{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“报文”:{“索引”:{“日期部分”:[[2024,6,27]],“日期时间”:“2024-06-27T05:55:58Z”,“时间戳”:1719467758943},“参考计数”:89,“发布者”:“电气与电子工程师学会(IEEE)”,“问题”:“4”,“许可证”:[{“开始”:{'日期部分“:[2024,4,1]],”日期时间“:“2024-04-01T00:00:00Z”,“timestamp”:1711929600000},“content-version”:“vor”,“delay-in-days”:0,“URL”:“https:\/\/ieeexplore.iee.org\/Xplorehelp\/downloads\/license-information\/ieee.html”},{“start”:{“date-parts”:[2024,4,1]],“date-time”:“2024-104-01T000:00:00Z'”,“时间戳”:171929600000{,“内容-版本”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\/\/doi.org\/10.15223\/policy-029”},{“start”:{“date-parts”:[[2024,4,1]],“date-time”:“2024-04-01T00:00:00Z”,“timestamp”:1711929600000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“http:\/\/doi.org\/10.15223\/policy-037”}],“出资人”:[{“doi”:“10.13039\/501000001381“,”name“:”National Research Foundation“,”doi-asserted-by“:”publisher“,“奖项”:[“NRF-NRFI08-2022-0002”]}],“内容域”:{“域”:[],“交叉标记-限制”:false},“短容器-时间”:[”IIEEE Trans.Software Eng.“],“发布-打印”:{“日期-部件”:[[2024,4]]},”DOI“:”10.1109\/tse.2024.3361661“,”type“:”journal-article“,”created“:{”date-parts“:[2024,2,9]],”date-time“:”2024-02-09T18:27:52Z“,”时间戳“:1707503272000},“页面”:“721-741”,“源”:“Crossref”,“is-referenced-by-count”:3,“标题”:[“代码模型的秘密后门攻击”],“前缀”:“10.1109”,”卷“:“50”,“作者”:[{“ORCID”:“http://\/ORCID.org\/00000-0001-5938-1918”,“authenticated-ORCID”:false,“give”:“Zhou”,“family”:“Yang”,“sequence”:“first”,“affiliation”:[{”名称“:“新加坡新加坡管理大学计算与信息系统学院”}]},{“ORCID”:“http://\/ORCID.org\/0000-0002-1006-8493”,“authenticated-ORCID”:false,“given”:”Bowen“,“family”:“Xu”,“sequence”:“additional”,“affiliation”:[{“name”:“North Carolina State University,Raleigh,NC,USA”}]neneneep,{”ORCID“:“http://\/orcid.org\/00000-0003-0481-7264”,“authenticated-orcid”:false,“given”:“Jie M.”,“family”:“Zhang”,“sequence”:“additional”,“affiliation”:[{“name”:“King’s College London,London of,U.K.”}]},{“orcid”:“”:[{“name”:“University of California,Los Angeles,CA,USA”}]},{“ORCID”:“http:\/\/ORCID.org/0000-0002-0799-5018”,“authenticated ORCID”:false,“given”:“Jieke”,“family”:“Shi”,“sequence”:“additional”,“affiliation”:[{“name”:“新加坡管理大学计算与信息系统学院,Singapore,Singapore”}]},{“ORCID”:“http:\/\/orcid.org/0000-0003-3370-8585”,“authenticated orcid”:false,“given”:“Junda”,“family”:“He”,“sequence”:“additional”,“affiliation”:[{“name”:“School of Computing and Information Systems,Singapore Management University,Singapore,Singapore”},{“orcid”:“http:\/\/orcid.org/0000-0002-4367-7201”,“authenticated orcid”:false,“given”:“David”,“family”:“Lo”,“sequence”:“additional”,“affiliation”:[{“name”:“School of Computing and Information Systems,Singapore Management University,Singapore,Singapore”}],“member”:“263”,“reference”:[{“key”:“ref1”,“doi asserted by”:“publisher”,“doi”:“10.1145\\3505243”},{“key”:“ref2”,“first page”:“2091”,“文章标题”:“用于极端总结源代码的卷积注意网络”,“卷积时间”:“Proc.33rd Int.Conf.Mach.Learn.