{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:03:59Z","timestamp":1773518639925,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T00:00:00Z","timestamp":1753660800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T00:00:00Z","timestamp":1753660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s10515-025-00543-3","type":"journal-article","created":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T11:38:09Z","timestamp":1753702689000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["MCL-VD: Multi-modal contrastive learning with LoRA-enhanced GraphCodeBERT for effective vulnerability detection"],"prefix":"10.1007","volume":"32","author":[{"given":"Yi","family":"Cao","sequence":"first","affiliation":[]},{"given":"Xiaolin","family":"Ju","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lina","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,28]]},"reference":[{"key":"543_CR1","doi-asserted-by":"crossref","unstructured":"Aberdam, A., Litman, R., Tsiper, S., Anschel, O., Slossberg, R., Mazor, S., Manmatha, R., Perona, P.: Sequence-to-sequence contrastive learning for text recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15302\u201315312 (2021)","DOI":"10.1109\/CVPR46437.2021.01505"},{"issue":"5","key":"543_CR2","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MS.2008.130","volume":"25","author":"N Ayewah","year":"2008","unstructured":"Ayewah, N., Pugh, W., Hovemeyer, D., Morgenthaler, J.D., Penix, J.: Using static analysis to find bugs. IEEE Softw. 25(5), 22\u201329 (2008)","journal-title":"IEEE Softw."},{"key":"543_CR3","unstructured":"Bruening, D., Amarasinghe, S.: Efficient, transparent, and comprehensive runtime code manipulation (2004)"},{"issue":"9","key":"543_CR4","doi-asserted-by":"publisher","first-page":"3280","DOI":"10.1109\/TSE.2021.3087402","volume":"48","author":"S Chakraborty","year":"2021","unstructured":"Chakraborty, S., Krishna, R., Ding, Y., Ray, B.: Deep learning based vulnerability detection: Are we there yet? IEEE Trans. Softw. Eng. 48(9), 3280\u20133296 (2021)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"543_CR5","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.: A simple framework for contrastive learning of visual representations. In: International Conference on Machine Learning, pp. 1597\u20131607 (2020). PMLR"},{"key":"543_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, X., Zhang, G., Wang, H., Sui, Y.: Path-sensitive code embedding via contrastive learning for software vulnerability detection. In: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 519\u2013531 (2022)","DOI":"10.1145\/3533767.3534371"},{"issue":"6","key":"543_CR7","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MSP.2004.111","volume":"2","author":"B Chess","year":"2004","unstructured":"Chess, B., McGraw, G.: Static analysis for security. IEEE Sec. Privacy. 2(6), 76\u201379 (2004)","journal-title":"IEEE Sec. Privacy."},{"key":"543_CR8","unstructured":"Dettmers, T., Pagnoni, A., Holtzman, A., Zettlemoyer, L.: Qlora: efficient finetuning of quantized llms (2023). 52:3982\u20133992 (2023). arXiv:2305.14314"},{"key":"543_CR9","doi-asserted-by":"crossref","unstructured":"Fan, J., Li, Y., Wang, S., Nguyen, T.N.: Ac\/c++ code vulnerability dataset with code changes and cve summaries. In: Proceedings of the 17th International Conference on Mining Software Repositories, pp. 508\u2013512 (2020)","DOI":"10.1145\/3379597.3387501"},{"key":"543_CR10","doi-asserted-by":"crossref","unstructured":"Feng, Z., Guo, D., Tang, D., Duan, N., Feng, X., Gong, M., Shou, L., Qin, B., Liu, T., Jiang, D., et al.: Codebert: A pre-trained model for programming and natural languages (2020). arXiv:2002.08155","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"543_CR11","doi-asserted-by":"crossref","unstructured":"Guo, D., Lu, S., Duan, N., Wang, Y., Zhou, M., Yin, J.: Unixcoder: Unified cross-modal pre-training for code representation. In: Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pp. 7212\u20137225 (2022)","DOI":"10.18653\/v1\/2022.acl-long.499"},{"key":"543_CR12","unstructured":"Guo, D., Ren, S., Lu, S., Feng, Z., Tang, D., Liu, S., Zhou, L., Duan, N., Svyatkovskiy, A., Fu, S., et al.: Graphcodebert: Pre-training