{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T10:57:31Z","timestamp":1775645851693,"version":"3.50.1"},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["529939250002"],"award-info":[{"award-number":["529939250002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.jisa.2026.104430","type":"journal-article","created":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T07:47:53Z","timestamp":1775634473000},"page":"104430","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["ReSLC: Defending backdoor attacks on intelligent vulnerability detection via redundant semantic LLM compression"],"prefix":"10.1016","volume":"100","author":[{"given":"Hongying","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yating","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3913-5001","authenticated-orcid":false,"given":"Gaolei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Pang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6831-3973","authenticated-orcid":false,"given":"Jianhua","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2026.104430_bib0001","series-title":"Proceedings of the 16th ACM workshop on artificial intelligence and security","first-page":"149","article-title":"Broken promises: measuring confounding effects in learning-based vulnerability discovery","author":"Imgrund","year":"2023"},{"key":"10.1016\/j.jisa.2026.104430_bib0002","series-title":"IEEE ICSE","first-page":"1","article-title":"Large language models are edge-case generators: crafting unusual programs for fuzzing deep learning libraries","author":"Deng","year":"2024"},{"key":"10.1016\/j.jisa.2026.104430_bib0003","unstructured":"Li Z., Zou D., Xu S., Ou X., Jin H., Wang S., et al. Vuldeepecker: a deep learning-based system for vulnerability detection. arXiv preprint arXiv: 1801016812018."},{"issue":"4","key":"10.1016\/j.jisa.2026.104430_bib0004","doi-asserted-by":"crossref","first-page":"2244","DOI":"10.1109\/TDSC.2021.3051525","article-title":"Sysevr: a framework for using deep learning to detect software vulnerabilities","volume":"19","author":"Li","year":"2021","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"4","key":"10.1016\/j.jisa.2026.104430_bib0005","doi-asserted-by":"crossref","first-page":"2821","DOI":"10.1109\/TDSC.2021.3076142","article-title":"Vuldeelocator: a deep learning-based fine-grained vulnerability detector","volume":"19","author":"Li","year":"2021","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"10.1016\/j.jisa.2026.104430_bib0006","article-title":"Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks","volume":"32","author":"Zhou","year":"2019","journal-title":"Adv Neural Inf Process Syst"},{"issue":"3","key":"10.1016\/j.jisa.2026.104430_bib0007","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3436877","article-title":"Deepwukong: statically detecting software vulnerabilities using deep graph neural network","volume":"30","author":"Cheng","year":"2021","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"key":"10.1016\/j.jisa.2026.104430_bib0008","series-title":"2023\u202fIEEE\/ACM 45th international conference on software engineering (ICSE)","first-page":"2275","article-title":"Vulnerability detection with graph simplification and enhanced graph representation learning","author":"Wen","year":"2023"},{"key":"10.1016\/j.jisa.2026.104430_bib0009","series-title":"Proceedings of the 44th international conference on software engineering","first-page":"1456","article-title":"Mvd: memory-related vulnerability detection based on flow-sensitive graph neural networks","author":"Cao","year":"2022"},{"issue":"9","key":"10.1016\/j.jisa.2026.104430_bib0010","doi-asserted-by":"crossref","first-page":"3280","DOI":"10.1109\/TSE.2021.3087402","article-title":"Deep learning based vulnerability detection: are we there yet?","volume":"48","author":"Chakraborty","year":"2021","journal-title":"IEEE Trans Software Eng"},{"issue":"4","key":"10.1016\/j.jisa.2026.104430_bib0011","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3640333","article-title":"Exploring semantic redundancy using backdoor triggers: a complementary insight into the challenges facing DNN-based software vulnerability detection","volume":"33","author":"Shao","year":"2024","journal-title":"ACM Trans Software