{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T17:06:34Z","timestamp":1769792794464,"version":"3.49.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032041593","type":"print"},{"value":"9783032041609","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-04160-9_17","type":"book-chapter","created":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:57:45Z","timestamp":1769749065000},"page":"187-196","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Large Language Models with\u00a0Faster Code Preprocessing for\u00a0Vulnerability Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-1038-8384","authenticated-orcid":false,"given":"Jos\u00e9","family":"Gonalves","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6630-9939","authenticated-orcid":false,"given":"Miguel","family":"Silva","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8075-531X","authenticated-orcid":false,"given":"Eva","family":"Maia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2519-9859","authenticated-orcid":false,"given":"Isabel","family":"Praa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,31]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","unstructured":"Chen Y et al (2023) DiverseVul: a new vulnerable source code dataset for deep learning based vulnerability detection\u2019. In: Proceedings of the 26th international symposium on research in attacks, intrusions and defenses. RAID 2023. ACM. https:\/\/doi.org\/10.1145\/3607199.3607242","DOI":"10.1145\/3607199.3607242"},{"key":"17_CR2","doi-asserted-by":"publisher","unstructured":"Croft R, Ali Babar M, Mehdi Kholoosi M (2023) Data quality for software vulnerability datasets. In: 2023 IEEE\/ACM 45th international conference on software engineering (ICSE), pp\u00a0121\u2013133. https:\/\/doi.org\/10.1109\/ICSE48619.2023.00022","DOI":"10.1109\/ICSE48619.2023.00022"},{"key":"17_CR3","doi-asserted-by":"publisher","unstructured":"Du X et al (2023) An extensive study on adversarial attack against pre-trained models of code. In: Proceedings of the 31st ACM joint European software engineering conference and symposium on the foundations of software engineering. ESEC\/FSE 2023. Association for Computing Machinery, San Francisco, CA, USA, pp 489\u2013501. ISBN: 9798400703270. https:\/\/doi.org\/10.1145\/3611643.3616356","DOI":"10.1145\/3611643.3616356"},{"key":"17_CR4","unstructured":"Gonalves J et al (2024) Evaluating LLaMA 3.2 for software vulnerability detection. arXiv:2503.07770 [cs.LG]"},{"key":"17_CR5","doi-asserted-by":"publisher","unstructured":"Gonalves J et al (2025) RDiverseVul: refined DiverseVul. Version 1.0.0. Zenodo. https:\/\/doi.org\/10.5281\/zenodo.15051277","DOI":"10.5281\/zenodo.15051277"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Gonalves J et al (2025) SCoPE: evaluating LLMs for software vulnerability detection. In: Mehmood R et al (eds) Distributed computing and artificial intelligence, special sessions I, 21st international conference. Springer, Cham, pp 34\u201343. ISBN: 978-3-031-76459-2. 10.1007\/978-3-031-76459-2_4","DOI":"10.1007\/978-3-031-76459-2_4"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Gupta A, Goyal R (2024) A generative AI-driven method-level semantic clone detection based on the structural and semantical comparison of methods. IEEE Access 12:70773\u201370791","DOI":"10.1109\/ACCESS.2024.3401770"},{"key":"17_CR8","doi-asserted-by":"publisher","unstructured":"Kalouptsoglou I et al (2023) Software vulnerability prediction: a systematic mapping study. Inf Softw Technol 164:107303. ISSN: 0950-5849. https:\/\/doi.org\/10.1016\/j.infsof.2023.107303","DOI":"10.1016\/j.infsof.2023.107303"},{"key":"17_CR9","doi-asserted-by":"publisher","unstructured":"Lomio F et al (2022) Just-in-time software vulnerability detection: are we there yet? J Syst Softw 188:111283. ISSN: 0164-1212. https:\/\/doi.org\/10.1016\/j.jss.2022.111283","DOI":"10.1016\/j.jss.2022.111283"},{"key":"17_CR10","doi-asserted-by":"publisher","unstructured":"Lu