{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:11:44Z","timestamp":1764238304201,"version":"3.46.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Research on digital twin collaboration technology for dynamic assembly of human-computer collaboration","award":["2024Z296"],"award-info":[{"award-number":["2024Z296"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s10586-025-05557-w","type":"journal-article","created":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T20:01:28Z","timestamp":1759176088000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LLM-based program analysis for source codes, abstract syntax trees and webassembly instructions"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-3771-7114","authenticated-orcid":false,"given":"Liangjun","family":"Deng","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qi","family":"Zhong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yao","family":"Qiu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jingxue","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hang","family":"Lei","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shunkun","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Liming","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hongyuan","family":"Cheng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,9,29]]},"reference":[{"key":"5557_CR1","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.compag.2018.02.016","volume":"147","author":"A Kamilaris","year":"2018","unstructured":"Kamilaris, A., Prenafeta-Bold\u00b4u, F.X.: Deep learning in agriculture: A survey. Comput. Electron. Agric. 147, 70\u201390 (2018)","journal-title":"Comput. Electron. Agric."},{"key":"5557_CR2","doi-asserted-by":"publisher","first-page":"102914","DOI":"10.1016\/j.cose.2022.102914","volume":"123","author":"AO Bang","year":"2022","unstructured":"Bang, A.O., Rao, U.P., Visconti, A., Brighente, A., Conti, M.: An Iot inventory before deployment: A survey on Iot protocols, communication technologies, vulnerabilities, attacks, and future research directions. Computers Secur. 123, 102914 (2022)","journal-title":"Computers Secur."},{"key":"5557_CR3","doi-asserted-by":"crossref","unstructured":"Wang, J., Wang, Y., Song, J., Cheng, H.: IoV vulnerability classification algorithm based on knowledge graph. Electronics;12(23). (2023)","DOI":"10.3390\/electronics12234749"},{"issue":"12","key":"5557_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3679013","volume":"56","author":"J Chen","year":"2024","unstructured":"Chen, J., Yan, H., Liu, Z., Zhang, M., Xiong, H., Yu, S.: When federated learning Meets privacy-preserving computation. ACM Comput. Surveys. 56(12), 1\u201336 (2024)","journal-title":"ACM Comput. Surveys"},{"key":"5557_CR5","doi-asserted-by":"publisher","first-page":"111909","DOI":"10.1016\/j.knosys.2024.111909","volume":"296","author":"W Ke","year":"2024","unstructured":"Ke, W., Zheng, D., Li, X., He, Y., Li, T., Min, F.: Improving the transferability of adversarial examples through neighborhood attribution. Knowl. Based Syst. 296, 111909 (2024)","journal-title":"Knowl. Based Syst."},{"issue":"3","key":"5557_CR6","doi-asserted-by":"publisher","first-page":"4922","DOI":"10.1109\/JSYST.2023.3264773","volume":"17","author":"H Cheng","year":"2023","unstructured":"Cheng, H., Zhang, X., Yang, J., Liu, Y., PPRT: Privacy preserving and reliable trust-aware platoon recommendation scheme in IoV. IEEE Syst. J. 17(3), 4922\u20134933 (2023)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"5557_CR7","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/s10489-023-05171-6","volume":"54","author":"D Zheng","year":"2024","unstructured":"Zheng, D., Ke, W., Li, X., Zhang, S., Yin, G., Qian, W., et al.: Channel-augmented joint transformation for transferable adversarial attacks. Appl. Intell. 