{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T15:01:34Z","timestamp":1770994894944,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"25","license":[{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Cyber Security Research Centre Limited"},{"DOI":"10.13039\/501100003327","name":"Cooperative Research Centres, Australian Government Department of Industry","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003327","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001793","name":"Queensland University of Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001793","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In recent years, machine learning models have been increasingly used to detect security vulnerabilities in software, due to their ability to achieve high performance and lower false positive rates compared to traditional program analysis tools. However, these models often lack the capability to provide a clear explanation for why a program has been flagged as vulnerable, leaving developers with little reasoning to work with. We present a new method which not only identifies the presence of vulnerabilities in a program, but also the specific type of error, considering the whole program rather than just individual functions. Our approach utilizes graph neural networks that employ inter-procedural value flow graphs, and instruction embedding from the LLVM Intermediate Representation, to predict a class. By mapping these classes to the Common Weakness Enumeration list, we provide a clear indication of the security issue found, saving developers valuable time which would otherwise be spent analyzing a binary vulnerable\/non-vulnerable label. To evaluate our method\u2019s effectiveness, we used two datasets: one containing memory-related errors (out of bound array accesses), and the other a range of vulnerabilities from the Juliet Test Suite, including buffer and integer overflows, format strings, and invalid frees. Our model, implemented using PyTorch and the Gated Graph Sequence Neural Network from Torch-Geometric, achieved a precision of 96.35 and 91.59% on the two datasets, respectively. Compared to common static analysis tools, our method produced roughly half the number of false positives, while identifying approximately three times the number of vulnerable samples. Compared to recent machine learning systems, we achieve similar performance while offering the added benefit of differentiating between classes. Overall, our approach represents a meaningful improvement in software vulnerability detection, providing developers with valuable insights to better secure their code.<\/jats:p>","DOI":"10.1007\/s00521-024-09819-3","type":"journal-article","created":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T11:01:58Z","timestamp":1716202918000},"page":"15869-15891","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Multi-class vulnerability prediction using value flow and graph neural networks"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-5483-8007","authenticated-orcid":false,"given":"Connor","family":"McLaughlin","sequence":"first","affiliation":[]},{"given":"Yi","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,20]]},"reference":[{"key":"9819_CR1","unstructured":"The MITRE Corporation: CVE (2022) https:\/\/cve.mitre.org\/"},{"key":"9819_CR2","unstructured":"National Institute of Standards and Technology: NVD (2022) https:\/\/nvd.nist.gov\/"},{"key":"9819_CR3","unstructured":"K2 Cyber Security Inc (2022) Vulnerabilities up almost 10% in 2021. https:\/\/www.k2io.com\/the-final-count-vulnerabilities-up-almost-10-in-2021\/"},{"key":"9819_CR4","unstructured":"Rapid7 (2022) Analyzing the attack landscape: rapid7\u2019s 2021 vulnerability intelligence report. https:\/\/www.rapid7.com\/blog\/post\/2022\/03\/28\/analyzing-the-attack-landscape-rapid7s-annual-vulnerability-intelligence-report\/"},{"key":"9819_CR5","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.infsof.2015.08.002","volume":"68","author":"K Goseva-Popstojanova","year":"2015","unstructured":"Goseva-Popstojanova K, Perhinschi A (2015) On the capability of static code analysis to detect security vulnerabilities. Inf Softw Technol 68:18\u201333. https:\/\/doi.org\/10.1016\/j.infsof.2015.08.002","journal-title":"Inf Softw Technol"},{"key":"9819_CR6","doi-asserted-by":"publisher","unstructured":"Klees G, Ruef A, Cooper B, Wei S, Hicks M (2018) Evaluating fuzz testing. CCS \u201918, pp. 2123\u20132138. