{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,17]],"date-time":"2026-05-17T04:25:49Z","timestamp":1778991949578,"version":"3.51.4"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T00:00:00Z","timestamp":1760572800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T00:00:00Z","timestamp":1760572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10586-025-05721-2","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T14:25:57Z","timestamp":1760624757000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Leveraging Intra- and Inter-References in vulnerability detection using Multi-Agent collaboration based on LLMs"],"prefix":"10.1007","volume":"28","author":[{"given":"Chung-Nan","family":"Tsai","sequence":"first","affiliation":[]},{"given":"Jingnan","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Chun-Ming","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Ching-Sheng","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,16]]},"reference":[{"issue":"13","key":"5721_CR1","doi-asserted-by":"publisher","first-page":"2538","DOI":"10.3390\/electronics13132538","volume":"13","author":"D Grahn","year":"2024","unstructured":"Grahn, D., Chen, L., Zhang, J.: Vul-Mixer: Efficient and effective machine Learning\u2013Assisted software vulnerability detection. Electronics. 13(13), 2538 (2024)","journal-title":"Electronics"},{"key":"5721_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121865","volume":"238","author":"Z Tian","year":"2024","unstructured":"Tian, Z., Tian, B., Lv, J., Chen, Y., Chen, L.: Enhancing vulnerability detection via AST decomposition and neural sub-tree encoding. Expert Systems with Applications 238, 121865 (2024)","journal-title":"Expert Systems with Applications"},{"key":"5721_CR3","doi-asserted-by":"crossref","unstructured":"Li, Z., Zou, D., Xu, S., Ou, X., Jin, H., Wang, S., Zhong, Y.: Vuldeepecker: A deep learning-based system for vulnerability detection. ArXiv Preprint arXiv:180101681. (2018)","DOI":"10.14722\/ndss.2018.23158"},{"issue":"8","key":"5721_CR4","doi-asserted-by":"publisher","first-page":"4196","DOI":"10.1109\/TSE.2023.3286586","volume":"49","author":"J Zhang","year":"2023","unstructured":"Zhang, J., Liu, Z., Hu, X., Xia, X., Li, S.: Vulnerability detection by learning from syntax-based execution paths of code. IEEE Trans. Software Eng. 49(8), 4196\u20134212 (2023)","journal-title":"IEEE Trans. Software Eng."},{"issue":"4","key":"5721_CR5","doi-asserted-by":"publisher","first-page":"2244","DOI":"10.1109\/TDSC.2021.3051525","volume":"19","author":"Z Li","year":"2021","unstructured":"Li, Z., Zou, D., Xu, S., Jin, H., Zhu, Y., Chen, Z.: Sysevr: A framework for using deep learning to detect software vulnerabilities. IEEE Trans. Dependable Secur. Comput. 19(4), 2244\u20132258 (2021)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"5721_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2024.112014","volume":"214","author":"S Nguyen","year":"2024","unstructured":"Nguyen, S., Nguyen, T.T., Vu, T.T., Do, T.D., Ngo, K.T., Vo, H.D.: Code-centric learning-based just-in-time vulnerability detection. Journal of Systems and Software 214, 112014 (2024)","journal-title":"Journal of Systems and Software"},{"issue":"8","key":"5721_CR7","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1109\/TSE.2018.2869336","volume":"46","author":"Y Sui","year":"2018","unstructured":"Sui, Y., Xue, J.: Value-flow-based demand-driven pointer analysis for C and C++. IEEE Trans. Software Eng. 46(8), 812\u2013835 (2018)","journal-title":"IEEE Trans. Software Eng."