{"id":"https://openalex.org/W4396852301","doi":"https://doi.org/10.1145/3647444.3647909","title":"Using SVM Classification and Reverse Engineering to Generate Trustworthy Code in Software Development","display_name":"Using SVM Classification and Reverse Engineering to Generate Trustworthy Code in Software Development","publication_year":2023,"publication_date":"2023-11-23","ids":{"openalex":"https://openalex.org/W4396852301","doi":"https://doi.org/10.1145/3647444.3647909"},"language":"en","primary_location":{"id":"doi:10.1145/3647444.3647909","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3647444.3647909","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016458748","display_name":"Tejbir Singh","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tejbir Singh","raw_affiliation_strings":["MMICT&amp;BM, MMDU, Mullana, India"],"affiliations":[{"raw_affiliation_string":"MMICT&amp;BM, MMDU, Mullana, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020765815","display_name":"Ravi Kumar Sharma","orcid":"https://orcid.org/0000-0003-2899-6199"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ravi Kumar Sharma","raw_affiliation_strings":["MMICTBM, MM(DU), Mullana, India"],"affiliations":[{"raw_affiliation_string":"MMICTBM, MM(DU), Mullana, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077001144","display_name":"Dalip Kamboj","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dalip Kamboj","raw_affiliation_strings":["MMICTBM, MM(DU), Mullana, India"],"affiliations":[{"raw_affiliation_string":"MMICTBM, MM(DU), Mullana, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066605031","display_name":"Parul Gandhi","orcid":"https://orcid.org/0000-0002-3696-0025"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Parul Gandhi","raw_affiliation_strings":["Faculty of Computer applications, Mriirs, India"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer applications, Mriirs, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057137137","display_name":"Divyanshi Bhatia","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Divyanshi Bhatia","raw_affiliation_strings":["Faculty of Computer applications, DTU, delhi, India"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer applications, DTU, delhi, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5016458748"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6151,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.67430905,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9010999798774719,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7822214365005493},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.6992000341415405},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.6587696075439453},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5683568716049194},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5521836280822754},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.4988851547241211},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4455201029777527},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.44542306661605835},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3127564787864685},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.31026381254196167},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13043242692947388}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7822214365005493},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.6992000341415405},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.6587696075439453},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5683568716049194},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5521836280822754},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.4988851547241211},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4455201029777527},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.44542306661605835},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3127564787864685},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31026381254196167},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13043242692947388},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3647444.3647909","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3647444.3647909","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1501652040","https://openalex.org/W1969430674","https://openalex.org/W2019312328","https://openalex.org/W2022891974","https://openalex.org/W2042258659","https://openalex.org/W2096507591","https://openalex.org/W2099101940","https://openalex.org/W2123594341","https://openalex.org/W2158789621","https://openalex.org/W2163351999","https://openalex.org/W2207427070","https://openalex.org/W2477378326","https://openalex.org/W2511422681","https://openalex.org/W2547325028","https://openalex.org/W2564565181","https://openalex.org/W2618297990","https://openalex.org/W4291909707","https://openalex.org/W4312751214","https://openalex.org/W4366502761"],"related_works":["https://openalex.org/W2363831530","https://openalex.org/W2363845219","https://openalex.org/W2381057835","https://openalex.org/W1789649838","https://openalex.org/W1780668307","https://openalex.org/W1984362519","https://openalex.org/W2051831113","https://openalex.org/W2650054517","https://openalex.org/W2362738525","https://openalex.org/W1616281264"],"abstract_inverted_index":{"Software":[0,10,23],"engineering":[1,14],"refers":[2],"to":[3,15,29,63,73,86],"the":[4,26,31,50,58,87],"science":[5],"of":[6,90],"analysing":[7],"programme":[8],"operation.":[9],"engineers":[11,24],"use":[12],"reverse":[13],"create":[16],"code":[17,41,76],"from":[18],"a":[19,46],"previously":[20],"created":[21],"model.":[22],"utilise":[25],"abstract-present":[27,59],"model":[28,33,60],"transform":[30],"sequence":[32],"into":[34],"executable":[35],"code.":[36,66],"The":[37,52,67],"first":[38],"phase's":[39],"generated":[40],"will":[42,54,70],"be":[43,55,71],"used":[44,72],"as":[45],"starting":[47],"point":[48],"for":[49],"second.":[51],"enhancement":[53],"suggested":[56],"inside":[57],"in":[61],"order":[62],"produce":[64],"trustworthy":[65],"SVM":[68],"classifier":[69],"determine":[74],"what":[75,80],"is":[77,81],"necessary":[78],"and":[79],"not":[82],"before":[83],"moving":[84],"on":[85],"next":[88],"step":[89],"development.":[91]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
