{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:43:35Z","timestamp":1763192615032,"version":"3.45.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11229292","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["VulnTeam: A Team Collaboration Framework for LLM-based Vulnerability Detection"],"prefix":"10.1109","author":[{"given":"Jiayuan","family":"Li","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Lei","family":"Cui","sequence":"additional","affiliation":[{"name":"Quancheng Lab,Jinan,China"}]},{"given":"Wenyan","family":"Yu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Haiqiang","family":"Fei","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Feng","family":"Cheng","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Hongsong","family":"Zhu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"CVEdetails.com"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"ref3","first-page":"10197","article-title":"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks","volume-title":"Annual Conference on Neural Information Processing Systems","author":"Zhou"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510229"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3047756"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102417"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00191"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639170"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3087402"},{"journal-title":"CoRR","article-title":"GPT-4 technical report","year":"2023","key":"ref11"},{"key":"ref12","article-title":"Towards effectively detecting and explaining vulnerabilities using large language models","author":"Mao","year":"2024","journal-title":"CoRR"},{"key":"ref13","article-title":"Chain-of-thought prompting of large language models for discovering and fixing software vulnerabilities","author":"Nong","year":"2024","journal-title":"CoRR"},{"key":"ref14","article-title":"Llm4vuln: A unified evaluation framework for decoupling and enhancing llms\u2019 vulnerability reasoning","author":"Sun","year":"2024","journal-title":"CoRR"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49660.2025.10887736"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00210"},{"key":"ref17","article-title":"SARD"},{"key":"ref18","article-title":"Checkmarx - Application Security"},{"article-title":"Lora: Low-rank adaptation of large language models","volume-title":"The Tenth International Conference on Learning Representations, ICLR 2022","author":"Hu","key":"ref19"},{"article-title":"Finetuned language models are zero-shot learners","volume-title":"The Tenth International Conference on Learning Representations, ICLR 2022","author":"Wei","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2019.2942930"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528452"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616358"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623345"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.499"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-44693-1_53"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.emnlp-main.747"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.741"},{"article-title":"Multitask prompted training enables zero-shot task generalization","volume-title":"The Tenth International Conference on Learning Representations, ICLR 2022","author":"Sanh","key":"ref31"},{"key":"ref32","first-page":"70:1","article-title":"Scaling instruction-finetuned language models","volume":"25","author":"Chung","year":"2024","journal-title":"J. Mach. Learn. Res."},{"key":"ref33","article-title":"Flan-moe: Scaling instruction-finetuned language models with sparse mixture of experts","author":"Shen","year":"2023","journal-title":"CoRR"},{"key":"ref34","article-title":"Parameter-efficient fine-tuning for large models: A comprehensive survey","author":"Han","year":"2024","journal-title":"CoRR"},{"key":"ref35","article-title":"Adamix: Mixture-of-adapter for parameter-efficient tuning of large language models","author":"Wang","year":"2022","journal-title":"CoRR"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-short.107"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01086"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS48785.2022.9937567"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-long.233"},{"key":"ref40","article-title":"Lora dropout as a sparsity regularizer for overfitting control","author":"Lin","year":"2024","journal-title":"CoRR"},{"article-title":"Adaptive budget allocation for parameter-efficient fine-tuning","volume-title":"The Eleventh International Conference on Learning Representations, ICLR 2023","author":"Zhang","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.252"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2025,6,30]]},"location":"Rome, Italy","end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11229292.pdf?arnumber=11229292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:40:27Z","timestamp":1763192427000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11229292\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11229292","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}