{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:19:03Z","timestamp":1757629143308,"version":"3.44.0"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T00:00:00Z","timestamp":1748908800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T00:00:00Z","timestamp":1748908800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Postgraduate Research & Practice Innovation Program of Jiangsu Province","award":["SJCX24_2018"],"award-info":[{"award-number":["SJCX24_2018"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61202006"],"award-info":[{"award-number":["61202006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Open Project of State Key Laboratory for Novel Software Technology at Nanjing University","award":["KFKT2024B21"],"award-info":[{"award-number":["KFKT2024B21"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s10515-025-00526-4","type":"journal-article","created":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T23:02:15Z","timestamp":1748905335000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Semi-supervised software vulnerability assessment via code lexical and structural information fusion"],"prefix":"10.1007","volume":"32","author":[{"given":"Wenlong","family":"Pei","sequence":"first","affiliation":[]},{"given":"Yilin","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Guilong","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Ni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,3]]},"reference":[{"unstructured":"Berthelot, D., Carlini, N., Cubuk, E.D., Kurakin, A., Sohn, K., Zhang, H., Raffel, C.: Remixmatch: Semi-supervised learning with distribution matching and augmentation anchoring. In: International Conference on Learning Representations (2020)","key":"526_CR1"},{"doi-asserted-by":"crossref","unstructured":"Blum, A., Lafferty, J., Rwebangira, M.R., Reddy, R.: Semi-supervised learning using randomized mincuts. In: Proceedings of the Twenty-first International Conference on Machine Learning, p. 13 (2004)","key":"526_CR2","DOI":"10.1145\/1015330.1015429"},{"doi-asserted-by":"crossref","unstructured":"Chapelle, O., Chi, M., Zien, A.: A continuation method for semi-supervised svms. In: Proceedings of the 23rd International Conference on Machine Learning, pp. 185\u2013192 (2006)","key":"526_CR3","DOI":"10.1145\/1143844.1143868"},{"key":"526_CR4","doi-asserted-by":"publisher","first-page":"59125","DOI":"10.1109\/ACCESS.2022.3179692","volume":"10","author":"JC Costa","year":"2022","unstructured":"Costa, J.C., Roxo, T., Sequeiros, J.B., Proenca, H., Inacio, P.R.: Predicting cvss metric via description interpretation. IEEE Access 10, 59125\u201359134 (2022)","journal-title":"IEEE Access"},{"unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: Bert: Pre-training of deep bidirectional transformers for language understanding. (2018). arXiv:1810.04805","key":"526_CR5"},{"doi-asserted-by":"crossref","unstructured":"Elbaz, C., Rilling, L., Morin, C.: Fighting n-day vulnerabilities with automated cvss vector prediction at disclosure. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2020)","key":"526_CR6","DOI":"10.1145\/3407023.3407038"},{"doi-asserted-by":"crossref","unstructured":"Fan, J., Li, Y., Wang, S., Nguyen, T.N.: A c\/c++ code vulnerability dataset with code changes and cve summaries. In: Proceedings of the 17th International Conference on Mining Software Repositories, pp. 508\u2013512 (2020)","key":"526_CR7","DOI":"10.1145\/3379597.3387501"},{"doi-asserted-by":"crossref","unstructured":"Feng, Z., Guo, D., Tang, D., Duan, N., Feng, X., Gong, M., Shou, L., Qin, B., Liu, T., Jiang, D., et al.: Codebert: A pre-trained model for programming and natural languages. (2020). arXiv:2002.08155","key":"526_CR8","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"doi-asserted-by":"crossref","unstructured":"Feutrill, A., Ranathunga, D., Yarom, Y., Roughan, M.: The effect of common vulnerability scoring system metrics on vulnerability exploit delay. In: 2018 Sixth International Symposium on Computing and Networking (CANDAR), pp. 1\u201310. IEEE (2018)","key":"526_CR9","DOI":"10.1109\/CANDAR.2018.00009"},{"doi-asserted-by":"crossref","unstructured":"Gong, Z., Gao, C., Wang, Y., Gu, W., Peng, Y., Xu, Z.: Source code summarization with structural relative position guided transformer. In: 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 13\u201324. IEEE (2022)","key":"526_CR10","DOI":"10.1109\/SANER53432.2022.00013"},{"doi-asserted-by":"crossref","unstructured":"Gong, X., Xing, Z., Li, X., Feng, Z., Han, Z.: Joint prediction of multiple vulnerability characteristics through multi-task learning. In: 2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 31\u201340. IEEE (2019)","key":"526_CR11","DOI":"10.1109\/ICECCS.2019.00011"},{"unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. Adv. Neural. Inf. Process. Syst. 27 (2014)","key":"526_CR12"},{"key":"526_CR13","first-page":"18932","volume":"34","author":"Y Gorishniy","year":"2021","unstructured":"Gorishniy, Y., Rubachev, I., Khrulkov, V., Babenko, A.: Revisiting deep learning models for tabular data. Adv. Neural. Inf. Process. Syst. 34, 18932\u201318943 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"doi-asserted-by":"crossref","unstructured":"Grover, A., Leskovec, J.: node2vec: Scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 855\u2013864 (2016)","key":"526_CR14","DOI":"10.1145\/2939672.2939754"},{"unstructured":"Guo, D., Ren, S., Lu, S., Feng, Z., Tang, D., Liu, S., Zhou, L., Duan, N., Svyatkovskiy, A., Fu, S., et al.: Graphcodebert: Pre-training code representations with data flow. (2020). arXiv:2009.08366","key":"526_CR15"},{"doi-asserted-by":"crossref","unstructured":"Han, Z., Li, X., Xing, Z., Liu, H., Feng, Z.: Learning to predict severity of software vulnerability using only vulnerability description. In: 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 125\u2013136. IEEE (2017)","key":"526_CR16","DOI":"10.1109\/ICSME.2017.52"},{"doi-asserted-by":"crossref","unstructured":"Hin, D., Kan, A., Chen, H., Babar, M.A.: Linevd: Statement-level vulnerability detection using graph neural networks. In: Proceedings of the 19th International Conference on Mining Software Repositories, pp. 596\u2013607 (2022)","key":"526_CR17","DOI":"10.1145\/3524842.3527949"},{"issue":"1","key":"526_CR18","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/TSE.2022.3140868","volume":"49","author":"E Iannone","year":"2022","unstructured":"Iannone, E., Guadagni, R., Ferrucci, F., De Lucia, A., Palomba, F.: The secret life of software vulnerabilities: A large-scale empirical study. IEEE Trans. Softw. Eng. 49(1), 44\u201363 (2022)","journal-title":"IEEE Trans. Softw. Eng."},{"doi-asserted-by":"crossref","unstructured":"Iscen, A., Tolias, G., Avrithis, Y., Chum, O.: Label propagation for deep semi-supervised learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5070\u20135079 (2019)","key":"526_CR19","DOI":"10.1109\/CVPR.2019.00521"},{"issue":"6","key":"526_CR20","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1109\/TDSC.2016.2644614","volume":"15","author":"P Johnson","year":"2016","unstructured":"Johnson, P., Lagerstr\u00f6m, R., Ekstedt, M., Franke, U.: Can the common vulnerability scoring system be trusted? a bayesian analysis. IEEE Trans. Dependable Secure Comput. 15(6), 1002\u20131015 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"doi-asserted-by":"crossref","unstructured":"Khan, S., Parkinson, S.: Review into state of the art of vulnerability assessment using artificial intelligence. Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach, 3\u201332 (2018)","key":"526_CR21","DOI":"10.1007\/978-3-319-92624-7_1"},{"unstructured":"Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. (2014). arXivpreprint arXiv:1412.6980","key":"526_CR22"},{"unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational bayes. (2013). arXivpreprint arXiv:1312.6114","key":"526_CR23"},{"unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. (2016). arXiv:1609.02907","key":"526_CR24"},{"doi-asserted-by":"crossref","unstructured":"Le, T.H.M., Babar, M.A.: On the use of fine-grained vulnerable code statements for software vulnerability assessment models. In: Proceedings of the 19th International Conference on Mining Software Repositories, pp. 621\u2013633 (2022)","key":"526_CR25","DOI":"10.1145\/3524842.3528433"},{"doi-asserted-by":"crossref","unstructured":"Le, T.H.M., Hin, D., Croft, R., Babar, M.A.: Deepcva: Automated commit-level vulnerability assessment with deep multi-task learning. In: 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 717\u2013729. IEEE (2021)","key":"526_CR26","DOI":"10.1109\/ASE51524.2021.9678622"},{"doi-asserted-by":"crossref","unstructured":"Le, T.H.M., Sabir, B., Babar, M.A.: Automated software vulnerability assessment with concept drift. In: 2019 IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR), pp. 371\u2013382. IEEE (2019)","key":"526_CR27","DOI":"10.1109\/MSR.2019.00063"},{"issue":"5","key":"526_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3529757","volume":"55","author":"TH Le","year":"2022","unstructured":"Le, T.H., Chen, H., Babar, M.A.: A survey on data-driven software vulnerability assessment and prioritization. ACM Comput. Surv. 55(5), 1\u201339 (2022)","journal-title":"ACM Comput. Surv."},{"key":"526_CR29","first-page":"21314","volume":"35","author":"H Le","year":"2022","unstructured":"Le, H., Wang, Y., Gotmare, A.D., Savarese, S., Hoi, S.C.H.: Coderl: Mastering code generation through pretrained models and deep reinforcement learning. Adv. Neural. Inf. Process. Syst. 35, 21314\u201321328 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"doi-asserted-by":"crossref","unstructured":"Li, F., Paxson, V.: A large-scale empirical study of security patches. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2201\u20132215 (2017)","key":"526_CR30","DOI":"10.1145\/3133956.3134072"},{"doi-asserted-by":"crossref","unstructured":"Li, Y., Wang, S., Nguyen, T.N.: Vulnerability detection with fine-grained interpretations. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 292\u2013303 (2021)","key":"526_CR31","DOI":"10.1145\/3468264.3468597"},{"doi-asserted-by":"crossref","unstructured":"McIntosh, S., Kamei, Y.: Are fix-inducing changes a moving target? a longitudinal case study of just-in-time defect prediction. In: Proceedings of the 40th International Conference on Software Engineering, pp. 560\u2013560 (2018)","key":"526_CR32","DOI":"10.1145\/3180155.3182514"},{"unstructured":"Narayanan, A., Chandramohan, M., Venkatesan, R., Chen, L., Liu, Y., Jaiswal, S.: graph2vec: Learning distributed representations of graphs. (2017). arXiv:1707.05005","key":"526_CR33"},{"doi-asserted-by":"crossref","unstructured":"Nguyen, A.T., Le, T.H.M., Babar, M.A.: Automated code-centric software vulnerability assessment: How far are we? an empirical study in c\/c++. In: Proceedings of the 18th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 72\u201383 (2024)","key":"526_CR34","DOI":"10.1145\/3674805.3686670"},{"doi-asserted-by":"crossref","unstructured":"Ni, C., Shen, L., Yang, X., Zhu, Y., Wang, S.: Megavul: A c\/c++ vulnerability dataset with comprehensive code representations. In: 2024 IEEE\/ACM 21st International Conference on Mining Software Repositories (MSR), pp. 738\u2013742. IEEE (2024)","key":"526_CR35","DOI":"10.1145\/3643991.3644886"},{"doi-asserted-by":"crossref","unstructured":"Ni, X., Zheng, J., Guo, Y., Jin, X., Li, L.: Predicting severity of software vulnerability based on bert-cnn. In: 2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI), pp. 711\u2013715. IEEE (2022)","key":"526_CR36","DOI":"10.1109\/ICCEAI55464.2022.00151"},{"doi-asserted-by":"crossref","unstructured":"Novielli, N., Girardi, D., Lanubile, F.: A benchmark study on sentiment analysis for software engineering research. In: Proceedings of the 15th International Conference on Mining Software Repositories, pp. 364\u2013375 (2018)","key":"526_CR37","DOI":"10.1145\/3196398.3196403"},{"issue":"3","key":"526_CR38","doi-asserted-by":"publisher","first-page":"56","DOI":"10.3390\/computers9030056","volume":"9","author":"G