54(1), 428\u2013442 (2024)","journal-title":"Appl. Intell."},{"issue":"1","key":"5557_CR8","first-page":"90","volume":"9","author":"P Koopman","year":"2017","unstructured":"Koopman, P., Wagner, M.: Autonomous vehicle safety: An interdisciplinary challenge. IEEE Intell. Transp. Syst. Mag. 9(1), 90\u201396 (2017)","journal-title":"IEEE Intell. Transp. Syst. Mag."},{"key":"5557_CR9","doi-asserted-by":"crossref","unstructured":"Wan, L., Liu, Z., Ma, Y., Cheng, Y., Wu, Y., Li, R., et al.: Lightweight and Privacy-Preserving dual incentives for mobile crowdsensing. IEEE Trans. Cloud Comput. (2024)","DOI":"10.1109\/TCC.2024.3372598"},{"issue":"8","key":"5557_CR10","doi-asserted-by":"publisher","first-page":"3135","DOI":"10.1109\/TITS.2019.2926042","volume":"21","author":"J Guo","year":"2019","unstructured":"Guo, J., Kurup, U., Shah, M.: Is it safe to drive? An overview of factors, metrics, and datasets for driveability assessment in autonomous driving. IEEE Trans. Intell. Transp. Syst. 21(8), 3135\u20133151 (2019)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"5557_CR11","first-page":"100593","volume":"39","author":"J Chen","year":"2024","unstructured":"Chen, J., Wang, Z., Srivastava, G., Alghamdi, T.A., Khan, F., Kumari, S., et al.: Industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training. J. Industrial Inform. Integr. 39, 100593 (2024)","journal-title":"J. Industrial Inform. Integr."},{"issue":"6","key":"5557_CR12","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1109\/MWC.2018.1700364","volume":"25","author":"Q Luo","year":"2018","unstructured":"Luo, Q., Liu, J.: Wireless telematics systems in emerging intelligent and connected vehicles: Threats and solutions. IEEE Wirel. Commun. 25(6), 113\u2013119 (2018)","journal-title":"IEEE Wirel. Commun."},{"key":"5557_CR13","doi-asserted-by":"crossref","unstructured":"Koschuch, M., Sebron, W., Szalay, Z., T\u00a8or\u00a8ok, A., Tschi\u00a8urtz, H., Wahl, I.: Safety & security in the context of autonomous driving. In: 2019 IEEE International Conference on Connected Vehicles and Expo (ICCVE). IEEE; pp. 1\u20137. (2019)","DOI":"10.1109\/ICCVE45908.2019.8965092"},{"key":"5557_CR14","doi-asserted-by":"crossref","unstructured":"Sun, H., Huang, W., Weng, J., Liu, Z., Tan, W., He, Z., et al.: CCID-CAN: Cross-Chain intrusion detection on CAN bus for autonomous vehicles. IEEE Internet Things J. (2024)","DOI":"10.1109\/JIOT.2024.3393122"},{"key":"5557_CR15","doi-asserted-by":"publisher","first-page":"28291","DOI":"10.1109\/ACCESS.2019.2900462","volume":"7","author":"G Huang","year":"2019","unstructured":"Huang, G., Li, Y., Wang, Q., Ren, J., Cheng, Y., Zhao, X.: Automatic classification method for software vulnerability based on deep neural network. IEEE Access. 7, 28291\u201328298 (2019)","journal-title":"IEEE Access."},{"issue":"3","key":"5557_CR16","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.jss.2007.03.004","volume":"81","author":"G Frantzeskou","year":"2008","unstructured":"Frantzeskou, G., MacDonell, S., Stamatatos, E., Gritzalis, S.: Examining the significance of high-level programming features in source code author classification. J. Syst. Softw. 81(3), 447\u2013460 (2008)","journal-title":"J. Syst. Softw."