Eng Method"},{"issue":"6","key":"10.1016\/j.jisa.2026.104430_bib0012","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MS.2024.3416036","article-title":"Generative AI for software security analysis: fundamentals, applications, and challenges","volume":"41","author":"Ding","year":"2024","journal-title":"IEEE Software"},{"key":"10.1016\/j.jisa.2026.104430_bib0013","series-title":"2023 53rd annual IEEE\/IFIP international conference on dependable systems and networks workshops (DSN-W)","first-page":"25","article-title":"Ivsign: interpretable vulnerability signature via code embedding and static analysis","author":"Ding","year":"2023"},{"key":"10.1016\/j.jisa.2026.104430_bib0014","series-title":"2023\u202fIEEE Intl conf on parallel & distributed processing with applications, big data & cloud computing, sustainable computing & communications, social computing & networking (ISPA\/BDCloud\/SocialCom\/sustaincom)","first-page":"1149","article-title":"AdvbinSD: poisoning the binary code similarity detector via isolated instruction sequences","author":"Yi","year":"2023"},{"key":"10.1016\/j.jisa.2026.104430_bib0015","unstructured":"Gu T., Dolan-Gavitt B., Garg S.. Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv: 1708067332017."},{"key":"10.1016\/j.jisa.2026.104430_bib0016","series-title":"Proceedings of the tenth ACM conference on data and application security and privacy","first-page":"97","article-title":"Backdoor embedding in convolutional neural network models via invisible perturbation","author":"Zhong","year":"2020"},{"key":"10.1016\/j.jisa.2026.104430_bib0017","series-title":"Proceedings of the AAAI conference on artificial intelligence","first-page":"11957","article-title":"Hidden trigger backdoor attacks","volume":"vol. 34","author":"Saha","year":"2020"},{"key":"10.1016\/j.jisa.2026.104430_bib0018","doi-asserted-by":"crossref","first-page":"7106","DOI":"10.1109\/TIFS.2025.3581026","article-title":"Silent penetrator: breaching cross-domain federated fine-tuning via feature shift-induced backdoor","volume":"20","author":"Huang","year":"2025","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2026.104430_bib0019","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2025.103375","article-title":"Auth-graph: genAI-empowered attribute-masked backdoor for on-demand authorizable graph learning","volume":"124","author":"Yang","year":"2025","journal-title":"Inf Fusion"},{"key":"10.1016\/j.jisa.2026.104430_bib0020","doi-asserted-by":"crossref","first-page":"138872","DOI":"10.1109\/ACCESS.2019.2941376","article-title":"A backdoor attack against lstm-based text classification systems","volume":"7","author":"Dai","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.jisa.2026.104430_bib0021","series-title":"Proceedings of the 58th annual meeting of the association for computational linguistics","first-page":"2793","article-title":"Weight poisoning attacks on pretrained models","author":"Kurita","year":"2020"},{"key":"10.1016\/j.jisa.2026.104430_bib0022","series-title":"Proceedings of the 37th annual computer security applications conference","first-page":"554","article-title":"Badnl: backdoor attacks against nlp models with semantic-preserving improvements","author":"Chen","year":"2021"},{"key":"10.1016\/j.jisa.2026.104430_bib0023","unstructured":"Qi F., Li M., Chen Y., Zhang Z., Liu Z., Wang Y., et al. Hidden killer: invisible textual backdoor attacks with syntactic trigger. arXiv preprint arXiv: 2105124002021."},{"key":"10.1016\/j.jisa.2026.104430_bib0024","series-title":"31st USENIX security symposium (USENIX security 22)","first-page":"3611","article-title":"Hidden trigger backdoor attack on {NLP} models via linguistic style manipulation","author":"Pan","year":"2022"},{"issue":"11","key":"10.1016\/j.jisa.2026.104430_bib0025","doi-asserted-by":"crossref","first-page":"3071","DOI":"10.1109\/TSE.2024.3470333","article-title":"Multitask-based evaluation of open-source LLM on software vulnerability","volume":"50","author":"Yin","year":"2024","journal-title":"IEEE Trans Software Eng"},{"key":"10.1016\/j.jisa.2026.104430_bib0026","first-page":"1","article-title":"Advanced smart contract vulnerability detection via LLM-powered multi-agent systems","author":"Wei","year":"2025","journal-title":"IEEE