{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T17:45:31Z","timestamp":1767980731905,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Postgraduate Research & Practice Innovation Program of Jiangsu Province","award":["KYCX23_2914"],"award-info":[{"award-number":["KYCX23_2914"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61902161"],"award-info":[{"award-number":["61902161"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62077029"],"award-info":[{"award-number":["62077029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Foundation of the Jiangsu Higher Education Institutions of China","award":["18KJB520016"],"award-info":[{"award-number":["18KJB520016"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s11219-025-09726-3","type":"journal-article","created":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T16:24:54Z","timestamp":1751387094000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["HPDA: An enhanced GNN-based software vulnerability detection approach by hybrid-scale perception and data augmentation"],"prefix":"10.1007","volume":"33","author":[{"given":"Shengyi","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Qiao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Zirui","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,1]]},"reference":[{"key":"9726_CR1","unstructured":"Alon, U., & Yahav, E. (2021). On the bottleneck of graph neural networks and its practical implications. In International Conference on Learning Representations (ICLR)\u00a0(pp. 14048\u201314063)."},{"key":"9726_CR2","doi-asserted-by":"publisher","unstructured":"Cao, S., Sun, X., Bo, L., & Wu, R., et al. (2022). MVD: Memory-related vulnerability detection based on flow-sensitive graph neural networks. In Proceedings of the 44th International Conference on Software Engineering (ICSE '22). Association for Computing Machinery, New York, NY, USA, 1456\u20131468. https:\/\/doi.org\/10.1145\/3510003.3510219","DOI":"10.1145\/3510003.3510219"},{"issue":"9","key":"9726_CR3","doi-asserted-by":"publisher","first-page":"3280","DOI":"10.1109\/TSE.2021.3087402","volume":"48","author":"S Chakraborty","year":"2021","unstructured":"Chakraborty, S., Krishna, R., Ding, Y., & Ray, B. (2021). Deep learning based vulnerability detection: Are we there yet? IEEE Transactions on Software Engineering, 48(9), 3280\u20133296.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"9726_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3436877","volume":"30","author":"X Cheng","year":"2021","unstructured":"Cheng, X., Wang, H., Hua, J., Xu, G., & Sui, Y. (2021). Deepwukong: Statically detecting software vulnerabilities using deep graph neural network. ACM Transactions on Software Engineering and Methodology (TOSEM), 30(3), 1\u201333. https:\/\/doi.org\/10.1145\/3436877","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"9726_CR5","first-page":"1546","volume":"17","author":"MJ Choi","year":"2017","unstructured":"Choi, M. J., Jeong, S., Oh, H., & Choo, J. (2017). End-to-End Prediction of Buffer Overruns from Raw Source Code via Neural Memory Networks. In Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 17, 1546\u20131553.","journal-title":"In Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence"},{"key":"9726_CR6","unstructured":"Choromanski, K., Likhosherstov, V., Dohan, D., & Song, X., et al. (2021). Rethinking attention with performers. In International Conference on Learning Representations (ICLR)  (pp.\u00a01060\u20131097)."},{"key":"9726_CR7","unstructured":"Dam, H. K., Tran, T., Pham, T., & Ng, S. W., et al. (2017). Automatic feature learning for vulnerability prediction. arXiv preprint arXiv:1708.02368. Accessed 01 June, 2025."