{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T07:57:57Z","timestamp":1774079877301,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T00:00:00Z","timestamp":1774051200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T00:00:00Z","timestamp":1774051200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62376240"],"award-info":[{"award-number":["62376240"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"S&T Program of Hebei","award":["226Z0701G"],"award-info":[{"award-number":["226Z0701G"]}]},{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["F2022203026"],"award-info":[{"award-number":["F2022203026"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s11219-026-09741-y","type":"journal-article","created":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T06:13:49Z","timestamp":1774073629000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["VulLIC: Vulnerability classification method based on LLM code explanations and images"],"prefix":"10.1007","volume":"34","author":[{"given":"Jiadong","family":"Ren","sequence":"first","affiliation":[]},{"given":"Yuzheng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shuailin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jiazheng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Dekai","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,21]]},"reference":[{"key":"9741_CR1","unstructured":"NIST: (2024a). https:\/\/nvd.nist.gov\/general\/nvd-dashboard"},{"key":"9741_CR2","doi-asserted-by":"publisher","unstructured":"Liu, J., Su, P., Yang, M., He, L., Zhang, Y., Zhu, X.-Y., & Lin, H. (2018). Software and cyber security-a survey. Journal of Software, 29. https:\/\/doi.org\/10.13328\/j.cnki.jos.005320.","DOI":"10.13328\/j.cnki.jos.005320"},{"key":"9741_CR3","doi-asserted-by":"publisher","unstructured":"Ferda, Hankin, C., & Malacaria, P. (2022). Attack dynamics: An automatic attack graph generation framework based on system topology, capec, cwe, and cve databases. Computers & Security,123, 102938. https:\/\/doi.org\/10.1016\/j.cose.2022.102938.","DOI":"10.1016\/j.cose.2022.102938"},{"issue":"10","key":"9741_CR4","doi-asserted-by":"publisher","first-page":"4550","DOI":"10.1109\/TSE.2023.3305244","volume":"49","author":"M Fu","year":"2023","unstructured":"Fu, M., Nguyen, V., Tantithamthavorn, C. K., Le, T., & Phung, D. (2023). Vulexplainer: A transformer-based hierarchical distillation for explaining vulnerability types. IEEE Transactions on Software Engineering., 49(10), 4550\u20134565. https:\/\/doi.org\/10.1109\/TSE.2023.3305244","journal-title":"IEEE Transactions on Software Engineering."},{"key":"9741_CR5","doi-asserted-by":"publisher","unstructured":"Wang, Q., Gao, Y., Ren, J., & Zhang, B. (2023). An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network. Computers & Security.,126, Article 103070. https:\/\/doi.org\/10.1016\/j.cose.2022.103070.","DOI":"10.1016\/j.cose.2022.103070"},{"key":"9741_CR6","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1007\/978-3-319-49106-6_65","volume-title":"Advances on Broad-Band Wireless Computing, Communication and Applications","author":"S Na","year":"2017","unstructured":"Na, S., Kim, T., & Kim, H. (2017). A study on the classification of common vulnerabilities and exposures using na\u00efve bayes. In L. Barolli, F. Xhafa, & K. Yim (Eds.), Advances on Broad-Band Wireless Computing, Communication and Applications (pp. 657\u2013662). Cham: Springer."},{"key":"9741_CR7","doi-asserted-by":"publisher","unstructured":"Chen, J., Kudjo, P. K., Mensah, S., Brown, S. A., & Akorfu, G. (2020). An automatic software vulnerability classification framework using term frequency-inverse gravity moment and feature selection. Journal of Systems and Software.,167, Article 110616. https:\/\/doi.org\/10.1016\/j.jss.2020.110616.","DOI":"10.1016\/j.jss.2020.110616"},{"key":"9741_CR8","doi-asserted-by":"publisher","unstructured":"Yang, H., Guo, W., Zou, Z., Bai, Y., Wang, X., & Li, Y. (2018). Research on vulnerability classification method based on dmo-pso-svm algorithm. In: 