{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:28:14Z","timestamp":1730280494335,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,19]]},"DOI":"10.1109\/kse56063.2022.9953786","type":"proceedings-article","created":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T16:25:53Z","timestamp":1669047953000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Using Multiple Code Representations to Prioritize Static Analysis Warnings"],"prefix":"10.1109","author":[{"given":"Thanh Trong","family":"Vu","sequence":"first","affiliation":[{"name":"VNU University of Engineering and Technology,Faculty of Electronics and Telecommunications,Hanoi,Vietnam"}]},{"given":"Hieu Dinh","family":"Vo","sequence":"additional","affiliation":[{"name":"VNU University of Engineering and Technology,Faculty of Information Technology,Hanoi,Vietnam"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/77606.77608"},{"journal-title":"Joern","year":"2022","key":"ref11"},{"journal-title":"Pycparser","year":"2022","key":"ref12"},{"key":"ref13","article-title":"Software vulnerability discovery via learning multi-domain knowledge bases","author":"lin","year":"2019","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref14","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"2013","journal-title":"ICLRE"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00015"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.500-297"},{"journal-title":"Software Assurance Reference Dataset","year":"0","key":"ref17"},{"key":"ref18","article-title":"Deep learning based vulnerability detection: Are we there yet","author":"chakraborty","year":"2021","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00036"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00215"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3194095.3194100"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC53868.2021.00040"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00048"},{"journal-title":"JLint","year":"2022","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"journal-title":"Cppcheck","year":"2022","key":"ref1"},{"key":"ref20","first-page":"219","article-title":"Deep learning-based vulnerable function detection: A benchmark","author":"lin","year":"2019","journal-title":"International Conference on Information and Communications Security"},{"key":"ref22","first-page":"2","article-title":"Efficient elimination of false positives using bounded model checking","volume":"15","author":"muske","year":"2013","journal-title":"ISSRE"},{"key":"ref21","article-title":"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks","volume":"32","author":"zhou","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CESSER-IP.2019.00015"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381820"},{"key":"ref26","first-page":"1","article-title":"Trust-based fusion of classifiers for static code analysis","author":"yuksel","year":"2014","journal-title":"17th International Conference on Information Fusion (FUSION) FUSION"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.29"}],"event":{"name":"2022 14th International Conference on Knowledge and Systems Engineering (KSE)","start":{"date-parts":[[2022,10,19]]},"location":"Nha Trang, Vietnam","end":{"date-parts":[[2022,10,21]]}},"container-title":["2022 14th International Conference on Knowledge and Systems Engineering (KSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9953734\/9953612\/09953786.pdf?arnumber=9953786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T14:53:00Z","timestamp":1670856780000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9953786\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,19]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/kse56063.2022.9953786","relation":{},"subject":[],"published":{"date-parts":[[2022,10,19]]}}}