},{"key":"5557_CR17","doi-asserted-by":"crossref","unstructured":"White, M., Tufano, M., Vendome, C., Poshyvanyk, D.: Deep learning code fragments for code clone detection. In: Proceedings of the 31st IEEE\/ACM international conference on automated software engineering; pp. 87\u201398. (2016)","DOI":"10.1145\/2970276.2970326"},{"key":"5557_CR18","doi-asserted-by":"crossref","unstructured":"Wei, H., Li, M.: Supervised Deep Features for Software Functional Clone Detection by Exploiting Lexical and Syntactical Information in Source Code, pp. 3034\u20133040. In: IJCAI (2017)","DOI":"10.24963\/ijcai.2017\/423"},{"key":"5557_CR19","doi-asserted-by":"crossref","unstructured":"Sajnani, H., Saini, V., Svajlenko, J., Roy, C.K., Lopes, C.V.: Sourcerercc: Scaling code clone detection to big-code. In: Proceedings of the 38th international conference on software engineering; pp. 1157\u20131168. (2016)","DOI":"10.1145\/2884781.2884877"},{"key":"5557_CR20","doi-asserted-by":"crossref","unstructured":"Feng, Z., Guo, D., Tang, D., Duan, N., Feng, X., Gong, M., et al.: Codebert: A pre-trained model for programming and natural languages. ArXiv Preprint arXiv:200208155. (2020)","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"5557_CR21","doi-asserted-by":"crossref","unstructured":"Mou, L., Men, R., Li, G., Xu, Y., Zhang, L., Yan, R., et al.: Natural Language inference by tree-based Convolution and heuristic matching. ArXiv Preprint arXiv:151208422. (2015)","DOI":"10.18653\/v1\/P16-2022"},{"key":"5557_CR22","doi-asserted-by":"crossref","unstructured":"Mou, L., Li, G., Zhang, L., Wang, T., Jin, Z.: Convolutional neural networks over tree structures for programming language processing. In: Proceedings of the AAAI conference on artificial intelligence. vol. 30; (2016)","DOI":"10.1609\/aaai.v30i1.10139"},{"key":"5557_CR23","unstructured":"Alon, U., Brody, S., Levy, O., Yahav, E.: code2seq: Generating sequences from structured representations of code. arXiv preprint arXiv:180801400. (2018)"},{"key":"5557_CR24","unstructured":"Zhang, D., Fu, Y., Zheng, Z.: UAST: Uncertainty-aware siamese tracking. In: International Conference on Machine Learning. PMLR; pp. 26161\u201326175. (2022)"},{"issue":"8","key":"5557_CR25","doi-asserted-by":"publisher","first-page":"8895","DOI":"10.1007\/s10489-021-02894-2","volume":"52","author":"W Hua","year":"2022","unstructured":"Hua, W., Liu, G.: Transformer-based networks over tree structures for code classification. Appl. Intell. 52(8), 8895\u20138909 (2022)","journal-title":"Appl. Intell."},{"key":"5557_CR26","doi-asserted-by":"crossref","unstructured":"Liu, X., Zheng, Y., Du, Z., Ding, M., Qian, Y., Yang, Z., et al.: GPT understands, too. AI Open. (2023)","DOI":"10.1016\/j.aiopen.2023.08.012"},{"key":"5557_CR27","doi-asserted-by":"crossref","unstructured":"Yenduri, G., Ramalingam, M., Selvi, G.C., Supriya, Y., Srivastava, G., Maddikunta, P.K.R., et al.: Gpt (generative pre-trained transformer)\u2013a comprehensive review on enabling technologies, potential applications, emerging challenges, and future directions. IEEE Access. (2024)","DOI":"10.1109\/ACCESS.2024.3389497"},{"key":"5557_CR28","unstructured":"Achiam, J., Adler, S., Agarwal, S., Ahmad, L., Akkaya, I., Aleman, F.L., et al.: Gpt-4 technical report. arXiv preprint arXiv:230308774. (2023)"},{"key":"5557_CR29","doi-asserted-by":"crossref","unstructured":"Nam, D., Macvean, A., Hellendoorn, V., Vasilescu, B., Myers, B.: Using an llm to help with code understanding. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering; pp. 1\u201313. (2024)","DOI":"10.1145\/3597503.3639187"},{"key":"5557_CR30","doi-asserted-by":"crossref","unstructured":"Guo, J., Liu, Z., Tian, S., Huang, F., Li, J., Li, X., et al.: TFL-DT: A trust evaluation scheme for federated learning in digital twin for mobile networks. IEEE J. Sel. Areas Commun. (2023)","DOI":"10.1109\/JSAC.2023.3310094"},{"key":"5557_CR31","unstructured":"Ge, Y., Hua, W., Mei, K., Tan, J., Xu, S., Li, Z., et al.: Openagi: When Llm Meets domain experts. Adv. Neural. Inf. Process. Syst. 36. (2024)"},{"key":"5557_CR32","doi-asserted-by":"crossref","unstructured":"Jain, S.M.: WebAssembly Introduction. W3C. (2021)","DOI":"10.1007\/978-1-4842-7496-5"},{"key":"5557_CR33","unstructured":"WebAssembly