{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T03:23:09Z","timestamp":1768447389459,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,18]],"date-time":"2023-11-18T00:00:00Z","timestamp":1700265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,18]]},"DOI":"10.1145\/3603273.3635667","type":"proceedings-article","created":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T18:12:40Z","timestamp":1704823960000},"page":"392-396","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["VuLASTE: Long Sequence Model with Abstract Syntax Tree Embedding for Vulnerability Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-8833-3744","authenticated-orcid":false,"given":"Botong","family":"Zhu","sequence":"first","affiliation":[{"name":"School of Software, Beihang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3113-6552","authenticated-orcid":false,"given":"Huobin","family":"Tan","sequence":"additional","affiliation":[{"name":"School of Software, Beihang University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"37","volume-title":"Devanbu P and Sutton C 2018 ACM Computing Surveys (CSUR) 51(4)","author":"Allamanis M","unstructured":"Allamanis M, Barr E T, Devanbu P and Sutton C 2018 ACM Computing Surveys (CSUR) 51(4) pp. 1\u201337"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Duan X Wu J Ji S Rui Z Luo T Yang M and Wu Y 2019 IJCAI: 4665\u20134671","DOI":"10.24963\/ijcai.2019\/648"},{"key":"e_1_3_2_1_3_1","volume-title":"Deng Z and Zhong Y 2018 NDSS","author":"Li Z","unstructured":"Li Z, Zou D, Xu S, Ou X, Jin H, Wang S, Deng Z and Zhong Y 2018 NDSS (The Internet Society)"},{"key":"e_1_3_2_1_4_1","unstructured":"Mikolov T Chen K Corrado G and Dean J 2013 ICLR"},{"key":"e_1_3_2_1_5_1","unstructured":"Li Z Zou D Xu S Jin H Zhu Y and Chen Z 2021 IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_6_1","first-page":"1547","volume-title":"Jiang D 2020 Findings of the Association for Computational Linguistics: EMNLP","author":"Feng Z","unstructured":"Feng Z, Guo D, Tang D, Duan N, Feng X, Gong M, Shou L, Qin B, Liu T, Jiang D 2020 Findings of the Association for Computational Linguistics: EMNLP pp 1536\u20131547"},{"key":"e_1_3_2_1_7_1","first-page":"2473","volume-title":"Wu Y and Miller A 2019 Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP)","author":"Petroni F","unstructured":"Petroni F, Rockt\u00e4schel T, Riedel S, Lewis P, Bakhtin A, Wu Y and Miller A 2019 Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP) pp 2463\u20132473"},{"key":"e_1_3_2_1_8_1","unstructured":"Beltagy I Peters M E and Cohan A 2020 Preprint arXiv:2004.05150"},{"key":"e_1_3_2_1_9_1","first-page":"2083","volume-title":"Cheung A and Zettlemoyer L 2016 54th Annual Meeting of the Association for Computational Linguistics 2016 (Association for Computational Linguistics)","author":"Iyer S","unstructured":"Iyer S, Konstas I, Cheung A and Zettlemoyer L 2016 54th Annual Meeting of the Association for Computational Linguistics 2016 (Association for Computational Linguistics) pp 2073\u20132083"},{"key":"e_1_3_2_1_10_1","first-page":"2988","volume-title":"He K and Doll\u00e1r P 2017 Proceedings of the IEEE international conference on computer vision","author":"Lin T Y","unstructured":"Lin T Y, Goyal P, Girshick R, He K and Doll\u00e1r P 2017 Proceedings of the IEEE international conference on computer vision pp 2980\u20132988"},{"key":"e_1_3_2_1_11_1","unstructured":"Chakraborty S Krishna R Ding Y and Ray B 2021 IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_12_1","first-page":"614","volume-title":"Lee H and Oh H 2017 2017 IEEE Symposium on Security and Privacy (SP) (IEEE)","author":"Kim S","unstructured":"Kim S, Woo S, Lee H and Oh H 2017 2017 IEEE Symposium on Security and Privacy (SP) (IEEE) pp 595\u2013614"}],"event":{"name":"AAIA 2023: 2023 International Conference on Advances in Artificial Intelligence and Applications","location":"Wuhan China","acronym":"AAIA 2023"},"container-title":["Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603273.3635667","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603273.3635667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:34:19Z","timestamp":1755891259000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603273.3635667"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,18]]},"references-count":12,"alternative-id":["10.1145\/3603273.3635667","10.1145\/3603273"],"URL":"https:\/\/doi.org\/10.1145\/3603273.3635667","relation":{},"subject":[],"published":{"date-parts":[[2023,11,18]]},"assertion":[{"value":"2024-01-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}