{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:26:26Z","timestamp":1761978386740,"version":"build-2065373602"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T00:00:00Z","timestamp":1757203200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T00:00:00Z","timestamp":1757203200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,7]]},"DOI":"10.1109\/icsme64153.2025.00112","type":"proceedings-article","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:08:56Z","timestamp":1761930536000},"page":"945-949","source":"Crossref","is-referenced-by-count":0,"title":["VulGuard: An Unified Tool for Evaluating Just-In-Time Vulnerability Prediction Models"],"prefix":"10.1109","author":[{"given":"Duong","family":"Nguyen","sequence":"first","affiliation":[{"name":"School of Communication and Information Technology, Hanoi University of Science and Technology,Hanoi,Vietnam"}]},{"given":"Manh","family":"Tran-Duc","sequence":"additional","affiliation":[{"name":"School of Communication and Information Technology, Hanoi University of Science and Technology,Hanoi,Vietnam"}]},{"given":"Thanh","family":"Le-Cong","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, The University of Melbourne,Melbourne,Australia"}]},{"given":"Triet Huynh Minh","family":"Le","sequence":"additional","affiliation":[{"name":"School of Computer and Mathematical Sciences, The University of Adelaide,Adelaide,Australia"}]},{"given":"M. Ali","family":"Babar","sequence":"additional","affiliation":[{"name":"School of Computer and Mathematical Sciences, The University of Adelaide,Adelaide,Australia"}]},{"given":"Quyet-Thang","family":"Huynh","sequence":"additional","affiliation":[{"name":"School of Communication and Information Technology, Hanoi University of Science and Technology,Hanoi,Vietnam"}]}],"member":"263","reference":[{"article-title":"Crowdstrike outage report","volume-title":"CrowdStrike","year":"2024","key":"ref1"},{"article-title":"Crowdstrike outage damage","volume-title":"TechTarget","year":"2024","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813604"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2024.112014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254428"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111283"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME64153.2025.00023"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.70"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510113"},{"volume-title":"Vulguard: An unified framework for evaluating just-in-time vulnerability prediction models","year":"2025","author":"Nguyen","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464819"},{"key":"ref12","first-page":"518","article-title":"Cc2vec: Distributed representations of code changes","volume-title":"the ACM\/ IEEE 42nd international conference on software engineering","author":"Hoang","year":"2020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00016"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/QRS.2015.14","article-title":"Deep Learning for Just-in-Time Defect Prediction","volume-title":"2015 IEEE International Conference on Software Quality, Reliability and Security","author":"Yang","year":"2015"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083147"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.03.007"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3524610.3527910"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549165"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3415295"},{"volume-title":"GitHub","key":"ref20","article-title":"Github action"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.23"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3182514"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678622"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3117771"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1145\/3643991.3644919","article-title":"Are latent vulnerabilities hidden gems for software vulnerability prediction? an empirical study","volume-title":"the 21st International Conference on Mining Software Repositories","author":"Le","year":"2024"},{"key":"ref26","first-page":"606","article-title":"Snopy: Bridging sample denoising with causal graph learning for effective vulnerability detection","volume-title":"the 39th IEEE\/ACM International Conference on Automated Software Engineering","author":"Cao","year":"2024"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2616306"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3424276"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00063"},{"volume-title":"Joernio","key":"ref30","article-title":"Joern"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3674805.3686674"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3661167.3661281"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3529757"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3631974"}],"event":{"name":"2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)","start":{"date-parts":[[2025,9,7]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2025,9,12]]}},"container-title":["2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185055\/11185853\/11185086.pdf?arnumber=11185086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:21:30Z","timestamp":1761978090000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185086\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,7]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icsme64153.2025.00112","relation":{},"subject":[],"published":{"date-parts":[[2025,9,7]]}}}