{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:59:15Z","timestamp":1772906355113,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,23]]},"DOI":"10.1109\/sera57763.2023.10197730","type":"proceedings-article","created":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T17:29:18Z","timestamp":1691083758000},"page":"345-351","source":"Crossref","is-referenced-by-count":6,"title":["Commit Message Can Help: Security Patch Detection in Open Source Software via Transformer"],"prefix":"10.1109","author":[{"given":"Fei","family":"Zuo","sequence":"first","affiliation":[{"name":"University of Central Oklahoma,Edmond,Oklahoma,USA,73034"}]},{"given":"Xin","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of South Carolina,Columbia,South Carolina,USA,29208"}]},{"given":"Yuqi","family":"Song","sequence":"additional","affiliation":[{"name":"University of South Carolina,Columbia,South Carolina,USA,29208"}]},{"given":"Junghwan","family":"Rhee","sequence":"additional","affiliation":[{"name":"University of Central Oklahoma,Edmond,Oklahoma,USA,73034"}]},{"given":"Jicheng","family":"Fu","sequence":"additional","affiliation":[{"name":"University of Central Oklahoma,Edmond,Oklahoma,USA,73034"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9652940"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227176"},{"key":"ref15","first-page":"1","article-title":"SPI: Automated identification of security patches via commits","volume":"31","author":"zhou","year":"2021","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3192631"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00056"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437529"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3117771"},{"key":"ref1","article-title":"Published CVE Records","year":"0"},{"key":"ref17","article-title":"Distributed representations of words and phrases and their compositionality","volume":"26","author":"mikolov","year":"2013","journal-title":"Advances in neural information processing systems"},{"key":"ref16","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"2013","journal-title":"ICLR Workshop"},{"key":"ref19","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2015","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref18","article-title":"Attention is all you need","volume":"30","author":"vaswani","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00058"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813604"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1304-6_12"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985457"},{"key":"ref20","author":"bird","year":"2009","journal-title":"Natural Language Processing With Python"},{"key":"ref22","first-page":"45","article-title":"Software Framework for Topic Modelling with Large Corpora","author":"?eh??ek","year":"2010","journal-title":"The 7th international conference on Language Resources and Evaluation (LREC) Workshop on New Challenges for NLP Frameworks"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1111\/j.0039-3193.2004.00109.x"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SERA54885.2022.9806745"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref7","article-title":"Faster R-CNN: Towards real-time object detection with region proposal networks","volume":"28","author":"ren","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23492"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678720"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2834476"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488022"}],"event":{"name":"2023 IEEE\/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","location":"Orlando, FL, USA","start":{"date-parts":[[2023,5,23]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE\/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10197651\/10197644\/10197730.pdf?arnumber=10197730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T17:46:02Z","timestamp":1692639962000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10197730\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,23]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/sera57763.2023.10197730","relation":{},"subject":[],"published":{"date-parts":[[2023,5,23]]}}}