{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T08:15:44Z","timestamp":1773994544569,"version":"3.50.1"},"reference-count":340,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.eswa.2025.130991","type":"journal-article","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T16:07:36Z","timestamp":1767370056000},"page":"130991","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["CSLLM: Code-Specific Large Language Models\u2014A Survey"],"prefix":"10.1016","volume":"308","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2421-6335","authenticated-orcid":false,"given":"Jayesh","family":"Umre","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3451-1557","authenticated-orcid":false,"given":"Ashish Singh","family":"Parihar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5051-5887","authenticated-orcid":false,"given":"Atul","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/j.eswa.2025.130991_bib0001","doi-asserted-by":"crossref","DOI":"10.1145\/3719006","article-title":"Artificial intelligence for software engineering: The journey so far and the road ahead","volume":"34","author":"Ahmed","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"4","key":"10.1016\/j.eswa.2025.130991_bib0002","first-page":"559","article-title":"Lm4opt: Unveiling the potential of large language models in formulating mathematical optimization problems","volume":"62","author":"Ahmed","year":"2024","journal-title":"INFOR: Information Systems and Operational Research"},{"key":"10.1016\/j.eswa.2025.130991_bib0003","doi-asserted-by":"crossref","DOI":"10.1145\/3721127","article-title":"Accountability in code review: The role of intrinsic drivers and the impact of LLMs","author":"Alami","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0004","unstructured":"Allal, L. B., Li, R., Kocetkov, D., Mou, C., Akiki, C., Ferrandis, C. M., Muennighoff, N., Mishra, M., Gu, A., Dey, M. et al. (2023). Santacoder: Don\u2019t reach for the stars!arXiv preprint arXiv: 2301.03988."},{"key":"10.1016\/j.eswa.2025.130991_bib0005","doi-asserted-by":"crossref","first-page":"46136","DOI":"10.1109\/ACCESS.2025.3549780","article-title":"Code clone detection techniques based on large language models","volume":"13","author":"Almatrafi","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.130991_bib0006","series-title":"Proceedings of the 18th ACM\/IEEE international symposium on empirical software engineering and measurement","first-page":"427","article-title":"Automatic library migration using large language models: First results","author":"Almeida","year":"2024"},{"issue":"9","key":"10.1016\/j.eswa.2025.130991_bib0007","doi-asserted-by":"crossref","first-page":"2825","DOI":"10.3390\/s25092825","article-title":"Large language models for synthetic dataset generation of cybersecurity indicators of compromise","volume":"25","author":"Almorjan","year":"2025","journal-title":"Sensors"},{"key":"10.1016\/j.eswa.2025.130991_bib0008","doi-asserted-by":"crossref","DOI":"10.1109\/TAI.2025.3544590","article-title":"SecureLLAMA","author":"Alqarni","year":"2025","journal-title":"IEEE Transactions on Artificial Intelligence"},{"key":"10.1016\/j.eswa.2025.130991_bib0009","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.iotcps.2023.12.003","article-title":"Machine learning techniques for IOT security: Current research and future vision with generative AI and large language models","volume":"4","author":"Alwahedi","year":"2024","journal-title":"Internet of Things and Cyber-Physical Systems"},{"key":"10.1016\/j.eswa.2025.130991_bib0010","series-title":"2023\u202fIEEE\/ACM International workshop on automated program repair (APR)","first-page":"11","article-title":"Fixeval: Execution-based evaluation of program fixes for programming problems","author":"Anjum Haque","year":"2023"},{"issue":"9","key":"10.1016\/j.eswa.2025.130991_bib0011","doi-asserted-by":"crossref","first-page":"137","DOI":"10.3390\/robotics13090137","article-title":"Harnessing the power of large language models for automated code generation and verification","volume":"13","author":"Antero","year":"2024","journal-title":"Robotics"},{"key":"10.1016\/j.eswa.2025.130991_bib0012","series-title":"Proceedings of the 2024\u202fACM conference on fairness, accountability, and transparency","first-page":"2199","article-title":"A critical analysis of the largest source for generative AI training data","author":"Baack","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0013","series-title":"International conference on learning representations (ICLR)","article-title":"Neural machine translation by jointly learning to align and translate","author":"Bahdanau","year":"2015"},{"key":"10.1016\/j.eswa.2025.130991_bib0014","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.126357","article-title":"Collaboration between intelligent agents and large language models","volume":"269","author":"Bai","year":"2025","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2025.130991_bib0015","doi-asserted-by":"crossref","DOI":"10.1016\/j.mlwa.2025.100660","article-title":"Unified modeling language code generation from diagram images using multimodal large language models","volume":"20","author":"Bates","year":"2025","journal-title":"Machine Learning with Applications"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0016","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/72.279181","article-title":"Learning long-term dependencies with gradient descent is difficult","volume":"5","author":"Bengio","year":"1994","journal-title":"IEEE Transactions on Neural Networks"},{"key":"10.1016\/j.eswa.2025.130991_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.jii.2025.100834","article-title":"Advancing