{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T16:42:24Z","timestamp":1768840944584,"version":"3.49.0"},"reference-count":78,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T00:00:00Z","timestamp":1768780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T00:00:00Z","timestamp":1768780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272387"],"award-info":[{"award-number":["62272387"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi Province","doi-asserted-by":"publisher","award":["2022JM-342"],"award-info":[{"award-number":["2022JM-342"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Graduate Innovation Fund of Xi\u2019an University of Posts and Telecommunications","award":["CXJJZL2023028"],"award-info":[{"award-number":["CXJJZL2023028"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2026,12]]},"DOI":"10.1007\/s10515-026-00590-4","type":"journal-article","created":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T01:57:38Z","timestamp":1768787858000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Robust vulnerability detection with limited data via training-efficient adversarial reprogramming"],"prefix":"10.1007","volume":"33","author":[{"given":"Zhenzhou","family":"Tian","sequence":"first","affiliation":[]},{"given":"Chuang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yunpeng","family":"Hui","sequence":"additional","affiliation":[]},{"given":"Jiaze","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yanping","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lingwei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,19]]},"reference":[{"key":"590_CR1","doi-asserted-by":"crossref","unstructured":"Cao, S., Sun, X., Bo, L., Wei, Y., Li, B.: Bgnn4vd: Constructing bidirectional graph neural-network for vulnerability detection. Info. Sof. Tech. 136 (2021)","DOI":"10.1016\/j.infsof.2021.106576"},{"key":"590_CR2","doi-asserted-by":"crossref","unstructured":"Cao, S., Sun, X., Bo, L., Wu, R., Li, B., Tao, C.: MVD: memory-related vulnerability detection based on flow-sensitive graph neural networks. In: ICSE, pp. 1456\u20131468 (2022)","DOI":"10.1145\/3510003.3510219"},{"key":"590_CR3","doi-asserted-by":"crossref","unstructured":"Cao, S., Sun, X., Wu, X., Lo, D., Bo, L., Li, B., Liu, W.: Coca: Improving and explaining graph neural network-based vulnerability detection systems. In: ICSE. ICSE \u201924. Association for Computing Machinery, New York, NY, USA (2024)","DOI":"10.1145\/3597503.3639168"},{"key":"590_CR4","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., Ahmed, T., Ding, Y., Devanbu, P.T., Ray, B.: Natgen: generative pre-training by \u201cnaturalizing\u201d source code. In: ESEC\/FSE, pp. 18\u201330 (2022)","DOI":"10.1145\/3540250.3549162"},{"key":"590_CR5","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., Krishna, R., Ding, Y., Ray, B.: Deep learning based vulnerability detection: Are we there yet. IEEE Trans. Softw. Eng. (2021)","DOI":"10.1109\/TSE.2021.3087402"},{"key":"590_CR6","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. JAIR 16, 321\u2013357 (2002)","journal-title":"JAIR"},{"key":"590_CR7","doi-asserted-by":"crossref","unstructured":"Chen, L., et al.: Adversarially reprogramming pretrained neural networks for data-limited and cost-efficient malware detection. In: SDM, pp. 693\u2013701. SIAM (2022)","DOI":"10.1137\/1.9781611977172.78"},{"key":"590_CR8","doi-asserted-by":"crossref","unstructured":"Chen, L., Fan, Y., Ye, Y.: