{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,17]],"date-time":"2026-05-17T04:26:33Z","timestamp":1778991993051,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":53,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819534555","type":"print"},{"value":"9789819534562","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3456-2_24","type":"book-chapter","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T07:24:26Z","timestamp":1760599466000},"page":"348-362","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Sparse-MoE: Syntax-Aware Multi-view Mixture of\u00a0Experts for\u00a0Long-Sequence Software Vulnerability Detection"],"prefix":"10.1007","author":[{"given":"Yifan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Lei","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Ahmad, W.U., Chakraborty, S., Ray, B., Chang, K.W.: Unified pre-training for program understanding and generation. In: Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 2655\u20132668 (2021)","DOI":"10.18653\/v1\/2021.naacl-main.211"},{"key":"24_CR2","unstructured":"Beltagy, I., Peters, M.E., Cohan, A.: Longformer: The long-document transformer. arXiv preprint arXiv:2004.05150 (2020)"},{"key":"24_CR3","unstructured":"Buratti, L., et al.: Exploring software naturalness through neural language models. arXiv preprint arXiv:2006.12641 (2020)"},{"issue":"9","key":"24_CR4","doi-asserted-by":"publisher","first-page":"3280","DOI":"10.1109\/TSE.2021.3087402","volume":"48","author":"S Chakraborty","year":"2021","unstructured":"Chakraborty, S., Krishna, R., Ding, Y., Ray, B.: Deep learning based vulnerability detection: are we there yet? IEEE Trans. Software Eng. 48(9), 3280\u20133296 (2021)","journal-title":"IEEE Trans. Software Eng."},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Chen, Y., Ding, Z., Alowain, L., Chen, X., Wagner, D.: Diversevul: a new vulnerable source code dataset for deep learning based vulnerability detection. In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), pp. 654\u2013668 (2023)","DOI":"10.1145\/3607199.3607242"},{"issue":"6","key":"24_CR6","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MSP.2004.111","volume":"2","author":"B Chess","year":"2004","unstructured":"Chess, B., McGraw, G.: Static analysis for security. IEEE Sec. Priv. 2(6), 76\u201379 (2004)","journal-title":"IEEE Sec. Priv."},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Ding, Y., Steenhoek, B., Pei, K., Kaiser, G., Le, W., Ray, B.: Traced: execution-aware pre-training for source code. In: Proceedings of the 46th IEEE\/ACM International Conference on Software Engineering, pp. 1\u201312 (2024)","DOI":"10.1145\/3597503.3608140"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Fan, J., Li, Y., Wang, S., Nguyen, T.N.: A c\/c++ code vulnerability dataset with code changes and cve summaries. In: Proceedings of the 17th International Conference on Mining Software Repositories (MSR), pp. 508\u2013512 (2020)","DOI":"10.1145\/3379597.3387501"},{"issue":"120","key":"24_CR9","first-page":"1","volume":"23","author":"W Fedus","year":"2022","unstructured":"Fedus, W., Zoph, B., Shazeer, N.: Switch transformers: scaling to trillion parameter models with simple and efficient sparsity. J. Mach. Learn. Res. 23(120), 1\u201339 (2022)","journal-title":"J. Mach. Learn. Res."