{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:29:11Z","timestamp":1771705751951,"version":"3.50.1"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T00:00:00Z","timestamp":1718409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T00:00:00Z","timestamp":1718409600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T00:00:00Z","timestamp":1718409600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62206238"],"award-info":[{"award-number":["62206238"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20220562"],"award-info":[{"award-number":["BK20220562"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010014","name":"Six Talent Peaks Project in Jiangsu Province","doi-asserted-by":"publisher","award":["RJFW-053"],"award-info":[{"award-number":["RJFW-053"]}],"id":[{"id":"10.13039\/501100010014","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Jiangsu \u201c333\u201d Project and Yangzhou University Top-Level Talents Support Program"},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2023M732985"],"award-info":[{"award-number":["2023M732985"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"State Key Laboratory of Massive Personalized Customization System and Technology","award":["H&C-MPC-2023-02-05"],"award-info":[{"award-number":["H&C-MPC-2023-02-05"]}]},{"name":"Postgraduate Research and Practice Innovation Program of Jiangsu Province","award":["KYCX22_3502"],"award-info":[{"award-number":["KYCX22_3502"]}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council Foundation","doi-asserted-by":"publisher","award":["202308320436"],"award-info":[{"award-number":["202308320436"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,6,15]]},"DOI":"10.1109\/jiot.2024.3381641","type":"journal-article","created":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T19:31:42Z","timestamp":1711567902000},"page":"22385-22398","source":"Crossref","is-referenced-by-count":4,"title":["EXVul: Toward Effective and Explainable Vulnerability Detection for IoT Devices"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3688-4437","authenticated-orcid":false,"given":"Sicong","family":"Cao","sequence":"first","affiliation":[{"name":"School of Information Engineering, Yangzhou University, Yangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5165-5080","authenticated-orcid":false,"given":"Xiaobing","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Yangzhou University, Yangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8503-4063","authenticated-orcid":false,"given":"Wei","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Yangzhou University, Yangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4753-8161","authenticated-orcid":false,"given":"Di","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Mathematics, Physics and Computing, University of Southern Queensland, Toowoomba, QLD, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2143-5666","authenticated-orcid":false,"given":"Jiale","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Yangzhou University, Yangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4694-4926","authenticated-orcid":false,"given":"Yan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Mathematics, Physics and Computing, University of Southern Queensland, Toowoomba, QLD, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5215-7443","authenticated-orcid":false,"given":"Tom H.","family":"Luan","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3026-7537","authenticated-orcid":false,"given":"Longxiang","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Mathematics, Physics and Computing, University of Southern Queensland, Toowoomba, QLD, Australia"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"State of IoT\u2014Spring 2023","year":"2023"},{"key":"ref2","volume-title":"Internet of Things (IoT) security: Challenges and best practices","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100389"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2881961"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106576"},{"key":"ref8","volume-title":"Flawfinder","year":"2023"},{"key":"ref9","volume-title":"Checkmarx","year":"2023"},{"key":"ref10","volume-title":"Infer","year":"2023"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3044773"},{"key":"ref12","first-page":"10197","article-title":"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks","volume-title":"Proc. 33rd Annu. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Zhou"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3087402"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468597"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/icse48619.2023.00188"},{"key":"ref17","first-page":"53","article-title":"Explainable software analytics","volume-title":"Proc. 40th Int. Conf. Softw. Eng., New Ideas Emerg. Results","author":"Dam"},{"key":"ref18","article-title":"A systematic literature review on explainability for machine\/deep learning-based software engineering research","author":"Cao","year":"2024","journal-title":"arXiv:2401.14617"},{"key":"ref19","first-page":"9240","article-title":"GNNexplainer: Generating explanations for graph neural networks","volume-title":"Proc. 33rd Annu. Conf. Neural Inf. Process. Syst.","author":"Ying"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598145"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5555\/3524938.3525087"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2023.3297964"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.482"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref25","first-page":"6533","article-title":"Protein interface prediction using graph convolutional networks","volume-title":"Proc. 31st Annu. Conf. Neural Inf. Process. Syst.","author":"Fout"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110841"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2023.3319318"},{"key":"ref28","first-page":"19620","article-title":"Parameterized explainer for graph neural network","volume-title":"Proc. 34th Annu. Conf. Neural Inf. Process. Syst.","author":"Luo"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549162"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3285910"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1310.4546"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"ref34","first-page":"1","article-title":"Graph attention networks","volume-title":"Proc. 6th Int. Conf. Learn. Represent. (ICLR)","author":"Velickovic"},{"key":"ref35","first-page":"1","article-title":"Supervised contrastive learning","volume-title":"Proc. 34th Annu. Conf. Neural Inf. Process. Syst.","author":"Khosla"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103467"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387501"},{"key":"ref38","first-page":"1","article-title":"Gated graph sequence neural networks","volume-title":"Proc. 4th Int. Conf. Learn. Represent. (ICLR)","author":"Li"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3106898"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3115452"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3192419"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00018"},{"key":"ref43","article-title":"CodeSearchNet challenge: Evaluating the state of semantic code search","author":"Husain","year":"2019","journal-title":"arXiv:1909.09436"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3305244"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00089"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616358"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510219"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179377"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00044"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3436877"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3624744"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3527949"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528452"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3199769"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468545"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10551641\/10479158.pdf?arnumber=10479158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T19:02:21Z","timestamp":1738004541000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10479158\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,15]]},"references-count":56,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3381641","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,15]]}}}