(ICML)”,“卷”:“48”,“作者”:“Allamanis”,“年份”:“2016”},{“key”:“ref3”,“article-title”:“CodeSearchNet挑战:评估语义代码搜索的状态”,“author”:“Husain”,“year”:“2019”},“doi-asserted-by”:“publisher”,“doi”:“10.24963\/ijcai.2017\/423”},{“key”:“ref5”,“doi-asserted-by”:”publisher“,”doi“:”10.1109\/saner53432.2022.00054“},}“key:”ref6“,”doi-assert-by“:”publister“,”doi“:“doi”:“10.1145\/3510003.3510146”},{“key”:“ref8”,“doi-asserted-by”:“publisher”,“DOI”:“10.1145\/3428230”},{“key”:“ref9”,“DOI-asserted-by”:“publisher”,“DOI:”10.1609\/aaaai.v34i01.5469“},“key“:”ref10“,“article-title”:“使用优化模糊处理生成对抗计算机程序”,“volume-title“:”Proc.9th Int.Conf.Learnations.Representations(ICLR),Virtual Event“,”author“:”Srikant“,”year“:”2021“}”,{”key“:“参考11”,“doi-asserted-by”:“publisher”,“doi”:“10.1609\/aaai.v37i12.26739”},{“key”:“ref12”,“doi-asserted-by”:”publisher“,”doi“:”10.1109\/icse-seip55303.2022.9794112“},”{“密钥”:“ref13”,“首页”:“1536”,“文章标题”:“CodeBERT:编程和自然语言的预训练模型”,“卷时间”:“Proc.Findings Assoc.Compute.Linguage”统计(EMNLP)”,“author”:“Feng”,“year”:“2020”},{“key”:“ref14”,“article-title”:“Graphcodebert:用数据流预先训练代码表示”,“volume-title“:”Proc.9th Int.Conf.Learn.representations(ICLR),Virtual Event“,“author”:“Guo”,“year”:”2021,“volume-title”:“Proc.7th Int.Conf.Learn.Representations(ICLR)”,“author”:“Alon”,“year”:“2019”},{“key”:“ref16”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/3290353”}:“publisher”,“doi”:“10.1109\/icpr56361.2022.9956690”},{“key”:“ref19”,“首页”:“3104”,“article-title”:“使用神经网络进行序列到序列学习”,“volume-title“:“Proc.Adv.neural Inf.Process.Syst.27 Annul.Conf.neural-Inf.Process.Syst.”,“author”:“Sutskever”,“year”:“2014”},{“key”:“ref20”,“doi-asserted-by”:“publisher”,“doi”:“10.18653\/v1\/2021.emnlp-main.374”}由“:“publisher”,“DOI”:“10.1109 \/cvpr52688.2022.01465”},{“key”:“ref22”,“DOI-asserted-by”:“publicher”,“DOI”:”10.1109\/iccv48922.2021.01175“},}”key“:”ref23“,”DOI-assert-by“:”publisher 10.18653\/v1\/2021.acl-long.377“},{“key”:“ref25”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1145\/3460120.3484576”},{“key”:“ref26”,“DOI-asserted-by”:“publisher”,“DOI:”10.18653\/v1\/2021.acl-long.431“},“key“:”ref27“,”DOI-assert-by“:”publisher“,”DOI“:”10.1145\/3460319.3464809“}、{“key”:”ref28“,”article-title“:”Codexglue:用于代码理解和生成的机器学习基准数据集“,”卷时间“:“Proc.Neural Inf.Process.Syst.Track Dataset Benchmarks 1,NeurIPS Dataset Benchemarks 2021”,“author”:“Lu”,“year”:“2021”},{“key”:“ref29”,“doi-asserted-by”:“publisher”,”doi“:”10.18653\/v1\/2021.emnlp-main.685“},”{“key”:”ref30“,”doi-assert-by“:”publisher“,”doi:“10.18653//v1\/2021.naacl-main。