},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Feng, Z., et al.: Codebert: a pre-trained model for programming and natural languages. in: findings of the Association for Computational Linguistics: EMNLP 2020, pp. 1536\u20131547 (2020)","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Fu, M., Tantithamthavorn, C.: Linevul: a transformer-based line-level vulnerability prediction. In: Proceedings of the 19th International Conference on Mining Software Repositories, pp. 608\u2013620 (2022)","DOI":"10.1145\/3524842.3528452"},{"key":"24_CR12","unstructured":"Gong, L., Elhoushi, M., Cheung, A.: Ast-t5: Structure-aware pretraining for code generation and understanding. arXiv preprint arXiv:2401.03003 (2024)"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Guo, D., Lu, S., Duan, N., Wang, Y., Zhou, M., Yin, J.: Unixcoder: unified cross-modal pre-training for code representation. In: Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (ACL) (2022)","DOI":"10.18653\/v1\/2022.acl-long.499"},{"key":"24_CR14","unstructured":"Guo, D., et al.: Graphcodebert: Pre-training code representations with data flow. In: Proceedings of the 9th International Conference on Learning Representations (ICLR) (2021)"},{"key":"24_CR15","unstructured":"Guo, D., et\u00a0al.: Deepseek-coder: When the large language model meets programming\u2013the rise of code intelligence. arXiv preprint arXiv:2401.14196 (2024)"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Hanif, H., Maffeis, S.: Vulberta: simplified source code pre-training for vulnerability detection. In: Proceedings of the 2022 International Joint Conference on Neural Networks (IJCNN, pp.\u00a01\u20138 (2022)","DOI":"10.1109\/IJCNN55064.2022.9892280"},{"key":"24_CR17","unstructured":"Javaheripi, M., et\u00a0al.: Phi-2: The surprising power of small language models (2023), microsoft Research Blog"},{"key":"24_CR18","unstructured":"Jiang, A.Q., et al.: Mistral 7b (2023)"},{"issue":"12","key":"24_CR19","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TSE.2024.3493245","volume":"50","author":"Y Jiang","year":"2024","unstructured":"Jiang, Y., Zhang, Y., Su, X., Treude, C., Wang, T.: Stagedvulbert: multi-granular vulnerability detection with a novel pre-trained code model. IEEE Trans. Software Eng. 50(12), 3454\u20133471 (2024)","journal-title":"IEEE Trans. Software Eng."},{"key":"24_CR20","unstructured":"Lepikhin, D., et al.: Gshard: scaling giant models with conditional computation and automatic sharding. arXiv preprint arXiv:2006.16668 (2020)"},{"key":"24_CR21","unstructured":"Li, R., et\u00a0al.: Starcoder: May the source be with you! arXiv preprint arXiv:2305.06161 (2023)"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Li, Y., Wang, S., Nguyen, T.N.: Vulnerability detection with fine-grained interpretations. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 292\u2013303 (2021)","DOI":"10.1145\/3468264.3468597"},{"issue":"4","key":"24_CR23","doi-asserted-by":"publisher","first-page":"2821","DOI":"10.1109\/TDSC.2021.3076142","volume":"19","author":"Z Li","year":"2022","unstructured":"Li, Z., Zou, D., Xu, S., Chen, Z., Zhu, Y., Jin, H.: Vuldeelocator: a deep learning-based fine-grained vulnerability detector. IEEE Trans. Dependable Secure Comput. 19(4), 2821\u20132837 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"4","key":"24_CR24","doi-asserted-by":"publisher","first-page":"2244","DOI":"10.1109\/TDSC.2021.3051525","volume":"19","author":"Z Li","year":"2021","unstructured":"Li, Z., Zou, D., Xu, S., Jin, H., Zhu, Y., Chen, Z.: Sysevr: a framework for using deep learning to detect software vulnerabilities. IEEE Trans. Dependable Secure Comput. 19(4), 2244\u20132258 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: Vuldeepecker: a deep learning-based system for vulnerability detection. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2018)","DOI":"10.14722\/ndss.2018.23158"},{"issue":"10","key":"24_CR26","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/JPROC.2020.2993293","volume":"108","author":"G Lin","year":"2020","unstructured":"Lin, G., Wen, S., Han, Q.L., Zhang, J., Xiang, Y.: Software vulnerability detection using deep neural networks: A survey. Proc. IEEE 108(10), 1825\u20131848 (2020)","journal-title":"Proc. IEEE"},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"Liu, S., Wu, B., Xie, X., Meng, G., Liu, Y.: Contrabert: enhancing code pre-trained models via contrastive learning. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE), pp. 2476\u20132487 (2023)","DOI":"10.1109\/ICSE48619.2023.00207"},{"key":"24_CR28","unstructured":"Liu, Y., et al.: Roberta: a robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692 (2019)"},{"key":"24_CR29","unstructured":"Livshits, B., Lam, M.S.: Finding security vulnerabilities in java applications with static analysis. In: Proceedings of the 14th USENIX Security Symposium, pp. 271\u2013286 (2005)"},{"key":"24_CR30","unstructured":"Lu, S., et\u00a0al.: Codexglue: A machine learning benchmark dataset for code understanding and generation. arXiv preprint arXiv:2102.04664 (2021)"},{"key":"24_CR31","unstructured":"Luo, Z., et al.: Wizardcoder: empowering code large language models with evol-instruct. arXiv preprint arXiv:2306.08568 (2023)"},{"issue":"11","key":"24_CR32","doi-asserted-by":"publisher","first-page":"2312","DOI":"10.1109\/TSE.2019.2946563","volume":"47","author":"VJM Man\u00e8s","year":"2021","unstructured":"Man\u00e8s, V.J.M., et al.: The art, science, and engineering of fuzzing: A survey. IEEE Trans. Software Eng. 47(11), 2312\u20132331 (2021)","journal-title":"IEEE Trans. Software Eng."},{"key":"24_CR33","unstructured":"Mirsky, Y., et al.: Vulchecker: graph-based vulnerability localization in source code. In: Proceedings of the 32nd USENIX Security Symposium (USENIX Security 2023), pp. 6557\u20136574 (2023)"},{"key":"24_CR34","doi-asserted-by":"crossref","unstructured":"Ni, C., Guo, X., Zhu, Y., Xu, X., Yang, X.: Function-level vulnerability detection through fusing multi-modal knowledge. In: Proceedings of the 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1911\u20131918 (2023)","DOI":"10.1109\/ASE56229.2023.00084"},{"key":"24_CR35","doi-asserted-by":"crossref","unstructured":"Ni, C., Yin, X., Yang, K., Zhao, D., Xing, Z., Xia, X.: Distinguishing look-alike innocent and vulnerable code by subtle semantic representation learning and explanation. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1611\u20131622 (2023)","DOI":"10.1145\/3611643.3616358"},{"key":"24_CR36","unstructured":"Ouyang, L., et\u00a0al.: Training language models to follow instructions with human feedback. In: Proceedings of the 35th Conference on Neural Information Processing Systems (NeurIPS 2022), pp. 27730\u201327744 (2022)"},{"key":"24_CR37","doi-asserted-by":"crossref","unstructured":"Phan, L., Tran, H., Le, D., Nguyen, H., Anibal, J., Peltekian, A., Ye, Y.: Cotext: multi-task learning with code-text transformer. In: Proceedings of the 1st Workshop on Natural Language Processing for Programming (NLP4Prog), pp. 35\u201345 (2021)","DOI":"10.18653\/v1\/2021.nlp4prog-1.5"},{"key":"24_CR38","unstructured":"Rajbhandari, S., et al.: Deepspeed-moe: Advancing mixture-of-experts inference and training to power next-generation ai scale. In: Proceedings of the 39th International Conference on Machine Learning (ICML), vol.\u00a0162, pp. 18332\u201318346 (2022)"},{"key":"24_CR39","unstructured":"Roziere, B., et\u00a0al.: Code llama: Open foundation models for code. arXiv preprint arXiv:2308.12950 (2023)"},{"key":"24_CR40","doi-asserted-by":"crossref","unstructured":"Russell, R., et al.: Automated vulnerability detection in source code using deep representation learning. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 757\u2013762 (2018)","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"24_CR41","doi-asserted-by":"crossref","unstructured":"Sheng, Z., Chen, Z., Gu, S., Huang, H., Gu, G., Huang, J.: Llms in software security: a survey of vulnerability detection techniques and insights. arXiv preprint arXiv:2502.07049 (2025)","DOI":"10.1145\/3769082"},{"key":"24_CR42","unstructured":"Shimmi, S., Rahman, A., Gadde, M., Okhravi, H., Rahimi, M.: Vulsim: leveraging similarity of multi-dimensional neighbor embeddings for vulnerability detection. In: Proceedings of the 33rd USENIX Security Symposium (USENIX Security 2024), pp. 1777\u20131794 (2024)"},{"key":"24_CR43","doi-asserted-by":"crossref","unstructured":"Steenhoek, B., Gao, H., Le, W.: Dataflow analysis-inspired deep learning for efficient vulnerability detection. In: Proceedings of the 46th IEEE\/ACM International Conference on Software Engineering, pp. 1\u201313 (2024)","DOI":"10.1145\/3597503.3623345"},{"key":"24_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121865","volume":"238","author":"Z Tian","year":"2024","unstructured":"Tian, Z., Tian, B., Lv, J., Chen, Y., Chen, L.: Enhancing vulnerability detection via ast decomposition and neural sub-tree encoding. Expert Syst. Appl. 238, 121865 (2024)","journal-title":"Expert Syst. Appl."},{"key":"24_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103994","volume":"145","author":"R Wang","year":"2024","unstructured":"Wang, R., Xu, S., Tian, Y., Ji, X., Sun, X., Jiang, S.: Scl-cvd: supervised contrastive learning for code vulnerability detection via graphcodebert. Comput. Sec. 145, 103994 (2024)","journal-title":"Comput. Sec."},{"key":"24_CR46","doi-asserted-by":"crossref","unstructured":"Wang, Y., Le, H., Gotmare, A.D., Bui, N.D., Li, J., Hoi, S.C.: Codet5+: open code large language models for code understanding and generation. In: Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1247\u20131264 (2023)","DOI":"10.18653\/v1\/2023.emnlp-main.68"},{"key":"24_CR47","unstructured":"Wang, Z., Li, G., Li, J., Dong, Y., Xiong, Y., Jin, Z.: Line-level semantic structure learning for code vulnerability detection. In: Proceedings of the 2025 Asia-Pacific Symposium on Internetware (2025)"},{"key":"24_CR48","doi-asserted-by":"crossref","unstructured":"Wang, Z., Li, G., Li, J., Xiong, Y., Yan, M., Jin, Z.: M2cvd: enhancing vulnerability semantic through multi-model collaboration for code vulnerability detection. arXiv preprint arXiv:2406.05940 (2024)","DOI":"10.1145\/3771923"},{"key":"24_CR49","doi-asserted-by":"crossref","unstructured":"Wen, X.C., Chen, Y., Gao, C., Zhang, H., Zhang, J.M., Liao, Q.: Vulnerability detection with graph simplification and enhanced graph representation learning. In: Proceedings of the 45th IEEE\/ACM International Conference on Software Engineering (ICSE), pp. 2275\u20132286 (2023)","DOI":"10.1109\/ICSE48619.2023.00191"},{"key":"24_CR50","unstructured":"Yang, A.Z., Tian, H., Ye, H., Martins, R., Goues, C.L.: Security vulnerability detection with multitask self-instructed fine-tuning of large language models. arXiv preprint arXiv:2406.05892 (2024)"},{"key":"24_CR51","unstructured":"Zaheer, M., et al.: Big bird: transformers for longer sequences. In: Advances in Neural Information Processing Systems, vol.\u00a033, pp. 17283\u201317297 (2020)"},{"key":"24_CR52","unstructured":"Zhou, Y., Liu, S., Siow, J., Du, X., Liu, Y.: Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks. In: Advances in Neural Information Processing Systems, vol.\u00a032 (2019)"},{"key":"24_CR53","unstructured":"Zuo, S., et al.: Efficient long sequence modeling via state space augmented transformer. arXiv preprint arXiv:2212.08136 (2022)"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3456-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T22:05:27Z","timestamp":1760738727000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3456-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"ISBN":["9789819534555","9789819534562"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3456-2_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"17 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kyoto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2025.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}