},{"key":"9726_CR8","doi-asserted-by":"publisher","unstructured":"Ding, Y., Suneja, S., Zheng, Y., & Laredo, J., et al. (2022). VELVET: A noVel Ensemble Learning approach to automatically locate VulnErable sTatements. In IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, Honolulu, HI, USA, 959\u2013970. https:\/\/doi.org\/10.1109\/SANER53432.2022.00114","DOI":"10.1109\/SANER53432.2022.00114"},{"issue":"6","key":"9726_CR9","doi-asserted-by":"publisher","first-page":"5121","DOI":"10.1007\/s00521-024-10797-9","volume":"37","author":"C Do Xuan","year":"2025","unstructured":"Do Xuan, C., & Anh, H. N. (2025). A novel approach for software vulnerability detection based on advanced computing. Neural Computing and Applications, 37(6), 5121\u20135139.","journal-title":"Neural Computing and Applications"},{"key":"9726_CR10","first-page":"4665","volume":"19","author":"X Duan","year":"2019","unstructured":"Duan, X., Wu, J., Ji, S., Rui, Z., et al. (2019). VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities. In Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 19, 4665\u20134671.","journal-title":"In Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence"},{"key":"9726_CR11","doi-asserted-by":"publisher","unstructured":"Fan, G., Wu, R., Shi, Q., & Xiao, X., et al. (2019). Smoke: Scalable path-sensitive memory leak detection for millions of lines of code. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). IEEE, Montreal, QC, Canada, 72\u201382. https:\/\/doi.org\/10.1109\/ICSE.2019.00025","DOI":"10.1109\/ICSE.2019.00025"},{"key":"9726_CR12","doi-asserted-by":"publisher","unstructured":"Fan, J., Li, Y., Wang, S., & Nguyen, T. N. (2020). A C\/C++ code vulnerability dataset with code changes and CVE summaries. In Proceedings of the 17th International Conference on Mining Software Repositories (MSR '20). Association for Computing Machinery, New York, NY, USA, 508\u2013512. https:\/\/doi.org\/10.1145\/3379597.3387501","DOI":"10.1145\/3379597.3387501"},{"key":"9726_CR13","doi-asserted-by":"publisher","unstructured":"Feng, Z., Guo, D., Tang, D., & Duan, N., et al. (2020). Codebert: A pre-trained model for programming and natural languages. In Findings of the Association for Computational Linguistics: EMNLP 2020. Association for Computational Linguistics, 1536\u20131547. https:\/\/doi.org\/10.18653\/v1\/2020.findings-emnlp.139","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"9726_CR14","doi-asserted-by":"publisher","unstructured":"Fu, M., & Tantithamthavorn, C. (2022). Linevul: A transformer-based line-level vulnerability prediction. In Proceedings of the 19th International Conference on Mining Software Repositories (MSR '22). Association for Computing Machinery, New York, NY, USA, 608\u2013620. https:\/\/doi.org\/10.1145\/3524842.3528452","DOI":"10.1145\/3524842.3528452"},{"key":"9726_CR15","first-page":"11104","volume":"2207","author":"S Gao","year":"2022","unstructured":"Gao, S., Gao, C., Wang, C., Sun, J., & Lo, D. (2022). CARBON: A counterfactual reasoning based framework for neural code comprehension debiasing. CoRR, 2207, 11104.","journal-title":"CoRR"},{"key":"9726_CR16","doi-asserted-by":"publisher","unstructured":"Gao, Q., Ma, S., Shao, S., & Sui, Y., et al. (2018). CoBOT: Static C\/C++ bug detection in the presence of incomplete code. In Proceedings of the 26th Conference on Program Comprehension (ICPC '18). Association for Computing Machinery, New York, NY, USA, 385\u2013388. https:\/\/doi.org\/10.1145\/3196321.3196367","DOI":"10.1145\/3196321.3196367"},{"key":"9726_CR17","unstructured":"Gilmer, J., Schoenholz, S. S., Riley, P. F., Vinyals, O., & Dahl, G. E. (2017). Neural message passing for quantum chemistry. In Proceedings of the 34th International Conference on Machine Learning (ICML). Proceedings of Machine Learning Research, 70, 1263\u20131272."},{"key":"9726_CR18","unstructured":"Guo, D., Ren, S., Lu, S., & Feng, Z., et al. (2021). GraphCodeBERT: Pre-training Code Representations with Data Flow. In International Conference on Learning Representations (ICLR) (pp. 17456\u201317473)."},{"key":"9726_CR19","unstructured":"Hellendoorn, V. J., Sutton, C., Singh, R., Maniatis, P., & Bieber, D. (2020). Global relational models of source code. In International Conference on Learning Representations (ICLR) (Vol 9, pp. 6331\u20136342)."},{"key":"9726_CR20","unstructured":"Husain, H., Wu, H. H., Gazit, T., Allamanis, M., & Brockschmidt, M. (2019). Codesearchnet challenge: Evaluating the state of semantic code search. arXiv preprint arXiv:1909.09436. Accessed 1 June 2025."