Adversarial reprogramming of pretrained neural networks for fraud detection. In: CIKM, pp. 2935\u20132939 (2021)","DOI":"10.1145\/3459637.3482053"},{"key":"590_CR9","doi-asserted-by":"crossref","unstructured":"Cheng, X., Zhang, G., Wang, H., Sui, Y.: Path-sensitive code embedding via contrastive learning for software vulnerability detection. In: ISSTA, pp. 519\u2013531 (2022)","DOI":"10.1145\/3533767.3534371"},{"key":"590_CR10","doi-asserted-by":"crossref","unstructured":"Cheng, B., Zhao, M., Wang, K., Wang, M., Bai, G., Feng, R., et al.: Beyond fidelity: Explaining vulnerability localization of learning-based detectors. ToSEM (2024)","DOI":"10.1145\/3641543"},{"issue":"3","key":"590_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3436877","volume":"30","author":"X Cheng","year":"2021","unstructured":"Cheng, X., Wang, H., Hua, J., Xu, G., Sui, Y.: Deepwukong: Statically detecting software vulnerabilities using deep graph neural network. ACM Trans. Soft. Eng. Meth. 30(3), 1\u201333 (2021)","journal-title":"ACM Trans. Soft. Eng. Meth."},{"issue":"2","key":"590_CR12","first-page":"542","volume":"21","author":"X Cheng","year":"2024","unstructured":"Cheng, X., Nie, X., Li, N., Wang, H., Zheng, Z., Sui, Y.: How about bug-triggering paths?-understanding and characterizing learning-based vulnerability detectors. TDSC 21(2), 542\u2013558 (2024)","journal-title":"TDSC"},{"key":"590_CR13","doi-asserted-by":"crossref","unstructured":"Croft, R., Babar, M.A.e.a.: Data quality for software vulnerability datasets. In: ICSE, pp. 121\u2013133 (2023)","DOI":"10.1109\/ICSE48619.2023.00022"},{"key":"590_CR14","unstructured":"CVE. (2025). https:\/\/cve.mitre.org\/"},{"key":"590_CR15","unstructured":"CWE. (2025). https:\/\/cwe.mitre.org\/"},{"key":"590_CR16","doi-asserted-by":"publisher","unstructured":"Das, S., Fabiha, S.T., Shafiq, S., Medvidovi\u0107, N.: Are we learning the right features? a framework for evaluating dl-based software vulnerability detection solutions. In: Proceedings of the IEEE\/ACM 47th International Conference on Software Engineering. ICSE \u201925, pp. 2893\u2013290 (2025). https:\/\/doi.org\/10.1109\/ICSE55347.2025.00194","DOI":"10.1109\/ICSE55347.2025.00194"},{"key":"590_CR17","doi-asserted-by":"publisher","unstructured":"Ding, Y., Fu, Y., Ibrahim, O., Sitawarin, C., Chen, X., Alomair, B., Wagner, D., Ray, B., Chen, Y.: Vulnerability Detection with Code Language Models: How Far Are We? . In: ICSE, CA, USA, pp. 469\u2013481 (2025). https:\/\/doi.org\/10.1109\/ICSE55347.2025.00038","DOI":"10.1109\/ICSE55347.2025.00038"},{"key":"590_CR18","doi-asserted-by":"crossref","unstructured":"Ding, Y., Suneja, S., Zheng, Y., Laredo, J., Morari, A., Kaiser, G., Ray, B.: Velvet: a novel ensemble learning approach to automatically locate vulnerable statements. In: SANER, pp. 959\u2013970 (2022)","DOI":"10.1109\/SANER53432.2022.00114"},{"key":"590_CR19","doi-asserted-by":"crossref","unstructured":"Dolan-Gavitt, B., Hulin, P., Kirda, E., Leek, T.e.a.: Lava: Large-scale automated vulnerability addition. In: S&P, pp. 110\u2013121 (2016)","DOI":"10.1109\/SP.2016.15"},{"key":"590_CR20","unstructured":"Elsayed, G.F., Goodfellow, I., Sohl-Dickstein, J.: Adversarial reprogramming of neural networks (2018)"},{"key":"590_CR21","doi-asserted-by":"crossref","unstructured":"Feng, Z., Guo, D., Tang, D., Duan, N., Feng, X., Gong, M., Shou, L., et al.: Codebert: A pre-trained model