Core Specification: World Wide Web Consortium (W3C)"},{"key":"5557_CR34","unstructured":"Lehmann, D., Kinder, J., Pradel, M.: Everything old is new again: Binary security of {WebAssembly}. In: 29th USENIX Security Symposium (USENIX Security 20); pp. 217\u2013234. (2020)"},{"key":"5557_CR35","doi-asserted-by":"crossref","unstructured":"Hilbig, A., Lehmann, D., Pradel, M.: An empirical study of real-world webassembly binaries: Security, languages, use cases. In: Proceedings of the web conference.; 2021. pp. 2696\u20132708. (2021)","DOI":"10.1145\/3442381.3450138"},{"key":"5557_CR36","doi-asserted-by":"crossref","unstructured":"Lehmann, D., Pradel, M.: Wasabi: A framework for dynamically analyzing webassembly. In: Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems; pp. 1045\u20131058. (2019)","DOI":"10.1145\/3297858.3304068"},{"key":"5557_CR37","unstructured":"Touvron, H., Lavril, T., Izacard, G., Martinet, X., Lachaux, M.A., Lacroix, T., et al.: Llama: Open and efficient foundation language models. arXiv preprint arXiv:230213971.;. (2023)"},{"key":"5557_CR38","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2204.06745","author":"S Black","year":"2022","unstructured":"Black, S., Biderman, S., Hallahan, E., Anthony, Q., Gao, L., Golding, L., et al.: GPT-NeoX-20B: An Open-Source autoregressive Language model. ARXIV. (2022). https:\/\/doi.org\/10.48550\/ARXIV.2204.06745","journal-title":"ARXIV"},{"key":"5557_CR39","unstructured":"Gao, L., Biderman, S., Black, S., Golding, L., Hoppe, T., Foster, C., et al.: The Pile: An 800GB Dataset of Diverse Text for Language Modeling. arXiv preprint arXiv:210100027.;. (2020)"},{"key":"5557_CR40","unstructured":"Hugging Face datasets: Hugging Face"},{"key":"5557_CR41","unstructured":"Open Instruction Generalist (OIG) Dataset. LAION-AI"},{"key":"5557_CR42","unstructured":"Zhang, G., Shi, Y., Liu, R., Yuan, R., Li, Y., Dong, S., et al.: Chinese open instruction generalist: A preliminary release. ONLINE (2023)"},{"key":"5557_CR43","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., et al.: Attention is all you need. Adv. Neural. Inf. Process. Syst.;30. (2017)"},{"key":"5557_CR44","unstructured":"Shen, Y., Song, K., Tan, X., Li, D., Lu, W., Zhuang, Y., Hugginggpt: Solving Ai tasks with Chatgpt and its friends in hugging face. Adv. Neural. Inf. Process. Syst. 36. (2024)"},{"key":"5557_CR45","unstructured":"fuzzinglabs: Security analysis tool for webassembly module. ONLINE (2018)"},{"key":"5557_CR46","unstructured":"TBCC: Project in Github. Github"},{"key":"5557_CR47","unstructured":"TBCC, Dataset, T.B.C.C.: ONLINE;. (2021)"},{"key":"5557_CR48","doi-asserted-by":"crossref","unstructured":"Zhang, J., Wang, X., Zhang, H., Sun, H., Wang, K., Liu, X.: A novel neural source code representation based on abstract syntax tree. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). IEEE; pp. 783\u2013794. (2019)","DOI":"10.1109\/ICSE.2019.00086"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05557-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05557-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05557-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:06:11Z","timestamp":1764237971000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05557-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,29]]},"references-count":48,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["5557"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05557-w","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,9,29]]},"assertion":[{"value":"9 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This manuscript has not been submitted to, nor is it under review at, another journal or other publishing venue.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"892"}}