{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T11:01:25Z","timestamp":1769943685742,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819549689","type":"print"},{"value":"9789819549696","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-4969-6_18","type":"book-chapter","created":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T08:48:25Z","timestamp":1763974105000},"page":"233-245","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Prompting Instability: An Empirical Study of\u00a0LLM Robustness in\u00a0Code Vulnerability Detection"],"prefix":"10.1007","author":[{"given":"Shuo","family":"Han","sequence":"first","affiliation":[]},{"given":"Tao","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Yuantian","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,25]]},"reference":[{"key":"18_CR1","unstructured":"AI, M.: Codestral: empowering developers and democratizing coding with mistral AI (2024). https:\/\/mistral.ai\/news\/codestral. Accessed 20 Mar 2025"},{"key":"18_CR2","unstructured":"AI, M.: Mistral small 3: a new standard in efficient language models (2024). https:\/\/mistral.ai\/news\/mistral-small-3. Accessed 20 Mar 2025"},{"key":"18_CR3","unstructured":"AI@Meta: Llama 3 Model Card (2024)"},{"key":"18_CR4","unstructured":"Bai, J., et al.: Qwen technical report. arXiv preprint arXiv:2309.16609 (2023)"},{"key":"18_CR5","doi-asserted-by":"publisher","unstructured":"Elazar, Y., et al.: Measuring and improving consistency in pretrained language models. Trans. Assoc. Comput. Linguist. 9, 1012\u20131031 (2021). https:\/\/doi.org\/10.1162\/tacl_a_00357. https:\/\/aclanthology.org\/2021.tacl-1.77","DOI":"10.1162\/tacl_a_00357"},{"key":"18_CR6","unstructured":"Facebook: Infer (2013). https:\/\/fbinfer.com\/. Accessed 12 Oct 2024"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Hou, X., et al.: Large language models for software engineering: a systematic literature review. ACM Trans. Softw. Eng. Methodol. (2024)","DOI":"10.1145\/3695988"},{"key":"18_CR8","unstructured":"Hui, B., et al.: Qwen2.5-coder technical report. arXiv preprint arXiv:2409.12186 (2024)"},{"key":"18_CR9","unstructured":"Kim, T., et al.: Rvfuzzer: finding input validation bugs in robotic vehicles through control-guided testing. In: Proceedings of the 28th USENIX Security Symposium (SEC 2019), pp. 425\u2013442 (2019)"},{"key":"18_CR10","unstructured":"OpenAI: GPT-3.5-Turbo (2025). https:\/\/platform.openai.com\/, large language model"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Ouyang, S., Zhang, J.M., Harman, M., Wang, M.: An empirical study of the nondeterminism of chatgpt in code generation. ACM Trans. Softw. Eng. Methodol. (2025). https:\/\/doi.org\/10.1145\/3697010","DOI":"10.1145\/3697010"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Saxena, Y., Chopra, S., Tripathi, A.M.: Evaluating consistency and reasoning capabilities of large language models. In: 2024 Second International Conference on Data Science and Information System (ICDSIS), pp.\u00a01\u20135. IEEE (2024)","DOI":"10.1109\/ICDSIS61070.2024.10594233"},{"key":"18_CR13","unstructured":"Sheng, Z., Chen, Z., Gu, S., Huang, H., Gu, G., Huang, J.: LLMs in software security: a survey of vulnerability detection techniques and insights (2025). https:\/\/arxiv.org\/abs\/2502.07049"},{"key":"18_CR14","unstructured":"Steenhoek, B., et al.: To err is machine: vulnerability detection challenges LLM reasoning (2025). https:\/\/arxiv.org\/abs\/2403.17218"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Ullah, S., Han, M., Pujar, S., Pearce, H., Coskun, A., Stringhini, G.: LLMs cannot reliably identify and reason about security vulnerabilities (yet?): a comprehensive evaluation, framework, and benchmarks. In: IEEE Symposium on Security and Privacy (2024). https:\/\/www.bu.edu","DOI":"10.1109\/SP54263.2024.00210"},{"key":"18_CR16","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems (NeurIPS) (2017)"},{"key":"18_CR17","unstructured":"Xie, Q., Li, Q., Yu, Z., Zhang, Y., Zhang, Y., Yang, L.: An empirical analysis of uncertainty in large language model evaluations (2025). https:\/\/arxiv.org\/abs\/2502.10709"}],"container-title":["Lecture Notes in Computer Science","AI 2025: Advances in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-4969-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T20:57:29Z","timestamp":1769893049000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-4969-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,25]]},"ISBN":["9789819549689","9789819549696"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-4969-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,25]]},"assertion":[{"value":"25 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australasian Joint Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canberra, ACT","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ausai2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ajcai2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}