{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T19:40:01Z","timestamp":1769283601355,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T00:00:00Z","timestamp":1757635200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T00:00:00Z","timestamp":1757635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1007\/s10515-025-00551-3","type":"journal-article","created":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T04:20:45Z","timestamp":1757650845000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Automatic Code Generation Techniques: A Systematic Literature Review"],"prefix":"10.1007","volume":"33","author":[{"given":"Maha","family":"Alharbi","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Alshayeb","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,12]]},"reference":[{"key":"551_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed, A., Azab, S., Abdelhamid, Y.: Source-code generation using deep learning: a survey. In: Epia conference on artificial intelligence pp. 467\u2013482 (2023)","DOI":"10.1007\/978-3-031-49011-8_37"},{"key":"551_CR107","doi-asserted-by":"crossref","unstructured":"Al Alamin, M. A., Malakar, S., Uddin, G., Afroz, S., Haider, T. B., Iqbal, A.: An empirical study of developer discussions on low-code software development challenges. In: 2021 IEEE\/ACM 18th International Conference on Mining Software Repositories (MSR). IEEE, pp. 46\u201357 (2021)","DOI":"10.1109\/MSR52588.2021.00018"},{"key":"551_CR2","doi-asserted-by":"crossref","unstructured":"Balachandran, V.: Reducing human effort and improving quality in peer code reviews using automatic static analysis and reviewer recommendation. In: 2013 35th international conference on software engineering (icse) pp. 931\u2013940 (2013)","DOI":"10.1109\/ICSE.2013.6606642"},{"key":"551_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.110951","volume":"177","author":"N Davila","year":"2021","unstructured":"Davila, N., Nunes, I.: A systematic literature review and taxonomy of modern code review. Journal of Systems and Software 177, 110951 (2021)","journal-title":"Journal of Systems and Software"},{"key":"551_CR4","doi-asserted-by":"publisher","first-page":"82434","DOI":"10.1109\/ACCESS.2022.3196347","volume":"10","author":"E Dehaerne","year":"2022","unstructured":"Dehaerne, E.: Code generation using machine learning: A systematic review. Ieee Access 10, 82434\u201382455 (2022)","journal-title":"Ieee Access"},{"issue":"10","key":"551_CR5","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1016\/j.infsof.2012.04.008","volume":"54","author":"E Dom\u0131","year":"2012","unstructured":"Dom\u0131, E., P\u00e9rez, B., Rubio, \u00c1.L., et al.: A systematic review of code generation proposals from state machine specifications. Inf. Softw. Technol. 54(10), 1045\u20131066 (2012)","journal-title":"Inf. Softw. Technol."},{"key":"551_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111741","volume":"203","author":"M Evtikhiev","year":"2023","unstructured":"Evtikhiev, M., et al.: Out of the bleu: how should we assess quality of the code generation models? Journal of Systems and Software 203, 111741 (2023)","journal-title":"Journal of Systems and Software"},{"key":"551_CR7","doi-asserted-by":"crossref","unstructured":"Feng, Z., et\u00a0al.: Codebert: A pre-trained model for programming and natural languages (2020). arXiv preprint arXiv:2002.08155","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"551_CR8","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.infsof.2017.01.001","volume":"85","author":"V Garousi","year":"2017","unstructured":"Garousi, V., Felderer, M., Hacalo\u011flu, T.: Software test maturity assessment and test process improvement: A multivocal literature review. Inf. Softw. Technol. 85, 16\u201342 (2017)","journal-title":"Inf. Softw. Technol."},{"key":"551_CR9","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.jss.2019.06.044","volume":"156","author":"V Garousi","year":"2019","unstructured":"Garousi, V., Giray, G., et al.: Aligning software engineering education with industrial needs: A meta-analysis. Journal of Systems and Software 156, 65\u201383 (2019)","journal-title":"Journal of Systems and Software"},{"key":"551_CR10","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1016\/j.procs.2015.03.171","volume":"45","author":"D Gurunule","year":"2015","unstructured":"Gurunule, D., Nashi pudimath, M.: A review: analysis of aspect orientation and model driven engineering for code generation. Procedia Computer Science 45, 852\u2013861 (2015)","journal-title":"Procedia Computer Science"},{"key":"551_CR11","doi-asserted-by":"crossref","unstructured":"Harel, D., Gery, E.: Executable object modeling with statecharts. In: Proceedings of IEEE 18th International Conference on Software Engineering, pp. 246\u2013257 (1996)","DOI":"10.1109\/ICSE.1996.493420"},{"key":"551_CR12","unstructured":"Keele, S., et\u00a0al.: Guidelines for performing systematic literature reviews in software engineering. Technical report, ver. 2.3 ebse technical report. ebse (2007)"},{"issue":"3","key":"551_CR13","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1109\/TSE.2022.3174092","volume":"49","author":"B Kitchenham","year":"2022","unstructured":"Kitchenham, B., Madeyski, L., Budgen, D.: Segress: Software engineering guidelines for reporting secondary studies. IEEE Trans. Software Eng. 49(3), 1273\u20131298 (2022)","journal-title":"IEEE Trans. Software Eng."},{"issue":"3","key":"551_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3383458","volume":"53","author":"THM Le","year":"2020","unstructured":"Le, T.H.M., Chen, H., Babar, M.A.: Deep learning for source code modeling and generation: Models, applications, and challenges. ACM Computing Surveys 53(3), 1\u201338 (2020)","journal-title":"ACM Computing Surveys"},{"key":"551_CR15","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.procs.2020.02.099","volume":"166","author":"Z Li","year":"2020","unstructured":"Li, Z., et al.: The metric for automatic code generation. Procedia Computer Science 166, 279\u2013286 (2020)","journal-title":"Procedia Computer Science"},{"key":"551_CR108","unstructured":"Liu, B., Jiang, Y., Zhang, Y., Niu, N., Li, G., Liu, H.: An Empirical Study on the Potential of LLMs in Automated Software Refactoring. arXiv preprint arXiv:2411.04444 (2024)."