{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,19]],"date-time":"2026-04-19T06:04:18Z","timestamp":1776578658094,"version":"3.51.2"},"reference-count":23,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.067044","type":"journal-article","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T08:31:53Z","timestamp":1754641913000},"page":"3321-3334","source":"Crossref","is-referenced-by-count":1,"title":["Interpretable Vulnerability Detection in LLMs: A BERT-Based Approach with SHAP Explanations"],"prefix":"10.32604","volume":"85","author":[{"given":"Nouman","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Changsheng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.iotcps.2025.01.001","article-title":"Generative AI in cybersecurity: a comprehensive review of LLM applications and vulnerabilities","volume":"5","author":"Ferrag","year":"2025","journal-title":"Internet Things Cyber-Phys Syst"},{"key":"ref2","first-page":"145","article-title":"Large language model for vulnerability detection and repair: literature review and the road ahead","volume":"34","author":"Zhou","year":"2024","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"ref3","series-title":"2023 11th International Conference on Affective Computing and Intelligent Interaction (ACII)","first-page":"1","article-title":"Context unlocks emotions: text-based emotion classification dataset auditing with large language models","author":"Yang","year":"2023"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"4236","DOI":"10.3390\/app15084236","article-title":"Instance-level weighted contrast learning for text classification","volume":"15","author":"Liu","year":"2025","journal-title":"Appl Sci"},{"key":"ref5","series-title":"Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering (ICSE \u201924)","article-title":"Using an LLM to help with code understanding","author":"Nam","year":"2024"},{"key":"ref6","first-page":"1","article-title":"Explainability for large language models: a survey","volume":"15","author":"Zhao","year":"2024","journal-title":"ACM Trans Intell Syst Technol"},{"key":"ref7","unstructured":"Devlin J, Chang M-W, Lee K, Toutanova K. BERT: pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805. 2019."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1007\/s11280-024-01276-1","article-title":"When large language models meet personalization: perspectives of challenges and opportunities","volume":"27","author":"Chen","year":"2024","journal-title":"World Wide Web"},{"key":"ref9","unstructured":"Mathews NS, Brus Y, Aafer Y, Nagappan M, McIntosh S. LLbezpeky: leveraging large language models for vulnerability detection. arXiv:2401.01269. 2024. doi:10.48550\/arxiv.2401.01269."},{"key":"ref10","unstructured":"Gao Z, Wang H, Zhou Y, Zhu W, Zhang C. How far have we gone in vulnerability detection using large language models. arXiv:2311.12420. 2023. doi:10.48550\/arxiv.2311.12420."},{"key":"ref11","series-title":"2023 IEEE 34th International Symposium on Software Reliability Engineering Workshops (ISSREW)","first-page":"112","article-title":"Software vulnerability detection using large language models","author":"Purba","year":"2023"},{"key":"ref12","series-title":"Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing","first-page":"8696","article-title":"CodeT5: identifier-aware unified pre-trained encoder-decoder models for code understanding and generation","author":"Wang","year":"2021 Nov"},{"key":"ref13","series-title":"Proceedings of the 2024 ACM\/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results","first-page":"47","article-title":"Large language model for vulnerability detection: emerging results and future directions","author":"Zhou","year":"2024"},{"key":"ref14","unstructured":"Sun Y, Wu D, Xue Y, Liu H, Ma W, Zhang L et al. LLM4Vuln: a unified evaluation framework for decoupling and enhancing LLMs\u2019 vulnerability reasoning. arXiv.2401.16185. 2024. doi:10.48550\/arxiv.2401.16185. ."},{"key":"ref15","series-title":"2024 IEEE Symposium on Security and Privacy (SP)","first-page":"862","article-title":"LLMs cannot reliably identify and reason about security vulnerabilities (Yet?): a comprehensive evaluation, framework, and benchmarks","author":"Ullah","year":"2024"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/s10664-024-10602-0","article-title":"Towards an understanding of large language models in software engineering tasks","volume":"30","author":"Zheng","year":"2025","journal-title":"Empirical Softw Eng"},{"key":"ref17","unstructured":"Shui X, Ru Z. Bridging the gap between explainability and large language models; 2025 [cited 2025 Jun 6]. Available from: https:\/\/hal.science\/hal-05011844."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"2020","DOI":"10.1080\/10447318.2024.2381929","article-title":"How explainable AI affects human performance: a systematic review of the behavioural consequences of saliency maps","volume":"41","author":"M\u00fcller","year":"2025","journal-title":"Int J Hum Comput Interact"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.procs.2019.09.167","article-title":"The proposal of undersampling method for learning from imbalanced datasets","volume":"159","author":"Bach","year":"2019","journal-title":"Procedia Comput Sci"},{"key":"ref20","series-title":"2020 11th International Conference on Information and Communication Systems (ICICS)","first-page":"243","article-title":"Machine learning with oversampling and undersampling techniques: overview study and experimental results","author":"Mohammed","year":"2020"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"3067","DOI":"10.1109\/TPAMI.2025.3528193","article-title":"Adaptive biased stochastic optimization","volume":"47","author":"Yang","year":"2025","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref22","first-page":"316","author":"Basheer","year":"2024","journal-title":"Artificial intelligence applications and innovations"},{"key":"ref23","series-title":"Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses","first-page":"654","article-title":"DiverseVul: a new vulnerable source code dataset for deep learning based vulnerability detection","author":"Chen","year":"2023"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-2\/TSP_CMC_67044\/TSP_CMC_67044.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T05:35:43Z","timestamp":1764826543000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n2\/63809"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":23,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.067044","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}