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3243734.3243804","DOI":"10.1145\/3243734.3243804"},{"key":"9819_CR7","doi-asserted-by":"publisher","first-page":"103009","DOI":"10.1016\/j.jnca.2021.103009","volume":"179","author":"H Hanif","year":"2021","unstructured":"Hanif H, Md Nasir MHN, Ab Razak MF, Firdaus A, Anuar NB (2021) The rise of software vulnerability: taxonomy of software vulnerabilities detection and machine learning approaches. J Netw Comput Appl 179:103009. https:\/\/doi.org\/10.1016\/j.jnca.2021.103009","journal-title":"J Netw Comput Appl"},{"key":"9819_CR8","doi-asserted-by":"publisher","unstructured":"Hovsepyan A, Scandariato R, Joosen W, Walden J (2012) Software vulnerability prediction using text analysis techniques. In: Proceedings of the 4th international workshop on security measurements and metrics, pp. 7\u201310. https:\/\/doi.org\/10.1145\/2372225.2372230","DOI":"10.1145\/2372225.2372230"},{"key":"9819_CR9","doi-asserted-by":"publisher","unstructured":"Li Z, Zou D, Xu S, Ou X, Jin H, Wang S, Deng Z, Zhong, Y (2018) Vuldeepecker: a deep learning-based system for vulnerability detection. https:\/\/doi.org\/10.14722\/ndss.2018.23158","DOI":"10.14722\/ndss.2018.23158"},{"key":"9819_CR10","doi-asserted-by":"publisher","unstructured":"Harer JA, Kim LY, Russell RL, Ozdemir O, Kosta LR, Rangamani A, Hamilton LH, Centeno GI, Key JR, Ellingwood PM, Antelman E, Mackay A, McConley MW, Opper JM, Chin P, Lazovich T (2018) Automated software vulnerability detection with machine learning. https:\/\/doi.org\/10.48550\/ARXIV.1803.04497","DOI":"10.48550\/ARXIV.1803.04497"},{"key":"9819_CR11","doi-asserted-by":"publisher","unstructured":"Xu A, Dai T, Chen H, Ming Z, Li W (2018) Vulnerability detection for source code using contextual lstm. In: 2018 5th international conference on systems and informatics (ICSAI), pp. 1225\u20131230. https:\/\/doi.org\/10.1109\/ICSAI.2018.8599360. IEEE","DOI":"10.1109\/ICSAI.2018.8599360"},{"key":"9819_CR12","doi-asserted-by":"publisher","DOI":"10.3390\/app9194086","author":"Y Lee","year":"2019","unstructured":"Lee Y, Kwon H, Choi SH, Lim SH, Baek SH, Park KW (2019) Instruction2vec: efficient preprocessor of assembly code to detect software weakness with CNN. Appl Sci. https:\/\/doi.org\/10.3390\/app9194086","journal-title":"Appl Sci"},{"key":"9819_CR13","doi-asserted-by":"publisher","unstructured":"Lattner C, Adve V (2004) Llvm: a compilation framework for lifelong program analysis & transformation. In: International symposium on code generation and optimization, 2004. CGO 2004., pp. 75\u201386. https:\/\/doi.org\/10.1109\/CGO.2004.1281665","DOI":"10.1109\/CGO.2004.1281665"},{"key":"9819_CR14","doi-asserted-by":"publisher","unstructured":"Sanchez-Lengeling B, Reif E, Pearce A, Wiltschko AB (2021) A gentle introduction to graph neural networks. Distill. https:\/\/doi.org\/10.23915\/distill.00033","DOI":"10.23915\/distill.00033"},{"key":"9819_CR15","doi-asserted-by":"publisher","unstructured":"Yang X, Chen Y, Eide E, Regehr J (2011) Finding and understanding bugs in c compilers. In: Proceedings of the 32nd ACM SIGPLAN conference on programming language design and implementation. PLDI \u201911, pp. 283\u2013294. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/1993498.1993532","DOI":"10.1145\/1993498.1993532"},{"key":"9819_CR16","unstructured":"National Institute of Standards and Technology (2017) Juliet C\/C++ 1.3 - NIST software assurance reference dataset. https:\/\/samate.nist.gov\/SARD\/test-suites\/112"},{"key":"9819_CR17","unstructured":"MSRC Team (2019) A proactive approach to more secure code. https:\/\/msrc-blog.microsoft.com\/2019\/07\/16\/a-proactive-approach-to-more-secure-code\/"},{"key":"9819_CR18","unstructured":"Rapid7 (2018) CVE 100K: by the numbers. https:\/\/blog.rapid7.com\/2018\/04\/30\/cve-100k-by-the-numbers\/"},{"key":"9819_CR19","doi-asserted-by":"publisher","unstructured":"Sui Y, Xue J (2016) Svf: interprocedural static value-flow analysis in llvm. In: Proceedings of the 25th international conference on compiler construction, pp. 265\u2013266. https:\/\/doi.org\/10.1145\/2892208.2892235. ACM","DOI":"10.1145\/2892208.2892235"},{"issue":"2","key":"9819_CR20","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1109\/TSE.2014.2302311","volume":"40","author":"Y Sui","year":"2014","unstructured":"Sui Y, Ye D, Xue J (2014) Detecting memory leaks statically with full-sparse value-flow analysis. IEEE Trans Software Eng 40(2):107\u2013122. https:\/\/doi.org\/10.1109\/TSE.2014.2302311","journal-title":"IEEE Trans Software Eng"},{"key":"9819_CR21","doi-asserted-by":"publisher","DOI":"10.1145\/3436877","author":"X Cheng","year":"2021","unstructured":"Cheng X, Wang H, Hua J, Xu G, Sui Y (2021) Deepwukong: statically detecting software vulnerabilities using deep graph neural network. ACM Trans Softw Eng Methodol. https:\/\/doi.org\/10.1145\/3436877","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"9819_CR22","doi-asserted-by":"publisher","unstructured":"Cheng X, Zhang G, Wang H, Sui Y (2022) Path-sensitive code embedding via contrastive learning for software vulnerability detection. In: Proceedings of the 31st ACM SIGSOFT international symposium on software testing and analysis. ISSTA 2022, pp. 519\u2013531. Association for Computing Machinery, New York, NY, USA . https:\/\/doi.org\/10.1145\/3533767.3534371","DOI":"10.1145\/3533767.3534371"},{"key":"9819_CR23","unstructured":"Andersen LO (1994) Program analysis and specialization for the c programming language. PhD thesis, Citeseer"},{"key":"9819_CR24","doi-asserted-by":"publisher","DOI":"10.1145\/3428301","author":"Y Sui","year":"2020","unstructured":"Sui Y, Cheng X, Zhang G, Wang H (2020) Flow2vec: value-flow-based precise code embedding. Proc ACM Program Lang. https:\/\/doi.org\/10.1145\/3428301","journal-title":"Proc ACM Program Lang"},{"key":"9819_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3290353","volume":"3","author":"U Alon","year":"2019","unstructured":"Alon U, Zilberstein M, Levy O, Yahav E (2019) code2vec: learning distributed representations of code. Proc ACM Prog Lang 3:1\u201329. https:\/\/doi.org\/10.1145\/3290353","journal-title":"Proc ACM Prog Lang"},{"key":"9819_CR26","unstructured":"llvm-admin team (2022) The LLVM Compiler Infrastructure Project. https:\/\/llvm.org\/"},{"key":"9819_CR27","unstructured":"Clang developers (2022) Clang Static Analyzer. https:\/\/clang-analyzer.llvm.org\/"},{"issue":"1","key":"9819_CR28","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/TNN.2008.2005605","volume":"20","author":"F Scarselli","year":"2009","unstructured":"Scarselli F, Gori M, Tsoi AC, Hagenbuchner M, Monfardini G (2009) The graph neural network model. IEEE Trans Neural Netw 20(1):61\u201380. https:\/\/doi.org\/10.1109\/TNN.2008.2005605","journal-title":"IEEE Trans Neural Netw"},{"key":"9819_CR29","unstructured":"CSIRO\u2019s Data61 (2018) StellarGraph machine learning library. GitHub. https:\/\/github.com\/stellargraph\/stellargraph"},{"key":"9819_CR30","doi-asserted-by":"publisher","unstructured":"Li Y, Zemel R, Brockschmidt M, Tarlow D (2016) Gated graph sequence neural networks. In: Proceedings of ICLR\u201916. https:\/\/doi.org\/10.48550\/ARXIV.1511.05493","DOI":"10.48550\/ARXIV.1511.05493"},{"key":"9819_CR31","unstructured":"Zhou Y, Liu S, Siow J, Du X, Liu Y (2019) Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks. Advances in Neural Information Processing Systems. Vol. 32"},{"key":"9819_CR32","unstructured":"Yang X, Chen Y, Eric E, Regehr J (2017) Csmith. https:\/\/embed.cs.utah.edu\/csmith\/"},{"key":"9819_CR33","unstructured":"Ravitch T (2021) A wrapper script to build whole-program LLVM bitcode files. GitHub. https:\/\/github.com\/travitch\/whole-program-llvm"},{"key":"9819_CR34","doi-asserted-by":"publisher","DOI":"10.1145\/3418463","author":"S VenkataKeerthy","year":"2020","unstructured":"VenkataKeerthy S, Aggarwal R, Jain S, Desarkar MS, Upadrasta R, Srikant YN (2020) Ir2vec: Llvm ir based scalable program embeddings. ACM Trans Archit Code Optim. https:\/\/doi.org\/10.1145\/3418463","journal-title":"ACM Trans Archit Code Optim"},{"key":"9819_CR35","unstructured":"Bordes A, Usunier N, Garcia-Duran A, Weston J, Yakhnenko O (2013) Translating embeddings for modeling multi-relational data. 26"},{"key":"9819_CR36","doi-asserted-by":"publisher","unstructured":"Mikolov T, Chen K, Corrado G, Dean J (2013) Efficient estimation of word representations in vector space. https:\/\/doi.org\/10.48550\/ARXIV.1301.3781","DOI":"10.48550\/ARXIV.1301.3781"},{"key":"9819_CR37","doi-asserted-by":"crossref","unstructured":"Zhang M, Cui Z, Neumann M, Chen Y (2018) An end-to-end deep learning architecture for graph classification. In: Proceedings of the AAAI conference on artificial intelligence. Vol 32","DOI":"10.1609\/aaai.v32i1.11782"},{"key":"9819_CR38","doi-asserted-by":"publisher","unstructured":"Monti F, Frasca F, Eynard D, Mannion D, Bronstein MM (2019) Fake news detection on social media using geometric deep learning. https:\/\/doi.org\/10.48550\/ARXIV.1902.06673","DOI":"10.48550\/ARXIV.1902.06673"},{"key":"9819_CR39","doi-asserted-by":"crossref","unstructured":"Cho K, van Merrienboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y (2014) Learning phrase representations using RNN encoder-decoder for statistical machine translation","DOI":"10.3115\/v1\/D14-1179"},{"key":"9819_CR40","doi-asserted-by":"publisher","unstructured":"Fey M, Lenssen JE (2019) Fast graph representation learning with pytorch geometric. arXiv preprint arXiv:1903.02428. https:\/\/doi.org\/10.48550\/ARXIV.1903.02428","DOI":"10.48550\/ARXIV.1903.02428"},{"key":"9819_CR41","doi-asserted-by":"publisher","unstructured":"Paszke A, Gross S, Massa F, Lerer A, Bradbury J, Chanan G, Killeen T, Lin Z, Gimelshein N, Antiga L, Desmaison A, K\u00f6pf A, Yang E, DeVito Z, Raison M, Tejani A, Chilamkurthy S, Steiner B, Fang L, Bai J, Chintala S (2019) Pytorch: An imperative style, high-performance deep learning library . https:\/\/doi.org\/10.5555\/3454287.3455008","DOI":"10.5555\/3454287.3455008"},{"key":"9819_CR42","unstructured":"Marjam\u00e4ki D (2022) Cppcheck - A tool for static C\/C++ code analysis. GitHub. https:\/\/github.com\/danmar\/cppcheck\/"},{"key":"9819_CR43","unstructured":"Clang-developers (2022) Clang: a C language family frontend for LLVM. Clang developers. https:\/\/clang.llvm.org\/index.html"},{"key":"9819_CR44","unstructured":"Pinconschi E (2020) GitHub - epicosy\/devign: effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks. https:\/\/github.com\/epicosy\/devign"},{"issue":"4","key":"9819_CR45","doi-asserted-by":"publisher","first-page":"2244","DOI":"10.1109\/TDSC.2021.3051525","volume":"19","author":"Z Li","year":"2022","unstructured":"Li Z, Zou D, Xu S, Jin H, Zhu Y, Chen Z (2022) Sysevr: a framework for using deep learning to detect software vulnerabilities. IEEE Trans Depend Secure Comput 19(4):2244\u20132258. https:\/\/doi.org\/10.1109\/TDSC.2021.3051525","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"9819_CR46","unstructured":"Zhen Li DZ, Xu S, Jin H, Zhu Y, Chen Z (2021) GitHub - SySeVR\/sysevr. https:\/\/github.com\/SySeVR\/SySeVR"},{"key":"9819_CR47","doi-asserted-by":"publisher","unstructured":"Yang S, Yu X, Zhou Y (2020) LSTM and GRU neural network performance comparison study: Taking yelp review dataset as an example. In: 2020 International workshop on electronic communication and artificial intelligence (IWECAI), pp. 98\u2013101. https:\/\/doi.org\/10.1109\/IWECAI50956.2020.00027","DOI":"10.1109\/IWECAI50956.2020.00027"},{"key":"9819_CR48","doi-asserted-by":"publisher","first-page":"103184","DOI":"10.1109\/ACCESS.2019.2930578","volume":"7","author":"Z Li","year":"2019","unstructured":"Li Z, Zou D, Tang J, Zhang Z, Sun M, Jin H (2019) A comparative study of deep learning-based vulnerability detection system. IEEE Access 7:103184\u2013103197. https:\/\/doi.org\/10.1109\/ACCESS.2019.2930578","journal-title":"IEEE Access"},{"key":"9819_CR49","unstructured":"Synopsys, Inc. (2022) Coverity Scan - Static Analysis. https:\/\/scan.coverity.com\/"},{"key":"9819_CR50","doi-asserted-by":"publisher","unstructured":"Roy