code representations with data flow (2020). arXiv:2009.08366"},{"key":"543_CR13","doi-asserted-by":"crossref","unstructured":"Hanif, H., Maffeis, S.: Vulberta: Simplified source code pre-training for vulnerability detection. In: 2022 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138 (2022). IEEE","DOI":"10.1109\/IJCNN55064.2022.9892280"},{"key":"543_CR14","unstructured":"Hayou, S., Ghosh, N., Yu, B.: Lora+: Efficient low rank adaptation of large models (2024). arXiv:2402.12354"},{"key":"543_CR15","doi-asserted-by":"crossref","unstructured":"He, K., Fan, H., Wu, Y., Xie, S., Girshick, R.: Momentum contrast for unsupervised visual representation learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9729\u20139738 (2020)","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"543_CR16","unstructured":"Hu, E.J., Shen, Y., Wallis, P., Allen-Zhu, Z., Li, Y., Wang, S., Wang, L., Chen, W.: Lora: Low-rank adaptation of large language models (2021). arXiv:2106.09685"},{"key":"543_CR17","doi-asserted-by":"crossref","unstructured":"Jain, P., Jain, A., Zhang, T., Abbeel, P., Gonzalez, J.E., Stoica, I.: Contrastive code representation learning (2020). arXiv:2007.04973","DOI":"10.18653\/v1\/2021.emnlp-main.482"},{"key":"543_CR18","doi-asserted-by":"crossref","unstructured":"Jiang, C., Xu, H., Dong, M., Chen, J., Ye, W., Yan, M., Ye, Q., Zhang, J., Huang, F., Zhang, S.: Hallucination augmented contrastive learning for multimodal large language model. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 27036\u201327046 (2024)","DOI":"10.1109\/CVPR52733.2024.02553"},{"key":"543_CR19","doi-asserted-by":"crossref","unstructured":"Kan, X., Sun, C., Liu, S., Huang, Y., Tan, G., Ma, S., Zhang, Y.: Sdft: A pdg-based summarization for efficient dynamic data flow tracking. In: 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS), pp. 702\u2013713 (2021). IEEE","DOI":"10.1109\/QRS54544.2021.00080"},{"key":"543_CR20","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1007\/s11277-015-3152-1","volume":"89","author":"S Kim","year":"2016","unstructured":"Kim, S., Kim, R.Y.C., Park, Y.B.: Software vulnerability detection methodology combined with static and dynamic analysis. Wireless Personal Commun. 89, 777\u2013793 (2016)","journal-title":"Wireless Personal Commun."},{"key":"543_CR21","unstructured":"Kopiczko, D.J., Blankevoort, T., Asano, Y.M.: Vera: Vector-based random matrix adaptation (2023). arXiv:2310.11454"},{"issue":"9","key":"543_CR22","doi-asserted-by":"publisher","first-page":"1449","DOI":"10.1109\/JPROC.2015.2460697","volume":"103","author":"D Lahat","year":"2015","unstructured":"Lahat, D., Adali, T., Jutten, C.: Multimodal data fusion: an overview of methods, challenges, and prospects. Proceed. IEEE. 103(9), 1449\u20131477 (2015)","journal-title":"Proceed. IEEE."},{"issue":"11","key":"543_CR23","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proceed. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proceed. IEEE"},{"key":"543_CR24","doi-asserted-by":"crossref","unstructured":"Li, L., Ding, S.H., Walenstein, A., Charland, P., Fung, B.C.: Dynamic neural control flow execution: an agent-based deep equilibrium approach for binary vulnerability detection. In: Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, pp. 1215\u20131225 (2024)","DOI":"10.1145\/3627673.3679726"},{"key":"543_CR25","unstructured":"Li, Y., Yu, Y., Liang, C., He, P., Karampatziakis, N., Chen, W., Zhao, T.: Loftq: Lora-fine-tuning-aware quantization for large language models (2023). arXiv:2310.08659"},{"key":"543_CR26","doi-asserted-by":"crossref","unstructured":"Li, Z., Zou, D., Xu, S., Ou, X., Jin, H., Wang, S., Deng, Z., Zhong, Y.: Vuldeepecker: A deep learning-based system for vulnerability detection (2018). arXiv:1801.01681","DOI":"10.14722\/ndss.2018.23158"},{"issue":"4","key":"543_CR27","doi-asserted-by":"publisher","first-page":"2244","DOI":"10.1109\/TDSC.2021.3051525","volume":"19","author":"Z Li","year":"2021","unstructured":"Li, Z., Zou, D., Xu, S., Jin, H., Zhu, Y., Chen, Z.: Sysevr: A framework for using deep learning to detect software vulnerabilities. IEEE Trans. Dependable Secure Comput. 