software security: DCodeBERT for automatic vulnerability detection and repair","volume":"45","author":"Bensaoud","year":"2025","journal-title":"Journal of Industrial Information Integration"},{"key":"10.1016\/j.eswa.2025.130991_bib0018","series-title":"Proceedings of the 18th ACM\/IEEE international symposium on empirical software engineering and measurement","first-page":"292","article-title":"Are large language models a threat to programming platforms? an exploratory study","author":"Billah","year":"2024"},{"issue":"3","key":"10.1016\/j.eswa.2025.130991_bib0019","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/s10462-024-11078-6","article-title":"Digital forgetting in large language models: A survey of unlearning methods","volume":"58","author":"Blanco-Justicia","year":"2025","journal-title":"Artificial Intelligence Review"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0020","doi-asserted-by":"crossref","DOI":"10.1080\/10872981.2025.2550751","article-title":"Evaluating large language models as graders of medical short answer questions: A comparative analysis with expert human graders","volume":"30","author":"Bolgova","year":"2025","journal-title":"Medical Education Online"},{"key":"10.1016\/j.eswa.2025.130991_bib0021","series-title":"Advances in neural information processing systems","first-page":"1877","article-title":"Language models are few-shot learners","volume":"vol. 33","author":"Brown","year":"2020"},{"issue":"POPL","key":"10.1016\/j.eswa.2025.130991_bib0022","doi-asserted-by":"crossref","DOI":"10.1145\/3704905","article-title":"Automated program refinement: Guide and verify code large language model with refinement calculus","volume":"9","author":"Cai","year":"2025","journal-title":"Proceedings of the ACM on Programming Languages"},{"key":"10.1016\/j.eswa.2025.130991_bib0023","series-title":"Proceedings of the 2024\u202fIEEE\/ACM 46th international conference on software engineering: Companion proceedings","first-page":"416","article-title":"F-codeLLM: A federated learning framework for adapting large language models to practical software development","author":"Cai","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0024","series-title":"Proceedings of the 39th IEEE\/ACM international conference on automated software engineering","first-page":"870","article-title":"Javabench: A benchmark of object-oriented code generation for evaluating large language models","author":"Cao","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0025","doi-asserted-by":"crossref","DOI":"10.1016\/j.iheduc.2025.101001","article-title":"Transforming online learning research: Leveraging GPT large language models for automated content analysis of cognitive presence","volume":"65","author":"Castellanos-Reyes","year":"2025","journal-title":"The Internet and Higher Education"},{"issue":"7","key":"10.1016\/j.eswa.2025.130991_bib0026","doi-asserted-by":"crossref","DOI":"10.1145\/3716846","article-title":"Hallucination detection in foundation models for decision-making: A flexible definition and review of the state of the art","volume":"57","author":"Chakraborty","year":"2025","journal-title":"ACM Computing Surveys"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0027","doi-asserted-by":"crossref","DOI":"10.3390\/software4010005","article-title":"A systematic approach for assessing large language models\u2019 test case generation capability","volume":"4","author":"Chang","year":"2025","journal-title":"Software"},{"issue":"3","key":"10.1016\/j.eswa.2025.130991_bib0028","doi-asserted-by":"crossref","DOI":"10.1145\/3641289","article-title":"A survey on evaluation of large language models","volume":"15","author":"Chang","year":"2024","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"10.1016\/j.eswa.2025.130991_bib0029","series-title":"Proceedings of the 26th international symposium on research in attacks, intrusions and defenses","first-page":"654","article-title":"Diversevul","author":"Chen","year":"2023"},{"key":"10.1016\/j.eswa.2025.130991_bib0030","doi-asserted-by":"crossref","DOI":"10.1016\/j.patter.2025.101260","article-title":"Unleashing the potential of prompt engineering for large language models","author":"Chen","year":"2025","journal-title":"Patterns"},{"key":"10.1016\/j.eswa.2025.130991_bib0031","article-title":"Llm for mobile: An initial roadmap","author":"Chen","year":"2024","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0032","series-title":"Proceedings of the IEEE\/ACM 46th international conference on software engineering","article-title":"Code search is all you need? improving code suggestions with code search","author":"Chen","year":"2024"},{"issue":"5","key":"10.1016\/j.eswa.2025.130991_bib0033","doi-asserted-by":"crossref","first-page":"335","DOI":"10.3390\/info16050335","article-title":"From pixels to insights: Unsupervised knowledge graph generation with large language model","volume":"16","author":"Chen","year":"2025","journal-title":"Information"},{"issue":"11","key":"10.1016\/j.eswa.2025.130991_bib0034","doi-asserted-by":"crossref","first-page":"2145","DOI":"10.3390\/electronics14112145","article-title":"Evaluation of prompt engineering on the performance of a large language model in document information extraction","volume":"14","author":"Chen","year":"2025","journal-title":"Electronics"},{"key":"10.1016\/j.eswa.2025.130991_bib0035","unstructured":"Chen, M., Tworek, J., Jun, H., Yuan, Q., Oliveira, P. H. P. D., Kaplan, J., Edwards, H., Burda, Y., Joseph, N., Brockman, G. et al. (2021). Evaluating large language models trained on code. 10.48550\/arXiv.2107.03374."