for programming and natural languages. arXiv (2020)","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"590_CR22","doi-asserted-by":"crossref","unstructured":"Fu, M., Tantithamthavorn, C.: Linevul: A transformer-based line-level vulnerability prediction. In: 19th Int. Conf. on Mining Software Repositories, pp. 608\u2013620 (2022)","DOI":"10.1145\/3524842.3528452"},{"key":"590_CR23","doi-asserted-by":"publisher","unstructured":"Gao, S., Mao, W., Gao, C., Li, L., Hu, X., Xia, X., Lyu, M.R.: Learning in the wild: Towards leveraging unlabeled data for effectively tuning pre-trained code models. In: ICSE (2024). https:\/\/doi.org\/10.1145\/3597503.3639216","DOI":"10.1145\/3597503.3639216"},{"key":"590_CR24","doi-asserted-by":"crossref","unstructured":"Guo, D., Lu, S., Duan, N., Wang, Y., Zhou, M., Yin, J.: UniXcoder: Unified cross-modal pre-training for code representation. In: ACL, pp. 7212\u20137225 (2022)","DOI":"10.18653\/v1\/2022.acl-long.499"},{"key":"590_CR25","doi-asserted-by":"crossref","unstructured":"Guo, Y., Patsakis, C., Hu, Q., Tang, Q., Casino, F.: Outside the comfort zone: Analysing llm capabilities in software vulnerability detection. In: European Symposium on Research in Computer Security, pp. 271\u2013289. Springer (2024)","DOI":"10.1007\/978-3-031-70879-4_14"},{"key":"590_CR26","unstructured":"Guo, D., Ren, S., Lu, S., et al.: Graphcodebert: Pre-training code representations with data flow. arXiv (2020)"},{"key":"590_CR27","doi-asserted-by":"crossref","unstructured":"Hanif, H., Maffeis, S.: Vulberta: Simplified source code pre-training for vulnerability detection. In: IJCNN, pp. 1\u20138. IEEE (2022)","DOI":"10.1109\/IJCNN55064.2022.9892280"},{"key":"590_CR28","doi-asserted-by":"publisher","unstructured":"Hin, D., Kan, A., Chen, H., Babar, M.A.: Linevd: statement-level vulnerability detection using graph neural networks. In: Proceedings of the 19th International Conference on Mining Software Repositories. MSR \u201922, pp. 596\u2013607. Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3524842.3527949","DOI":"10.1145\/3524842.3527949"},{"issue":"1","key":"590_CR29","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/s10515-024-00484-3","volume":"32","author":"X Jia","year":"2025","unstructured":"Jia, X., Du, J., Fang, M., Liu, H., Li, Y., Jiang, F.: Vulnerability detection with graph enhancement and global dependency representation learning. Autom. Softw. Eng. 32(1), 14 (2025). https:\/\/doi.org\/10.1007\/s10515-024-00484-3","journal-title":"Autom. Softw. Eng."},{"key":"590_CR30","doi-asserted-by":"crossref","unstructured":"Lester, B., Al-Rfou, R., Constant, N.: The power of scale for parameter-efficient prompt tuning. In: EMNLP, pp. 3045\u20133059 (2021)","DOI":"10.18653\/v1\/2021.emnlp-main.243"},{"key":"590_CR31","doi-asserted-by":"crossref","unstructured":"Li, Q., Chen, L., Jing, S., Wu, D.: Knowledge distillation on cross-modal adversarial reprogramming for data-limited attribute inference. In: WWW, pp. 65\u201368 (2023)","DOI":"10.1145\/3543873.3587313"},{"key":"590_CR32","doi-asserted-by":"crossref","unstructured":"Li, X.L., Liang, P.: Prefix-tuning: Optimizing continuous prompts for generation. In: ACL-IJCNLP, pp. 4582\u20134597 (2021)","DOI":"10.18653\/v1\/2021.acl-long.353"},{"key":"590_CR33","unstructured":"Li, Z., Tang, J., Zou, D., Chen, Q., Xu, S., Zhang, C., Li, Y., Jin, H.: Towards making deep learning-based vulnerability detectors