{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T08:50:13Z","timestamp":1777107013646,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,14]]},"DOI":"10.1145\/3787279.3787294","type":"proceedings-article","created":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T07:38:47Z","timestamp":1777102727000},"page":"87-91","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Automated Trust-Aware Software Vulnerability Scoring via Explainable Feature Alignment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0744-5876","authenticated-orcid":false,"given":"Seyedeh Leili","family":"Mirtaheri","sequence":"first","affiliation":[{"name":"Department of Informatics, Modeling, Electronics and System Engineering, University of Calabria, Rende, Cosenza, Italy"}],"role":[{"role":"author","vocab":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4101-2218","authenticated-orcid":false,"given":"Amirhossein","family":"Majd","sequence":"additional","affiliation":[{"name":"Department of Informatics, Modeling, Electronics and System Engineering, University of Calabria, Rende, Cosenza, Italy"}],"role":[{"role":"author","vocab":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2313-6002","authenticated-orcid":false,"given":"Reza","family":"Shahbazian","sequence":"additional","affiliation":[{"name":"Department of Humanities, University of Palermo, Palermo, Palermo, Italy"}],"role":[{"role":"author","vocab":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4385-958X","authenticated-orcid":false,"given":"Andrea","family":"Pugliese","sequence":"additional","affiliation":[{"name":"Department of Informatics, Modeling, Electronics and System Engineering, University of Calabria, Rende, Cosenza, Italy"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2026,4,25]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"S. Abbasi. 2024. 2024 Midyear Threat Landscape Review. Qualys Security Blog. https:\/\/blog.qualys.com\/vulnerabilities-threat-research\/2024\/08\/06\/2024-midyear-threat-landscape-review Accessed: 2025-01-14."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I59117.2023.10397701"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Mohammad Ali Ahsan Ullah Md\u00a0Rashedul Islam and Rifat Hossain. 2025. Assessing of Software Security Reliability: Dimensional Security Assurance Techniques. Computers & Security 150 (2025) 104230.","DOI":"10.1016\/j.cose.2024.104230"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","unstructured":"Aseel Alshuaibi Mohammed Almaayah and Aitizaz Ali. 2025. Machine Learning for Cybersecurity Issues: A Systematic Review. Journal of Cyber Security and Risk Auditing 2025 1 (2025) 36\u201346. 10.63180\/jcsra.thestap.2025.1.4","DOI":"10.63180\/jcsra.thestap.2025.1.4"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/937"},{"key":"e_1_3_3_2_7_2","first-page":"2383","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Christou Neophytos","year":"2023","unstructured":"Neophytos Christou, Di Jin, Vaggelis Atlidakis, Baishakhi Ray, and Vasileios\u00a0P. Kemerlis. 2023. IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks. In 32nd USENIX Security Symposium (USENIX Security 23). 2383\u20132400."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Sarah Elder Md\u00a0Rayhanur Rahman Gage Fringer Kunal Kapoor and Laurie Williams. 2024. A Survey on Software Vulnerability Exploitability Assessment. Comput. Surveys 56 8 (2024) 1\u201341.","DOI":"10.1145\/3648610"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Tanikonda et al.2025. AI-Based Continuous Compliance Monitoring Framework with High Detection Accuracy and Reduced Response Times in Healthcare. World Journal of Advanced Research and Reviews 26 3 (2025) 2249\u20132255.","DOI":"10.30574\/wjarr.2025.26.3.2424"},{"key":"e_1_3_3_2_10_2","unstructured":"E. Giunchiglia et\u00a0al. 2023. Trustworthy AI Metrics: Quantitative Assessment for Security Applications. ACM Transactions on Information and System Security (2023)."},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Philipp Kuehn David\u00a0N. Relke and Christian Reuter. 2023. Common Vulnerability Scoring System Prediction Based on Open Source Intelligence Information Sources. Computers & Security 131 (2023) 103286.","DOI":"10.1016\/j.cose.2023.103286"},{"key":"e_1_3_3_2_12_2","first-page":"717","volume-title":"Proceedings of the 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"Le T.\u00a0H.\u00a0M.","year":"2021","unstructured":"T.\u00a0H.\u00a0M. Le, D. Hin, R. Croft, and M.\u00a0A. Babar. 2021. DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning. In Proceedings of the 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, 717\u2013729."},{"key":"e_1_3_3_2_13_2","unstructured":"Yong Li et\u00a0al. 2021. Trustworthy AI: A Survey on Ensuring Trust in Artificial Intelligence Systems. Journal of AI Research 70 (2021) 1\u201335."},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616346"},{"key":"e_1_3_3_2_15_2","first-page":"811","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Liu Peiyu","year":"2024","unstructured":"Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, and Wenhai Wang. 2024. Exploring ChatGPT\u2019s Capabilities on Vulnerability Management. In 33rd USENIX Security Symposium (USENIX Security 24). 811\u2013828."},{"key":"e_1_3_3_2_16_2","unstructured":"Scott Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1705.07874 (2017). arxiv:https:\/\/arXiv.org\/abs\/1705.07874"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/IST64061.2024.10843410"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","unstructured":"VZ Mohale. 2025. A Systematic Review on the Integration of Explainable AI to Enhance Intrusion Detection Systems. Frontiers in Artificial Intelligence (2025) 1526221. 10.3389\/frai.2025.1526221","DOI":"10.3389\/frai.2025.1526221"},{"key":"e_1_3_3_2_19_2","unstructured":"Alex Radiuk et\u00a0al. 2024. Toward Explainable Deep Learning in Healthcare Through Transition Matrix Approaches. Frontiers in Artificial Intelligence 8 (2024) 1482141."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.442"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA52953.2021.00256"},{"key":"e_1_3_3_2_23_2","unstructured":"A. Vizel N. Feldman and E. Yahav. 2023. Explainable AI for Vulnerability Assessment: Challenges and Opportunities. IEEE Security & Privacy 21 2 (2023)."},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Zijing Zhang Vimal Kumar Bernhard Pfahringer and Albert Bifet. 2025. AI-Enabled Automated Common Vulnerability Scoring from Common Vulnerabilities and Exposures Descriptions. International Journal of Information Security 24 1 (2025) 1\u201320.","DOI":"10.1007\/s10207-024-00922-z"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3639476.3639762"}],"event":{"name":"ICAAI 2025: 2025 9th International Conference on Advances in Artificial Intelligence","location":"Manchester United Kingdom","acronym":"ICAAI 2025"},"container-title":["Proceedings of the 2025 9th International Conference on Advances in Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3787279.3787294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T08:22:11Z","timestamp":1777105331000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3787279.3787294"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":24,"alternative-id":["10.1145\/3787279.3787294","10.1145\/3787279"],"URL":"https:\/\/doi.org\/10.1145\/3787279.3787294","relation":{},"subject":[],"published":{"date-parts":[[2025,11,14]]},"assertion":[{"value":"2026-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}