{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T13:48:23Z","timestamp":1772632103348,"version":"3.50.1"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1109\/tps-isa67132.2025.00019","type":"proceedings-article","created":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T20:50:15Z","timestamp":1772571015000},"page":"89-100","source":"Crossref","is-referenced-by-count":0,"title":["NATGVD: Natural Adversarial Example Attack Towards Graph-Based Vulnerability Detection"],"prefix":"10.1109","author":[{"given":"Avilash","family":"Rath","sequence":"first","affiliation":[{"name":"The University of Texas at Dallas"}]},{"given":"Weiliang","family":"Qi","sequence":"additional","affiliation":[{"name":"The University of Texas at Dallas"}]},{"given":"Youpeng","family":"Li","sequence":"additional","affiliation":[{"name":"The University of Texas at Dallas"}]},{"given":"Xinda","family":"Wang","sequence":"additional","affiliation":[{"name":"The University of Texas at Dallas"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"A log 4 shell (log 4j) retrospective.","author":"Labs","year":"2024"},{"key":"ref2","article-title":"CodeXGLUE: A machine learning benchmark dataset for code understanding and generation","volume-title":"Thirty-fifth Conference on Neural Information Processing Systems Datasets and Benchmarks Track (Round 1)","author":"Lu","year":"2021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3290353"},{"key":"ref4","article-title":"GraphCodeBERT: Pre-training code representations with data flow","volume-title":"International Conference on Learning Representations","author":"Guo","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2021.3087402"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3510454.3516865"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.499"},{"key":"ref8","volume-title":"Microsoft CodeXGLUE leaderboard","year":"2024"},{"key":"ref9","article-title":"A closer look into transformer-based code intelligence through code transformation: Challenges and opportunities","author":"Li","year":"2022","journal-title":"arXiv preprint"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.649"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3591227"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510146"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678706"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3428230"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5469"},{"key":"ref16","first-page":"1181","article-title":"Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Li","year":"2023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-long.773"},{"key":"ref18","article-title":"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks","author":"Zhou","year":"2019","journal-title":"arXiv preprint"},{"key":"ref19","first-page":"6557","article-title":"VulChecker: Graph-based vulnerability localization in source code","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Mirsky","year":"2023"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC51732.2021.9376145"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3527949"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1063\/1.1699114"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00016"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3153844"},{"key":"ref26","first-page":"896","article-title":"Adversarial robustness for code","volume-title":"International Conference on Machine Learning","author":"Bielik","year":"2020"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528452"},{"key":"ref28","article-title":"Efficient estimation of word representations in vector space","volume-title":"1st International Conference on Learning Representations","author":"Mikolov","year":"2013"},{"key":"ref29","article-title":"Gated graph sequence neural networks","volume-title":"Proceedings of ICLR\u201916","author":"Li","year":"2016"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00084"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1162"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387501"},{"key":"ref35","article-title":"Elements of Software Science (Operating and programming systems series)","author":"Halstead","year":"1977","journal-title":"Elsevier Science Inc."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"ref37","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions, and reversals","volume":"10","author":"Levenshtein","year":"1966","journal-title":"Soviet physics doklady"},{"key":"ref38","article-title":"Ensemble methods as a defense to adversarial perturbations against deep neural networks","author":"Strauss","year":"2017","journal-title":"arXiv preprint"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12040936"},{"key":"ref40","article-title":"code2seq: Generating sequences from structured representations of code","volume-title":"International Conference on Learning Representations","author":"Alon","year":"2018"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3511887"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3188583"},{"key":"ref43","first-page":"479","article-title":"Misleading authorship attribution of source code using adversarial learning","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Quiring","year":"2019"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01501"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3611914"}],"event":{"name":"2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","location":"Pittsburgh, PA, USA","start":{"date-parts":[[2025,11,12]]},"end":{"date-parts":[[2025,11,14]]}},"container-title":["2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11410113\/11410157\/11410325.pdf?arnumber=11410325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T06:51:06Z","timestamp":1772607066000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11410325\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/tps-isa67132.2025.00019","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]}}}