robust. arXiv (2021a)"},{"key":"590_CR34","doi-asserted-by":"crossref","unstructured":"Li, Y., Wang, S., Nguyen, T.N.: Vulnerability detection with fine-grained interpretations. In: ESEC\/FSE, pp. 292\u2013303 (2021b)","DOI":"10.1145\/3468264.3468597"},{"key":"590_CR35","unstructured":"Li, Y., Zemel, R., Brockschmidt, M., Tarlow, D.: Gated graph sequence neural networks. In: Proceedings of ICLR\u201916 (2016)"},{"key":"590_CR36","doi-asserted-by":"crossref","unstructured":"Li, Z., Zou, D., Xu, S., Jin, H., Zhu, Y., Chen, Z.: Sysevr: A framework for using deep learning to detect software vulnerabilities. TDSC, 2244\u20132258 (2021c)","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"590_CR37","doi-asserted-by":"crossref","unstructured":"Li, Z., Zou, D., Xu, S., Ou, X., Jin, H., Wang, S., Deng, Z., Zhong, Y.: Vuldeepecker: A deep learning-based system for vulnerability detection. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23158"},{"key":"590_CR38","unstructured":"Liu, Y., Ott, M., Goyal, N., Du, J., Joshi, M., Chen, D., Levy, O., et al.: Roberta: A robustly optimized bert pretraining approach. arXiv (2019)"},{"key":"590_CR39","doi-asserted-by":"publisher","unstructured":"Lu, G., Ju, X., Chen, X., Pei, W., Cai, Z.: Grace: Empowering llm-based software vulnerability detection with graph structure and in-context learning. J. Syst. Softw. 212(C) (2024). https:\/\/doi.org\/10.1016\/j.jss.2024.112031","DOI":"10.1016\/j.jss.2024.112031"},{"key":"590_CR40","unstructured":"Mao, C., Zhong, Z., Yang, J., Vondrick, C., Ray, B.: Metric learning for adversarial robustness. Adv. Neural Inf. Process. Syst. 32 (2019)"},{"key":"590_CR41","doi-asserted-by":"crossref","unstructured":"Neekhara, P., Hussain, S., Du, J., Dubnov, S., Koushanfar, F., McAuley, J.: Cross-modal adversarial reprogramming. In: WACV, pp. 2427\u20132435 (2022)","DOI":"10.1109\/WACV51458.2022.00295"},{"key":"590_CR42","doi-asserted-by":"crossref","unstructured":"Neekhara, P., Hussain, S., Dubnov, S., Koushanfar, F.: Adversarial reprogramming of text classification neural networks. In: EMNLP-IJCNLP, pp. 5216\u20135225 (2019)","DOI":"10.18653\/v1\/D19-1525"},{"key":"590_CR43","doi-asserted-by":"crossref","unstructured":"Niu, C., Li, C., Ng, V., Ge, J., Huang, L., Luo, B.: SPT-code: Sequence-to-sequence pre-training for learning source code representations. In: ICSE (2022)","DOI":"10.1145\/3510003.3510096"},{"key":"590_CR44","unstructured":"Nong, Y., Aldeen, M., Cheng, L., Hu, H., Chen, F., Cai, H.: Chain-of-Thought Prompting of Large Language Models for Discovering and Fixing Software Vulnerabilities (2024). https:\/\/arxiv.org\/abs\/2402.17230"},{"key":"590_CR45","doi-asserted-by":"crossref","unstructured":"Nong, Y., Fang, R., Yi, G.e.a.: VGX: Large-scale sample generation for boosting learning-based software vulnerability analyses. arXiv (2023a)","DOI":"10.1145\/3597503.3639116"},{"key":"590_CR46","doi-asserted-by":"crossref","unstructured":"Nong, Y., Ou, Y., Pradel, M., Chen, F., Cai, H.: Generating realistic vulnerabilities via neural code editing: an empirical study. In: FSE, pp. 1097\u20131109 (2022)","DOI":"10.1145\/3540250.3549128"},{"key":"590_CR47","doi-asserted-by":"crossref","unstructured":"Nong, Y., Ou, Y., Pradel, M., Chen, F., Cai, H.: VULGEN: Realistic vulnerability generation via pattern mining and deep learning. In: ICSE (2023b)","DOI":"10.1109\/ICSE48619.2023.00211"},{"key":"590_CR48","doi-asserted-by":"publisher","unstructured":"Rahman, M.M., Ceka, I., Mao, C., Chakraborty, S., Ray, B., Le, W.: Towards causal deep learning for vulnerability detection. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering. ICSE \u201924. Association for Computing Machinery, New York, NY, USA (2024). https:\/\/doi.org\/10.1145\/3597503.3639170","DOI":"10.1145\/3597503.3639170"},{"issue":"1","key":"590_CR49","doi-asserted-by":"publisher","first-page":"6086","DOI":"10.1038\/s41598-024-56706-x","volume":"14","author":"O Rainio","year":"2024","unstructured":"Rainio, O., Teuho, J., Klen, R.: Evaluation metrics and statistical tests for machine learning. Sci. Rep. 14(1), 6086 (2024). https:\/\/doi.org\/10.1038\/s41598-024-56706-x","journal-title":"Sci. Rep."},{"issue":"2","key":"590_CR50","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/s10515-024-00438-9","volume":"31","author":"Z Ren","year":"2024","unstructured":"Ren, Z., Ju, X., Chen, X., Shen, H.: Prorlearn: boosting prompt tuning-based vulnerability detection by reinforcement learning. Autom. Softw. Eng. 31(2), 38 (2024). https:\/\/doi.org\/10.1007\/s10515-024-00438-9","journal-title":"Autom. Softw. Eng."},{"key":"590_CR51","doi-asserted-by":"publisher","unstructured":"Risse, N., Liu, J., B\u00f6hme, M.: Top score on the wrong exam: On benchmarking in machine learning for vulnerability detection. Proc. ACM Softw. Eng. 2(ISSTA) (2025). https:\/\/doi.org\/10.1145\/3728887","DOI":"10.1145\/3728887"},{"key":"590_CR52","doi-asserted-by":"crossref","unstructured":"Russell, R., Kim, L., Hamilton, L., Lazovich, T., Harer, J., Ozdemir, O., Ellingwood, P., McConley, M.: Automated vulnerability detection in source code using deep representation learning. In: ICMLA, pp. 757\u2013762 (2018)","DOI":"10.1109\/ICMLA.2018.00120"},{"issue":"11","key":"590_CR53","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1109\/78.650093","volume":"45","author":"M Schuster","year":"1997","unstructured":"Schuster, M., Paliwal, K.K.: Bidirectional recurrent neural networks. IEEE Trans. Signal Process. 45(11), 2673\u20132681 (1997)","journal-title":"IEEE Trans. Signal Process."},{"key":"590_CR54","doi-asserted-by":"publisher","first-page":"104350","DOI":"10.1016\/j.cose.2025.104350","volume":"151","author":"M Shao","year":"2025","unstructured":"Shao, M., Ding, Y., Cao, J., Li, Y.: Graphfvd: Property graph-based fine-grained vulnerability detection. Comput. Secur. 151, 104350 (2025)","journal-title":"Comput. Secur."},{"key":"590_CR55","doi-asserted-by":"crossref","unstructured":"Steenhoek, B., Rahman, M.M., Jiles, R., Le, W.: An empirical study of deep learning models for vulnerability detection. In: ICSE, pp. 2237\u20132248 (2023)","DOI":"10.1109\/ICSE48619.2023.00188"},{"key":"590_CR56","unstructured":"Steenhoek, B., Rahman, M.M., Roy, M.K., Alam, M.S., Barr, E.T.: A Comprehensive Study of the Capabilities of Large Language Models for Vulnerability Detection (2024). https:\/\/arxiv.org\/abs\/2403.17218"},{"key":"590_CR57","doi-asserted-by":"crossref","unstructured":"Tang, Z., Hu, Q., Hu, Y., Kuang, W., Chen, J.: Sevuldet: A semantics-enhanced learnable vulnerability detector. In: DSN, pp. 150\u2013162 (2022)","DOI":"10.1109\/DSN53405.2022.00026"},{"key":"590_CR58","doi-asserted-by":"publisher","unstructured":"Tian, Z., Li, H., Sun, H., Chen, Y., Chen, L.: Hardvd: High-capacity cross-modal adversarial reprogramming for data-efficient vulnerability detection. Inf. Sci. 