{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T21:00:43Z","timestamp":1775941243733,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/ijcnn55064.2022.9892280","type":"proceedings-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T19:56:04Z","timestamp":1664567764000},"page":"1-8","source":"Crossref","is-referenced-by-count":132,"title":["VulBERTa: Simplified Source Code Pre-Training for Vulnerability Detection"],"prefix":"10.1109","author":[{"given":"Hazim","family":"Hanif","sequence":"first","affiliation":[{"name":"Imperial College,Department of Computing,London,UK"}]},{"given":"Sergio","family":"Maffeis","sequence":"additional","affiliation":[{"name":"University of Malaya,Faculty of Computer Science and Information Technology,Malaysia"}]}],"member":"263","reference":[{"key":"ref39","author":"coimbra","year":"2021","journal-title":"On using distributed representations of source code for the detection of c security vulnerabilities"},{"key":"ref38","first-page":"2655","article-title":"Unified pretraining for program understanding and generation","author":"ahmad","year":"0","journal-title":"Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics Human Language Technologies"},{"key":"ref33","year":"0","journal-title":"National Vulnerability Database"},{"key":"ref32","year":"2017","journal-title":"Juliet test suite 1 3"},{"key":"ref31","year":"2021","journal-title":"Pygithub Typed interactions with the github api v3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref37","article-title":"Codexglue: A machine learning benchmark dataset for code understanding and generation","volume":"abs 2102 4664","author":"lu","year":"2021","journal-title":"CoRR"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.06.042"},{"key":"ref35","first-page":"8026","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume":"32","author":"p","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref34","year":"0","journal-title":"Software Assurance Reference Dataset"},{"key":"ref10","article-title":"Albert: A lite bert for self-supervised learning of language representations","author":"lan","year":"0","journal-title":"International Conference on Learning Representations"},{"key":"ref40","author":"zhuang","year":"2021","journal-title":"Software vulnerability detection via deep learning over disaggregated code graph representation"},{"key":"ref11","article-title":"Deberta: Decoding-enhanced bert with disentangled attention","author":"he","year":"0","journal-title":"International Conference on Learning Representations 2021"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-5446"},{"key":"ref13","first-page":"23","article-title":"A new algorithm for data compression","volume":"12","author":"gage","year":"1994","journal-title":"C Users J"},{"key":"ref14","year":"2021","journal-title":"libclang C Interface to Clang"},{"key":"ref15","author":"liu","year":"2019","journal-title":"RoBERTa A Robustly optimized BERT Pretraining Approach"},{"key":"ref16","first-page":"40","article-title":"CoTexT: Multi-task learning with code-text transformer","author":"long","year":"0","journal-title":"Proceedings of the 1st Workshop on Natural Language Processing for Programming (NLP4Prog 2021)"},{"key":"ref17","author":"buratti","year":"2020","journal-title":"Exploring software naturalness through neural language models"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"ref28","author":"roziere","year":"2021","journal-title":"Dobf A deobfuscation pre-training objective for programming languages"},{"key":"ref4","first-page":"1","article-title":"Sysevr: A framework for using deep learning to detect software vulnerabilities","author":"zhen","year":"2021","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref3","article-title":"Vuldeepecker: A deep learning-based system for vulnerability detection","author":"zhen","year":"2018","journal-title":"25th Annual Network and Distributed System Security Symposium (NDSS 2018)"},{"key":"ref6","article-title":"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks","volume":"32","author":"zhou","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref29","author":"guo","year":"2021","journal-title":"Graphcodebert Pretraining code representations with data flow"},{"key":"ref5","first-page":"2224","article-title":"muvuldeepecker: A deep learning-based system for multiclass vulnerability detection","volume":"18","author":"zou","year":"2021","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref8","article-title":"Attention is all you need","volume":"30","author":"vaswani","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106576"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103009"},{"key":"ref9","first-page":"4171","article-title":"BERT: Pretraining of deep bidirectional transformers for language understanding","volume":"1","author":"devlin","year":"0","journal-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics Human Language Technologies"},{"key":"ref1","year":"2021","journal-title":"Browse cve vulnerabilities by date"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813604"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3436877"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2016.2630503"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.11.001"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3412841.3442132"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00020"},{"key":"ref25","article-title":"Deep learning based vulnerability detection: Are we there yet","author":"chakraborty","year":"2021","journal-title":"IEEE Transactions on Software Engineering"}],"event":{"name":"2022 International Joint Conference on Neural Networks (IJCNN)","location":"Padua, Italy","start":{"date-parts":[[2022,7,18]]},"end":{"date-parts":[[2022,7,23]]}},"container-title":["2022 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9891857\/9889787\/09892280.pdf?arnumber=9892280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T23:01:08Z","timestamp":1667516468000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9892280\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/ijcnn55064.2022.9892280","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}