},{"key":"10.1016\/j.eswa.2025.130991_bib0036","first-page":"1","article-title":"Learning-based automated program repair: A systematic literature review","author":"Chen","year":"2025","journal-title":"Complex System Modeling and Simulation"},{"key":"10.1016\/j.eswa.2025.130991_bib0037","first-page":"54872","article-title":"Unlocking the capabilities of thought","volume":"37","author":"Chen","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.eswa.2025.130991_bib0038","series-title":"Findings of the association for computational linguistics: EMNLP 2023","first-page":"3279","article-title":"MAPO: Boosting large language model performance with model-adaptive prompt optimization","author":"Chen","year":"2023"},{"issue":"11","key":"10.1016\/j.eswa.2025.130991_bib0039","doi-asserted-by":"crossref","first-page":"2849","DOI":"10.1109\/TSE.2024.3423769","article-title":"Supersonic: Learning to generate source code optimizations in c\/c++","volume":"50","author":"Chen","year":"2024","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"14","key":"10.1016\/j.eswa.2025.130991_bib0040","doi-asserted-by":"crossref","DOI":"10.3390\/app15147781","article-title":"Data-driven selection of decontamination robot locomotion based on terrain compatibility scoring models","volume":"15","author":"Chittoor","year":"2025","journal-title":"Applied Sciences"},{"key":"10.1016\/j.eswa.2025.130991_bib0041","doi-asserted-by":"crossref","unstructured":"Chu, Z., Wang, Z., & Zhang, W. (2024). Fairness in large language models: A taxonomic survey. 26(1), 34\u201348. 10.1145\/3682112.3682117.","DOI":"10.1145\/3682112.3682117"},{"key":"10.1016\/j.eswa.2025.130991_bib0042","series-title":"Proceedings of the 30th ACM SIGKDD conference on knowledge discovery and data mining","first-page":"6437","article-title":"Bias and unfairness in information retrieval systems: new challenges in the LLM era","author":"Dai","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0043","doi-asserted-by":"crossref","first-page":"16344","DOI":"10.52202\/068431-1189","article-title":"Flashattention","volume":"35","author":"Dao","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"6","key":"10.1016\/j.eswa.2025.130991_bib0044","doi-asserted-by":"crossref","DOI":"10.1145\/3712001","article-title":"Security and privacy challenges of large language models: A survey","volume":"57","author":"Das","year":"2025","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/j.eswa.2025.130991_bib0045","unstructured":"Google DeepMind and others. Gemini. https:\/\/deepmind.google\/technology\/gemini, Accessed: May 2025."},{"key":"10.1016\/j.eswa.2025.130991_bib0046","unstructured":"DeepSeek, A. I. et al. (2024). Deepseek. https:\/\/www.deepseek.com\/, Accessed: May 2025."},{"key":"10.1016\/j.eswa.2025.130991_bib0047","article-title":"Gpt","author":"Deng","year":"2025","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"key":"10.1016\/j.eswa.2025.130991_bib0048","series-title":"Companion proceedings of the 30th international conference on intelligent user interfaces","first-page":"120","article-title":"Athena: A customizable llm-based code completion tool for visual studio code","author":"Desolda","year":"2025"},{"key":"10.1016\/j.eswa.2025.130991_bib0049","first-page":"1","article-title":"Advancements in automated program repair","author":"Dikici","year":"2025","journal-title":"Knowledge and Information Systems"},{"key":"10.1016\/j.eswa.2025.130991_bib0050","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2024.128849","article-title":"Adversarial contrastive representation training with external knowledge injection for zero-shot stance detection","volume":"614","author":"Ding","year":"2025","journal-title":"Neurocomputing"},{"key":"10.1016\/j.eswa.2025.130991_bib0051","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2024.129108","article-title":"Enhancing zero-shot multilingual semantic parsing: A framework leveraging large language models for data augmentation and advanced prompting techniques","volume":"618","author":"Do","year":"2025","journal-title":"Neurocomputing"},{"issue":"9","key":"10.1016\/j.eswa.2025.130991_bib0052","doi-asserted-by":"crossref","DOI":"10.1145\/3727339","article-title":"A primer on pretrained multilingual language models","volume":"57","author":"Doddapaneni","year":"2025","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/j.eswa.2025.130991_bib0053","doi-asserted-by":"crossref","unstructured":"Dong, Y., Ding, J., Jiang, X., Li, G., Li, Z., & Jin, Z. (2025a). Codescore: Evaluating code generation by learning code execution. 34(3). 10.1145\/3695991.","DOI":"10.1145\/3695991"},{"key":"10.1016\/j.eswa.2025.130991_bib0054","series-title":"Proceedings of the eighteenth ACM international conference on web search and data mining","first-page":"596","article-title":"Enhancing code search intent with programming context exploration","author":"Dong","year":"2025"},{"issue":"4","key":"10.1016\/j.eswa.2025.130991_bib0055","doi-asserted-by":"crossref","first-page":"2146","DOI":"10.3390\/app15042146","article-title":"Fine-tuning large language models for ontology engineering: A comparative analysis of GPT-4 and mistral","volume":"15","author":"Doumanas","year":"2025","journal-title":"Applied Sciences"},{"key":"10.1016\/j.eswa.2025.130991_bib0056","series-title":"Proceedings of the IEEE\/ACM 46th international conference on software engineering","article-title":"Evaluating large language models in class","author":"Du","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0057","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2025.103263","article-title":"Llm-manuf: An integrated framework of fine-tuning large language models for intelligent decision-making in manufacturing","volume":"65","author":"Du","year":"2025","journal-title":"Advanced Engineering Informatics"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0058","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1140\/epjds\/s13688-025-00548-8","article-title":"Scaling hermeneutics: A guide to qualitative coding with LLMs for reflexive content analysis","volume":"14","author":"Dunivin","year":"2025","journal-title":"EPJ Data Science"},{"key":"10.1016\/j.eswa.2025.130991_bib0059","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2025.112562","article-title":"Piloting copilot, codex, and starcoder2: Hot temperature, cold prompts, or black magic?","volume":"230","author":"D\u00f6derlein","year":"2025","journal-title":"Journal of Systems and Software"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0060","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1207\/s15516709cog1402_1","article-title":"Finding structure in time","volume":"14","author":"Elman","year":"1990","journal-title":"Cognitive science"},{"key":"10.1016\/j.eswa.2025.130991_bib0061","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2023.111741","article-title":"Out of the BLEU","volume":"203","author":"Evtikhiev","year":"2023","journal-title":"Journal of Systems and Software"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0062","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1007\/s10207-025-00992-7","article-title":"Large language models for software vulnerability detection","volume":"24","author":"Far","year":"2025","journal-title":"International Journal of Information Security"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0063","article-title":"A comparative analysis of instruction fine-tuning large language models for financial text classification","volume":"16","author":"Fatemi","year":"2025","journal-title":"Management Information Systems"},{"key":"10.1016\/j.eswa.2025.130991_bib0064","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2024.3472476","article-title":"Flakyfix","author":"Fatima","year":"2024","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"11","key":"10.1016\/j.eswa.2025.130991_bib0065","doi-asserted-by":"crossref","first-page":"1470","DOI":"10.3390\/sym16111470","article-title":"Optimizing microservice deployment in edge computing with large language models","volume":"16","author":"Feng","year":"2024","journal-title":"Symmetry"},{"key":"10.1016\/j.eswa.2025.130991_bib0066","series-title":"Findings of the association for computational linguistics: EMNLP 2020","first-page":"1536","article-title":"CodeBERT: A pre-trained model for programming and natural languages","author":"Feng","year":"2020"},{"key":"10.1016\/j.eswa.2025.130991_bib0067","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2024.109291","article-title":"Enhanced automated code vulnerability repair using large language models","volume":"138","author":"de Fitero-Dominguez","year":"2024","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"10.1016\/j.eswa.2025.130991_bib0068","series-title":"Companion proceedings of the ACM on web conference 2025","first-page":"191","article-title":"Ai-driven guided response for security operation centers with microsoft copilot for security","author":"Freitas","year":"2025"},{"key":"10.1016\/j.eswa.2025.130991_bib0069","unstructured":"Fried, D., Aghajanyan, A., Lin, J., Wang, S., Wallace, E., Shi, F., Zhong, R., Yih, W.-t., Zettlemoyer, L., & Lewis, M. (2022). Incoder: A generative model for code infilling and synthesis. 10.48550\/arXiv.2204.05999."},{"key":"10.1016\/j.eswa.2025.130991_bib0070","article-title":"A generalized hardware debugging approach for large language models using semi","author":"Fu","year":"2024","journal-title":"IEEE Transactions on Circuits and Systems I: Regular Papers"},{"key":"10.1016\/j.eswa.2025.130991_bib0071","first-page":"1","article-title":"The TRIPOD","author":"Gallifant","year":"2025","journal-title":"Nature Medicine"},{"issue":"10","key":"10.1016\/j.eswa.2025.130991_bib0072","doi-asserted-by":"crossref","first-page":"7243","DOI":"10.1007\/s10994-024-06587-y","article-title":"Evaluating large language models for user stance detection on x (twitter)","volume":"113","author":"Gambini","year":"2024","journal-title":"Machine Learning"},{"key":"10.1016\/j.eswa.2025.130991_bib0073","article-title":"The current challenges of software engineering in the era of large language models","author":"Gao","year":"2024","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"3","key":"10.1016\/j.eswa.2025.130991_bib0074","first-page":"1","article-title":"Chatiot","volume":"8","author":"Gao","year":"2024","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"10.1016\/j.eswa.2025.130991_bib0075","doi-asserted-by":"crossref","DOI":"10.1016\/j.dajour.2024.100418","article-title":"Classification of intent in moderating online discussions: An empirical evaluation","volume":"10","author":"Gehweiler","year":"2024","journal-title":"Decision Analytics Journal"},{"key":"10.1016\/j.eswa.2025.130991_bib0076","series-title":"Proceedings of the 46th IEEE\/ACM international conference on software engineering","first-page":"1","article-title":"Large language models are few","author":"Geng","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0077","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2024.103193","article-title":"Transformers in source code generation","author":"Ghaemi","year":"2024","journal-title":"Journal of Systems