{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T06:31:15Z","timestamp":1768804275895,"version":"3.49.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T00:00:00Z","timestamp":1756857600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T00:00:00Z","timestamp":1756857600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10586-025-05506-7","type":"journal-article","created":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T14:17:19Z","timestamp":1756909039000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["GTVD: a multi-level aggregation vulnerability detection method based on full-dependency program graph"],"prefix":"10.1007","volume":"28","author":[{"given":"Haitao","family":"He","sequence":"first","affiliation":[]},{"given":"Shibo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuxiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,3]]},"reference":[{"issue":"3","key":"5506_CR1","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/JAS.2021.1004261","volume":"9","author":"J Zhang","year":"2021","unstructured":"Zhang, J., Pan, L., Han, Q.L., et al.: Deep learning based attack detection for cyber-physical system cybersecurity: a survey. IEEE\/CAA J. Autom. Sin. 9(3), 377\u2013391 (2021)","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"5506_CR2","doi-asserted-by":"crossref","unstructured":"Lipp, S., Banescu, S., Pretschner, A.: An empirical study on the effectiveness of static C code analyzers for vulnerability detection. In: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 544\u2013555 (2022)","DOI":"10.1145\/3533767.3534380"},{"issue":"10","key":"5506_CR3","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/JPROC.2020.2993293","volume":"108","author":"G Lin","year":"2020","unstructured":"Lin, G., Wen, S., Han, Q.L., et al.: Software vulnerability detection using deep neural networks: a survey. Proc. IEEE 108(10), 1825\u20131848 (2020)","journal-title":"Proc. IEEE"},{"key":"5506_CR4","doi-asserted-by":"publisher","first-page":"197158","DOI":"10.1109\/ACCESS.2020.3034766","volume":"8","author":"P Zeng","year":"2020","unstructured":"Zeng, P., Lin, G., Pan, L., et al.: Software vulnerability analysis and discovery using deep learning techniques: a survey. IEEE Access 8, 197158\u2013197172 (2020)","journal-title":"IEEE Access"},{"key":"5506_CR5","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1109\/TIFS.2020.3044773","volume":"16","author":"H Wang","year":"2020","unstructured":"Wang, H., Ye, G., Tang, Z., et al.: Combining graph-based learning with automated data collection for code vulnerability detection. IEEE Trans. Inf. Forensics Secur. 16, 1943\u20131958 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5506_CR6","doi-asserted-by":"crossref","unstructured":"Bui, V.C., Do, X.C.: Detecting software vulnerabilities based on source code analysis using GCN transformer. In: 2023 RIVF International Conference on Computing and Communication Technologies (RIVF), pp. 112\u2013117. IEEE (2023)","DOI":"10.1109\/RIVF60135.2023.10471834"},{"key":"5506_CR7","doi-asserted-by":"crossref","unstructured":"Li, Z., Zou, D., Xu, S., et al.: Vuldeepecker: a deep learning-based system for vulnerability detection (2018). arXiv preprint arXiv:1801.01681","DOI":"10.14722\/ndss.2018.23158"},{"issue":"7","key":"5506_CR8","first-page":"1329","volume":"28","author":"S Liu","year":"2019","unstructured":"Liu, S., Lin, G., Han, Q.L., et al.: DeepBalance: deep-learning and fuzzy oversampling for vulnerability detection. IEEE Trans. Fuzzy Syst. 28(7), 1329\u20131343 (2019)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"5506_CR9","doi-asserted-by":"crossref","unstructured":"Russell, R., Kim, L., Hamilton, L., et al.: Automated vulnerability detection in source code using deep representation learning. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 757-762. IEEE (2018)","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"5506_CR10","doi-asserted-by":"publisher","first-page":"80079","DOI":"10.1109\/ACCESS.2019.2923227","volume":"7","author":"R Li","year":"2019","unstructured":"Li, R., Feng, C., Zhang, X., et al.: A lightweight assisted vulnerability discovery method using deep neural networks. IEEE Access 7, 80079\u201380092 (2019)","journal-title":"IEEE Access"},{"key":"5506_CR11","doi-asserted-by":"crossref","unstructured":"Duan, X., Wu, J., Ji, S., et al.: VulSniper: focus your attention to shoot fine-grained vulnerabilities. In: IJCAI, pp. 4665\u20134671 (2019)","DOI":"10.24963\/ijcai.2019\/648"},{"key":"5506_CR12","doi-asserted-by":"crossref","unstructured":"Hin, D., Kan, A., Chen, H., et