Paolone","year":"2020","unstructured":"Paolone, G., Marinelli, M., Paesani, R., Di Felice, P.: Automatic code generation of mvc web applications. Computers 9(3), 56 (2020)","journal-title":"Computers"},{"doi-asserted-by":"crossref","unstructured":"Shahid, M.R., Debar, H.: Cvss-bert: Explainable natural language processing to determine the severity of a computer security vulnerability from its description. In: 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 1600\u20131607. IEEE (2021)","key":"526_CR39","DOI":"10.1109\/ICMLA52953.2021.00256"},{"issue":"3","key":"526_CR40","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/S1353-4858(17)30027-2","volume":"2017","author":"V Smyth","year":"2017","unstructured":"Smyth, V.: Software vulnerability management: how intelligence helps reduce the risk. Netw. Secur. 2017(3), 10\u201312 (2017)","journal-title":"Netw. Secur."},{"key":"526_CR41","first-page":"596","volume":"33","author":"K Sohn","year":"2020","unstructured":"Sohn, K., Berthelot, D., Carlini, N., Zhang, Z., Zhang, H., Raffel, C.A., Cubuk, E.D., Kurakin, A., Li, C.-L.: Fixmatch: Simplifying semi-supervised learning with consistency and confidence. Adv. Neural. Inf. Process. Syst. 33, 596\u2013608 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"526_CR42","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jss.2018.09.039","volume":"146","author":"G Spanos","year":"2018","unstructured":"Spanos, G., Angelis, L.: A multi-target approach to estimate software vulnerability characteristics and severity scores. J. Syst. Softw. 146, 152\u2013166 (2018)","journal-title":"J. Syst. Softw."},{"doi-asserted-by":"crossref","unstructured":"Sun, X., Ye, Z., Bo, L., Wu, X., Wei, Y., Zhang, T., Li, B.: Automatic software vulnerability assessment by extracting vulnerability elements. J. Syst. Softw. 111790 (2023)","key":"526_CR43","DOI":"10.1016\/j.jss.2023.111790"},{"key":"526_CR44","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s10115-013-0706-y","volume":"42","author":"I Triguero","year":"2015","unstructured":"Triguero, I., Garc\u00eda, S., Herrera, F.: Self-labeled techniques for semi-supervised learning: taxonomy, software and empirical study. Knowl. Inf. Syst. 42, 245\u2013284 (2015)","journal-title":"Knowl. Inf. Syst."},{"unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141, Polosukhin, I.: Attention is all you need. Adv. Neural Inf. Process. Syst. 30 (2017)","key":"526_CR45"},{"key":"526_CR46","first-page":"4","volume":"1050","author":"P Velickovic","year":"2018","unstructured":"Velickovic, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., Bengio, Y.: Graph attention networks. Stat. 1050, 4 (2018)","journal-title":"Stat."},{"doi-asserted-by":"crossref","unstructured":"Wang, X., Hu, R., Gao, C., Wen, X.-C., Chen, Y., Liao, Q.: Reposvul: A repository-level high-quality vulnerability dataset. In: Proceedings of the 2024 IEEE\/ACM 46th International Conference on Software Engineering: Companion Proceedings, pp. 472\u2013483 (2024)","key":"526_CR47","DOI":"10.1145\/3639478.3647634"},{"doi-asserted-by":"crossref","unstructured":"Wang, C., Li, Z., Pena, Y., Gao, S., Chen, S., Wang, S., Gao, C., Lyu, M.R.: Reef: A framework for collecting real-world vulnerabilities and fixes. In: 2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1952\u20131962. IEEE (2023)","key":"526_CR48","DOI":"10.1109\/ASE56229.2023.00199"},{"doi-asserted-by":"crossref","unstructured":"Wang, Y., Wang, W., Joty, S., Hoi, S.C.: Codet5: Identifier-aware unified pre-trained encoder-decoder models for code understanding and generation. (2021). arXiv:2109.00859","key":"526_CR49","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"doi-asserted-by":"crossref","unstructured":"Wen, X.-C., Chen, Y., Gao, C., Zhang, H., Zhang, J.M., Liao, Q.: Vulnerability detection with graph simplification and enhanced graph representation learning. (2023). arXiv:2302.04675","key":"526_CR50","DOI":"10.1109\/ICSE48619.2023.00191"},{"doi-asserted-by":"crossref","unstructured":"Wen, X.