{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:43:48Z","timestamp":1773330228717,"version":"3.50.1"},"reference-count":86,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Open Project of China Academy of Railway Sciences Corporation Limited","award":["RITS2023KF05"],"award-info":[{"award-number":["RITS2023KF05"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1109\/tse.2024.3523284","type":"journal-article","created":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T19:17:11Z","timestamp":1735327031000},"page":"466-483","source":"Crossref","is-referenced-by-count":4,"title":["<i>Do Chase Your Tail!<\/i> Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-Tail Software Through Feature Inference"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9747-4426","authenticated-orcid":false,"given":"Linyi","family":"Han","sequence":"first","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2162-0407","authenticated-orcid":false,"given":"Shidong","family":"Pan","sequence":"additional","affiliation":[{"name":"CSIRO&#x2019;s Data61, Canberra, ACT, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7663-1421","authenticated-orcid":false,"given":"Zhenchang","family":"Xing","sequence":"additional","affiliation":[{"name":"CSIRO&#x2019;s Data61, Canberra, ACT, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5212-7068","authenticated-orcid":false,"given":"Jiamou","family":"Sun","sequence":"additional","affiliation":[{"name":"CSIRO&#x2019;s Data61, Canberra, ACT, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9247-7521","authenticated-orcid":false,"given":"Sofonias","family":"Yitagesu","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3931-3886","authenticated-orcid":false,"given":"Xiaowang","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8158-7453","authenticated-orcid":false,"given":"Zhiyong","family":"Feng","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/iscc58397.2023.10218000"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1716"},{"key":"ref3","article-title":"National vulnerability database (NVD)[ol]","author":"MITRE","year":"2022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/compsac51774.2021.00138"},{"key":"ref5","article-title":"Mitre key details phrasing","author":"Evans","year":"2020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3400286.3418261"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103017"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8858010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/APR59189.2023.00012"},{"key":"ref10","first-page":"887","article-title":"Understanding and securing device vulnerabilities through automated bug report analysis","volume-title":"Proc. 28th USENIX Secur. Symp., USENIX Secur.","author":"Feng","year":"2019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2016.24"},{"key":"ref12","first-page":"186","article-title":"Venerable variadic vulnerabilities vanquished","volume-title":"Proc. 26th USENIX Secur. Symp., USENIX Secur.","author":"Biswas","year":"2017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3277592"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2020.24419","article-title":"Precisely characterizing security impact in a flood of patches via symbolic rule comparison","volume-title":"Proc. 27th Annu. Netw. Distrib. Syst. Secur. Symp., (NDSS)","author":"Wu","year":"2020"},{"key":"ref15","first-page":"1769","article-title":"Detecting missing-check bugs via semantic- and context-aware criticalness and constraints inferences","volume-title":"Proc. 28th USENIX Secur. Symp., USENIX Secur.","author":"Lu","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/icsme.2017.52"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3498537"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SANER56733.2023.00062"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103070"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3524610.3527893"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00157"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01622-8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10888-011-9188-x"},{"key":"ref24","article-title":"OpenAI","year":"2024"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623343"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3608137"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616350"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-acl.663"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678638"},{"key":"ref30","article-title":"CNNVD vulnerability compatibility description specification"},{"key":"ref31","article-title":"CERT-FR"},{"key":"ref32","article-title":"Common weakness enumeration"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1984.4767478"},{"key":"ref34","article-title":"Natural language inference over interaction space","volume-title":"Proc. 6th Int. Conf. Learn. Representations (ICLR)","author":"Gong","year":"2018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505665"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i9.26259"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-long.351"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111790"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00094"},{"key":"ref40","article-title":"A survey of large language models","author":"Zhao","year":"2023"},{"key":"ref41","first-page":"24824","article-title":"Chain-of-thought prompting elicits reasoning in large language models","volume-title":"Proc. NeurIPS","volume":"35","author":"Wei","year":"2022"},{"key":"ref42","first-page":"22199","article-title":"Large