{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T21:39:07Z","timestamp":1774993147886,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1637534,1820685"],"award-info":[{"award-number":["CCF-1637534,1820685"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1109\/dsaa53316.2021.9564227","type":"proceedings-article","created":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T22:54:28Z","timestamp":1634770468000},"page":"1-12","source":"Crossref","is-referenced-by-count":53,"title":["V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities"],"prefix":"10.1109","author":[{"given":"Siddhartha Shankar","family":"Das","sequence":"first","affiliation":[]},{"given":"Edoardo","family":"Serra","sequence":"additional","affiliation":[]},{"given":"Mahantesh","family":"Halappanavar","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Pothen","sequence":"additional","affiliation":[]},{"given":"Ehab","family":"Al-Shaer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"657","article-title":"A study on the classification of common vulnerabilities and exposures using na&#x00EF;ve bayes","author":"na","year":"0","journal-title":"International Conference on Broadband and Wireless Computing Communication and Applications"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219568"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.53"},{"key":"ref13","first-page":"238","article-title":"Software design level vulnerability classification model","volume":"6","author":"rehman","year":"2012","journal-title":"International Journal of Computer Science and Security (IJCSS)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3314058.3318167"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.52"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2018OFL0006"},{"key":"ref17","author":"reimers","year":"2019","journal-title":"Sentence-bert Sentence embeddings using siamese bert-networks[J]"},{"key":"ref18","author":"lu","year":"2020","journal-title":"TwinBERT Distilling knowledge to twin-structured BERT models for efficient retrieval"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/S15-2045"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2019.8929620"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57633-6_13"},{"key":"ref6","author":"devlin","year":"2018","journal-title":"BERT Pre-training of deep bidirectional transformers for language understanding"},{"key":"ref5","first-page":"5998","article-title":"Attention is all you need","author":"vaswani","year":"0","journal-title":"Advances in neural information processing systems"},{"key":"ref8","first-page":"73","article-title":"Siamese neural networks: An overview","author":"chicco","year":"2020","journal-title":"Artificial Neural Networks"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32381-3_16"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2016.025"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1387830.1387835"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101589"},{"key":"ref20","author":"cer","year":"2018","journal-title":"Universal sentence encoder"},{"key":"ref22","author":"wei","year":"2019","journal-title":"EDA Easy Data Augmentation Techniques for Boosting Performance on Text Classification Tasks"},{"key":"ref21","author":"loshchilov","year":"2017","journal-title":"Decoupled weight decay regularization"}],"event":{"name":"2021 IEEE 8th International Conference on Data Science and Advanced Analytics (DSAA)","location":"Porto, Portugal","start":{"date-parts":[[2021,10,6]]},"end":{"date-parts":[[2021,10,9]]}},"container-title":["2021 IEEE 8th International Conference on Data Science and Advanced Analytics (DSAA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9564091\/9564109\/09564227.pdf?arnumber=9564227","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:47:24Z","timestamp":1652197644000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9564227\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/dsaa53316.2021.9564227","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}