},{"issue":"6","key":"551_CR16","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/264934.264941","volume":"17","author":"H Loeper","year":"1997","unstructured":"Loeper, H., Khattab, A., Neubert, P.: Concurrent objects in ada 95. ACM SIGAda Ada Letters 17(6), 47\u201364 (1997)","journal-title":"ACM SIGAda Ada Letters"},{"issue":"3","key":"551_CR17","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1002\/jrsm.1106","volume":"5","author":"Q Mahood","year":"2014","unstructured":"Mahood, Q., Van Eerd, D., Irvin, E.: Searching for grey literature for systematic reviews: challenges and benefits. Research Synthesis Methods 5(3), 221\u2013234 (2014)","journal-title":"Research Synthesis Methods"},{"issue":"4","key":"551_CR18","doi-asserted-by":"publisher","first-page":"264","DOI":"10.7326\/0003-4819-151-4-200908180-00135","volume":"151","author":"D Moher","year":"2009","unstructured":"Moher, D., et al.: Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. Ann. Intern. Med. 151(4), 264\u2013269 (2009)","journal-title":"Ann. Intern. Med."},{"key":"551_CR110","unstructured":"Mou, L., Li, G., Jin, Z., Zhang, L., Wang, T.: TBCNN: A tree-based convolutional neural network for programming language processing. arXiv preprint arXiv:1409.5718 (2014)"},{"key":"551_CR109","unstructured":"Mou, L., Men, R., Li, G., Zhang, L., Jin, Z.: On end-to-end program generation from user intention by deep neural networks. arXiv preprint arXiv:1510.07211 (2015)"},{"issue":"4","key":"551_CR19","first-page":"47","volume":"13","author":"MI Mukhtar","year":"2018","unstructured":"Mukhtar, M.I., Galadanci, B.S.: Automatic code generation from uml diagrams: the state-of-the-art. Sci. World J. 13(4), 47\u201360 (2018)","journal-title":"Sci. World J."},{"issue":"3","key":"551_CR20","doi-asserted-by":"publisher","DOI":"10.3390\/computers9030056","volume":"9","author":"G Paolone","year":"2020","unstructured":"Paolone, G., et al.: Automatic code generation of mvc web applications. Computers 9(3), 56 (2020)","journal-title":"Computers"},{"key":"551_CR21","doi-asserted-by":"crossref","unstructured":"Papineni, K., et\u00a0al.: Bleu: a method for automatic evaluation of machine translation. In: Proceedings of the 40th annual meeting of the association for computational linguistics, pp. 311\u2013318 (2002)","DOI":"10.3115\/1073083.1073135"},{"key":"551_CR22","unstructured":"Pawade, D., et\u00a0al.: Literature survey on automatic code generation techniques. I-Manager\u2019s J. Comput. Sci. 6(2), (2018)"},{"issue":"4","key":"551_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2400682.2400715","volume":"9","author":"S Purini","year":"2013","unstructured":"Purini, S., Jain, L.: Finding good optimization sequences covering program space. ACM Transactions on Architecture and Code Optimization 9(4), 1\u201323 (2013)","journal-title":"ACM Transactions on Architecture and Code Optimization"},{"key":"551_CR24","doi-asserted-by":"crossref","unstructured":"Rayside, D., et\u00a0al.: Equality and hashing for (almost) free: Generating implementations from abstraction functions. In: 2009 IEEE 31st International Conference on Software Engineering, pp. 342\u2013352 (2009)","DOI":"10.1109\/ICSE.2009.5070534"},{"issue":"3","key":"551_CR25","first-page":"537","volume":"17","author":"J Shin","year":"2021","unstructured":"Shin, J., Nam, J.: A survey of automatic code generation from natural language. J. Inform. Process. Syst. 17(3), 537\u2013555 (2021)","journal-title":"J. Inform. Process. Syst."},{"issue":"9","key":"551_CR26","doi-asserted-by":"publisher","DOI":"10.3390\/e23091174","volume":"23","author":"C Yang","year":"2021","unstructured":"Yang, C., Liu, Y., Yin, C.: Recent advances in intelligent source code generation: A survey on natural language based studies. Entropy 23(9), 1174 (2021)","journal-title":"Entropy"},{"key":"551_CR27","doi-asserted-by":"crossref","unstructured":"Zan, D., et\u00a0al.: Large language models meet nl2code: A survey (2022). arXiv preprint arXiv:2212.09420","DOI":"10.18653\/v1\/2023.acl-long.411"},{"key":"551_CR28","unstructured":"Zhu, Y., Pan, M.: Automatic code summarization: A systematic literature review (2019). arXiv preprint arXiv:1909.04352"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00551-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-025-00551-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00551-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T05:04:46Z","timestamp":1769231086000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-025-00551-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,12]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,5]]}},"alternative-id":["551"],"URL":"https:\/\/doi.org\/10.1007\/s10515-025-00551-3","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,12]]},"assertion":[{"value":"20 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2025","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"In this article the affiliation details for Mohammad Alshayeb were incorrectly given as \"Department of Computer Science, University College of Al Jamoum, Umm Al Qura University, Mecca, Saudi Arabia\" and \"Interdisciplinary Research Centre for Intelligent Secure Systems, King Fahd University of Petroleum and Minerals, Street, Dhahran, Saudi Arabia\"","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"but should have been \"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia \" and \"Interdisciplinary Research Centre for Intelligent Secure Systems, King Fahd University of Petroleum and Minerals, Street, Dhahran, Saudi Arabia\"","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"4"}}