686(C) (2025). https:\/\/doi.org\/10.1016\/j.ins.2024.121370","DOI":"10.1016\/j.ins.2024.121370"},{"key":"590_CR59","first-page":"121865","volume":"238","author":"Z Tian","year":"2024","unstructured":"Tian, Z., Tian, B., Lv, J., Chen, Y., Chen, L.: Enhancing vulnerability detection via ast decomposition and neural sub-tree encoding. ESWA 238, 121865 (2024)","journal-title":"ESWA"},{"key":"590_CR60","doi-asserted-by":"publisher","first-page":"112365","DOI":"10.1016\/j.jss.2025.112365","volume":"223","author":"Z Tian","year":"2025","unstructured":"Tian, Z., Qiu, R., Teng, Y., Sun, J., Chen, Y., Chen, L.: Towards cost-efficient vulnerability detection with cross-modal adversarial reprogramming. J. Syst. Softw. 223, 112365 (2025). https:\/\/doi.org\/10.1016\/j.jss.2025.112365","journal-title":"J. Syst. Softw."},{"key":"590_CR61","unstructured":"Tree-sitter. (2025). https:\/\/tree-sitter.github.io\/tree-sitter\/"},{"key":"590_CR62","unstructured":"Tsai, Y.-Y., Chen, P.-Y., Ho, T.-Y.: Transfer learning without knowing: Reprogramming black-box machine learning models with scarce data and limited resources. In: ICML, pp. 9614\u20139624 (2020)"},{"key":"590_CR63","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141., Polosukhin, I.: Attention is all you need. NeurIPS 30 (2017)"},{"key":"590_CR64","doi-asserted-by":"crossref","unstructured":"Wang, W., Nguyen, T.N., Wang, S., Li, Y., Zhang, J., Yadavally, A.: Deepvd: Toward class-separation features for neural network vulnerability detection. In: ICSE, pp. 2249\u20132261 (2023)","DOI":"10.1109\/ICSE48619.2023.00189"},{"key":"590_CR65","doi-asserted-by":"crossref","unstructured":"Wen, X.-C., Chen, Y., Gao, C., Zhang, H., Zhang, J.M.: Vulnerability detection with graph simplification and enhanced graph representation learning. In: ICSE, pp. 2275\u20132286 (2023)","DOI":"10.1109\/ICSE48619.2023.00191"},{"key":"590_CR66","doi-asserted-by":"publisher","unstructured":"Wen, X.-C., Gao, C., Gao, S., Xiao, Y., Lyu, M.R.: Scale: Constructing structured natural language comment trees for software vulnerability detection. In: 33rd Int. Sym. on Sof. Testing and Analysis. ISSTA 2024, pp. 235\u2013247. New York, NY, USA (2024a). https:\/\/doi.org\/10.1145\/3650212.3652124","DOI":"10.1145\/3650212.3652124"},{"issue":"6","key":"590_CR67","doi-asserted-by":"publisher","first-page":"1325","DOI":"10.1109\/TSE.2024.3382361","volume":"50","author":"X-C Wen","year":"2024","unstructured":"Wen, X.-C., Gao, C., Luo, F., Wang, H., Li, G., Liao, Q.: Livable: Exploring long-tailed classification of software vulnerability types. IEEE Trans. Software Eng. 50(6), 1325\u20131339 (2024b). https:\/\/doi.org\/10.1109\/TSE.2024.3382361","journal-title":"IEEE Trans. Software Eng."},{"key":"590_CR68","doi-asserted-by":"crossref","unstructured":"Wu, T., Chen, L., Du, G., Meng, D., Shi, G.: Ultravcs: Ultra-fine-grained variable-based code slicing for automated vulnerability detection. TIFS, 1\u20131 (2024)","DOI":"10.1109\/TIFS.2024.3374219"},{"key":"590_CR69","doi-asserted-by":"crossref","unstructured":"Wu, Y., Zou, D., Dou, S., Yang, W., Xu, D., Jin, H.: Vulcnn: An image-inspired scalable vulnerability detection system. In: ICSE, pp. 2365\u20132376 (2022)","DOI":"10.1145\/3510003.3510229"},{"key":"590_CR70","doi-asserted-by":"crossref","unstructured":"Yang, X., Wang, S., Li, Y., Wang, S.: Does data sampling improve deep learning-based vulnerability detection? yeas! and nays! In: ICSE, pp. 2287\u20132298 (2023)","DOI":"10.1109\/ICSE48619.2023.00192"},{"key":"590_CR71","first-page":"1","volume":"4","author":"N Yefet","year":"2020","unstructured":"Yefet, N., Alon, U., Yahav, E.: Adversarial examples for models of code. OOPSLA 4, 1\u201330 (2020)","journal-title":"OOPSLA"},{"issue":"11","key":"590_CR72","doi-asserted-by":"publisher","first-page":"3071","DOI":"10.1109\/TSE.2024.3470333","volume":"50","author":"X Yin","year":"2024","unstructured":"Yin, X., Ni, C., Wang, S.: Multitask-based evaluation of open-source llm on software vulnerability. IEEE Trans. Softw. Eng. 50(11), 3071\u20133087 (2024). https:\/\/doi.org\/10.1109\/TSE.2024.3470333","journal-title":"IEEE Trans. Softw. Eng."},{"key":"590_CR73","doi-asserted-by":"publisher","unstructured":"Yu, X., Li, Z., Huang, X., Zhao, S.: Advulcode: Generating adversarial vulnerable code against deep learning-based vulnerability detectors. Electronics 12(4) (2023). https:\/\/doi.org\/10.3390\/electronics12040936","DOI":"10.3390\/electronics12040936"},{"key":"590_CR74","doi-asserted-by":"crossref","unstructured":"Zhang, H., Li, Z., Li, G., Ma, L., Liu, Y., Jin, Z.: Generating adversarial examples for holding robustness of source code processing models. In: AAAI, vol. 34, pp. 1169\u20131176 (2020)","DOI":"10.1609\/aaai.v34i01.5469"},{"issue":"8","key":"590_CR75","doi-asserted-by":"publisher","first-page":"4196","DOI":"10.1109\/TSE.2023.3286586","volume":"49","author":"J Zhang","year":"2023","unstructured":"Zhang, J., Liu, Z., Hu, X., Xia, X., Li, S.: Vulnerability detection by learning from syntax-based execution paths of code. IEEE Trans. Softw. Eng. 49(8), 4196\u20134212 (2023). https:\/\/doi.org\/10.1109\/TSE.2023.3286586","journal-title":"IEEE Trans. Softw. Eng."},{"key":"590_CR76","doi-asserted-by":"publisher","first-page":"103992","DOI":"10.1016\/j.cose.2024.103992","volume":"144","author":"T Zheng","year":"2024","unstructured":"Zheng, T., Liu, H., Xu, H., Chen, X., Yi, P., Wu, Y.: Few-vuld: A few-shot learning framework for software vulnerability detection. Comput. Secur. 144, 103992 (2024). https:\/\/doi.org\/10.1016\/j.cose.2024.103992","journal-title":"Comput. Secur."},{"key":"590_CR77","unstructured":"Zhou, Y., Liu, S., Siow, J., Du, X., Liu, Y.: Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks. NeurIPS 32 (2019)"},{"key":"590_CR78","doi-asserted-by":"publisher","DOI":"10.1145\/3708522","author":"X Zhou","year":"2024","unstructured":"Zhou, X., Cao, S., Sun, X., Lo, D.: Large language model for vulnerability detection and repair: Literature review and the road ahead. ACM Trans. Softw. Eng. Methodol. (2024). https:\/\/doi.org\/10.1145\/3708522","journal-title":"ACM Trans. Softw. Eng. Methodol."}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-026-00590-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-026-00590-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-026-00590-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T01:57:47Z","timestamp":1768787867000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-026-00590-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,19]]},"references-count":78,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,12]]}},"alternative-id":["590"],"URL":"https:\/\/doi.org\/10.1007\/s10515-026-00590-4","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,19]]},"assertion":[{"value":"26 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"47"}}