{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T00:09:14Z","timestamp":1773446954442,"version":"3.50.1"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3538050","type":"journal-article","created":{"date-parts":[[2025,2,3]],"date-time":"2025-02-03T18:29:08Z","timestamp":1738607348000},"page":"23580-23596","source":"Crossref","is-referenced-by-count":12,"title":["Analysis of ChatGPT-Generated Codes Across Multiple Programming Languages"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8681-1231","authenticated-orcid":false,"given":"Sally","family":"Almanasra","sequence":"first","affiliation":[{"name":"Faculty of Computer Studies, Arab Open University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6530-5022","authenticated-orcid":false,"given":"Khaled","family":"Suwais","sequence":"additional","affiliation":[{"name":"Faculty of Computer Studies, Arab Open University, Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/e25060888"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3487569"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.859"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref5","article-title":"Do users write more insecure code with AI assistants?","author":"Perry","year":"2022","journal-title":"arXiv:2211.03622"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.7759\/cureus.40135"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.09.010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.carj.2018.02.002"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/issrew60843.2023.00060"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/sp54263.2024.00140"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.9734\/ajeba\/2024\/v24i41268"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1051\/e3sconf\/202449102033"},{"key":"ref13","volume-title":"LeetCode Online Judge","year":"2024"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-024-02459-6"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.21203\/rs.3.rs-4440421\/v1","article-title":"Modify mistral large performance with low-rank adaptation (LoRA) on the big-bench dataset","author":"Fujiwara","year":"2024"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.21203\/rs.3.rs-3226684\/v1","article-title":"MFD: Multi-feature detection of LLM-generated text","author":"Wu","year":"2023"},{"key":"ref17","article-title":"Using DeepSpeed and megatron to train megatron-turing NLG 530B, a large-scale generative language model","author":"Smith","year":"2022","journal-title":"arXiv:2201.11990"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1038\/s43856-023-00370-1"},{"key":"ref19","article-title":"Autoformalization with large language models","author":"Wu","year":"2022","journal-title":"arXiv:2205.12615"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/a17020062"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123602"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2024.100526"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3511861.3511863"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3643674"},{"key":"ref25","first-page":"152","article-title":"Quality assessment of ChatGPT generated code and their use by developers","volume-title":"Proc. 21st Int. Conf. Mining Softw. Repositories","author":"Siddiq"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00096"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/digital4010005"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SMC53992.2023.10394237"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT62343.2024.00060"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC57700.2023.00117"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTIM62047.2024.10629560"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3403858"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2024.3392499"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-6529-8_26"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-51979-6_54"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10870152.pdf?arnumber=10870152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:47:19Z","timestamp":1740084439000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10870152\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3538050","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}