{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:47:52Z","timestamp":1770846472626,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,5]]},"DOI":"10.1109\/smc58881.2025.11343244","type":"proceedings-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:54:44Z","timestamp":1769633684000},"page":"1882-1887","source":"Crossref","is-referenced-by-count":0,"title":["VulSCS: A Source Code Vulnerability Detection System Using Secondary Code Slicing"],"prefix":"10.1109","author":[{"given":"Yong","family":"Zhong","sequence":"first","affiliation":[{"name":"Foshan University,School of Computer Science and Artificial Intelligence,Foshan,China,528225"}]},{"given":"Bin","family":"Liu","sequence":"additional","affiliation":[{"name":"Foshan University,School of Computer Science and Artificial Intelligence,Foshan,China,528225"}]},{"given":"Wenyin","family":"Yang","sequence":"additional","affiliation":[{"name":"Foshan University,School of Computer Science and Artificial Intelligence,Foshan,China,528225"}]},{"given":"Junxian","family":"Ye","sequence":"additional","affiliation":[{"name":"Foshan University,School of Computer Science and Artificial Intelligence,Foshan,China,528225"}]},{"given":"Jihui Liand Fen","family":"Liu","sequence":"additional","affiliation":[{"name":"Foshan University,School of Computer Science and Artificial Intelligence,Foshan,China,528225"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2697856"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.62"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.13"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991102"},{"key":"ref7","article-title":"Rough Audit Tool for Security","year":"2021"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/648"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2021.3051525"},{"key":"ref13","first-page":"2539","article-title":"2017. POSTER: Vulnerability discovery with function representation learning from unlabeled projects","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201917)","author":"Lin"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/icmla.2018.00120"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/35075138"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2019.2942930"},{"key":"ref17","first-page":"1","article-title":"Vuldeelocator: a deep learning-based fine-grained vulnerability detector","volume":"2021","author":"Li","year":"2021","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510229"},{"key":"ref20","article-title":"Software assurance reference dataset","year":"2018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"ref23","article-title":"Adjacency Matrix"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3057733"},{"key":"ref26","article-title":"Tensors and Dynamic neural networks in Python with strong GPU acceleration 2021 (PyTorch)"},{"key":"ref27","first-page":"10197","article-title":"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks","volume-title":"Proceedings of the 2019 Advances in Neural Information Processing Systems (NIPS\u201919)","author":"Zhou"},{"key":"ref28","article-title":"VulMCI : Code Splicing-based Pixel-row Oversampling for More Continuous Vulnerability Image Generation","author":"Tao","year":"2024"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859089"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227183"},{"key":"ref34","article-title":"Detecting format string vulnerabilities with type qualifiers","volume-title":"10th USENIX Security Symposium (USENIX Security 01)","author":"Shankar"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.54"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2373377"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421003"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315311"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3436877"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56390-9_9"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT4SD59951.2023.10303562"}],"event":{"name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","location":"Vienna, Austria","start":{"date-parts":[[2025,10,5]]},"end":{"date-parts":[[2025,10,8]]}},"container-title":["2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11342430\/11342431\/11343244.pdf?arnumber=11343244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:53:31Z","timestamp":1770843211000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11343244\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,5]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/smc58881.2025.11343244","relation":{},"subject":[],"published":{"date-parts":[[2025,10,5]]}}}