{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T10:28:10Z","timestamp":1751624890498,"version":"3.30.2"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1109\/mascots64422.2024.10786510","type":"proceedings-article","created":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T18:50:09Z","timestamp":1734115809000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Vulnerability prediction using pre-trained models: An empirical evaluation"],"prefix":"10.1109","author":[{"given":"Ilias","family":"Kalouptsoglou","sequence":"first","affiliation":[{"name":"Information Technologies Institute,Centre for Research and Technology Hellas,Thessaloniki,Greece"}]},{"given":"Miltiadis","family":"Siavvas","sequence":"additional","affiliation":[{"name":"Information Technologies Institute,Centre for Research and Technology Hellas,Thessaloniki,Greece"}]},{"given":"Apostolos","family":"Ampatzoglou","sequence":"additional","affiliation":[{"name":"University of Macedonia,Department of Applied Informatics,Thessaloniki,Greece"}]},{"given":"Dionysios","family":"Kehagias","sequence":"additional","affiliation":[{"name":"Information Technologies Institute,Centre for Research and Technology Hellas,Thessaloniki,Greece"}]},{"given":"Alexander","family":"Chatzigeorgiou","sequence":"additional","affiliation":[{"name":"University of Macedonia,Department of Applied Informatics,Thessaloniki,Greece"}]}],"member":"263","reference":[{"journal-title":"ISO\/IEC 25010 - Systems and software engineering - Systems and software Quality Requirements and Evaluation (SQuaRE) - System and software quality models. ISO\/IEC","year":"2011","key":"ref1"},{"volume-title":"ISO\/IEC 27000:2018","year":"2023","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2010.06.003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58811-3_62"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2340398"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68110-4_7"},{"key":"ref7","article-title":"A deep language model for software code","author":"Dam","year":"2016","journal-title":"arXiv preprint arXiv:1608.02715"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.32"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/e24050651"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-09357-9_3","article-title":"An empirical evaluation of the usefulness of word embedding techniques in deep learning-based vulnerability prediction","volume-title":"In Proceedings of EuroCybersec2021","author":"Kalouptsoglou"},{"key":"ref12","article-title":"Efficient estimation of word representations in vector space","author":"Mikolov","year":"2013","journal-title":"arXiv:1301.3781"},{"volume-title":"fastText","year":"2023","key":"ref13"},{"key":"ref14","article-title":"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks","author":"Zhou","year":"2019","journal-title":"arXiv preprint arXiv:1909.03496"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85347-1_20"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484500"},{"volume-title":"Improving language understanding by generative pre-training","year":"2018","author":"Radford","key":"ref18"},{"key":"ref19","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv:1810.04805"},{"key":"ref20","article-title":"Language models are unsupervised multitask learners","author":"Radford","year":"2019","journal-title":"OpenAI"},{"key":"ref21","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","author":"Raffel","year":"2020","journal-title":"Journal of ML research"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref23","article-title":"Codexglue: A machine learning benchmark dataset for code understanding and generation","author":"Lu","year":"2021","journal-title":"arXiv preprint arXiv:2102.04664"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107303"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0228439"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892280"},{"key":"ref28","article-title":"On using distributed representations of source code for the detection of c security vulnerabilities","author":"Coimbra","year":"2021","journal-title":"arXiv preprint arXiv:2106.01367"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW55968.2022.00042"},{"key":"ref30","article-title":"An empirical study of automated vulnerability localization with large language models","author":"Zhang","year":"2024","journal-title":"arXiv preprint arXiv:2404.00287"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528452"},{"volume-title":"[Online]","year":"2024","author":"Kalouptsoglou","key":"ref32"},{"key":"ref33","article-title":"Roberta: A robustly optimized bert pre-training approach","author":"Liu","year":"2019","journal-title":"arXiv preprint arXiv:1907.11692"},{"key":"ref34","article-title":"Decoupled weight decay regularization","author":"Loshchilov","year":"2017","journal-title":"arXiv:1711.05101"},{"key":"ref35","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv preprint arXiv:1412.6980"},{"key":"ref36","first-page":"23 803","article-title":"Cross-entropy loss functions: Theoretical analysis and applications","volume-title":"International conference on Machine learning","author":"Mao"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.4324\/9780203771587"}],"event":{"name":"2024 32nd International Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)","start":{"date-parts":[[2024,10,21]]},"location":"Krakow, Poland","end":{"date-parts":[[2024,10,23]]}},"container-title":["2024 32nd International Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10786488\/10786336\/10786510.pdf?arnumber=10786510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T06:44:16Z","timestamp":1734158656000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10786510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/mascots64422.2024.10786510","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]}}}