-C., Wang, X., Gao, C., Wang, S., Liu, Y., Gu, Z.: When less is enough: Positive and unlabeled learning model for vulnerability detection. In: 2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 345\u2013357. IEEE (2023)","key":"526_CR51","DOI":"10.1109\/ASE56229.2023.00144"},{"issue":"5","key":"526_CR52","first-page":"320","volume":"10","author":"T Wen","year":"2015","unstructured":"Wen, T., Zhang, Y., Dong, Y., Yang, G.: A novel automatic severity vulnerability assessment framework. J. Commun. 10(5), 320\u2013329 (2015)","journal-title":"J. Commun."},{"doi-asserted-by":"crossref","unstructured":"Xia, C.S., Zhang, L.: Less training, more repairing please: revisiting automated program repair via zero-shot learning. In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 959\u2013971 (2022)","key":"526_CR53","DOI":"10.1145\/3540250.3549101"},{"doi-asserted-by":"crossref","unstructured":"Yamaguchi, F., Golde, N., Arp, D., Rieck, K.: Modeling and discovering vulnerabilities with code property graphs. In: 2014 IEEE Symposium on Security and Privacy, pp. 590\u2013604. IEEE (2014)","key":"526_CR54","DOI":"10.1109\/SP.2014.44"},{"doi-asserted-by":"crossref","unstructured":"Yamamoto, Y., Miyamoto, D., Nakayama, M.: Text-mining approach for estimating vulnerability score. In: 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), pp. 67\u201373. IEEE (2015)","key":"526_CR55","DOI":"10.1109\/BADGERS.2015.018"},{"doi-asserted-by":"crossref","unstructured":"Zagoruyko, S., Komodakis, N.: Wide residual networks. (2016).\u00a0arXiv preprint arXiv:1605.07146","key":"526_CR56","DOI":"10.5244\/C.30.87"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., Xiao, Y., Kabir, M.M.A., Yao, D., Meng, N.: Example-based vulnerability detection and repair in java code. In: Proceedings of the 30th IEEE\/ACM International Conference on Program Comprehension, pp. 190\u2013201 (2022)","key":"526_CR57","DOI":"10.1145\/3524610.3527895"},{"key":"526_CR58","first-page":"18408","volume":"34","author":"B Zhang","year":"2021","unstructured":"Zhang, B., Wang, Y., Hou, W., Wu, H., Wang, J., Okumura, M., Shinozaki, T.: Flexmatch: Boosting semi-supervised learning with curriculum pseudo labeling. Adv. Neural. Inf. Process. Syst. 34, 18408\u201318419 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"doi-asserted-by":"crossref","unstructured":"Zhou, J., Pacheco, M., Wan, Z., Xia, X., Lo, D., Wang, Y., Hassan, A.E.: Finding a needle in a haystack: Automated mining of silent vulnerability fixes. In: 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 705\u2013716. IEEE (2021)","key":"526_CR59","DOI":"10.1109\/ASE51524.2021.9678720"},{"key":"526_CR60","doi-asserted-by":"publisher","first-page":"111257","DOI":"10.1016\/j.jss.2022.111257","volume":"188","author":"Y Zhou","year":"2022","unstructured":"Zhou, Y., Shen, J., Zhang, X., Yang, W., Han, T., Chen, T.: Automatic source code summarization with graph attention networks. J. Syst. Softw. 188, 111257 (2022)","journal-title":"J. Syst. Softw."},{"doi-asserted-by":"crossref","unstructured":"Zhu, X., Goldberg, A.: Introduction to Semi-supervised Learning. Morgan & Claypool Publishers,??? (2009)","key":"526_CR61","DOI":"10.1007\/978-3-031-01548-9"},{"unstructured":"Zhu, X.J.: Semi-supervised learning literature survey (2005)","key":"526_CR62"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00526-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-025-00526-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00526-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T13:57:49Z","timestamp":1757512669000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-025-00526-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,3]]},"references-count":62,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["526"],"URL":"https:\/\/doi.org\/10.1007\/s10515-025-00526-4","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"type":"print","value":"0928-8910"},{"type":"electronic","value":"1573-7535"}],"subject":[],"published":{"date-parts":[[2025,6,3]]},"assertion":[{"value":"12 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"57"}}