{"id":"https://openalex.org/W3189308362","doi":"https://doi.org/10.3233/jifs-211011","title":"Intelligent mining vulnerabilities in python code snippets","display_name":"Intelligent mining vulnerabilities in python code snippets","publication_year":2021,"publication_date":"2021-08-10","ids":{"openalex":"https://openalex.org/W3189308362","doi":"https://doi.org/10.3233/jifs-211011","mag":"3189308362"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-211011","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-211011","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023668207","display_name":"Wenbo Guo","orcid":"https://orcid.org/0000-0001-6655-8179"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenbo Guo","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075394107","display_name":"Cheng Huang","orcid":"https://orcid.org/0000-0002-5871-946X"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Cheng Huang","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029715489","display_name":"Weina Niu","orcid":"https://orcid.org/0000-0002-3235-3463"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weina Niu","raw_affiliation_strings":["Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100606641","display_name":"Yong Fang","orcid":"https://orcid.org/0000-0003-2736-0615"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Fang","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24185976"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5075394107"],"corresponding_institution_ids":["https://openalex.org/I24185976"],"apc_list":null,"apc_paid":null,"fwci":1.1017,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.82470561,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"41","issue":"2","first_page":"3615","last_page":"3628"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.85991370677948},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.6630455851554871},{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.6112292408943176},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.49046608805656433},{"id":"https://openalex.org/keywords/abstract-syntax-tree","display_name":"Abstract syntax tree","score":0.48796170949935913},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.47774213552474976},{"id":"https://openalex.org/keywords/open-source","display_name":"Open source","score":0.4445819854736328},{"id":"https://openalex.org/keywords/kpi-driven-code-analysis","display_name":"KPI-driven code analysis","score":0.42311254143714905},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.42096754908561707},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.3719775080680847},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.37134766578674316},{"id":"https://openalex.org/keywords/syntax","display_name":"Syntax","score":0.35125112533569336},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3465741276741028},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3154047727584839},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2992839813232422},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.246261328458786},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.23800289630889893},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.20753183960914612},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.1526012420654297}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.85991370677948},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.6630455851554871},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.6112292408943176},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.49046608805656433},{"id":"https://openalex.org/C58646249","wikidata":"https://www.wikidata.org/wiki/Q127380","display_name":"Abstract syntax tree","level":3,"score":0.48796170949935913},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.47774213552474976},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.4445819854736328},{"id":"https://openalex.org/C121957198","wikidata":"https://www.wikidata.org/wiki/Q14365593","display_name":"KPI-driven code analysis","level":5,"score":0.42311254143714905},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.42096754908561707},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.3719775080680847},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.37134766578674316},{"id":"https://openalex.org/C60048249","wikidata":"https://www.wikidata.org/wiki/Q37437","display_name":"Syntax","level":2,"score":0.35125112533569336},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3465741276741028},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3154047727584839},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2992839813232422},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.246261328458786},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.23800289630889893},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.20753183960914612},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.1526012420654297},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-211011","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-211011","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1981401636","https://openalex.org/W2079753286","https://openalex.org/W2084974764","https://openalex.org/W2556605533","https://openalex.org/W2925189961","https://openalex.org/W2963541700","https://openalex.org/W2985739320","https://openalex.org/W2995824836","https://openalex.org/W6672049475","https://openalex.org/W6771758405"],"related_works":["https://openalex.org/W3194341934","https://openalex.org/W4210653322","https://openalex.org/W2969257295","https://openalex.org/W1486481742","https://openalex.org/W377327559","https://openalex.org/W3049398420","https://openalex.org/W2097062407","https://openalex.org/W2968544084","https://openalex.org/W3033053557","https://openalex.org/W4312885411"],"abstract_inverted_index":{"In":[0,166],"the":[1,12,58,64,75,86,104,112,121,126,147,161,167,174],"software":[2],"development":[3],"process,":[4],"many":[5],"developers":[6],"learn":[7],"from":[8],"code":[9,26,44,61,77,81,122,139,158,179],"snippets":[10,45,62,159],"in":[11,63,116,160,173,184],"open-source":[13,164,175],"community":[14,176],"to":[15,55,78,95,119,181],"implement":[16],"specific":[17],"functions.":[18],"However,":[19],"few":[20],"people":[21],"think":[22],"about":[23],"whether":[24],"these":[25],"have":[27],"vulnerabilities,":[28],"which":[29],"provides":[30],"channels":[31],"for":[32,74,177],"developing":[33],"unsafe":[34],"programs.":[35],"To":[36],"this":[37,39,134],"end,":[38],"paper":[40],"constructs":[41],"a":[42,107],"source":[43,66,76],"vulnerability":[46,97,123,142],"mining":[47],"system":[48],"named":[49],"PyVul":[50,68,153],"based":[51,125],"on":[52],"deep":[53],"learning":[54],"automatically":[56],"detect":[57,96],"security":[59],"of":[60,146],"open":[65],"community.":[67,165],"builds":[69],"abstract":[70],"syntax":[71],"tree":[72],"(AST)":[73],"extract":[79],"its":[80],"feature,":[82],"and":[83,140],"then":[84],"introduces":[85],"bidirectional":[87],"long-term":[88],"short-term":[89],"memory":[90],"(BiLSTM)":[91],"neural":[92],"network":[93],"algorithm":[94],"codes.":[98],"If":[99],"it":[100,169],"is":[101],"vulnerable":[102,138,157,178],"code,":[103],"further":[105],"constructed":[106],"multi-classification":[108],"model":[109,149],"could":[110],"analyze":[111],"context":[113],"discussion":[114],"contents":[115],"associated":[117],"threads,":[118],"classify":[120,141],"type":[124],"content":[127],"description.":[128],"Compared":[129],"with":[130],"traditional":[131],"detection":[132],"methods,":[133],"method":[135],"can":[136,150,170],"identify":[137],"type.":[143],"The":[144],"accuracy":[145],"proposed":[148],"reach":[151],"85%.":[152],"also":[154],"found":[155],"138":[156],"real":[162],"public":[163],"future,":[168],"be":[171],"used":[172],"auditing":[180],"assist":[182],"users":[183],"safe":[185],"development.":[186]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
