{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T03:34:14Z","timestamp":1777952054820,"version":"3.51.4"},"reference-count":20,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":31,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.01.107","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:30:19Z","timestamp":1774035019000},"page":"941-949","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A Comprehensive Assessment of OpenAI\u2019s Large Language Models for Detecting Vulnerabilities in Source Code"],"prefix":"10.1016","volume":"275","author":[{"given":"Osama","family":"Hosam","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Achraf","family":"Ghorbel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ghazi Ben","family":"Ayed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2026.01.107_bib1","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1109\/ICMLA.2018.00120","article-title":"\"Automated vulnerability detection in source code using deep representation learning,\"","author":"Russell","year":"2018","journal-title":"2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA)"},{"key":"10.1016\/j.procs.2026.01.107_bib2","article-title":"\"Attention is all you need,\"","volume":"30","author":"Vaswani","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.procs.2026.01.107_bib3","first-page":"1877","article-title":"\"Language models are few-shot learners,\"","volume":"33","author":"Brown","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.procs.2026.01.107_bib4","doi-asserted-by":"crossref","unstructured":"Gallifant, J., et al., \"Peer review of GPT-4 technical report and systems card,\" PLOS Digital Health, vol. 3, no. 1, 2024, e0000417.","DOI":"10.1371\/journal.pdig.0000417"},{"key":"10.1016\/j.procs.2026.01.107_bib5","doi-asserted-by":"crossref","first-page":"508","DOI":"10.1145\/3379597.3387501","article-title":"\"A C\/C++ code vulnerability dataset with code changes and CVE summaries,\" in","author":"Fan","year":"2020","journal-title":"Proceedings of the 17th International Conference on Mining Software Repositories"},{"key":"10.1016\/j.procs.2026.01.107_bib6","first-page":"30","article-title":"\"CVEfixes: automated collection of vulnerabilities and their fixes from open-source software,\" in","author":"Bhandari","year":"2021","journal-title":"Proceedings of the 17th International Conference on Predictive Models and Data Analytics in Software Engineering"},{"key":"10.1016\/j.procs.2026.01.107_bib7","first-page":"986","article-title":"\"The adverse effects of code duplication in machine learning models of code,\" in","author":"Allamanis","year":"2021","journal-title":"Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"},{"issue":"2","key":"10.1016\/j.procs.2026.01.107_bib8","article-title":"\"BERT: Pre-training of deep bidirectional transformers for language understanding,\" in","volume":"1","author":"Kenton","year":"2019","journal-title":"Proceedings of NAACL-HLT"},{"key":"10.1016\/j.procs.2026.01.107_bib9","doi-asserted-by":"crossref","unstructured":"Zhang, H., Lu, S., Li, Z., Jin, Z., Ma, L., Liu, Y., & Li, G., \"CodeBERT-Attack: Adversarial attack against source code deep learning models via pre-trained model,\" Journal of Software: Evolution and Process, vol. 36, no. 3, 2024, e2571.","DOI":"10.1002\/smr.2571"},{"key":"10.1016\/j.procs.2026.01.107_bib10","first-page":"2476","article-title":"\"ContraBERT: Enhancing code pre-trained models via contrastive learning,\" in 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","author":"Liu","year":"2023","journal-title":"IEEE"},{"key":"10.1016\/j.procs.2026.01.107_bib11","article-title":"\"Improving language understanding by generative pre-training,\"","author":"Radford","year":"2018","journal-title":"OpenAI Technical Report"},{"key":"10.1016\/j.procs.2026.01.107_bib12","doi-asserted-by":"crossref","unstructured":"Leon, Maikel. \"GPT-5 and open-weight LLMs: Advances in reasoning, transparency, and control.\" Information Systems (2025): 102620.","DOI":"10.1016\/j.is.2025.102620"},{"key":"10.1016\/j.procs.2026.01.107_bib13","article-title":"\"DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection,\" in","author":"Chen","year":"2023","journal-title":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"},{"key":"10.1016\/j.procs.2026.01.107_bib14","article-title":"\"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks,\"","volume":"32","author":"Zhou","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"9","key":"10.1016\/j.procs.2026.01.107_bib15","doi-asserted-by":"crossref","first-page":"3280","DOI":"10.1109\/TSE.2021.3087402","article-title":"\"Deep learning based vulnerability detection: Are we there yet?\"","volume":"48","author":"Chakraborty","year":"2021","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"4","key":"10.1016\/j.procs.2026.01.107_bib16","doi-asserted-by":"crossref","first-page":"2244","DOI":"10.1109\/TDSC.2021.3051525","article-title":"\"Sysevr: A framework for using deep learning to detect software vulnerabilities,\"","volume":"19","author":"Li","year":"2021","journal-title":"IEEE Transactions on Dependable andSecure Computing"},{"key":"10.1016\/j.procs.2026.01.107_bib17","doi-asserted-by":"crossref","first-page":"754","DOI":"10.1109\/SP46214.2022.9833571","article-title":"\"Asleep at the keyboard? assessing the security of github copilot\u2019s code contributions,\" in","author":"Pearce","year":"2022","journal-title":"2022 IEEE Symposium on Security and Privacy (SP)"},{"key":"10.1016\/j.procs.2026.01.107_bib18","article-title":"\"Security of code generated by large language models: A systematic review,\"","author":"Szczepanski","year":"2023","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/j.procs.2026.01.107_bib19","doi-asserted-by":"crossref","first-page":"22300","DOI":"10.52202\/068431-1620","article-title":"\"Revisiting neural scaling laws in language and vision,\"","volume":"35","author":"Alabdulmohsin","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"8","key":"10.1016\/j.procs.2026.01.107_bib20","first-page":"9","article-title":"\"Language models are unsupervised multitask learners,\"","volume":"1","author":"Radford","year":"2019","journal-title":"OpenAI Blog"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926001080?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926001080?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:26:24Z","timestamp":1777893984000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926001080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":20,"alternative-id":["S1877050926001080"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.107","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A Comprehensive Assessment of OpenAI\u2019s Large Language Models for Detecting Vulnerabilities in Source Code","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.107","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}