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), pp. 1180\u20131183. https:\/\/doi.org\/10.1109\/IAEAC.2018.8577637.","DOI":"10.1109\/IAEAC.2018.8577637"},{"key":"9741_CR9","doi-asserted-by":"publisher","unstructured":"Davari, M., Zulkernine, M., & Jaafar, F. (2017). An automatic software vulnerability classification framework. In: 2017 International Conference on Software Security and Assurance (ICSSA), pp. 44\u201349. https:\/\/doi.org\/10.1109\/ICSSA.2017.27.","DOI":"10.1109\/ICSSA.2017.27"},{"key":"9741_CR10","doi-asserted-by":"publisher","unstructured":"Wang, P., Zhou, Y., Sun, B., & Zhang, W. (2019). Intelligent prediction of vulnerability severity level based on text mining and xgbboost. In: 2019 Eleventh International Conference on Advanced Computational Intelligence (ICACI), pp. 72\u201377. https:\/\/doi.org\/10.1109\/ICACI.2019.8778469.","DOI":"10.1109\/ICACI.2019.8778469"},{"key":"9741_CR11","doi-asserted-by":"publisher","unstructured":"Vishnu, P.R., Vinod, P., & Yerima, S.Y. (2022). A deep learning approach for classifying vulnerability descriptions using self attention based neural network. Journal of Network and Systems Management, 30(9). https:\/\/doi.org\/10.1007\/s10922-021-09624-6.","DOI":"10.1007\/s10922-021-09624-6"},{"key":"9741_CR12","doi-asserted-by":"publisher","first-page":"28291","DOI":"10.1109\/ACCESS.2019.2900462","volume":"7","author":"G Huang","year":"2019","unstructured":"Huang, G., Li, Y., Wang, Q., Ren, J., Cheng, Y., & Zhao, X. (2019). Automatic classification method for software vulnerability based on deep neural network. IEEE Access., 7, 28291\u201328298. https:\/\/doi.org\/10.1109\/ACCESS.2019.2900462","journal-title":"IEEE Access."},{"key":"9741_CR13","doi-asserted-by":"crossref","unstructured":"Nakagawa, S., Nagai, T., Kanehara, H., Furumoto, K., Takita, M., Shiraishi, Y., Takahashi, T., Mohri, M., Takano, Y., & Morii, M. (2019). Character-level convolutional neural network for predicting severity of software vulnerability from vulnerability description. IEICE Trans Inf Syst, 102-D, 1679\u20131682.","DOI":"10.1587\/transinf.2018OFL0006"},{"key":"9741_CR14","doi-asserted-by":"publisher","unstructured":"Han, Z., Li, X., Xing, Z., Liu, H., Feng, & Z. (2017). Learning to predict severity of software vulnerability using only vulnerability description. In: 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 125\u2013136.. https:\/\/doi.org\/10.1109\/ICSME.2017.52.","DOI":"10.1109\/ICSME.2017.52"},{"issue":"1","key":"9741_CR15","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/s13198-020-01021-7","volume":"12","author":"R Sharma","year":"2021","unstructured":"Sharma, R., Sibal, R., & Sabharwal, S. (2021). Software vulnerability prioritization using vulnerability description. International Journal of System Assurance Engineering and Management., 12(1), 58\u201364. https:\/\/doi.org\/10.1007\/s13198-020-01021-7","journal-title":"International Journal of System Assurance Engineering and Management."},{"key":"9741_CR16","doi-asserted-by":"publisher","unstructured":"Ni, X., Zheng, J., Guo, Y., Jin, X., & Li, L. (2022). Predicting severity of software vulnerability based on bert-cnn. In: 2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI), pp. 711\u2013715. https:\/\/doi.org\/10.1109\/ICCEAI55464.2022.00151.","DOI":"10.1109\/ICCEAI55464.2022.00151"},{"key":"9741_CR17","doi-asserted-by":"publisher","unstructured":"Dong, Y., Tang, Y., Cheng, X., & Yang, Y. (2023). Dekedver: A deep learning-based multi-type software vulnerability classification framework using vulnerability description and source code. Information and Software Technology.,163, Article 107290. https:\/\/doi.org\/10.1016\/j.infsof.2023.107290.","DOI":"10.1016\/j.infsof.2023.107290"},{"key":"9741_CR18","doi-asserted-by":"publisher","unstructured":"Du, X., Zhang, S., Zhou, Y., & Du, H. (2024). A vulnerability severity prediction method based on bimodal data and multi-task learning. Journal of Systems and Software.,213, Article 