},{"key":"9726_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3360588","volume":"3","author":"Y Li","year":"2019","unstructured":"Li, Y., Wang, S., Nguyen, T. N., & Van Nguyen, S. (2019). Improving bug detection via context-based code representation learning and attention-based neural networks. Proceedings of the ACM on Programming Languages, 3, 1\u201330. https:\/\/doi.org\/10.1145\/3360588","journal-title":"Proceedings of the ACM on Programming Languages"},{"key":"9726_CR22","doi-asserted-by":"crossref","unstructured":"Li, Z., Zou, D., Xu, S., & Ou, X., et al. (2018). VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. In Network and Distributed Systems Security (NDSS) Symposium\u00a0(pp. 1\u201312).","DOI":"10.14722\/ndss.2018.23158"},{"issue":"4","key":"9726_CR23","doi-asserted-by":"publisher","first-page":"2244","DOI":"10.1109\/TDSC.2021.3051525","volume":"19","author":"Z Li","year":"2021","unstructured":"Li, Z., Zou, D., Xu, S., Jin, H., et al. (2021a). Sysevr: A framework for using deep learning to detect software vulnerabilities. IEEE Transactions on Dependable and Secure Computing, 19(4), 2244\u20132258.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"9726_CR24","doi-asserted-by":"publisher","unstructured":"Li, Y., Wang, S., & Nguyen, T. N. (2021b). Vulnerability detection with fine-grained interpretations. In Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE '2021) (pp. 292\u2013303). Association for Computing Machinery. https:\/\/doi.org\/10.1145\/3468264.3468597","DOI":"10.1145\/3468264.3468597"},{"key":"9726_CR25","doi-asserted-by":"publisher","unstructured":"Lin, G., Zhang, J., Luo, W., Pan, L., & Xiang, Y. (2017). POSTER: Vulnerability discovery with function representation learning from unlabeled projects. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17). Association for Computing Machinery, New York, NY, USA, 2539\u20132541. https:\/\/doi.org\/10.1145\/3133956.3138840","DOI":"10.1145\/3133956.3138840"},{"key":"9726_CR26","unstructured":"Luo, Y., McThrow, M., Au, W. Y., & Komikado, et al. (2023). Automated data augmentations for graph classification. In The Eleventh International Conference on Learning Representations (ICLR) (pp. 4982\u20135008)."},{"issue":"01","key":"9726_CR27","doi-asserted-by":"publisher","first-page":"4602","DOI":"10.1609\/aaai.v33i01.33014602","volume":"33","author":"C Morris","year":"2019","unstructured":"Morris, C., Ritzert, M., Fey, M., Hamilton, et al. (2019). Weisfeiler and leman go neural: Higher-order graph neural networks. Proceedings of the AAAI Conference on Artificial Intelligence, 33(01), 4602\u20134609. https:\/\/doi.org\/10.1609\/aaai.v33i01.33014602","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"9726_CR28","first-page":"149","volume":"17","author":"J Pan","year":"2017","unstructured":"Pan, J., Yan, G., & Fan, X. (2017). Digtool: A virtualization-based framework for detecting kernel vulnerabilities. In 26th USENIX Security Symposium, 17, 149\u2013165.","journal-title":"In 26th USENIX Security Symposium"},{"key":"9726_CR29","first-page":"14501","volume":"35","author":"L Ramp\u00e1\u0161ek","year":"2022","unstructured":"Ramp\u00e1\u0161ek, L., Galkin, M., Dwivedi, V. P., Luu, A. T., et al. (2022). Recipe for a general, powerful, scalable graph transformer. Advances in Neural Information Processing Systems, 35, 14501\u201314515.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"9726_CR30","doi-asserted-by":"publisher","unstructured":"Russell, R., Kim, L., Hamilton, L., & Lazovich, T., et al. (2018). Automated vulnerability detection in source code using deep representation learning. In 17th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, Orlando, FL, USA, 757\u2013762. https:\/\/doi.org\/10.1109\/ICMLA.2018.00120","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"9726_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3597503.3623345","volume":"16","author":"B Steenhoek","year":"2024","unstructured":"Steenhoek, B., Gao, H., & Le, W. (2024). Dataflow analysis-inspired deep learning for efficient vulnerability detection. In Proceedings of the 46th IEEE\/ACM International