Architecture"},{"key":"10.1016\/j.eswa.2025.130991_bib0078","doi-asserted-by":"crossref","first-page":"24383","DOI":"10.1109\/ACCESS.2024.3525069","article-title":"Leveraging an enhanced codeBERT-based model for multiclass software defect prediction via defect classification","volume":"13","author":"Ghafoor Hussain","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.130991_bib0079","series-title":"2025 5Th international conference on advanced research in computing (ICARC)","first-page":"1","article-title":"Evaluating the effectiveness of large language models in automated unit test generation","author":"Godage","year":"2025"},{"key":"10.1016\/j.eswa.2025.130991_bib0080","doi-asserted-by":"crossref","DOI":"10.1016\/j.copbio.2023.103055","article-title":"Defining the boundaries: Challenges and advances in identifying cells in microscopy images","volume":"85","author":"Gogoberidze","year":"2024","journal-title":"Current Opinion in Biotechnology"},{"key":"10.1016\/j.eswa.2025.130991_bib0081","unstructured":"Google, A. I. et al. (2024). Codegemma. https:\/\/ai.google.dev\/gemma, Accessed: May 2025."},{"key":"10.1016\/j.eswa.2025.130991_bib0082","doi-asserted-by":"crossref","DOI":"10.1016\/j.softx.2024.101698","article-title":"SmarTS","volume":"26","author":"G\u00f3rski","year":"2024","journal-title":"SoftwareX"},{"issue":"12","key":"10.1016\/j.eswa.2025.130991_bib0083","doi-asserted-by":"crossref","first-page":"1236","DOI":"10.1109\/TSE.2015.2454513","article-title":"The manybugs and introclass benchmarks for automated repair of c programs","volume":"41","author":"Goues","year":"2015","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0084","doi-asserted-by":"crossref","DOI":"10.1145\/3719351","article-title":"Fully autonomous programming using iterative multi-agent debugging with large language models","volume":"5","author":"Grishina","year":"2025","journal-title":"ACM Transactions on Evolutionary Learning and Optimization"},{"key":"10.1016\/j.eswa.2025.130991_bib0085","doi-asserted-by":"crossref","DOI":"10.1145\/3719351","article-title":"Fully autonomous programming using iterative multi","author":"Grishina","year":"2025","journal-title":"ACM Transactions on Evolutionary Learning"},{"issue":"3","key":"10.1016\/j.eswa.2025.130991_bib0086","doi-asserted-by":"crossref","DOI":"10.1145\/3697012","article-title":"On the effectiveness of large language models in domain-specific code generation","volume":"34","author":"Gu","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"3","key":"10.1016\/j.eswa.2025.130991_bib0087","first-page":"1","article-title":"On the effectiveness of large language models in domain-specific code generation","volume":"34","author":"Gu","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0088","series-title":"Proceedings of the 61st ACM\/IEEE design automation conference","first-page":"1","article-title":"Aptq","author":"Guan","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0089","series-title":"Proceedings of the ACM on web conference 2025","first-page":"1834","article-title":"Webcode2m: A real-world dataset for code generation from webpage designs","author":"Gui","year":"2025"},{"key":"10.1016\/j.eswa.2025.130991_bib0090","unstructured":"Guo, D., Ren, S., Lu, S., Feng, Z., Tang, D., Liu, S., Zhou, L., Duan, N., Svyatkovskiy, A., Fu, S. et al. (2021). Graphcodebert: Pre-training code representations with data flow. 10.48550\/arXiv.2009.08366."},{"key":"10.1016\/j.eswa.2025.130991_bib0091","series-title":"A review of the application of prompt engineering in the safety of large language models","first-page":"424","author":"Guo","year":"2025"},{"key":"10.1016\/j.eswa.2025.130991_bib0092","article-title":"Human","volume":"25","author":"G\u00f3mez-Carmona","year":"2024","journal-title":"Internet of Things"},{"key":"10.1016\/j.eswa.2025.130991_bib0093","article-title":"Multi","volume":"139","author":"Han","year":"2025","journal-title":"Engineering applications of artificial intelligence"},{"key":"10.1016\/j.eswa.2025.130991_bib0094","series-title":"2022 International joint conference on neural networks (IJCNN)","first-page":"1","article-title":"VulBERTa: Simplified source code pre-training for vulnerability detection","author":"Hanif","year":"2022"},{"key":"10.1016\/j.eswa.2025.130991_bib0095","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2024.128773","article-title":"Preserving text space integrity for robust compositional zero-shot learning via mixture of pretrained experts","volume":"614","author":"Hao","year":"2025","journal-title":"Neurocomputing"},{"key":"10.1016\/j.eswa.2025.130991_bib0096","series-title":"Proceedings of the 32nd ACM international conference on information and knowledge management","first-page":"720","article-title":"Large language models as zero","author":"He","year":"2023"},{"key":"10.1016\/j.eswa.2025.130991_bib0097","series-title":"Proceedings of the 42nd ACM SIGPLAN international conference on programming language design and implementation","first-page":"296","article-title":"Learning to find naming issues with big code and small supervision","author":"He","year":"2021"},{"issue":"10","key":"10.1016\/j.eswa.2025.130991_bib0098","doi-asserted-by":"crossref","DOI":"10.3390\/electronics14101961","article-title":"Enhancing large language models for specialized domains: A two-stage framework with parameter-sensitive loRA fine-tuning and chain-of-thought RAG","volume":"14","author":"He","year":"2025","journal-title":"Electronics"},{"key":"10.1016\/j.eswa.2025.130991_bib0099","article-title":"Development of a code","volume":"230","author":"Hemant","year":"2025","journal-title":"Applied