G et al (2024) GRACE: empowering LLM-based software vulnerability detection with graph structure and in-context learning. J Syst Softw 212:112031. ISSN: 0164-1212. https:\/\/doi.org\/10.1016\/j.jss.2024.112031","DOI":"10.1016\/j.jss.2024.112031"},{"key":"17_CR11","doi-asserted-by":"publisher","unstructured":"Mahyari AA (2024) Harnessing the power of LLMs in source code vulnerability detection. In: MILCOM 2024\u20142024 IEEE military communications conference (MILCOM), pp 251\u2013256. https:\/\/doi.org\/10.1109\/MILCOM61039.2024.10774025","DOI":"10.1109\/MILCOM61039.2024.10774025"},{"key":"17_CR12","doi-asserted-by":"publisher","unstructured":"Purba MD et al (2023) Software vulnerability detection using large language models. In: 2023 IEEE 34th international symposium on software reliability engineering workshops (ISSREW), pp 112\u2013119. https:\/\/doi.org\/10.1109\/ISSREW60843.2023.00058","DOI":"10.1109\/ISSREW60843.2023.00058"},{"key":"17_CR13","doi-asserted-by":"publisher","unstructured":"Razuvayevskaya O et al (2024) Comparison between parameter-efficient techniques and full fine-tuning: a case study on multilingual news article classification. PLOS ONE 19(5):1\u201326. https:\/\/doi.org\/10.1371\/journal.pone.0301738","DOI":"10.1371\/journal.pone.0301738"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Shestov A et al (2025) Finetuning large language models for vulnerability detection. IEEE Access 13:38889\u201338900","DOI":"10.1109\/ACCESS.2025.3546700"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Tamberg K, Bahsi H (2025) Harnessing large language models for software vulnerability detection: a comprehensive benchmarking study. IEEE Access 13:29698\u201329717","DOI":"10.1109\/ACCESS.2025.3541146"},{"key":"17_CR16","doi-asserted-by":"publisher","unstructured":"Yang G et al (2024) How important are good method names in neural code generation? A model robustness perspective. ACM Trans Softw Eng Methodol 33(3). ISSN: 1049-331X. https:\/\/doi.org\/10.1145\/3630010","DOI":"10.1145\/3630010"},{"key":"17_CR17","doi-asserted-by":"publisher","unstructured":"Yefet N, Alon U, Yahav E (2020) Adversarial examples for models of code. In: Proceedings of the ACM on programming languages 4.OOPSLA. https:\/\/doi.org\/10.1145\/3428230","DOI":"10.1145\/3428230"},{"key":"17_CR18","doi-asserted-by":"publisher","unstructured":"Yu X et al (2023) AdVulCode: generating adversarial vulnerable code against deep learning-based vulnerability detectors. Electronics 12:936. ISSN: 2079-9292. https:\/\/doi.org\/10.3390\/electronics12040936","DOI":"10.3390\/electronics12040936"},{"key":"17_CR19","doi-asserted-by":"publisher","unstructured":"Zhou X, Zhang T, Lo D (2024) Large language model for vulnerability detection: emerging results and future directions. In: Proceedings of the 2024 ACM\/IEEE 44th international conference on software engineering: new ideas and emerging results. ICSE-NIER\u201924. Association for Computing Machinery, Lisbon, Portugal, pp. 7\u201351. ISBN: 9798400705007. https:\/\/doi.org\/10.1145\/3639476.3639762","DOI":"10.1145\/3639476.3639762"}],"container-title":["Lecture Notes in Networks and Systems","Distributed Computing and Artificial Intelligence, 22nd International Conference"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-04160-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:57:47Z","timestamp":1769749067000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-04160-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032041593","9783032041609"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-04160-9_17","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"31 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Distributed Computing and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lille","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dcai2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dcai-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}