Conference on Software Engineering (ICSE \u201924). Association for Computing Machinery, New York, NY, USA, 16, 1\u201313. https:\/\/doi.org\/10.1145\/3597503.3623345","journal-title":"Association for Computing Machinery, New York, NY, USA"},{"key":"9726_CR32","doi-asserted-by":"publisher","unstructured":"Steenhoek, B., Rahman, M. M., Jiles, R., & Le, W. (2023). An empirical study of deep learning models for vulnerability detection. In IEEE\/ACM 45th International Conference on Software Engineering (ICSE). IEEE, Melbourne, Australia, 2237\u20132248. https:\/\/doi.org\/10.1109\/ICSE48619.2023.00188","DOI":"10.1109\/ICSE48619.2023.00188"},{"key":"9726_CR33","doi-asserted-by":"publisher","unstructured":"Wang, C., Yang, Y., Gao, C., & Peng, et al. (2022). No more fine-tuning? an experimental evaluation of prompt tuning in code intelligence. In Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE '2022). Association for Computing Machinery, New York, NY, USA, 382\u2013394. https:\/\/doi.org\/10.1145\/3540250.3549113","DOI":"10.1145\/3540250.3549113"},{"key":"9726_CR34","doi-asserted-by":"publisher","unstructured":"Wen, X. C., Chen, Y., Gao, C., & Zhang, et al. (2023). Vulnerability detection with graph simplification and enhanced graph representation learning. In IEEE\/ACM 45th International Conference on Software Engineering (ICSE). IEEE, Melbourne, Australia, 2275\u20132286. https:\/\/doi.org\/10.1109\/ICSE48619.2023.00191","DOI":"10.1109\/ICSE48619.2023.00191"},{"key":"9726_CR35","unstructured":"Xu, K., Hu, W., Leskovec, J., & Jegelka, S. (2019). How powerful are graph neural networks?. In International Conference on Learning Representations (ICLR). (pp. 9104\u20139120)."},{"key":"9726_CR36","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s10207-025-00983-8","volume":"24","author":"CD Xuan","year":"2025","unstructured":"Xuan, C. D., Quang, D. B., & Quang, V. D. (2025). Large language models based vulnerability detection: How does it enhance performance? International Journal of Information Security, 24, 69.","journal-title":"International Journal of Information Security"},{"key":"9726_CR37","doi-asserted-by":"publisher","unstructured":"Yamaguchi, F., Golde, N., Arp, D., & Rieck, K. (2014). Modeling and discovering vulnerabilities with code property graphs. In IEEE Symposium on Security and Privacy. IEEE, Berkeley, CA, USA, 590\u2013604. https:\/\/doi.org\/10.1109\/SP.2014.44","DOI":"10.1109\/SP.2014.44"},{"key":"9726_CR38","unstructured":"Zhou, Y., Liu, S., Siow, J., Du, X., & Liu, Y. (2019). Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks. In Proceedings of the 33rd International Conference on Neural Information Processing Systems (NeurIPS) (pp. 10197\u201310207)."},{"key":"9726_CR39","doi-asserted-by":"publisher","unstructured":"Zhou, X., Han, D., & Lo, D. (2021). Assessing generalizability of codebert. In IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, Luxembourg, 425\u2013436. https:\/\/doi.org\/10.1109\/ICSME52107.2021.00044","DOI":"10.1109\/ICSME52107.2021.00044"},{"key":"9726_CR40","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1007\/s11390-020-0142-x","volume":"36","author":"DH Zhu","year":"2021","unstructured":"Zhu, D. H., Dai, X. Y., & Chen, J. J. (2021). Pre-train and learn: Preserving global information for graph neural networks. Journal of Computer Science and Technology, 36, 1420\u20131430.","journal-title":"Journal of Computer Science and Technology"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-025-09726-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11219-025-09726-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-025-09726-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T11:05:19Z","timestamp":1758971119000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11219-025-09726-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,1]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["9726"],"URL":"https:\/\/doi.org\/10.1007\/s11219-025-09726-3","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,1]]},"assertion":[{"value":"12 June 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"29"}}