{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T08:51:43Z","timestamp":1764838303190,"version":"3.46.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:00:00Z","timestamp":1756166400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:00:00Z","timestamp":1756166400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,26]]},"DOI":"10.1109\/pst65910.2025.11268830","type":"proceedings-article","created":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:40:04Z","timestamp":1764787204000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["FragmentFool: Fragment-based Adversarial Perturbation for Graph Neural Network-based Vulnerability Detection"],"prefix":"10.1109","author":[{"given":"Muhammad Fakhrur","family":"Rozi","sequence":"first","affiliation":[{"name":"Cyber Security Research Institute NICT,Koganei,Japan"}]},{"given":"Tao","family":"Ban","sequence":"additional","affiliation":[{"name":"Cyber Security Research Institute NICT,Koganei,Japan"}]},{"given":"Seiichi","family":"Ozawa","sequence":"additional","affiliation":[{"name":"Kobe University,Center for Mathematical and Data Sciences,Kobe,Japan"}]},{"given":"Hiroaki","family":"Inoue","sequence":"additional","affiliation":[{"name":"Kobe University,Graduate School of Engineering,Kobe,Japan"}]},{"given":"Takeshi","family":"Takahashi","sequence":"additional","affiliation":[{"name":"Cyber Security Research Institute NICT,Koganei,Japan"}]},{"given":"Sajjad","family":"Dadkhah","sequence":"additional","affiliation":[{"name":"Canadian Institute for Cybersecurity University of New Brunswick,Fredericton,Canada"}]}],"member":"263","reference":[{"article-title":"Lint, a c program checker","year":"1978","author":"Johnson","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898880"},{"year":"2025","key":"ref3","article-title":"Rough auditing tool for security (rats)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180453"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3087402"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3317266"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/BF01692511"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/800028.808479"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3467180"},{"article-title":"Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks","year":"2019","author":"Zhou","key":"ref12"},{"article-title":"Adversarial attacks on node embeddings via graph poisoning","volume-title":"Proceedings of the 36th International Conference on Machine Learning, ICML, Proceedings of Machine Learning Research","author":"Bojchevski","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467416"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3589291"},{"year":"2025","key":"ref16","article-title":"Common vulnerabilities and exposures (cve)"},{"year":"2025","key":"ref17","article-title":"Joern: The bug hunter workbench"},{"key":"ref18","first-page":"2613","article-title":"Montage: A neural network language Model-Guided JavaScript engine fuzzer","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Lee"},{"article-title":"Gated graph sequence neural networks","volume-title":"4th International Conference on Learning Representations, ICLR 2016","author":"Li","key":"ref19"},{"article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"International Conference on Learning Representations","author":"Kipf","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14711\/thesis-991012757468803412"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3428230"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR56361.2022.9956690"},{"key":"ref24","first-page":"1559","article-title":"You autocomplete me: Poisoning vulnerabilities in neural code completion","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Schuster"},{"key":"ref25","first-page":"7357","article-title":"EaTVul: ChatGPT-based evasion attack against software vulnerability detection","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Liu"},{"year":"2025","key":"ref26","article-title":"Chatgpt"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00070"}],"event":{"name":"2025 22nd Annual International Conference on Privacy, Security, and Trust (PST)","start":{"date-parts":[[2025,8,26]]},"location":"Fredericton, NB, Canada","end":{"date-parts":[[2025,8,28]]}},"container-title":["2025 22nd Annual International Conference on Privacy, Security, and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11268482\/11268814\/11268830.pdf?arnumber=11268830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T08:47:59Z","timestamp":1764838079000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11268830\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,26]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/pst65910.2025.11268830","relation":{},"subject":[],"published":{"date-parts":[[2025,8,26]]}}}