language models are zero-shot reasoners","volume-title":"Proc. NeurIPS","volume":"35","author":"Kojima","year":"2022"},{"key":"ref43","volume-title":"Software Engineering","author":"Sommerville","year":"2010"},{"key":"ref44","article-title":"Wikipedia","year":"2024"},{"key":"ref45","article-title":"A survey on retrieval-augmented text generation","author":"Li","year":"2022"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-tutorials.6"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.acl-long.271"},{"key":"ref48","article-title":"Context-aware code generation framework for code repositories: Local, global, and third-party library awareness","author":"Liao","year":"2023"},{"key":"ref49","article-title":"REALM: Retrieval-augmented language model pre-training","author":"Guu","year":"2020"},{"key":"ref50","article-title":"Least-to-most prompting enables complex reasoning in large language models","volume-title":"Proc. 11th Int. Conf. Learn. Representations (ICLR)","author":"Zhou","year":"2023"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/msec.2023.3333936"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111902"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122173"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.deelio-1.10"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.naacl-main.191"},{"key":"ref56","first-page":"521","article-title":"Surface-based retrieval reduces perplexity of retrieval-augmented language models","volume-title":"Proc. 61st Annu. Meeting Assoc. Comput. Linguistics (vol. 2: Short Papers), ACL","author":"Doostmohammadi","year":"2023"},{"key":"ref57","article-title":"Rethinking with retrieval: Faithful large language model inference","author":"He","year":"2023"},{"key":"ref58","first-page":"157","article-title":"Lost in the middle: How language models use long contexts","volume-title":"Transactions of the Association for Computational Linguistics","volume":"12","author":"Liu","year":"2023"},{"key":"ref59","article-title":"Word2vec","year":"2019"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1967.1053964"},{"key":"ref61","article-title":"Selective annotation makes language models better few-shot learners","author":"Su","year":"2022"},{"key":"ref62","article-title":"Common vulnerabilities and exposures (CVE)[OL]","author":"MITRE","year":"2019"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3524489.3527298"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/iri54793.2022.00045"},{"key":"ref65","first-page":"311","article-title":"Bleu: A method for automatic evaluation of machine translation","volume-title":"Proc. 40th Annu. Meeting Assoc. Comput. Linguistics","author":"Papineni","year":"2002"},{"key":"ref66","first-page":"65","article-title":"METEOR: An automatic metric for MT evaluation with improved correlation with human judgments","volume-title":"Proc. Workshop Intrinsic Extrinsic Eval. Meas. Mach. Transl. Summarization@ACL 2005,Ann Arbor","author":"Banerjee","year":"2005"},{"key":"ref67","first-page":"74","article-title":"Rouge: A package for automatic evaluation of summaries","volume-title":"in Text Summarization Branches Out","author":"Lin","year":"2004"},{"key":"ref68","article-title":"Bertscore: Evaluating text generation with BERT","volume-title":"Proc. 8th Int. Conf. Learn. Representations, ICLR","author":"Zhang","year":"2020"},{"key":"ref69","article-title":"Code repository","year":"2024"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107178"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/msr52588.2021.00016"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/iceccs.2019.00011"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-8024-6_17"},{"key":"ref74","first-page":"427","article-title":"A framework for software diversification with ISA heterogeneity","volume-title":"Proc. 23rd Int. Symp. Res. in Attacks, Intrusions Defenses, RAID","author":"Wang","year":"2020"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.116"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/icse-c.2017.114"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00671-6_12"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401411"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6623997"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2985126"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409674"},{"key":"ref82","article-title":"Chain of thought prompting elicits reasoning in large language models","author":"Wei","year":"2022"},{"key":"ref83","article-title":"Applying BERT and chatGPT for sentiment analysis of lyme disease in scientific literature","author":"Susnjak","year":"2023"},{"key":"ref84","article-title":"Can large language models reason about medical questions?\u201d","author":"Li\u00e9vin","year":"2022"},{"key":"ref85","article-title":"Evaluation of chatGPT model for vulnerability detection","author":"Cheshkov","year":"2023"},{"key":"ref86","article-title":"ChatGPT prompt patterns for improving code quality, refactoring, requirements elicitation, and software design","author":"White","year":"2023"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/10885779\/10817126.pdf?arnumber=10817126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:17:51Z","timestamp":1740082671000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10817126\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":86,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tse.2024.3523284","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2]]}}}