al.: LineVD: statement-level vulnerability detection using graph neural networks. In: Proceedings of the 19th International Conference on Mining Software Repositories, pp. 596\u2013607 (2022)","DOI":"10.1145\/3524842.3527949"},{"issue":"3","key":"5506_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3436877","volume":"30","author":"X Cheng","year":"2021","unstructured":"Cheng, X., Wang, H., Hua, J., et al.: Deepwukong: statically detecting software vulnerabilities using deep graph neural network. ACM Trans. Softw. Eng. Methodol. (TOSEM) 30(3), 1\u201333 (2021)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"5506_CR14","doi-asserted-by":"publisher","first-page":"102286","DOI":"10.1016\/j.cose.2021.102286","volume":"108","author":"H Yan","year":"2021","unstructured":"Yan, H., Luo, S., Pan, L., et al.: HAN-BSVD: a hierarchical attention network for binary software vulnerability detection. Comput. Secur. 108, 102286 (2021)","journal-title":"Comput. Secur."},{"key":"5506_CR15","doi-asserted-by":"crossref","unstructured":"Steenhoek, B., Gao, H., Le, W.: Dataflow analysis-inspired deep learning for efficient vulnerability detection. In: Proceedings of the 46th IEEE\/ACM International Conference on Software Engineering, pp. 1\u201313 (2024)","DOI":"10.1145\/3597503.3623345"},{"key":"5506_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3199769","author":"D Zou","year":"2022","unstructured":"Zou, D., Hu, Y., Li, W., et al.: mvulpreter: a multi-granularity vulnerability detection system with interpretations. IEEE Trans. Dependable Secure Comput. (2022). https:\/\/doi.org\/10.1109\/TDSC.2022.3199769","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5506_CR17","doi-asserted-by":"publisher","first-page":"74562","DOI":"10.1109\/ACCESS.2020.2988557","volume":"8","author":"M Zagane","year":"2020","unstructured":"Zagane, M., Abdi, M.K., Alenezi, M.: Deep learning for software vulnerabilities detection using code metrics. IEEE Access 8, 74562\u201374570 (2020)","journal-title":"IEEE Access"},{"key":"5506_CR18","doi-asserted-by":"crossref","unstructured":"Wu, Y., Zou, D., Dou, S., et al.: Vulcnn: an image-inspired scalable vulnerability detection system. In: Proceedings of the 44th International Conference on Software Engineering, pp. 2365\u20132376 (2022)","DOI":"10.1145\/3510003.3510229"},{"issue":"5","key":"5506_CR19","doi-asserted-by":"publisher","first-page":"2469","DOI":"10.1109\/TDSC.2019.2954088","volume":"18","author":"G Lin","year":"2019","unstructured":"Lin, G., Zhang, J., Luo, W., et al.: Software vulnerability discovery via learning multi-domain knowledge bases. IEEE Trans. Dependable Secure Comput. 18(5), 2469\u20132485 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"8","key":"5506_CR20","doi-asserted-by":"publisher","first-page":"4152","DOI":"10.1109\/TSE.2023.3285910","volume":"49","author":"C Zhang","year":"2023","unstructured":"Zhang, C., Liu, B., Xin, Y., et al.: CPVD: Cross project vulnerability detection based on graph attention network and domain adaptation. IEEE Trans. Softw. Eng. 49(8), 4152\u20134168 (2023)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5506_CR21","doi-asserted-by":"crossref","unstructured":"Cheng, X., Zhang, G., Wang, H., et al.: Path-sensitive code embedding via contrastive learning for software vulnerability detection. In: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 519\u2013531 (2022)","DOI":"10.1145\/3533767.3534371"},{"issue":"7","key":"5506_CR22","doi-asserted-by":"publisher","first-page":"3201","DOI":"10.3390\/app11073201","volume":"11","author":"X Li","year":"2021","unstructured":"Li, X., Wang, L., Xin, Y., et al.: Automated software vulnerability detection based on hybrid neural network. Appl. Sci. 11(7), 3201 (2021)","journal-title":"Appl. Sci."},{"key":"5506_CR23","unstructured":"Mathews, N.S., Brus, Y., Aafer, Y., et al.: Llbezpeky: leveraging large language models for vulnerability detection (2024). arXiv preprint arXiv:2401.01269"},{"key":"5506_CR24","unstructured":"Sun, Y., Wu, D., Xue, Y., et al.: LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning (2024). arXiv preprint arXiv:2401.16185"},{"key":"5506_CR25","doi-asserted-by":"crossref","unstructured":"Mao, Z., Li, J., Li, M., et al.: Multi-role Consensus through LLMs Discussions for Vulnerability Detection (2024). arXiv preprint arXiv:2403.14274","DOI":"10.1109\/QRS-C63300.2024.00173"},{"key":"5506_CR26","unstructured":"Steenhoek, B., Rahman, M.M., Roy, M.K., et al.: A