"which":[44,70],"could":[45,71,99],"acquire":[46],"better":[47],"effect":[48],"through":[49],"generating":[50],"vector":[51],"space":[52],"themes":[54],"other":[55],"than":[56],"words.":[58],"Secondly,":[59],"multi-class":[61],"classifier":[62],"HT-SVM":[64],"(Huffman":[65],"Tree":[66],"SVM)":[67],"constructed,":[69],"make":[72],"faster":[74],"more":[76],"stable":[77],"by":[79],"making":[80],"good":[81],"use":[82],"prior":[85],"knowledge":[86],"about":[87],"distribution":[88],"number":[91],"vulnerabilities.":[93],"Experiments":[94],"show":[95],"that":[96],"obtain":[100],"higher":[101],"accuracy":[103],"efficiency.":[105]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":6},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