211“},{”键“:”参考31“,”文章标题“:“结构化神经摘要”,“卷标题”:“Proc.7th Int.Conf.Learn.Representations(ICLR)”,“author”:“Fernandes”,“year”:“2019”},{“key”:“ref32”,“first page”:“8011”,“article title”:“后门攻击中的光谱签名”,“卷标题”:“Proc.Adv.neural Inf.Process.Syst.31 Annu.Conf.neural Inf.Process.Syst.(NeurIPS)”,“author”:“Tran”,“year”:“2018”},{“key”:“ref33”,“doi-asserted-by”:“publisher”,“doi”:“10.18653\/v1\/2021.emnlp-main.752”}\/j.infsof.2021.106552“},{”键“:”参考36“,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/icst49551.2021.00016”},{“key”:“ref37”,“doi-asserted-by”:”publisher“,”doi“:”10.1145\/34885832.3485837“},“key“:”ref38“,”first page“:“1505”,“article-title”:“深度学习模型中的盲目后门”,“volume-title“:”Proc.30th USENIX Secur.Symp.,USENIX-Secur.“,”author“:”Bagdasaryan“,”year“:”2021“},{”key“:“ref39”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/3427228.3427258”},{“key”:“ref40”,“doi-asserte-by”:“publisher”,“DI:”10.1145\/3510003.3510181“},}“key:”ref41“,”doi-assert-by“:”publisher“,”doi“:”10.48550\/arXiv.1810.04805“}”,{”key“:”ref42“,”article-title“:”Roberta:稳健优化的BERT预处理方法”,“作者”:“刘”,“年份”:“2019年”},{“key”:“ref43”,“first-page”:“1559”,“article-title”:“You autocomplete me:毒害神经代码完成中的漏洞”,“volume-title“:“Proc.30th USENIX Secur.Symp.,USENIX-Secur.”,“author”:“Schuster”,“year”:“2021”},{”key:“ref44”,“article-title”:“Wiley StatsRef:Statistics Ref:在线统计参考”,“作者”:“Balakrishnan”,“年份”:“2014”}、{“issue”:“8”,“key”:“ref45”,“first page”:“9”,“文章标题”:“语言模型是无监督的多任务学习者”,“volume”:“1”,“author”:“Radford”,“year”:“2019”,“journal title”:“OpenAI Blog”},{“issue”:“6”,“key”:“ref46”,“doi asserted by”:“crossref”,“first page”:“80”,“doi”:“10.2307\/3001968”,“文章标题”:“通过排名方法进行的个体比较”,“volume”:“1”,“author”:“Wilcoxon”,“year”:“1945”,“journal-title”:“Biometrics Bull.”},{“key”:“ref47”,“doi-asserted-by”:“publisher”,“doi”:“10.18653\/v1\/2020.acl-main.249”}“,”doi-asserted-by“:”crossref“,”doi“:”10.3115\/1220355.1220427“,”article-title“:“橙色:评估机器翻译自动评估指标的方法”,“卷-时间”:“Proc.20th Int.Conf.Compute.Linguistics(COLING)”,“author”:“Lin”,“year”:“2004”},{“key”:“ref50”,“doi-asserted-by”:“publisher”,”doi“:“10.1145\/3357384.3357971”},{“key”:“ref52”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/tdsc.2022.3220673”}publisher“,”doi“:”10.1109\/tdsc.2022.3220673“},{”key“:”ref56“,”doi-asserted-by“:“publisher”,“DOI”:“10.1109\/saner53432.2022.00070”},{“issue”:“11”,“key”:“ref57”,“首页”:“2579”,“article-title”:“使用t-SNE可视化数据”,“volume”:”9“,”author“:”Maaten“,”year“:”2008“,”journal-title“:”J.Mach.Learn.Res.“},”{“key“:”ref58“,”DOI-asserted-by“:”publisher“,”DOI“:”10.1109\/tse.2021.3136169“},{“key”:“ref59”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1145\/3468264.3473117”},{“key”:“ref60”,“DOI-asserted-by”:“publicher”,“DI:”10.1109\/icsme52107.2021.00073 sme52107.2021.00079“},{“key”:“ref63”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1145\/3564625.3564636”},{“key”:“ref64”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/saner53432.2022.00056”}.,{”key“:”ref65“,”doi-assert-by“:”publisher“,”doi“:”10.1145\/3293882.3330579,{“key”:“ref67”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ase51524.2021.9678706”},{“key”:“ref68”,“article-title”:“解释和利用对抗性示例”,“author”:“Goodfellow”,“year”:“2015”}、{“key”:”ref69“,”doi-asserted-by“:”publisher“,”doi“:”10.1145\/3527905●●●●。