{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:12:36Z","timestamp":1770739956255,"version":"3.49.0"},"reference-count":11,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T00:00:00Z","timestamp":1771113600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T00:00:00Z","timestamp":1771113600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T00:00:00Z","timestamp":1771113600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2026,2,15]]},"DOI":"10.1109\/jiot.2025.3636829","type":"journal-article","created":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T18:29:54Z","timestamp":1764095394000},"page":"6704-6712","source":"Crossref","is-referenced-by-count":0,"title":["Bias Detection and Mitigation in Large Language Models for Code Generation"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4220-3637","authenticated-orcid":false,"given":"Alexander I.","family":"Iliev","sequence":"first","affiliation":[{"name":"Institute of Mathematics and Informatics, Bulgarian Academy of Sciences, Sofia, Bulgaria"}]},{"given":"Deepshikha","family":"Singh","sequence":"additional","affiliation":[{"name":"SRH University, Berlin, Germany"}]},{"given":"Sanjeeth","family":"Chittyala","sequence":"additional","affiliation":[{"name":"SRH University, Berlin, Germany"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Directions in abusive language training data: Garbage in, garbage out","author":"Vidgen","year":"2020","journal-title":"arXiv:2004.01670"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445922"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-13851-5_26"},{"issue":"2","key":"ref4","first-page":"210","article-title":"FairCode: Benchmarking bias in code generation","volume":"49","author":"Du","year":"2025","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref5","article-title":"Proximal diagonal Newton methods for composite optimization problems","author":"Yagishita","year":"2023","journal-title":"arXiv:2310.06789"},{"key":"ref6","article-title":"A discrete particle swarm optimizer for the design of cryptographic Boolean functions","author":"Mariot","year":"2024","journal-title":"arXiv:2401.04567"},{"key":"ref7","article-title":"Teach LLMs to phish: Stealing private information from language models","author":"Panda","year":"2024","journal-title":"arXiv:2403.00871"},{"key":"ref8","article-title":"On (1,2)-step competition graphs of multipartite tournaments II","author":"Choi","year":"2024","journal-title":"arXiv:2402.01986"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/JHEP09(2024)136"},{"key":"ref10","article-title":"Self-supervised 3D patient modeling with multi-modal attentive fusion","author":"Zheng","year":"2024","journal-title":"arXiv:2403.03217"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00440-025-01376-7"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11372629\/11267418.pdf?arnumber=11267418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T21:08:05Z","timestamp":1770671285000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11267418\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,15]]},"references-count":11,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3636829","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,15]]}}}