},{"key":"5721_CR8","doi-asserted-by":"crossref","unstructured":"Ma, X., Yan, J., Wang, W., Yan, J., Zhang, J., Qiu, Z.: Detecting memory-related bugs by tracking heap memory management of C\u2009+\u2009+\u2009smart pointers. In 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE) (pp. 880\u2013891). IEEE. (2021), November","DOI":"10.1109\/ASE51524.2021.9678836"},{"key":"5721_CR9","doi-asserted-by":"crossref","unstructured":"Duan, X., Wu, J., Du, M., Luo, T., Yang, M., Wu, Y.: MultiCode: A Unified Code Analysis Framework based on Multi-type and Multi-granularity Semantic Learning. In 2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) (pp. 359\u2013364). IEEE. (2021), October","DOI":"10.1109\/ISSREW53611.2021.00102"},{"key":"5721_CR10","doi-asserted-by":"crossref","unstructured":"Li, J., Ernst, M.D.: CBCD: Cloned buggy code detector. In 2012 34th International Conference on Software Engineering (ICSE) (pp. 310\u2013320). IEEE. (2012), June","DOI":"10.1109\/ICSE.2012.6227183"},{"key":"#cr-split#-5721_CR11.1","doi-asserted-by":"crossref","unstructured":"Kim, S., Woo, S., Lee, H., Oh, H.: Vuddy: A scalable approach for vulnerable code clone discovery. In 2017 IEEE symposium on security and privacy","DOI":"10.1109\/SP.2017.62"},{"key":"#cr-split#-5721_CR11.2","unstructured":"(SP) (pp. 595-614). IEEE. (2017), May"},{"key":"5721_CR12","doi-asserted-by":"crossref","unstructured":"Russell, R., Kim, L., Hamilton, L., Lazovich, T., Harer, J., Ozdemir, O., McConley, M.: Automated vulnerability detection in source code using deep representation learning. In 2018 17th IEEE international conference on machine learning and applications (ICMLA) (pp. 757\u2013762). IEEE. (2018), December","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"5721_CR13","doi-asserted-by":"crossref","unstructured":"Hin, D., Kan, A., Chen, H., Babar, M.A.: LineVD: statement-level vulnerability detection using graph neural networks. In Proceedings of the 19th international conference on mining software repositories (pp. 596\u2013607). (2022), May","DOI":"10.1145\/3524842.3527949"},{"key":"5721_CR14","doi-asserted-by":"crossref","unstructured":"Park, J.S., O\u2019Brien, J., Cai, C.J., Morris, M.R., Liang, P., Bernstein, M.S.: Generative agents: Interactive simulacra of human behavior. In Proceedings of the 36th annual acm symposium on user interface software and technology (pp. 1\u201322). (2023), October","DOI":"10.1145\/3586183.3606763"},{"key":"5721_CR15","unstructured":"Weyssow, M., Zhou, X., Kim, K., Lo, D., Sahraoui, H.: Exploring parameter-efficient fine-tuning techniques for code generation with large Language models. ArXiv Preprint arXiv:230810462. (2023)"},{"key":"5721_CR16","unstructured":"Xi, Z., Chen, W., Guo, X., He, W., Ding, Y., Hong, B., Gui, T.: The rise and potential of large language model based agents: A survey. arXiv preprint arXiv:2309.07864. (2023)"},{"key":"5721_CR17","doi-asserted-by":"crossref","unstructured":"Wang, Z.M., Peng, Z., Que, H., Liu, J., Zhou, W., Wu, Y., Peng, J.: Rolellm: Benchmarking, eliciting, and enhancing role-playing abilities of large Language models. ArXiv Preprint arXiv:231000746. (2023)","DOI":"10.18653\/v1\/2024.findings-acl.878"},{"key":"5721_CR18","doi-asserted-by":"crossref","unstructured":"Zhou, X., Zhang, T., Lo, D.: Large language model for vulnerability detection: Emerging results and future directions. In Proceedings of the 2024 ACM\/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results (pp. 