Comprehensive Study of the Capabilities of Large Language Models for Vulnerability Detection (2024). arXiv preprint arXiv:2403.17218"},{"key":"5506_CR27","doi-asserted-by":"crossref","unstructured":"Zhou, X., Zhang, T., Lo, D.: Large language model for vulnerability detection: emerging results and future directions. In: Proceedings of the 2024 ACM\/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results, pp. 47\u201351 (2024)","DOI":"10.1145\/3639476.3639762"},{"key":"5506_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, C., Liu, H., Zeng, J., et al.: Prompt-enhanced software vulnerability detection using chatgpt. In: Proceedings of the 2024 IEEE\/ACM 46th International Conference on Software Engineering: Companion Proceedings, pp. 276\u2013277 (2024)","DOI":"10.1145\/3639478.3643065"},{"key":"5506_CR29","doi-asserted-by":"crossref","unstructured":"Feng, X., Liu, H., Wang, L., et al.: An Interpretable Model for Large-Scale Smart Contract Vulnerability Detection. Blockchain: Research and Applications, p. 100209 (2024)","DOI":"10.1016\/j.bcra.2024.100209"},{"key":"5506_CR30","doi-asserted-by":"publisher","first-page":"112031","DOI":"10.1016\/j.jss.2024.112031","volume":"212","author":"G Lu","year":"2024","unstructured":"Lu, G., Ju, X., Chen, X., et al.: GRACE: empowering LLM-based software vulnerability detection with graph structure and in-context learning. J. Syst. Softw. 212, 112031 (2024)","journal-title":"J. Syst. Softw."},{"key":"5506_CR31","unstructured":"Mikolov, T.: Efficient estimation of word representations in vector space, p. 3781 (2013). arXiv preprint arXiv:1301.3781"},{"key":"5506_CR32","unstructured":"Zhou, Y., Liu, S., Siow, J., et al.: Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks. In: Advances in neural information processing systems, p. 32 (2019)"},{"key":"5506_CR33","doi-asserted-by":"crossref","unstructured":"Fan, J., Li, Y., Wang, S., et al.: AC\/C++ code vulnerability dataset with code changes and CVE summaries. In: Proceedings of the 17th International Conference on Mining Software Repositories, pp. 508\u2013512 (2020)","DOI":"10.1145\/3379597.3387501"},{"issue":"9","key":"5506_CR34","doi-asserted-by":"publisher","first-page":"3280","DOI":"10.1109\/TSE.2021.3087402","volume":"48","author":"S Chakraborty","year":"2021","unstructured":"Chakraborty, S., Krishna, R., Ding, Y., et al.: Deep learning based vulnerability detection: are we there yet? IEEE Trans. Softw. Eng. 48(9), 3280\u20133296 (2021)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"4","key":"5506_CR35","doi-asserted-by":"publisher","first-page":"2244","DOI":"10.1109\/TDSC.2021.3051525","volume":"19","author":"Z Li","year":"2021","unstructured":"Li, Z., Zou, D., Xu, S., et al.: Sysevr: a framework for using deep learning to detect software vulnerabilities. IEEE Trans. Dependable Secure Comput. 19(4), 2244\u20132258 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5506_CR36","doi-asserted-by":"crossref","unstructured":"Li, Y., Wang, S., Nguyen, T.N.: Vulnerability detection with fine-grained interpretations. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 292\u2013303 (2021)","DOI":"10.1145\/3468264.3468597"},{"issue":"12","key":"5506_CR37","doi-asserted-by":"publisher","first-page":"15204","DOI":"10.1007\/s10489-022-04214-8","volume":"53","author":"X Lv","year":"2023","unstructured":"Lv, X., Peng, T., Chen, J., et al.: BovdGFE: buffer overflow vulnerability detection based on graph feature extraction. Appl. Intell. 53(12), 15204\u201315221 (2023)","journal-title":"Appl. Intell."},{"key":"5506_CR38","doi-asserted-by":"crossref","unstructured":"Wen, X.C., Chen, Y., Gao, C., et al.: Vulnerability detection with graph simplification and enhanced graph representation learning. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE), pp. 2275\u20132286. IEEE (2023)","DOI":"10.1109\/ICSE48619.2023.00191"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05506-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05506-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05506-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T09:35:47Z","timestamp":1759743347000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05506-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,3]]},"references-count":38,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["5506"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05506-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,3]]},"assertion":[{"value":"10 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"656"}}