{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:58:42Z","timestamp":1775627922006,"version":"3.50.1"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1109\/icmla66185.2025.00212","type":"proceedings-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T19:54:58Z","timestamp":1775591698000},"page":"1390-1395","source":"Crossref","is-referenced-by-count":0,"title":["SecureFixAgent: A Hybrid LLM Agent for Automated Python Static Vulnerability Repair"],"prefix":"10.1109","author":[{"given":"Jugal","family":"Gajjar","sequence":"first","affiliation":[{"name":"The George Washington University,Computer Science Department,Washington D.C,USA"}]},{"given":"Kamalasankari","family":"Subramaniakuppusamy","sequence":"additional","affiliation":[{"name":"The George Washington University,Computer Science Department,Washington D.C,USA"}]},{"given":"Relsy","family":"Puthal","sequence":"additional","affiliation":[{"name":"The George Washington University,Applied Economics Department,Washington D.C,USA"}]},{"given":"Kaustik","family":"Ranaware","sequence":"additional","affiliation":[{"name":"The George Washington University,Computer Science Department,Washington D.C,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"10 ways cybercrime impacts business","volume-title":"Investopedia","author":"Gratton","year":"2025"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3278129"},{"key":"ref3","article-title":"A deep dive into large language model code generation mistakes: What and why?","author":"Chen","year":"2024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"ref5","volume-title":"GitHub AI Copilot: Auto-Detect and Fix Code Vulnerabilities Instantly","year":"2024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00042"},{"issue":"6","key":"ref7","first-page":"231","article-title":"Dynamic taint analysis tools: A review","volume":"13","author":"Alashjaee","year":"2019","journal-title":"Int. J. Comput. Sci. Secur."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref9","article-title":"Juliet test suite","year":"2023"},{"key":"ref10","article-title":"SonarQube: Continuous code quality","year":"2025"},{"key":"ref11","article-title":"Burp Suite: Web vulnerability scanner","year":"2025"},{"key":"ref12","article-title":"OWASP ZAP: Zed attack proxy","year":"2025"},{"key":"ref13","article-title":"Bandit (1.8.6) [Computer software]","year":"2025"},{"key":"ref14","article-title":"Pylint","year":"2020"},{"key":"ref15","article-title":"Semgrep","year":"2025"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3708522"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104113"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3349589"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2024.112083"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3520312.3534862"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"key":"ref24","article-title":"MalBERT: Transformer-based malware detection","author":"Raff","year":"2021"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892280"},{"key":"ref26","article-title":"Qwen2.5-coder technical report","author":"Hui","year":"2024"},{"key":"ref27","article-title":"GitHub Copilot","year":"2025"},{"key":"ref28","article-title":"MLX: Efficient and flexible machine learning on Apple silicon","author":"Hannun","year":"2023"},{"key":"ref29","article-title":"LoRA: Low-rank adaptation of large language models","author":"Hu","year":"2022"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IRI66576.2025.00014"},{"key":"ref31","article-title":"Codegemma: Open code models based on Gemma","author":"Team","year":"2024"},{"key":"ref32","article-title":"DeepSeek-Coder-v2: Breaking the barrier of closed-source models in code intelligence","author":"Zhu","year":"2024"},{"key":"ref33","article-title":"Code Llama: Open foundation models for code","author":"Roziere","year":"2023"},{"key":"ref34","article-title":"CVE-Bench: A benchmark for AI agents\u2019 ability to exploit real-world web application vulnerabilities","author":"Zhu","year":"2025"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME58846.2023.00027"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3549035.3561184"}],"event":{"name":"2025 International Conference on Machine Learning and Applications (ICMLA)","location":"Boca Raton, FL, USA","start":{"date-parts":[[2025,12,3]]},"end":{"date-parts":[[2025,12,5]]}},"container-title":["2025 International Conference on Machine Learning and Applications (ICMLA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471302\/11471304\/11471329.pdf?arnumber=11471329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:19:01Z","timestamp":1775625541000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471329\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/icmla66185.2025.00212","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]}}}