47\u201351). (2024), April","DOI":"10.1145\/3639476.3639762"},{"key":"5721_CR19","unstructured":"Lee, C., Xia, C.S., Huang, J.T., Zhu, Z., Zhang, L., Lyu, M.R.: A Unified Debugging Approach via LLM-Based Multi-Agent Synergy. arXiv preprint arXiv:2404.17153. (2024)"},{"key":"5721_CR20","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btae238","author":"M Jeong","year":"2024","unstructured":"Jeong, M., Sohn, J., Sung, M., Kang, J.: Improving medical reasoning through retrieval and self-reflection with retrieval-augmented large Language models. Bioinformatics. 40(Suppl 1), i119\u2013i129 (2024). https:\/\/doi.org\/10.1093\/bioinformatics\/btae238","journal-title":"Bioinformatics"},{"key":"5721_CR21","unstructured":"Ding, Y., Fan, W., Ning, L., Wang, S., Li, H., Yin, D., Li, Q.: A survey on rag meets llms: Towards retrieval-augmented large language models. arXiv preprint arXiv:2405.06211. (2024)"},{"key":"5721_CR22","doi-asserted-by":"crossref","unstructured":"Lin, D., Koppel, J., Chen, A., Solar-Lezama, A.: QuixBugs: A multi-lingual program repair benchmark set based on the Quixey Challenge. In Proceedings Companion of the 2017 ACM SIGPLAN international conference on systems, programming, languages, and applications: software for humanity (pp. 55\u201356). (2017), October","DOI":"10.1145\/3135932.3135941"},{"key":"5721_CR23","doi-asserted-by":"crossref","unstructured":"Pan, S., Bao, L., Xia, X., Lo, D., Li, S.: Fine-grained commit-level vulnerability type prediction by CWE tree structure. In 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE) (pp. 957\u2013969). IEEE. (2023), May","DOI":"10.1109\/ICSE48619.2023.00088"},{"key":"5721_CR24","doi-asserted-by":"crossref","unstructured":"Le, T.H.M., Babar, M.A., Thai, T.H.: Software Vulnerability Prediction in Low-Resource Languages: An Empirical Study of CodeBERT and ChatGPT. In Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering (pp. 679\u2013685). (2024), June","DOI":"10.1145\/3661167.3661281"},{"key":"5721_CR25","doi-asserted-by":"crossref","unstructured":"Awadhutkar, P., Santhanam, G.R., Holland, B., Kothari, S.: DISCOVER: detecting algorithmic complexity vulnerabilities. In Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (pp. 1129\u20131133). (2019), August","DOI":"10.1145\/3338906.3341177"},{"key":"5721_CR26","doi-asserted-by":"crossref","unstructured":"Lipp, S., Banescu, S., Pretschner, A.: An empirical study on the effectiveness of static C code analyzers for vulnerability detection. In Proceedings of the 31st ACM SIGSOFT international symposium on software testing and analysis (pp. 544\u2013555). (2022), July","DOI":"10.1145\/3533767.3534380"},{"key":"5721_CR27","doi-asserted-by":"crossref","unstructured":"Charoenwet, W., Thongtanunam, P., Pham, V.T., Treude, C.: An empirical study of static analysis tools for secure code review. In Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (pp. 691\u2013703). (2024), September","DOI":"10.1145\/3650212.3680313"},{"key":"5721_CR28","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D., Pham, L.H., Sun, J., Lin, Y., Minh, Q.T.: sfuzz: An efficient adaptive fuzzer for solidity smart contracts. In Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering (pp. 778\u2013788). (2020), June","DOI":"10.1145\/3377811.3380334"},{"key":"5721_CR29","doi-asserted-by":"crossref","unstructured":"Tsankov, P., Dan, A., Drachsler-Cohen, D.: Practical security analysis of smart contracts. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 67\u201382). (2022)","DOI":"10.1145\/3243734.3243780"},{"key":"5721_CR30","doi-asserted-by":"crossref","unstructured":"Aivatoglou, G., Anastasiadis, M., Spanos, G., Voulgaridis, A., Votis, K., Tzovaras, D.: A tree-based machine learning methodology to automatically classify software vulnerabilities. In 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (pp. 312\u2013317). IEEE. (2021), July","DOI":"10.1109\/CSR51186.2021.9527965"},{"key":"5721_CR31","first-page":"4442374","volume":"20221","author":"G Qiang","year":"2022","unstructured":"Qiang, G.: Research on software vulnerability detection method based on improved CNN model. Sci. Program. 20221, 4442374 (2022)","journal-title":"Sci. Program."},{"issue":"9","key":"5721_CR32","doi-asserted-by":"publisher","first-page":"3280","DOI":"10.1109\/TSE.2021.3087402","volume":"48","author":"S Chakraborty","year":"2021","unstructured":"Chakraborty, S., Krishna, R., Ding, Y., Ray, B.: Deep learning based vulnerability detection: Are we there yet? IEEE Trans. Software Eng. 48(9), 3280\u20133296 (2021)","journal-title":"IEEE Trans. Software Eng."},{"key":"5721_CR33","doi-asserted-by":"crossref","unstructured":"Feng, Z., Guo, D., Tang, D., Duan, N., Feng, X., Gong, M., \u2026 Zhou, M. (2020). Codebert:A pre-trained model for programming and natural languages. arXiv preprint arXiv:2002.08155.","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"5721_CR34","unstructured":"Guo, D., Ren, S., Lu, S., Feng, Z., Tang, D., Liu, S., \u2026 Zhou, M. (2020). Graphcodebert:Pre-training code representations with data flow. arXiv preprint arXiv:2009.08366."},{"key":"5721_CR35","doi-asserted-by":"crossref","unstructured":"Mao, Z., Li, J., Jin, D., Li, M., Tei, K.: Multi-role consensus through llms discussions for vulnerability detection. In 2024 IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C) (pp. 1318\u20131319). IEEE. (2024), July","DOI":"10.1109\/QRS-C63300.2024.00173"},{"key":"5721_CR36","unstructured":"Widyasari, R., Weyssow, M., Irsan, I. C., Ang, H. W., Liauw, F., Ouh, E. L., \u2026 Lo,D. (2025). Let the Trial Begin: A Mock-Court Approach to Vulnerability Detection using LLM-Based Agents. arXiv preprint arXiv:2505.10961."},{"key":"5721_CR37","unstructured":"Fayyazi, R., Trueba, S.H., Zuzak, M., Yang, S.J.: ProveRAG: Provenance-Driven vulnerability analysis with automated Retrieval-Augmented LLMs. (2024). arXiv preprint arXiv:2410.17406."},{"key":"5721_CR38","doi-asserted-by":"crossref","unstructured":"Ma, W., Wu, D., Sun, Y., Wang, T., Liu, S., Zhang, J., \u2026 Liu, Y. (2024). Combining fine-tuning and llm-based agents for intuitive smart contract auditing with justifications.arXiv preprint arXiv:2403.16073.","DOI":"10.1109\/ICSE55347.2025.00027"},{"key":"5721_CR39","unstructured":"Wei, Z., Sun, J., Zhang, Z., Zhang, X., Li, M., Hou, Z.: LLM-SmartAudit: Advanced Smart Contract Vulnerability Detection. arXiv preprint arXiv:2410.09381. (2024)"},{"key":"5721_CR40","doi-asserted-by":"crossref","unstructured":"Li, H., Chong, Y.Q., Stepputtis, S., Campbell, J., Hughes, D., Lewis, M., Sycara, K.: Theory of Mind for multi-agent collaboration via large Language models. ArXiv Preprint arXiv:231010701. (2023)","DOI":"10.18653\/v1\/2023.emnlp-main.13"},{"key":"5721_CR41","unstructured":"Tran, K.T., Dao, D., Nguyen, M.D., Pham, Q.V., O\u2019Sullivan, B., Nguyen, H.D.: Multi-Agent Collaboration Mechanisms: A Survey of LLMs. arXiv preprint arXiv:2501.06322. (2025)"},{"key":"5721_CR42","unstructured":"https:\/\/platform.openai.com\/docs\/models\/overview, [Accessed 