{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T21:42:53Z","timestamp":1776807773761,"version":"3.51.2"},"reference-count":89,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation","doi-asserted-by":"publisher","award":["NRF-NRFI08-2022-0002"],"award-info":[{"award-number":["NRF-NRFI08-2022-0002"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1109\/tse.2024.3361661","type":"journal-article","created":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T18:27:52Z","timestamp":1707503272000},"page":"721-741","source":"Crossref","is-referenced-by-count":51,"title":["Stealthy Backdoor Attack for Code Models"],"prefix":"10.1109","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5938-1918","authenticated-orcid":false,"given":"Zhou","family":"Yang","sequence":"first","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1006-8493","authenticated-orcid":false,"given":"Bowen","family":"Xu","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0481-7264","authenticated-orcid":false,"given":"Jie M.","family":"Zhang","sequence":"additional","affiliation":[{"name":"King&#x2019;s College London, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7335-7295","authenticated-orcid":false,"given":"Hong Jin","family":"Kang","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0799-5018","authenticated-orcid":false,"given":"Jieke","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3370-8585","authenticated-orcid":false,"given":"Junda","family":"He","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4367-7201","authenticated-orcid":false,"given":"David","family":"Lo","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore, Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3505243"},{"key":"ref2","first-page":"2091","article-title":"A convolutional attention network for extreme summarization of source code","volume-title":"Proc. 33rd Int. Conf. Mach. Learn. (ICML)","volume":"48","author":"Allamanis","year":"2016"},{"key":"ref3","article-title":"CodeSearchNet challenge: Evaluating the state of semantic code search","author":"Husain","year":"2019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/423"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/saner53432.2022.00054"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3524610.3527897"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510146"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3428230"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5469"},{"key":"ref10","article-title":"Generating adversarial computer programs using optimized obfuscations","volume-title":"Proc. 9th Int. Conf. Learn. Representations (ICLR), Virtual Event","author":"Srikant","year":"2021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26739"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/icse-seip55303.2022.9794112"},{"key":"ref13","first-page":"1536","article-title":"CodeBERT: A pre-trained model for programming and natural languages","volume-title":"Proc. Findings Assoc. Comput. Linguistics (EMNLP)","author":"Feng","year":"2020"},{"key":"ref14","article-title":"Graphcodebert: Pre-training code representations with data flow","volume-title":"Proc. 9th Int. Conf. Learn. Representations (ICLR), Virtual Event","author":"Guo","year":"2021"},{"key":"ref15","article-title":"Code2seq: Generating sequences from structured representations of code","volume-title":"Proc. 7th Int. Conf. Learn. Representations (ICLR)","author":"Alon","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3290353"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380427"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/icpr56361.2022.9956690"},{"key":"ref19","first-page":"3104","article-title":"Sequence to sequence learning with neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst. 27 Annu. Conf. Neural Inf. Process. Syst.","author":"Sutskever","year":"2014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.374"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52688.2022.01465"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/iccv48922.2021.01175"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/iccv48922.2021.01615"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.377"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484576"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.431"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464809"},{"key":"ref28","article-title":"Codexglue: A machine learning benchmark dataset for code understanding and generation","volume-title":"Proc. Neural Inf. Process. Syst. Track Datasets Benchmarks 1, NeurIPS Datasets Benchmarks 2021","author":"Lu","year":"2021"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.211"},{"key":"ref31","article-title":"Structured neural summarization","volume-title":"Proc. 7th Int. Conf. Learn. Representations (ICLR)","author":"Fernandes","year":"2019"},{"key":"ref32","first-page":"8011","article-title":"Spectral signatures in backdoor attacks","volume-title":"Proc. Adv. Neural Inf. Process. Syst. 31 Annu. