{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:34:55Z","timestamp":1757453695792,"version":"3.37.3"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tse.2023.3265362","type":"journal-article","created":{"date-parts":[[2023,4,7]],"date-time":"2023-04-07T17:29:07Z","timestamp":1680888547000},"page":"1-13","source":"Crossref","is-referenced-by-count":5,"title":["Specializing Neural Networks for Cryptographic Code Completion Applications"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4030-811X","authenticated-orcid":false,"given":"Ya","family":"Xiao","sequence":"first","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Wenjia","family":"Song","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Jingyuan","family":"Qi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Bimal","family":"Viswanath","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Blacksburg, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2091-7484","authenticated-orcid":false,"given":"Patrick","family":"McDaniel","sequence":"additional","affiliation":[{"name":"School of Computer, Data and Information Sciences, University of Wisconsin-Madison, Madison, WI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8969-2792","authenticated-orcid":false,"given":"Danfeng","family":"Yao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Blacksburg, VA, USA"}]}],"member":"263","reference":[{"article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","year":"2018","author":"Devlin","key":"ref1"},{"article-title":"RoBERTa: A robustly optimized bert pretraining approach","year":"2019","author":"Liu","key":"ref2"},{"key":"ref3","first-page":"1877","article-title":"Language models are few-shot learners","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Brown"},{"article-title":"XLNeT: Generalized autoregressive pretraining for language understanding","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Yang","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1285"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417058"},{"article-title":"CodeXGLUE: A machine learning benchmark dataset for code understanding and generation","year":"2021","author":"Lu","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227135"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2902362"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884848"},{"article-title":"Learning to represent programs with graphs","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Allamanis","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1126\/science.abq1158"},{"article-title":"Evaluating large language models trained on code","year":"2021","author":"Chen","key":"ref14"},{"article-title":"Tree-to-tree neural networks for program translation","year":"2018","author":"Chen","key":"ref15"},{"article-title":"Neural sketch learning for conditional program generation","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Murali","key":"ref16"},{"article-title":"Generative code modeling with graphs","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Brockschmidt","key":"ref17"},{"key":"ref18","article-title":"GPT-Neo: Large scale autoregressive language modeling with mesh-tensorflow","author":"Black","year":"2021","journal-title":"If You Use This Software, Please Cite it Using These Metadata"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/578"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389261"},{"article-title":"GraphCodebBERT: Pre-training code representations with data flow","year":"2020","author":"Guo","key":"ref21"},{"key":"ref22","first-page":"10 197","article-title":"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Zhou"},{"key":"ref23","first-page":"80","article-title":"Learning continuous semantic representations of symbolic expressions","volume-title":"Proc. 34th Int. Conf. Mach. Learn.","author":"Allamanis"},{"key":"ref24","first-page":"18984","article-title":"Neural program generation modulo static analysis","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Mukherjee"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594321"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884790"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.25"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180201"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.52"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345659"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3507682"},{"article-title":"CamBench - Cryptographic API misuse detection tool benchmark suite","year":"2022","author":"Schlichtig","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2019.00017"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3154717"},{"article-title":"Attention is all you need","year":"2017","author":"Vaswani","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624029"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597102"},{"article-title":"A deep language model for software code","year":"2016","author":"Dam","key":"ref39"},{"key":"ref40","first-page":"1073","article-title":"Big Code!= big vocabulary: Open-vocabulary models for source code","volume-title":"Proc. IEEE\/ACM 42nd Int. Conf. Softw. Eng.","author":"Karampatsis"},{"key":"ref41","first-page":"649","article-title":"Structured generative models of natural source code","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Maddison"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2914770.2837671"},{"key":"ref43","first-page":"2933","article-title":"PHOG: Probabilistic model for code","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Bielik"},{"article-title":"Neural code completion","year":"2017","author":"Liu","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1041"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.336"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/BF01692511"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491458"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950333"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884873"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595767"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2775051.2677009"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786849"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635883"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.728"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.3115\/1073083.1073135"},{"article-title":"CodeBLEU: A method for automatic evaluation of code synthesis","year":"2020","author":"Ren","key":"ref57"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/4359463\/10097631.pdf?arnumber=10097631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T08:37:27Z","timestamp":1710405447000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10097631\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/tse.2023.3265362","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2023]]}}}