Acoustics"},{"issue":"8","key":"10.1016\/j.eswa.2025.130991_bib0100","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short","volume":"9","author":"Hochreiter","year":"1997","journal-title":"Neural Computation"},{"issue":"11","key":"10.1016\/j.eswa.2025.130991_bib0101","doi-asserted-by":"crossref","first-page":"3138","DOI":"10.1109\/TSE.2025.3612251","article-title":"The \u201cquestion neighbourhood\u201d approach for systematic evaluation of code-generating LLMs","volume":"51","author":"Honarvar","year":"2025","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"8","key":"10.1016\/j.eswa.2025.130991_bib0102","first-page":"1107","article-title":"Code smell","volume":"23","author":"Hong","year":"2024","journal-title":"Journal of Web Engineering"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0103","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10664-024-10573-2","article-title":"Type","volume":"30","author":"Hong","year":"2025","journal-title":"Empirical Software Engineering"},{"issue":"FSE","key":"10.1016\/j.eswa.2025.130991_bib0104","doi-asserted-by":"crossref","first-page":"1471","DOI":"10.1145\/3660773","article-title":"A deep dive into large language models for automated bug localization and repair","volume":"1","author":"Hossain","year":"2024","journal-title":"Proceedings of the ACM on Software Engineering"},{"key":"10.1016\/j.eswa.2025.130991_bib0105","article-title":"Geocode","author":"Hou","year":"2025","journal-title":"International Journal of Applied Earth Observation and Geoinformation"},{"issue":"8","key":"10.1016\/j.eswa.2025.130991_bib0106","doi-asserted-by":"crossref","DOI":"10.1002\/advs.202412279","article-title":"Comparing large language models and human programmers for generating programming code","volume":"12","author":"Hou","year":"2025","journal-title":"Advanced Science"},{"issue":"8","key":"10.1016\/j.eswa.2025.130991_bib0107","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3695988","article-title":"Large language models for software engineering","volume":"33","author":"Hou","year":"2024","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0108","first-page":"109701","article-title":"Wikicontradict","volume":"37","author":"Hou","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.eswa.2025.130991_bib0109","series-title":"Proceedings of the 32nd ACM international conference on multimedia","first-page":"6929","article-title":"Mplug-paperowl: Scientific diagram analysis with the multimodal large language model","author":"Hu","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0110","doi-asserted-by":"crossref","first-page":"50849","DOI":"10.1109\/ACCESS.2025.3550942","article-title":"Zpvqa: Visual question answering of images based on zero-shot prompt learning","volume":"13","author":"Hu","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.130991_bib0111","article-title":"Bias testing and mitigation in llm","author":"Huang","year":"2024","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"7","key":"10.1016\/j.eswa.2025.130991_bib0112","first-page":"1","article-title":"Revealing the unseen","volume":"33","author":"Huang","year":"2024","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"4","key":"10.1016\/j.eswa.2025.130991_bib0113","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1109\/TSE.2025.3532759","article-title":"Comprehensive fine-tuning large language models of code for automated program repair","volume":"51","author":"Huang","year":"2025","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.eswa.2025.130991_bib0114","series-title":"Llsm: Llm-enhanced logic synthesis model with eda-guided cot prompting, hybrid embedding and aig-tailored acceleration","first-page":"974","author":"Huang","year":"2025"},{"key":"10.1016\/j.eswa.2025.130991_bib0115","series-title":"Proceedings of the 1st fastcode programming challenge","first-page":"1","article-title":"Paracoder: Parallel code generation with large language model","author":"Huang","year":"2025"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0116","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1109\/TSE.2024.3519464","article-title":"Look before you leap: An exploratory study of uncertainty analysis for large language models","volume":"51","author":"Huang","year":"2025","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"4","key":"10.1016\/j.eswa.2025.130991_bib0117","doi-asserted-by":"crossref","first-page":"975","DOI":"10.1109\/TSE.2025.3535938","article-title":"One sentence can kill the bug: Auto-replay mobile app crashes from one-sentence overviews","volume":"51","author":"Huang","year":"2025","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.eswa.2025.130991_bib0118","doi-asserted-by":"crossref","first-page":"131271","DOI":"10.1109\/ACCESS.2025.3590604","article-title":"Optimizing the learnable roPE theta parameter in transformers","volume":"13","author":"Huang","year":"2025","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0119","doi-asserted-by":"crossref","DOI":"10.1111\/tgis.13294","article-title":"An LLM-based method for quality information extraction from web text for crowed-sensing spatiotemporal data","volume":"29","author":"Huang","year":"2025","journal-title":"Transactions in GIS"},{"key":"10.1016\/j.eswa.2025.130991_bib0120","series-title":"Proceedings of the 2024 on ACM SIGSAC conference on computer and communications security","first-page":"3600","article-title":"Pleak: Prompt leaking attacks against large language model applications","author":"Hui","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0121","article-title":"Large language models for code completion","author":"Husein","year":"2024","journal-title":"Computer Standards & Interfaces"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0122","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/3680410","article-title":"On program synthesis and large language models","volume":"68","author":"H\u00fcttel","year":"2024","journal-title":"Communications of the ACM"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0123","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/3680410","article-title":"On program synthesis and large language models","volume":"68","author":"H\u00fcttel","year":"2025","journal-title":"Communications of the ACM"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0124","doi-asserted-by":"crossref","DOI":"10.1145\/3691631","article-title":"Nlplego: Assembling test generation for natural language processing applications","volume":"34","author":"Ji","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0125","series-title":"Proceedings of the 21st international conference on mining software repositories","first-page":"431","article-title":"Peatmoss","author":"Jiang","year":"2024"},{"issue":"7","key":"10.1016\/j.eswa.2025.130991_bib0126","first-page":"1","article-title":"Self","volume":"33","author":"Jiang","year":"2024","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0127","series-title":"Proceedings of the 2014 international symposium on software testing and analysis","first-page":"437","article-title":"Defects4j: A database of existing faults to enable controlled testing studies for java programs","author":"Just","year":"2014"},{"key":"10.1016\/j.eswa.2025.130991_bib0128","article-title":"A survey of GPT","volume":"6","author":"Kalyan","year":"2024","journal-title":"Natural Language Processing Journal"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0129","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1111\/nyas.15125","article-title":"Can large language models reason and plan?","volume":"1534","author":"Kambhampati","year":"2024","journal-title":"Annals of the New York Academy of Sciences"},{"key":"10.1016\/j.eswa.2025.130991_bib0130","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2024.3450837","article-title":"Evaluating diverse large language models for automatic and general bug reproduction","author":"Kang","year":"2024","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.eswa.2025.130991_bib0131","doi-asserted-by":"crossref","DOI":"10.1016\/j.ejrai.2025.100021","article-title":"Large language models in radiology: A technical and clinical perspective","author":"Kao","year":"2025","journal-title":"European Journal of Radiology Artificial Intelligence"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0132","doi-asserted-by":"crossref","DOI":"10.3390\/computation13020030","article-title":"From vulnerability to defense: The role of large language models in enhancing cybersecurity","volume":"13","author":"Kasri","year":"2025","journal-title":"Computation"},{"key":"10.1016\/j.eswa.2025.130991_bib0133","first-page":"1","article-title":"Explainable AI reveals clever hans effects in unsupervised learning models","author":"Kauffmann","year":"2025","journal-title":"Nature Machine Intelligence"},{"issue":"EICS","key":"10.1016\/j.eswa.2025.130991_bib0134","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3661143","article-title":"Evaluation of code generation for simulating participant behavior in experience sampling method by iterative in","volume":"8","author":"Khanshan","year":"2024","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"issue":"11","key":"10.1016\/j.eswa.2025.130991_bib0135","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/3690928","article-title":"Toward effective AI support for developers","volume":"67","author":"Khemka","year":"2024","journal-title":"Communications of the ACM"},{"issue":"3","key":"10.1016\/j.eswa.2025.130991_bib0136","doi-asserted-by":"crossref","first-page":"864","DOI":"10.1109\/TSE.2025.3539566","article-title":"A reflection on change classification in the era of large language models","volume":"51","author":"Kim","year":"2025","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.eswa.2025.130991_bib0137","series-title":"Proceedings of the 2nd international workshop on evidential assessment of software technologies","first-page":"1","article-title":"Systematic review in software engineering: Where we are and where we should be going","author":"Kitchenham","year":"2012"},{"key":"10.1016\/j.eswa.2025.130991_bib0138","series-title":"Proceedings of the 2024 on ACM SIGSAC conference on computer and communications security","first-page":"2726","article-title":"Using AI assistants in software development: A qualitative study on security practices and concerns","author":"Klemmer","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0139","series-title":"Proceedings of the 18th innovations in software engineering conference","article-title":"Test case generation for requirements in natural language - an LLM comparison study","author":"Korraprolu","year":"2025"},{"issue":"4","key":"10.1016\/j.eswa.2025.130991_bib0140","doi-asserted-by":"crossref","first-page":"767","DOI":"10.3390\/electronics13040767","article-title":"Ai","volume":"13","author":"Kotsiantis","year":"2024","journal-title":"Electronics"},{"key":"10.1016\/j.eswa.2025.130991_bib0141","doi-asserted-by":"crossref","DOI":"10.1016\/j.mex.2025.103340","article-title":"A method for iot devices test case generation using language models","author":"Kumar","year":"2025","journal-title":"MethodsX"},{"key":"10.1016\/j.eswa.2025.130991_bib0142","article-title":"Applications, challenges, and future directions of