Trans Software Eng"},{"key":"10.1016\/j.jisa.2026.104430_bib0027","series-title":"Proceedings of the 1st ACM workshop on large AI systems and models with privacy and safety analysis","isbn-type":"print","first-page":"25","article-title":"How to efficiently manage critical infrastructure vulnerabilities? toward large code-graph models","author":"Zhang","year":"2024","ISBN":"https:\/\/id.crossref.org\/isbn\/9798400712098"},{"key":"10.1016\/j.jisa.2026.104430_bib0028","series-title":"2022 International joint conference on neural networks (IJCNN)","first-page":"1","article-title":"Vulberta: simplified source code pre-training for vulnerability detection","author":"Hanif","year":"2022"},{"key":"10.1016\/j.jisa.2026.104430_bib0029","series-title":"Proceedings of the IEEE\/ACM 46th international conference on software engineering","first-page":"1","article-title":"Pre-training by predicting program dependencies for vulnerability analysis tasks","author":"Liu","year":"2024"},{"key":"10.1016\/j.jisa.2026.104430_bib0030","first-page":"47","article-title":"Large language model for vulnerability detection: emerging results and future directions","author":"Zhou","year":"2024","journal-title":"ICSE NIER track(2024)"},{"issue":"10","key":"10.1016\/j.jisa.2026.104430_bib0031","doi-asserted-by":"crossref","first-page":"4550","DOI":"10.1109\/TSE.2023.3305244","article-title":"Vulexplainer: a transformer-based hierarchical distillation for explaining vulnerability types","volume":"49","author":"Fu","year":"2023","journal-title":"IEEE Trans Software Eng"},{"key":"10.1016\/j.jisa.2026.104430_bib0032","series-title":"2024 39Th IEEE\/ACM international conference on automated software engineering (ASE)","first-page":"2350","article-title":"Contracttinker: LLM-empowered vulnerability repair for real-world smart contracts","author":"Wang","year":"2024"},{"key":"10.1016\/j.jisa.2026.104430_bib0033","unstructured":"Oliinyk Y., Scott M., Tsang R., Fang C., Homayoun H., et al. Fuzzing busybox: leveraging LLM and crash reuse for embedded bug unearthing. arXiv preprint arXiv: 2403038972024."},{"key":"10.1016\/j.jisa.2026.104430_bib0034","series-title":"Proceedings of the 33rd USENIX conference on security symposium","isbn-type":"print","article-title":"An LLM-assisted easy-to-trigger backdoor attack on code completion models: injecting disguised vulnerabilities against strong detection","author":"Yan","year":"2024","ISBN":"https:\/\/id.crossref.org\/isbn\/9781939133441"},{"key":"10.1016\/j.jisa.2026.104430_bib0035","series-title":"Proceedings of the ACM\/IEEE 44th international conference on software engineering: companion proceedings","first-page":"178","article-title":"ReGVD: revisiting graph neural networks for vulnerability detection","author":"Nguyen","year":"2022"},{"key":"10.1016\/j.jisa.2026.104430_bib0036","unstructured":"Feng Z., Guo D., Tang D., Duan N., Feng X., Gong M., et al. Codebert: a pre-trained model for programming and natural languages. arXiv preprint arXiv: 2002081552020."},{"key":"10.1016\/j.jisa.2026.104430_bib0037","series-title":"Proceedings of the 26th international symposium on research in attacks, intrusions and defenses","first-page":"654","article-title":"Diversevul: a new vulnerable source code dataset for deep learning based vulnerability detection","author":"Chen","year":"2023"},{"key":"10.1016\/j.jisa.2026.104430_bib0038","article-title":"CodeBLEU: a method for automatic evaluation of code synthesis","volume":"abs\/2009.10297","author":"Ren","year":"2020","journal-title":"CoRR"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000608?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000608?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T10:11:39Z","timestamp":1775643099000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212626000608"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":38,"alternative-id":["S2214212626000608"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104430","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"ReSLC: Defending backdoor attacks on intelligent vulnerability detection via redundant semantic LLM compression","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104430","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104430"}}