学习。陈述(ICLR)”,“作者”:“Brockschmidt”,“年份”:“2019”},{“key”:“ref71”,“article-title”:“迈向对抗性攻击的深度学习模型”,“volume-title“:”Proc.6th Int.Conf.Learn.Representations(ICLR)“,“author”:“Madry”,“year”:“2018”}{“key“:”ref73“,”doi-asserted-by“:”publisher“,”doi“:”10.1145\/3485447.3512225“},{“key”:”ref74“,”首页“:”1487“,”article-title“:”针对恶意软件分类器的解释引导后门中毒攻击“,”volume-title”:“Proc.30th USENIX Secur.Symp.,USENIX-Secur.“,”author“:”Severi“,”年份“:”2021“}ted-by“:”publisher“,”DOI“:”10.1109\/access.2019.2909068“},{“key”:“ref76”,“article-title”:“利用数据中毒对深度学习系统进行有针对性的后门攻击”,“author”:“Chen”,“year”:“2017”},“key“:”ref77“,“first page”:”18944“,”article-title“:”带有不可察觉输入和潜在修改的后门攻击“,”volume-title“”:“Proc.Adv.Neural Inf。过程。系统。34年。确认神经信息流程。系统。(NeurIPS)“,”author“:”Doan“,”year“:”2021“},{“key”:“ref78”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/3374663751”},“key“:”ref79“,”doi-assert-by“:”publisher“,”doi“:”10.1109\/sp40001.2021.00034“}变体中的恶魔:DNNS的统计分析,用于强大的后门污染检测”,“体积-时间”:“Proc。30号USENIX安全。交响乐团。,USENIX安全。“,”author“:”Tang“,”year“:”2021“},{”key“:”ref81“,”doi-asserted-by“:”publisher“,”doi“:”10.1609\/aaai.v35i9.16971“}”,{“key”:“ref82”,“doi-assert-by”:“publisher”,“doi”:“10.1109\/sp.2019.00031”},”{“key”:”ref83“,”article-title“:”小心数据!在离线强化学习数据集中隐藏后门“,”“author”:“”Gong“},{”key“:”ref84“,”doi-asserted-by“:”crossref“,”DOI“:”10.14722\/ndss.2018.23291“,”article-title“:”对神经网络的木马攻击“,”volume-title”:“Proc。每年25日。Netw公司。分销系统。安全。交响乐团。,(NDSS)“,”author“:”Liu“,”year“:”2018“},{”key“:”ref85“,”doi-asserted-by“:”publisher“,”doi“:”10.1109\/access.2019.2941376“}”,{“key”:“ref86”,“doi-assert-by”:“publisher”,“doi”:“10.1145\/3540250.3549153},{“key”:“ref88”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/3533767.3534371”},{“key”:“ref89”,“doi asserted by”:“publisher”,“doi”:“10.1109\/TDSC.2022.3192419”}],“container title”:[“IEEE Transactions on Software Engineering”],“original title”:[],“link”:[{“URL”:“http:\/\/exploresting.iee.org/ielx7\/32\/10504688\/1044331665.pdf?arnumber=1044331665”,“内容类型”:“未指定”,“内容版本”:“vor”,“预期应用程序”:“相似性检查”}],“存放”:{“日期部分”:[[2024,4,18],“日期-时间”:“2024-04-18T17:28:19Z”,“时间戳”:171346129000},“分数”:1,“资源”:{“主”:{“URL”:“https://ieeexplore.ieee.org/document\/10443165\/”}},“副标题”:[],“短标题”:[],“已发布”:{“日期部分”:[[2024,4]]},“引用次数”:89,“期刊发行”:{“问题”:“4”},“URL”:“http://\/dx.doi.org\/10.109\/tse.2024.3361661”,“关系”:{},“ISSN”:[“0098-5589”,“1939-3520”,“2326-3881”],“ISSN-type”:[{“值”:“00985589”,“类型”:“打印”}发布的“:{“date-parts”:[[2024,4]]}}}