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Tran","year":"2018"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.752"},{"key":"ref34","article-title":"Detecting backdoor attacks on deep neural networks by activation clustering","author":"Chen","year":"2018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106552"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/icst49551.2021.00016"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485837"},{"key":"ref38","first-page":"1505","article-title":"Blind backdoors in deep learning models","volume-title":"Proc. 30th USENIX Secur. Symp., USENIX Secur.","author":"Bagdasaryan","year":"2021"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427258"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510181"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1810.04805"},{"key":"ref42","article-title":"Roberta: A robustly optimized BERT pretraining approach","author":"Liu","year":"2019"},{"key":"ref43","first-page":"1559","article-title":"You autocomplete me: Poisoning vulnerabilities in neural code completion","volume-title":"Proc. 30th USENIX Secur. Symp., USENIX Secur.","author":"Schuster","year":"2021"},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1002\/9781118445112","article-title":"Wiley StatsRef: Statistics Reference Online","author":"Balakrishnan","year":"2014"},{"issue":"8","key":"ref45","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford","year":"2019","journal-title":"OpenAI Blog"},{"issue":"6","key":"ref46","doi-asserted-by":"crossref","first-page":"80","DOI":"10.2307\/3001968","article-title":"Individual comparisons by ranking methods","volume":"1","author":"Wilcoxon","year":"1945","journal-title":"Biometrics Bull."},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.249"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.165"},{"key":"ref49","doi-asserted-by":"crossref","DOI":"10.3115\/1220355.1220427","article-title":"ORANGE: A method for evaluating automatic evaluation metrics for machine translation","volume-title":"Proc. 20th Int. Conf. Comput. Linguistics (COLING)","author":"Lin","year":"2004"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357971"},{"key":"ref51","article-title":"Ethics guidelines for trustworthy AI","year":"2019"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3220673"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3631977"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380379"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3220673"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/saner53432.2022.00070"},{"issue":"11","key":"ref57","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2021.3136169"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473117"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/icsme52107.2021.00073"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473124"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/icsme52107.2021.00079"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3564636"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/saner53432.2022.00056"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2019.2962027"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ase51524.2021.9678706"},{"key":"ref68","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2015"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3524610.3527905"},{"key":"ref70","article-title":"Generative code modeling with graphs","volume-title":"Proc. 7th Int. Conf. Learn. Representations (ICLR)","author":"Brockschmidt","year":"2019"},{"key":"ref71","article-title":"Towards deep learning models resistant to adversarial attacks","volume-title":"Proc. 6th Int. Conf. Learn. Representations (ICLR)","author":"Madry","year":"2018"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ase51524.2021.9678946"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512225"},{"key":"ref74","first-page":"1487","article-title":"Explanation-guided backdoor poisoning attacks against malware classifiers","volume-title":"Proc. 30th USENIX Secur. Symp., USENIX Secur.","author":"Severi","year":"2021"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2909068"},{"key":"ref76","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2017"},{"key":"ref77","first-page":"18944","article-title":"Backdoor attack with imperceptible input and latent modification","volume-title":"Proc. Adv. Neural Inf. Process. Syst. 34 Annu. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Doan","year":"2021"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3375751"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/sp40001.2021.00034"},{"key":"ref80","first-page":"1541","article-title":"Demon in the variant: Statistical analysis of DNNS for robust backdoor contamination detection","volume-title":"Proc. 30th USENIX Secur. Symp., USENIX Secur.","author":"Tang","year":"2021"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i9.16971"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2019.00031"},{"key":"ref83","article-title":"Mind your data! Hiding backdoors in offline reinforcement learning datasets","author":"Gong"},{"key":"ref84","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2018.23291","article-title":"Trojaning attack on neural networks","volume-title":"Proc. 25th Annu. Netw. Distrib. Syst. Secur. Symp., (NDSS)","author":"Liu","year":"2018"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2941376"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549153"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3428301"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534371"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3192419"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10504688\/10431665.pdf?arnumber=10431665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,10]],"date-time":"2024-11-10T23:44:38Z","timestamp":1731282278000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10431665\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":89,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tse.2024.3361661","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4]]}}}