{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T06:04:26Z","timestamp":1773295466196,"version":"3.50.1"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004517","name":"Tianjin University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004517","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1109\/ase51524.2021.9678638","type":"proceedings-article","created":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T20:33:49Z","timestamp":1642710829000},"page":"943-954","source":"Crossref","is-referenced-by-count":18,"title":["Unsupervised Labeling and Extraction of Phrase-based Concepts in Vulnerability Descriptions"],"prefix":"10.1109","author":[{"given":"Sofonias","family":"Yitagesu","sequence":"first","affiliation":[]},{"given":"Zhenchang","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Xiaowang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhiyong","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Linyi","family":"Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.26"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2017.8393106"},{"key":"ref33","volume":"15","author":"singh","year":"2013","journal-title":"Elementary Survey Sampling"},{"key":"ref32","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2015","journal-title":"3rd International Conference on Learning Representations ICLR 2015"},{"key":"ref31","first-page":"807","article-title":"Rectified linear units improve restricted boltz-mann machines","author":"nair","year":"2010","journal-title":"Proceedings of the 27th International Conference on Machine Learning (ICML-10)"},{"key":"ref30","author":"chollet","year":"2015","journal-title":"Keras"},{"key":"ref37","first-page":"4171","article-title":"BERT: pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"2019","journal-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics Human Language Technologies NAACL-HLT 2019"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref35","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"2013","journal-title":"Advances in Neural Information Processing Systems 26 27th Annual Conference on Neural Information Processing Systems 2013"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.2307\/2529786"},{"key":"ref28","article-title":"Automatic labeling for entity extraction in cyber security","author":"bridges","year":"2013","journal-title":"CoRR"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1088\/1755-1315\/31\/1\/012012"},{"key":"ref29","first-page":"265","article-title":"Tensorflow: A system for large-scale machine learning","author":"abadi","year":"2016","journal-title":"12th USENIX Symposium on Operating Systems Design and Implementation OSDI 2016"},{"key":"ref2","year":"2019","journal-title":"IBM X-Force Exchange"},{"key":"ref1","article-title":"National vulnerability database (nvd)[ol]","author":"mitre","year":"2017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-122"},{"key":"ref22","volume":"33","author":"gumbel","year":"1954","journal-title":"Statistical Theory of Extreme Values and Some Practical Applications A Series of Lectures"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2013.50"},{"key":"ref24","article-title":"How to train deep variational autoencoders and probabilistic ladder networks","author":"s\u00f8nderby","year":"2016","journal-title":"CoRR"},{"key":"ref23","article-title":"The concrete distribution: A continuous relaxation of discrete random variables","author":"maddison","year":"2017","journal-title":"5th International Conference on Learning Representations ICLR 2017"},{"key":"ref26","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","author":"ester","year":"1996","journal-title":"Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1038\/s41592-018-0308-4"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2013.106"},{"key":"ref51","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"van der maaten","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"ref10","first-page":"220","article-title":"Twitterosint: automated cybersecurity threat intelligence collection and analysis using twitter data","author":"vadapalli","year":"2018","journal-title":"Proceedings of the International Conference on Security and Management (SAM)"},{"key":"ref11","first-page":"879","article-title":"Relext: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement","author":"pingle","year":"2019","journal-title":"2010 International Conference on Advances in Social Networks Analysis and Mining ASONAM"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978315"},{"key":"ref12","first-page":"869","article-title":"Towards the detection of inconsistencies in public security vulnerability reports","author":"dong","year":"2019","journal-title":"28th USENIX Security Symposium USENIX Security 2019"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1143"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSR52588.2021.00016"},{"key":"ref15","article-title":"Auto-encoding variational bayes","author":"kingma","year":"2014","journal-title":"2nd International Conference on Learning Representations ICLR 2014 Banff AB Canada Apr"},{"key":"ref16","first-page":"1278","article-title":"Stochastic backpropagation and approximate inference in deep generative models","author":"rezende","year":"2014","journal-title":"Proceedings of the 31th International Conference on Machine Learning ICML 2014"},{"key":"ref17","article-title":"Categorical reparameterization with gumbel-softmax","author":"jang","year":"2017","journal-title":"5th International Conference on Learning Representations ICLR 2017"},{"key":"ref18","article-title":"Common vulnerabilities and exposures (cve)[ol]","author":"mitre","year":"2019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3115\/1075096.1075150"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/app9193945"},{"key":"ref3","author":"security","year":"2019","journal-title":"Exploit Database"},{"key":"ref6","first-page":"308","article-title":"Identifying vulnerabilities in trust and reputation systems","author":"g\u00fcnes","year":"2019","journal-title":"Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence IJCAI 2019"},{"key":"ref5","first-page":"356","article-title":"Automated extraction of vulnerability information for home computer security","author":"weerawardhana","year":"2014","journal-title":"Foundations and Practice of Security - 7th International Symposium FPS 2014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752338"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/937"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746277"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587375"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1138"},{"key":"ref45","article-title":"Deep learning approach for intelligent named entity recognition of cyber security","author":"k","year":"2020","journal-title":"CoRR"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3115\/1118693.1118694"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2011.26"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/AISP.2015.7123504"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3299815.3314470"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1800520"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01122-6"}],"event":{"name":"2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","location":"Melbourne, Australia","start":{"date-parts":[[2021,11,15]]},"end":{"date-parts":[[2021,11,19]]}},"container-title":["2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9678507\/9678392\/09678638.pdf?arnumber=9678638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:57:43Z","timestamp":1652201863000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9678638\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/ase51524.2021.9678638","relation":{},"subject":[],"published":{"date-parts":[[2021,11]]}}}