112039. https:\/\/doi.org\/10.1016\/j.jss.2024.112039.","DOI":"10.1016\/j.jss.2024.112039"},{"key":"9741_CR19","doi-asserted-by":"publisher","unstructured":"Hu, J., Guo, J., Luo, C., Hu, Y., Lanzinger, M., & Li, Z. (2025). Enabling generalized zero-shot vulnerability classification. IEEE Transactions on Dependable and Secure Computing, 1\u201318. https:\/\/doi.org\/10.1109\/TDSC.2025.3532487.","DOI":"10.1109\/TDSC.2025.3532487"},{"key":"9741_CR20","doi-asserted-by":"publisher","unstructured":"Liu, C., Chen, X., Li, X., & Xue, Y. (2024). Making vulnerability prediction more practical: Prediction, categorization, and localization. Information and Software Technology.,171, Article 107458. https:\/\/doi.org\/10.1016\/j.infsof.2024.107458.","DOI":"10.1016\/j.infsof.2024.107458"},{"key":"9741_CR21","doi-asserted-by":"publisher","unstructured":"Carlini, N., Tramer, F., Wallace, E., Jagielski, M., Herbert-Voss, A., Lee, K., Roberts, A., Brown, T., Song, D., Erlingsson, U., Oprea, A., & Raffel, C. (2020). Extracting Training Data from Large Language Models. arXiv e-prints, 2012\u201307805. https:\/\/doi.org\/10.48550\/arXiv.2012.07805. [cs.CR]","DOI":"10.48550\/arXiv.2012.07805"},{"key":"9741_CR22","unstructured":"Brants, T., Popat, A.C., Xu, P., Och, F.J., & Dean, J. (2007). Large language models in machine translation. In: J. Eisner (Ed.) Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL), pp. 858\u2013867. Association for Computational Linguistics, Prague, Czech Republic. https:\/\/aclanthology.org\/D07-1090\/."},{"key":"9741_CR23","doi-asserted-by":"publisher","unstructured":"Raffel, C., Shazeer, N., Roberts, A., Lee, K., Narang, S., Matena, M., Zhou, Y., Li, W., & Liu, P.J. (2019). Exploring the Limits of Transfer Learning with a Unified Text-to-Text Transformer. arXiv e-prints, 1910\u201310683. https:\/\/doi.org\/10.48550\/arXiv.1910.10683. [cs.LG]","DOI":"10.48550\/arXiv.1910.10683"},{"key":"9741_CR24","doi-asserted-by":"crossref","unstructured":"Nagata, R., Kimura, M., Hanawa, K. (2022). Exploring the capacity of a large-scale masked language model to recognize grammatical errors. In S. Muresan, P. Nakov, & A. Villavicencio (Eds.), Findings of the Association for Computational Linguistics: ACL 2022, pp. 4107\u20134118. Association for Computational Linguistics, Dublin, Ireland (2022). https:\/\/doi.org\/10.18653\/v1\/2022.findings-acl.324, https:\/\/aclanthology.org\/2022.findings-acl.324\/.","DOI":"10.18653\/v1\/2022.findings-acl.324"},{"key":"9741_CR25","unstructured":"Liu, Z., Tang, Y., Luo, X., Zhou, Y., & Zhang, L.F. (2023). No Need to Lift a Finger Anymore? Assessing the Quality of Code Generation by ChatGPT. arXiv e-prints, 2308\u201304838. https:\/\/doi.org\/10.48550\/arXiv.2308.04838. [cs.SE]"},{"issue":"2","key":"9741_CR26","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1080\/0022250X.2001.9990249","volume":"25","author":"U Brandes","year":"2001","unstructured":"Brandes, U. (2001). A faster algorithm for betweenness centrality*. The Journal of Mathematical Sociology., 25(2), 163\u2013177.","journal-title":"The Journal of Mathematical Sociology."},{"issue":"3","key":"9741_CR27","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"LC Freeman","year":"1978","unstructured":"Freeman, L. C. (1978). Centrality in social networks conceptual clarification. Social Networks., 1(3), 215\u2013239. https:\/\/doi.org\/10.1016\/0378-8733(78)90021-7","journal-title":"Social Networks."},{"key":"9741_CR28","doi-asserted-by":"publisher","unstructured":"Bianchini, M., Gori, M., & Scarselli, F. (2005). Inside pagerank. ACM Trans Internet Technol,5(1), 92\u2013128. https:\/\/doi.org\/10.1145\/1052934.1052938","DOI":"10.1145\/1052934.1052938"},{"key":"9741_CR29","unstructured":"NIST: CVE-2019-5799. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-5799 (2019b)"},{"key":"9741_CR30","unstructured":"MITRE Corporation: Common Weakness Enumeration (CWE) (2026a). https:\/\/cwe.mitre.org\/data\/definitions\/284.html"},{"key":"9741_CR31","unstructured":"MITRE Corporation: Common Weakness Enumeration (CWE)(2026b). https:\/\/cwe.mitre.org\/data\/definitions\/20.html"},{"key":"9741_CR32","doi-asserted-by":"publisher","unstructured":"Wang, J., Huang, Y., Chen, C., Liu, Z., Wang, S., & Wang, Q. (2023). Software Testing with Large Language Models: Survey, Landscape, and Vision. arXiv e-prints, 2307\u201307221. https:\/\/doi.org\/10.48550\/arXiv.2307.07221. [cs.SE]","DOI":"10.48550\/arXiv.2307.07221"},{"key":"9741_CR33","doi-asserted-by":"crossref","unstructured":"Gu, Y., Han, X., Liu, Z., Huang, M. (2022). PPT: Pre-trained prompt tuning for few-shot learning. In S. Muresan, P. Nakov, & A. Villavicencio (Eds.), Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pp. 8410\u20138423. Association for Computational Linguistics, Dublin, Ireland. https:\/\/doi.org\/10.18653\/v1\/2022.acl-long.576 , https:\/\/aclanthology.org\/2022.acl-long.576\/.","DOI":"10.18653\/v1\/2022.acl-long.576"},{"key":"9741_CR34","doi-asserted-by":"publisher","unstructured":"Brown, T.B., Mann, B., Ryder, N., Subbiah, M., Kaplan, J., Dhariwal, P., Neelakantan, A., Shyam, P., Sastry, G., Askell, A., Agarwal, S., Herbert-Voss, A., Krueger, G., Henighan, T., Child, R., Ramesh, A., Ziegler, D.M., Wu, J., Winter, C., Hesse, C., Chen, M., Sigler, E., Litwin, M., Gray, S., Chess, B., Clark, J., Berner, C., McCandlish, S., Radford, A., Sutskever, I., & Amodei, D. (2020). Language Models are Few-Shot Learners. arXiv e-prints, 2005\u201314165. https:\/\/doi.org\/10.48550\/arXiv.2005.14165. [cs.CL]","DOI":"10.48550\/arXiv.2005.14165"},{"key":"9741_CR35","doi-asserted-by":"publisher","unstructured":"Sun, X., Ye, Z., Bo, L., Wu, X., Wei, Y., Zhang, T., & Li, B. (2023). Automatic software vulnerability assessment by extracting vulnerability elements. Journal of Systems and Software.,204, Article 111790. https:\/\/doi.org\/10.1016\/j.jss.2023.111790.","DOI":"10.1016\/j.jss.2023.111790"},{"key":"9741_CR36","doi-asserted-by":"publisher","unstructured":"Malhotra, R., & Vidushi, V. (2023). Impact of word embedding methods on software vulnerability severity prediction models. In: 2023 13th International Conference on Cloud Computing, Data Science & Engineering (Confluence), pp. 293\u2013297. https:\/\/doi.org\/10.1109\/Confluence56041.2023.10048868.","DOI":"10.1109\/Confluence56041.2023.10048868"},{"key":"9741_CR37","doi-asserted-by":"publisher","unstructured":"Pan, M., Wu, P., Zou, Y., Ruan, C., & Zhang, T. (2023). An automatic vulnerability classification framework based on bigru-textcnn. Procedia Computer Science. 222, 377\u2013386. https:\/\/doi.org\/10.1016\/j.procs.2023.08.176 . International Neural Network Society Workshop on Deep Learning Innovations and Applications (INNS DLIA 2023).","DOI":"10.1016\/j.procs.2023.08.176"},{"key":"9741_CR38","doi-asserted-by":"publisher","unstructured":"Sun, X., Li, L., Bo, L., Wu, X., Wei, Y., & Li, B. (2024). Automatic software vulnerability classification by extracting vulnerability triggers. J Softw Evol Process, 36(2). https:\/\/doi.org\/10.1002\/SMR.2508.","DOI":"10.1002\/SMR.2508"},{"key":"9741_CR39","doi-asserted-by":"publisher","unstructured":"Ben Yahya, A., El Akhal, H., Mehdi Ismaili Alaoui, E., & El Alaoui, A.E.B. (2025). Bayes-based word weighting for enhanced vulnerability classification in critical infrastructure systems. Computers & Security,154, 104451. https:\/\/doi.org\/10.1016\/j.cose.2025.104451.","DOI":"10.1016\/j.cose.2025.104451"},{"key":"9741_CR40","doi-asserted-by":"publisher","unstructured":"Liu, Z. (2025). Intelligent classification of computer vulnerabilities and network security management system: Combining memristor neural network and improved tcnn model. PLOS ONE.,20(1), 0318075. https:\/\/doi.org\/10.1371\/journal.pone.0318075.","DOI":"10.1371\/journal.pone.0318075"},{"issue":"5","key":"9741_CR41","doi-asserted-by":"publisher","first-page":"872","DOI":"10.1109\/JAS.2025.125498","volume":"12","author":"Z Deng","year":"2025","unstructured":"Deng, Z., Ma, W., Han, Q.