{"id":"https://openalex.org/W4405362853","doi":"https://doi.org/10.1109/mascots64422.2024.10786510","title":"Vulnerability prediction using pre-trained models: An empirical evaluation","display_name":"Vulnerability prediction using pre-trained models: An empirical evaluation","publication_year":2024,"publication_date":"2024-10-21","ids":{"openalex":"https://openalex.org/W4405362853","doi":"https://doi.org/10.1109/mascots64422.2024.10786510"},"language":"en","primary_location":{"id":"doi:10.1109/mascots64422.2024.10786510","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mascots64422.2024.10786510","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 32nd International Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002897802","display_name":"Ilias Kalouptsoglou","orcid":"https://orcid.org/0000-0002-5118-2508"},"institutions":[{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]},{"id":"https://openalex.org/I4210134249","display_name":"Centre for Research and Technology Hellas","ror":"https://ror.org/03bndpq63","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210134249"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Ilias Kalouptsoglou","raw_affiliation_strings":["Information Technologies Institute,Centre for Research and Technology Hellas,Thessaloniki,Greece"],"affiliations":[{"raw_affiliation_string":"Information Technologies Institute,Centre for Research and Technology Hellas,Thessaloniki,Greece","institution_ids":["https://openalex.org/I4210093649","https://openalex.org/I4210134249"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071883230","display_name":"Miltiadis Siavvas","orcid":"https://orcid.org/0000-0002-3251-8723"},"institutions":[{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]},{"id":"https://openalex.org/I4210134249","display_name":"Centre for Research and Technology Hellas","ror":"https://ror.org/03bndpq63","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210134249"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Miltiadis Siavvas","raw_affiliation_strings":["Information Technologies Institute,Centre for Research and Technology Hellas,Thessaloniki,Greece"],"affiliations":[{"raw_affiliation_string":"Information Technologies Institute,Centre for Research and Technology Hellas,Thessaloniki,Greece","institution_ids":["https://openalex.org/I4210093649","https://openalex.org/I4210134249"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057023981","display_name":"Apostolos Ampatzoglou","orcid":"https://orcid.org/0000-0002-5764-7302"},"institutions":[{"id":"https://openalex.org/I192756129","display_name":"University of Macedonia","ror":"https://ror.org/05fg6gr82","country_code":"GR","type":"education","lineage":["https://openalex.org/I192756129"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Apostolos Ampatzoglou","raw_affiliation_strings":["University of Macedonia,Department of Applied Informatics,Thessaloniki,Greece"],"affiliations":[{"raw_affiliation_string":"University of Macedonia,Department of Applied Informatics,Thessaloniki,Greece","institution_ids":["https://openalex.org/I192756129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060625416","display_name":"Dionysios Kehagias","orcid":"https://orcid.org/0000-0002-6912-3493"},"institutions":[{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]},{"id":"https://openalex.org/I4210134249","display_name":"Centre for Research and Technology Hellas","ror":"https://ror.org/03bndpq63","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210134249"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Dionysios Kehagias","raw_affiliation_strings":["Information Technologies Institute,Centre for Research and Technology Hellas,Thessaloniki,Greece"],"affiliations":[{"raw_affiliation_string":"Information Technologies Institute,Centre for Research and Technology Hellas,Thessaloniki,Greece","institution_ids":["https://openalex.org/I4210093649","https://openalex.org/I4210134249"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005131176","display_name":"Alexander Chatzigeorgiou","orcid":"https://orcid.org/0000-0002-5381-8418"},"institutions":[{"id":"https://openalex.org/I192756129","display_name":"University of Macedonia","ror":"https://ror.org/05fg6gr82","country_code":"GR","type":"education","lineage":["https://openalex.org/I192756129"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Alexander Chatzigeorgiou","raw_affiliation_strings":["University of Macedonia,Department of Applied Informatics,Thessaloniki,Greece"],"affiliations":[{"raw_affiliation_string":"University of Macedonia,Department of Applied