{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:40:08Z","timestamp":1751092808067,"version":"3.41.0"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/mc.2025.3546204","type":"journal-article","created":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T17:42:40Z","timestamp":1750959760000},"page":"79-90","source":"Crossref","is-referenced-by-count":0,"title":["Leveraging LLMs for Trustworthy Software Engineering: Insights and Challenges"],"prefix":"10.1109","volume":"58","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5103-8541","authenticated-orcid":false,"given":"Marco","family":"Vieira","sequence":"first","affiliation":[{"name":"University of North Carolina at Charlotte, Charlotte, NC, USA"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1877","article-title":"Language models are few-shot learners","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst. (NIPS)","author":"Brown","year":"2020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3277666"},{"article-title":"A survey on evaluating large language models in code generation tasks","year":"2024","author":"Chen","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/icsa59870.2024.00016"},{"article-title":"AutoSafeCoder: A multi-agent framework for securing LLM code generation through static analysis and fuzz testing","year":"2024","author":"Nunez","key":"ref5"},{"article-title":"MAGIS: LLM-based multi-agent framework for GitHub issue resolution","year":"2024","author":"Tao","key":"ref6"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.3386\/w9200","volume-title":"Do trust and trustworthiness pay off?","author":"Slemrod","year":"2002"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35795-4_1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ieee.edge.2017.39"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-79059-1_4"},{"key":"ref11","first-page":"20,166","article-title":"Position: TrustLLM: Trustworthiness in large language models","volume-title":"Proc. 41st Int. Conf. Mach. Learn.","author":"Huang","year":"2024"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-023-00394-2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111621"},{"article-title":"CodeCoR: An LLM-based self-reflective multi-agent framework for code generation","year":"2025","author":"Pan","key":"ref14"},{"article-title":"LLM-powered code vulnerability repair with reinforcement learning and semantic reward","year":"2024","author":"Islam","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3663529.3663801"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3695988"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1201\/9781003129509"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1142\/9789812798039_0001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2841425"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/apsec60848.2023.00025"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613892"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-024-10573-2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3643788.3648014"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3663529.3663826"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-024-09675-3"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3660771"},{"key":"ref28","first-page":"24,824","article-title":"Chain-of-thought prompting elicits reasoning in large language models","volume-title":"Proc. 36th Int. Conf. Neural Inf. Process. Syst. (NIPS)","author":"Wei","year":"2022"},{"article-title":"A short survey of viewing large language models in legal aspect","year":"2023","author":"Sun","key":"ref29"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/2\/11052324\/11052849.pdf?arnumber=11052849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:14:12Z","timestamp":1751091252000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11052849\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":29,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/mc.2025.3546204","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"type":"print","value":"0018-9162"},{"type":"electronic","value":"1558-0814"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}