-L., Zhou, W., Zhu, X., Wen, S., & Xiang, Y. (2025). Exploring deepseek: A survey on advances, applications, challenges and future directions. IEEE\/CAA Journal of Automatica Sinica., 12(5), 872\u2013893. https:\/\/doi.org\/10.1109\/JAS.2025.125498","journal-title":"IEEE\/CAA Journal of Automatica Sinica."},{"issue":"2","key":"9741_CR42","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1109\/JAS.2024.124971","volume":"12","author":"X Zhu","year":"2025","unstructured":"Zhu, X., Zhou, W., Han, Q.-L., Ma, W., Wen, S., & Xiang, Y. (2025). When software security meets large language models: A survey. IEEE\/CAA Journal of Automatica Sinica., 12(2), 317\u2013334. https:\/\/doi.org\/10.1109\/JAS.2024.124971","journal-title":"IEEE\/CAA Journal of Automatica Sinica."},{"key":"9741_CR43","unstructured":"OpenAI: GPT-3.5-Turbo Model. https:\/\/platform.openai.com\/docs\/models\/gpt-3.5-turbo (2023a)"},{"key":"9741_CR44","unstructured":"OpenAI: GPT-4 Technical Report. arXiv preprint arXiv:2303.08774 (2023b)"},{"key":"9741_CR45","doi-asserted-by":"publisher","unstructured":"Lu, G., Ju, X., Chen, X., Pei, W., & Cai, Z. (2024). Grace: Empowering llm-based software vulnerability detection with graph structure and in-context learning. Journal of Systems and Software.,212, Article 112031. https:\/\/doi.org\/10.1016\/j.jss.2024.112031.","DOI":"10.1016\/j.jss.2024.112031"},{"key":"9741_CR46","doi-asserted-by":"crossref","unstructured":"Pagliardini, M., Gupta, P., & Jaggi, M. (2018). Unsupervised learning of sentence embeddings using compositional n-gram features. In M. Walker, H. Ji, & A. Stent (Eds.) Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long Papers), pp. 528\u2013540. Association for Computational Linguistics, New Orleans, Louisiana. https:\/\/doi.org\/10.18653\/v1\/N18-1049, https:\/\/aclanthology.org\/N18-1049\/.","DOI":"10.18653\/v1\/N18-1049"},{"key":"9741_CR47","doi-asserted-by":"publisher","unstructured":"Fan, J., Li, Y., Wang, S., & Nguyen, T.N. (2020). A c\/c++ code vulnerability dataset with code changes and cve summaries. In: 2020 IEEE\/ACM 17th International Conference on Mining Software Repositories (MSR), pp. 508\u2013512. https:\/\/doi.org\/10.1145\/3379597.3387501.","DOI":"10.1145\/3379597.3387501"},{"key":"9741_CR48","unstructured":"NIST: CVE-2019-15945. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-15945 (2019a)"},{"key":"9741_CR49","doi-asserted-by":"publisher","unstructured":"Chen, Y., Ding, Z., Alowain, L., Chen, X., & Wagner, D. (2023). DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. arXiv e-prints, 2304\u201300409. https:\/\/doi.org\/10.48550\/arXiv.2304.00409. [cs.CR]","DOI":"10.48550\/arXiv.2304.00409"},{"key":"9741_CR50","doi-asserted-by":"publisher","unstructured":"Croft, R., Babar, M.A., & Kholoosi, M.M. (2023). Data quality for software vulnerability datasets. In: Proceedings of the 45th International Conference on Software Engineering. ICSE \u201923, pp. 121\u2013133. IEEE Press. https:\/\/doi.org\/10.1109\/ICSE48619.2023.00022.","DOI":"10.1109\/ICSE48619.2023.00022"},{"key":"9741_CR51","doi-asserted-by":"publisher","unstructured":"Nie, X., Li, N., Wang, K., Wang, S., Luo, X., & Wang, H. (2023). Understanding and tackling label errors in deep learning-based vulnerability detection (experience paper). In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. ISSTA 2023, pp. 52\u201363. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3597926.3598037.","DOI":"10.1145\/3597926.3598037"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-026-09741-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11219-026-09741-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-026-09741-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T06:13:52Z","timestamp":1774073632000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11219-026-09741-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,21]]},"references-count":51,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["9741"],"URL":"https:\/\/doi.org\/10.1007\/s11219-026-09741-y","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,21]]},"assertion":[{"value":"25 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"13"}}