CK (2009) Detection and analysis of near-miss software clones, pp. 447\u2013450. https:\/\/doi.org\/10.1109\/ICSM.2009.5306301","DOI":"10.1109\/ICSM.2009.5306301"},{"key":"9819_CR51","doi-asserted-by":"publisher","unstructured":"Jang J, Agrawal A, Brumley D (2012) Redebug: finding unpatched code clones in entire OS distributions. https:\/\/doi.org\/10.1109\/SP.2012.13","DOI":"10.1109\/SP.2012.13"},{"key":"9819_CR52","doi-asserted-by":"publisher","unstructured":"Kim S, Woo S, Lee H, Oh H (2017) Vuddy: a scalable approach for vulnerable code clone discovery. In: 2017 IEEE symposium on security and privacy (SP), pp. 595\u2013614. https:\/\/doi.org\/10.1109\/SP.2017.62. IEEE","DOI":"10.1109\/SP.2017.62"},{"key":"9819_CR53","doi-asserted-by":"publisher","first-page":"100021","DOI":"10.1016\/j.array.2020.100021","volume":"6","author":"R Ferenc","year":"2020","unstructured":"Ferenc R, B\u00e1n D, Gr\u00f3sz T, Gyim\u00f3thy T (2020) Deep learning in static, metric-based bug prediction. Array 6:100021. https:\/\/doi.org\/10.1016\/j.array.2020.100021","journal-title":"Array"},{"key":"9819_CR54","doi-asserted-by":"publisher","unstructured":"Russell R, Kim L, Hamilton L, Lazovich T, Harer J, Ozdemir O, Ellingwood P, McConley M (2018) Automated vulnerability detection in source code using deep representation learning. In: 2018 17th IEEE international conference on machine learning and applications (ICMLA), pp. 757\u2013762. https:\/\/doi.org\/10.1109\/ICMLA.2018.00120. IEEE","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"9819_CR55","doi-asserted-by":"publisher","unstructured":"Tanwar A, Sundaresan K, Ashwath P, Ganesan P, Chandrasekaran SK, Ravi S (2020) Predicting vulnerability in large codebases with deep code representation. https:\/\/doi.org\/10.48550\/ARXIV.2004.12783","DOI":"10.48550\/ARXIV.2004.12783"},{"key":"9819_CR56","doi-asserted-by":"publisher","first-page":"103293","DOI":"10.1016\/j.jisa.2022.103293","volume":"69","author":"R Xu","year":"2022","unstructured":"Xu R, Tang Z, Ye G, Wang H, Ke X, Fang D, Wang Z (2022) Detecting code vulnerabilities by learning from large-scale open source repositories. J Inf Secur Appl 69:103293. https:\/\/doi.org\/10.1016\/j.jisa.2022.103293","journal-title":"J Inf Secur Appl"},{"key":"9819_CR57","doi-asserted-by":"publisher","unstructured":"Thapa C, Jang SI, Ahmed ME, Camtepe S, Pieprzyk J, Nepal S (2022) Transformer-based language models for software vulnerability detection. ACSAC \u201922, pp. 481\u2013496. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3564625.3567985","DOI":"10.1145\/3564625.3567985"},{"key":"9819_CR58","doi-asserted-by":"publisher","unstructured":"Alon U, Brody S, Levy O, Yahav E (2018) code2seq: Generating sequences from structured representations of code. In: International conference on learning representations. https:\/\/doi.org\/10.48550\/ARXIV.1808.01400","DOI":"10.48550\/ARXIV.1808.01400"},{"key":"9819_CR59","doi-asserted-by":"publisher","first-page":"103322","DOI":"10.1016\/j.cose.2023.103322","volume":"132","author":"X Sun","year":"2023","unstructured":"Sun X, Liu C, Dong W, Liu T (2023) Improvements to code2vec: generating path vectors using RNN. Comput Secur 132:103322. https:\/\/doi.org\/10.1016\/j.cose.2023.103322","journal-title":"Comput Secur"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-09819-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-024-09819-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-09819-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T14:31:25Z","timestamp":1724423485000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-024-09819-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,20]]},"references-count":59,"journal-issue":{"issue":"25","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["9819"],"URL":"https:\/\/doi.org\/10.1007\/s00521-024-09819-3","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,20]]},"assertion":[{"value":"21 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no financial or proprietary interests in any material discussed in this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}