Informatics,Thessaloniki,Greece","institution_ids":["https://openalex.org/I192756129"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5002897802"],"corresponding_institution_ids":["https://openalex.org/I4210093649","https://openalex.org/I4210134249"],"apc_list":null,"apc_paid":null,"fwci":1.099,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.80476855,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9383999705314636,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9383999705314636,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9018999934196472,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7054502367973328},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5019187927246094},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45959386229515076},{"id":"https://openalex.org/keywords/predictive-modelling","display_name":"Predictive modelling","score":0.4367362856864929},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.414485901594162},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.40487048029899597},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.16243413090705872},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11827594041824341},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10156288743019104}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7054502367973328},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5019187927246094},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45959386229515076},{"id":"https://openalex.org/C45804977","wikidata":"https://www.wikidata.org/wiki/Q7239673","display_name":"Predictive modelling","level":2,"score":0.4367362856864929},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.414485901594162},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40487048029899597},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.16243413090705872},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11827594041824341},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10156288743019104}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mascots64422.2024.10786510","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mascots64422.2024.10786510","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 32nd International Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334322","display_name":"HORIZON EUROPE Framework Programme","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2004758929","https://openalex.org/W2067148378","https://openalex.org/W2079753286","https://openalex.org/W2781491433","https://openalex.org/W3004437357","https://openalex.org/W3091031970","https://openalex.org/W3098605233","https://openalex.org/W3128948576","https://openalex.org/W3187025053","https://openalex.org/W3198619808","https://openalex.org/W3198685994","https://openalex.org/W4229001009","https://openalex.org/W4293201779","https://openalex.org/W4299627282","https://openalex.org/W4312326656","https://openalex.org/W4312436517","https://openalex.org/W4312690534","https://openalex.org/W4385245566","https://openalex.org/W4385337511","https://openalex.org/W6631190155","https://openalex.org/W6636510571","https://openalex.org/W6723530060","https://openalex.org/W6755207826","https://openalex.org/W6757817989","https://openalex.org/W6766673545","https://openalex.org/W6767260250","https://openalex.org/W6769627184","https://openalex.org/W6790588633","https://openalex.org/W6797124534","https://openalex.org/W6852177738","https://openalex.org/W6863467715"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W4387369504","https://openalex.org/W3046775127","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W3107602296","https://openalex.org/W4364306694","https://openalex.org/W4312192474"],"abstract_inverted_index":{"The":[0],"rise":[1],"of":[2,23,48,52],"Large":[3],"Language":[4],"Models":[5],"(LLMs)":[6],"has":[7],"provided":[8],"new":[9],"directions":[10],"for":[11],"addressing":[12],"downstream":[13],"text":[14],"classification":[15],"tasks,":[16],"such":[17],"as":[18,29,87,89],"vulnerability":[19,44,123],"prediction,":[20],"where":[21],"segments":[22],"the":[24,49,53,57,114,118],"source":[25],"code":[26],"are":[27,64,117],"classified":[28],"vulnerable":[30,75],"or":[31],"not.":[32],"Several":[33],"recent":[34],"studies":[35],"have":[36],"employed":[37],"transfer":[38],"learning":[39],"in":[40,122],"order":[41],"to":[42,70,73,112],"enhance":[43],"prediction":[45],"taking":[46],"advantage":[47],"prior":[50],"knowledge":[51],"pre-trained":[54,62],"LLMs.":[55],"In":[56,78],"current":[58],"study,":[59],"different":[60],"Transformer-based":[61],"LLMs":[63],"examined":[65],"and":[66,84,96,104],"evaluated":[67],"with":[68],"respect":[69],"their":[71,90,102],"capacity":[72],"predict":[74],"software":[76],"components.":[77],"particular,":[79],"we":[80,100,105],"fine-tune":[81],"BERT,":[82],"GPT-2,":[83],"T5":[85],"models,":[86],"well":[88],"code-oriented":[91],"variants":[92],"namely":[93],"CodeBERT,":[94],"CodeGPT,":[95],"CodeT5":[97],"respectively.":[98],"Subsequently,":[99],"assess":[101],"performance":[103],"conduct":[106],"an":[107],"empirical":[108],"comparison":[109],"between":[110],"them":[111],"identify":[113],"models":[115],"that":[116],"most":[119],"accurate":[120],"ones":[121],"prediction.":[124]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
