{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:42:25Z","timestamp":1772934145225,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11402220","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"4378-4387","source":"Crossref","is-referenced-by-count":0,"title":["ResVul-LLM: A Neurosymbolic Framework Combining Large Language Models and Symbolic Reasoning for C\/C++ Vulnerability Analysis"],"prefix":"10.1109","author":[{"given":"Md. Shazzad Hossain","family":"Shaon","sequence":"first","affiliation":[{"name":"Oakland University,Department of CSE,Rochester,MI,USA,48309"}]},{"given":"Shapna","family":"Akter","sequence":"additional","affiliation":[{"name":"Oakland University,Department of CSE,Rochester,MI,USA,48309"}]},{"given":"Alfredo","family":"Cuzzocrea","sequence":"additional","affiliation":[{"name":"University of Calabria,iDEA Lab,Rende,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-acl.67"},{"issue":"3","key":"ref2","article-title":"Language models are few-shot learners","volume":"1","author":"Mann","year":"2020","journal-title":"arXiv preprint arXiv:2005.14165"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.52202\/068431-2011"},{"key":"ref4","volume-title":"GPT-4 technical report","volume":"abs\/2303.08774","year":"2023"},{"key":"ref5","article-title":"Emergent abilities of large language models","author":"Wei","year":"2022","journal-title":"arXiv preprint arXiv:2206.07682"},{"key":"ref6","article-title":"Evaluating the logical reasoning ability of chatgpt and gpt-4","author":"Liu","year":"2023","journal-title":"arXiv preprint arXiv:2304.03439"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016064126976"},{"key":"ref8","article-title":"Roscoe: A suite of metrics for scoring step-by-step reasoning","author":"Golovneva","year":"2022","journal-title":"arXiv preprint arXiv:2212.07919"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3624724"},{"key":"ref10","first-page":"50","article-title":"A Probabilistic Approach to Model Adaptive Hypermedia Systems","volume-title":"WebDyn@ ICDT","author":"Cannataro","year":"2001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-008-0065-4"},{"key":"ref12","first-page":"209","article-title":"Klee: unassisted and automatic generation of high-coverage tests for complex systems programs","volume-title":"OSDI","volume":"8","author":"Cadar","year":"2008"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.59"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.73"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330574"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3674805.3686670"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"ref18","article-title":"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks","volume":"32","author":"Zhou","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref20","first-page":"37","article-title":"GraphCodeBERT: Pre-training Code Representations with Data Flow","volume-title":"9th International Conference on Learning Representations, ICLR","author":"Guo","year":"2021"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.499"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BigData62323.2024.10825609"},{"key":"ref23","article-title":"Lprotector: An llm -driven vulnerability detection system","author":"Sheng","year":"2024","journal-title":"arXiv preprint arXiv:2411.06493"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICST62969.2025.10988968"},{"key":"ref25","article-title":"SCL-CVD: Neurosymbolic Contrastive Learning for C\/C++ Vulnerability Detection","author":"Wang","year":"2025","journal-title":"arXiv"},{"key":"ref26","article-title":"Fuzz4all: Leveraging LLMs and Symbolic Execution for Effective Fuzzing","author":"Xia","year":"2024","journal-title":"arXiv"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534371"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106576"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468597"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387501"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3087402"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607242"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.345"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-acl.625"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3475960.3475985"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14794\/ICAI.10.2017.23"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11402220.pdf?arnumber=11402220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T07:00:51Z","timestamp":1772866851000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11402220\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11402220","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}