02-06-2025]"},{"key":"5721_CR43","doi-asserted-by":"crossref","unstructured":"Fan, A., Gokkaya, B., Harman, M., Lyubarskiy, M., Sengupta, S., Yoo, S., Zhang, J.M.: Large language models for software engineering: Survey and open problems. In 2023 IEEE\/ACM International Conference on Software Engineering: Future of Software Engineering (ICSE-FoSE) (pp. 31\u201353). IEEE. (2023), May","DOI":"10.1109\/ICSE-FoSE59343.2023.00008"},{"key":"5721_CR44","unstructured":"https:\/\/ai.meta.com\/blog\/meta-llama-3\/, [Accessed 02-06-2025]"},{"key":"5721_CR45","unstructured":"Dubey, A., Jauhri, A., Pandey, A., Kadian, A., Al-Dahle, A., Letman, A., \u2026 Ganapathy,R. (2024). The llama 3 herd of models. arXiv preprint arXiv:2407.21783."},{"key":"5721_CR46","unstructured":"Team, G., Mesnard, T., Hardin, C., Dadashi, R., Bhupatiraju, S., Pathak, S., \u2026 Kenealy,K. (2024). Gemma: Open models based on gemini research and technology. arXiv preprint arXiv:2403.08295."},{"key":"5721_CR47","unstructured":"Jiang, A. Q., Sablayrolles, A., Roux, A., Mensch, A., Savary, B., Bamford, C., \u2026 Sayed,W. E. (2024). Mixtral of experts. arXiv preprint arXiv:2401.04088."},{"key":"5721_CR48","unstructured":"https:\/\/openai.com\/index\/hellogpt-4o\/, [Accessed 02-06-2025]"},{"key":"5721_CR49","doi-asserted-by":"crossref","unstructured":"Shahriar, S., Lund, B. D., Mannuru, N. R., Arshad, M. A., Hayawi, K., Bevara, R. V.K., \u2026 Batool, L. (2024). Putting gpt-4o to the sword: A comprehensive evaluation of language, vision, speech, and multimodal proficiency. Applied Sciences, 14(17), 7782.","DOI":"10.3390\/app14177782"},{"key":"5721_CR50","doi-asserted-by":"crossref","unstructured":"Fu, M., Tantithamthavorn, C.: Linevul: A transformer-based line-level vulnerability prediction. In Proceedings of the 19th International Conference on Mining Software Repositories (pp. 608\u2013620). (2022), May","DOI":"10.1145\/3524842.3528452"},{"key":"5721_CR51","doi-asserted-by":"crossref","unstructured":"Steenhoek, B., Rahman, M.M., Jiles, R., Le, W.: An empirical study of deep learning models for vulnerability detection. In 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE) (pp. 2237\u20132248). IEEE. (2023), May","DOI":"10.1109\/ICSE48619.2023.00188"},{"key":"5721_CR52","unstructured":"Widyasari, R., Lo, D., Liao, L.: Beyond chatgpt: Enhancing software quality assurance tasks with diverse LLMs and validation techniques. (2024). arXiv preprint arXiv:2409.01001."},{"key":"5721_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106374","volume":"127","author":"L Ardito","year":"2020","unstructured":"Ardito, L., Coppola, R., Malnati, G., Torchiano, M.: Effectiveness of Kotlin vs. Java in android app development tasks. Information and Software Technology 127, 106374 (2020)","journal-title":"Information and Software Technology"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05721-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05721-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05721-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T11:48:59Z","timestamp":1764071339000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05721-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,16]]},"references-count":54,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["5721"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05721-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,16]]},"assertion":[{"value":"21 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"1004"}}