19(4), 2244\u20132258 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"543_CR28","doi-asserted-by":"crossref","unstructured":"Liu, T., Curtsinger, C., Berger, E.D.: Doubletake: Fast and precise error detection via evidence-based dynamic analysis. In: Proceedings of the 38th International Conference on Software Engineering, pp. 911\u2013922 (2016)","DOI":"10.1145\/2884781.2884784"},{"key":"543_CR29","unstructured":"Liu, S.-Y., Wang, C.-Y., Yin, H., Molchanov, P., Wang, Y.-C.F., Cheng, K.-T., Chen, M.-H.: Dora: Weight-decomposed low-rank adaptation (2024). arXiv:2402.09353"},{"key":"543_CR30","doi-asserted-by":"crossref","unstructured":"Liu, S., Wu, B., Xie, X., Meng, G., Liu, Y.: Contrabert: Enhancing code pre-trained models via contrastive learning. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE), pp. 2476\u20132487 (2023). IEEE","DOI":"10.1109\/ICSE48619.2023.00207"},{"key":"543_CR31","unstructured":"Livshits, V.B., Lam, M.S.: Finding security vulnerabilities in java applications with static analysis. In: USENIX Security Symposium, vol. 14, pp. 18\u201318 (2005)"},{"key":"543_CR32","unstructured":"Maaten, L., Hinton, G.: Visualizing data using t-sne. J. Mach. Learn. Res. 9(11) (2008)"},{"issue":"5","key":"543_CR33","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MSEC.2022.3176058","volume":"20","author":"T Marjanov","year":"2022","unstructured":"Marjanov, T., Pashchenko, I., Massacci, F.: Machine learning for source code vulnerability detection: What works and what isn\u2019t there yet. IEEE Sec. Privacy. 20(5), 60\u201376 (2022)","journal-title":"IEEE Sec. Privacy."},{"key":"543_CR34","unstructured":"Meng, F., Wang, Z., Zhang, M.: Pissa: Principal singular values and singular vectors adaptation of large language models (2024). arXiv:2404.02948"},{"key":"543_CR35","unstructured":"Neelakantan, A., Xu, T., Puri, R., Radford, A., Han, J.M., Tworek, J., Yuan, Q., Tezak, N., Kim, J.W., Hallacy, C., et al.: Text and code embeddings by contrastive pre-training (2022). arXiv:2201.10005"},{"issue":"6","key":"543_CR36","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1273442.1250746","volume":"42","author":"N Nethercote","year":"2007","unstructured":"Nethercote, N., Seward, J.: Valgrind: a framework for heavyweight dynamic binary instrumentation. ACM Sigplan Notices. 42(6), 89\u2013100 (2007)","journal-title":"ACM Sigplan Notices."},{"key":"543_CR37","doi-asserted-by":"crossref","unstructured":"Neuhaus, S., Zimmermann, T., Holler, C., Zeller, A.: Predicting vulnerable software components. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 529\u2013540 (2007)","DOI":"10.1145\/1315245.1315311"},{"key":"543_CR38","doi-asserted-by":"crossref","unstructured":"Nguyen, V.-A., Nguyen, D.Q., Nguyen, V., Le, T., Tran, Q.H., Phung, D.: Regvd: Revisiting graph neural networks for vulnerability detection. In: Proceedings of the ACM\/IEEE 44th International Conference on Software Engineering: Companion Proceedings, pp. 178\u2013182 (2022)","DOI":"10.1145\/3510454.3516865"},{"key":"543_CR39","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s00607-018-0664-z","volume":"101","author":"P Nunes","year":"2019","unstructured":"Nunes, P., Medeiros, I., Fonseca, J., Neves, N., Correia, M., Vieira, M.: An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios. Computing. 101, 161\u2013185 (2019)","journal-title":"Computing."},{"key":"543_CR40","doi-asserted-by":"crossref","unstructured":"Renduchintala, A., Konuk, T., Kuchaiev, O.: Tied-lora: Enhacing parameter efficiency of lora with weight tying (2023). arXiv:2311.09578","DOI":"10.18653\/v1\/2024.naacl-long.481"},{"key":"543_CR41","doi-asserted-by":"crossref","unstructured":"Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Nature. 323(6088), 533\u2013536 (1986)","DOI":"10.1038\/323533a0"},{"key":"543_CR42","doi-asserted-by":"crossref","unstructured":"Russell, R., Kim, L., Hamilton, L., Lazovich, T., Harer, J., Ozdemir, O., Ellingwood, P., McConley, M.: Automated vulnerability detection in source code using deep representation learning. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 757\u2013762 (2018). IEEE","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"543_CR43","unstructured":"Sharma, T., Kechagia, M., Georgiou, S., Tiwari, R., Vats, I., Moazen, H., Sarro, F.: A survey on machine learning techniques for source code analysis (2021). arXiv:2110.09610"},{"key":"543_CR44","doi-asserted-by":"crossref","unstructured":"Shin, Y., Williams, L.: Is complexity really the enemy of software security? In: Proceedings of the 4th ACM Workshop on Quality of Protection, pp. 47\u201350 (2008)","DOI":"10.1145\/1456362.1456372"},{"key":"543_CR45","doi-asserted-by":"crossref","unstructured":"Svyatkovskiy, A., Deng, S.K., Fu, S., Sundaresan, N.: Intellicode compose: Code generation using transformer. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1433\u20131443 (2020)","DOI":"10.1145\/3368089.3417058"},{"key":"543_CR46","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wang, W., Joty, S., Hoi, S.C.: Codet5: Identifier-aware unified pre-trained encoder-decoder models for code understanding and generation (2021). arXiv:2109.00859","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"key":"543_CR47","doi-asserted-by":"publisher","first-page":"103994","DOI":"10.1016\/j.cose.2024.103994","volume":"145","author":"R Wang","year":"2024","unstructured":"Wang, R., Xu, S., Tian, Y., Ji, X., Sun, X., Jiang, S.: Scl-cvd: Supervised contrastive learning for code vulnerability detection via graphcodebert. Comput. Sec. 145, 103994 (2024)","journal-title":"Comput. Sec."},{"key":"543_CR48","doi-asserted-by":"crossref","unstructured":"Wen, F., Nagy, C., Bavota, G., Lanza, M.: A large-scale empirical study on code-comment inconsistencies. In: 2019 IEEE\/ACM 27th International Conference on Program Comprehension (ICPC), pp. 53\u201364 (2019). IEEE","DOI":"10.1109\/ICPC.2019.00019"},{"key":"543_CR49","doi-asserted-by":"crossref","unstructured":"Wu, H., Zhao, H., Zhang, M.: Code summarization with structure-induced transformer. In: Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021, pp. 1078\u20131090 (2021)","DOI":"10.18653\/v1\/2021.findings-acl.93"},{"key":"543_CR50","doi-asserted-by":"crossref","unstructured":"Wu, Y., Zou, D., Dou, S., Yang, W., Xu, D., Jin, H.: Vulcnn: An image-inspired scalable vulnerability detection system. In: Proceedings of the 44th International Conference on Software Engineering, pp. 2365\u20132376 (2022)","DOI":"10.1145\/3510003.3510229"},{"key":"543_CR51","doi-asserted-by":"crossref","unstructured":"Xu, S., Zhang, X., Wu, Y., Wei, F.: Sequence level contrastive learning for text summarization. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 36, pp. 11556\u201311565 (2022)","DOI":"10.1609\/aaai.v36i10.21409"},{"issue":"10s","key":"543_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3505243","volume":"54","author":"Y Yang","year":"2022","unstructured":"Yang, Y., Xia, X., Lo, D., Grundy, J.: A survey on deep learning for software engineering. ACM Comput. Surv. (CSUR). 54(10s), 1\u201373 (2022)","journal-title":"ACM Comput. Surv. (CSUR)."},{"key":"543_CR53","unstructured":"Zhang, Q., Chen, M., Bukharin, A., Karampatziakis, N., He, P., Cheng, Y., Chen, W., Zhao, T.: Adalora: Adaptive budget allocation for parameter-efficient fine-tuning (2023). arXiv:2303.10512"},{"key":"543_CR54","doi-asserted-by":"crossref","unstructured":"Zhang, H., Li, Z., Li, G., Ma, L., Liu, Y., Jin, Z.: Generating adversarial examples for holding robustness of source code processing models. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 1169\u20131176 (2020)","DOI":"10.1609\/aaai.v34i01.5469"},{"key":"543_CR55","unstructured":"Zhou, Y., Liu, S., Siow, J., Du, X., Liu, Y.: Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks. Adv. Neural Inf. Process. Syst. 32 (2019)"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00543-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-025-00543-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00543-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T13:57:45Z","timestamp":1757512665000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-025-00543-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,28]]},"references-count":55,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["543"],"URL":"https:\/\/doi.org\/10.1007\/s10515-025-00543-3","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,28]]},"assertion":[{"value":"23 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"67"}}