human","author":"Kumar","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.130991_bib0143","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.126360","article-title":"Nvp-hri: Zero shot natural voice and posture-based human\u2013robot interaction via large language model","volume":"268","author":"Lai","year":"2025","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2025.130991_bib0144","series-title":"Proceedings of the third international workshop on automated program repair","first-page":"61","article-title":"Towards javascript program repair with generative pre-trained transformer (gpt-2)","author":"Lajk\u00f3","year":"2022"},{"issue":"8","key":"10.1016\/j.eswa.2025.130991_bib0145","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3470133","article-title":"A systematic review of API evolution literature","volume":"54","author":"Lamothe","year":"2021","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"10.1016\/j.eswa.2025.130991_bib0146","series-title":"Advances in neural information processing systems","article-title":"CodeRL: Mastering code generation through pretrained models and deep reinforcement learning","author":"Le","year":"2022"},{"key":"10.1016\/j.eswa.2025.130991_bib0147","series-title":"2024\u202fIEEE Conference on software testing, verification and validation (ICST)","first-page":"442","article-title":"The github recent bugs dataset for evaluating llm","author":"Lee","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0148","article-title":"Reasoning abilities of large language models","author":"Lee","year":"2024","journal-title":"ACM transactions on intelligent systems and technology"},{"key":"10.1016\/j.eswa.2025.130991_bib0149","article-title":"Applying large language models and chain-of-thought for automatic scoring","volume":"6","author":"Lee","year":"2024","journal-title":"Computers and Education: Artificial Intelligence"},{"key":"10.1016\/j.eswa.2025.130991_bib0150","first-page":"1","article-title":"Large language models in finance (finLLMs)","author":"Lee","year":"2025","journal-title":"Neural Computing and Applications"},{"key":"10.1016\/j.eswa.2025.130991_bib0151","series-title":"Advances in neural information processing systems","first-page":"9459","article-title":"Retrieval-augmented generation for knowledge-intensive NLP tasks","volume":"vol. 33","author":"Lewis","year":"2020"},{"key":"10.1016\/j.eswa.2025.130991_bib0152","series-title":"Advances in neural information processing systems","first-page":"3843","article-title":"Solving quantitative reasoning problems with language models","volume":"vol. 35","author":"Lewkowycz","year":"2022"},{"issue":"3","key":"10.1016\/j.eswa.2025.130991_bib0153","doi-asserted-by":"crossref","first-page":"100","DOI":"10.3390\/fi17030100","article-title":"Applying large language model analysis and backend web services in regulatory technologies for continuous compliance checks","volume":"17","author":"Li","year":"2025","journal-title":"Future Internet"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0154","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1038\/s41597-025-04613-9","article-title":"An astronomical question answering dataset for evaluating large language models","volume":"12","author":"Li","year":"2025","journal-title":"Scientific Data"},{"key":"10.1016\/j.eswa.2025.130991_bib0155","article-title":"Hybrid automated program repair by combining large language models and program analysis","author":"Li","year":"2024","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"5","key":"10.1016\/j.eswa.2025.130991_bib0156","doi-asserted-by":"crossref","first-page":"1591","DOI":"10.1109\/TSE.2025.3558403","article-title":"Retrieval-augmented fine-tuning for improving retrieve-and-edit based assertion generation","volume":"51","author":"Li","year":"2025","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"8","key":"10.1016\/j.eswa.2025.130991_bib0157","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3675395","article-title":"Acecoder","volume":"33","author":"Li","year":"2024","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0158","first-page":"1","article-title":"Structured chain","volume":"34","author":"Li","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0159","article-title":"Large language models for automated web-form-test generation: An empirical study","author":"Li","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0160","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3695868","article-title":"Building a coding assistant via the retrieval","volume":"43","author":"Li","year":"2025","journal-title":"ACM Transactions on Information Systems"},{"key":"10.1016\/j.eswa.2025.130991_bib0161","doi-asserted-by":"crossref","DOI":"10.1016\/j.csi.2024.103942","article-title":"Evaluating large language models for software testing","volume":"93","author":"Li","year":"2025","journal-title":"Computer Standards & Interfaces"},{"issue":"6624","key":"10.1016\/j.eswa.2025.130991_bib0162","doi-asserted-by":"crossref","first-page":"1092","DOI":"10.1126\/science.abq1158","article-title":"Competition","volume":"378","author":"Li","year":"2022","journal-title":"Science (New York, N.Y.)"},{"key":"10.1016\/j.eswa.2025.130991_bib0163","article-title":"An approach for rapid source code development based on chatGPT and prompt engineering","author":"Li","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.130991_bib0164","series-title":"Proceedings of the 2023\u202fACM SIGSAC conference on computer and communications security","first-page":"2336","article-title":"Protecting intellectual property of large language model-based code generation APIs via watermarks","author":"Li","year":"2023"},{"key":"10.1016\/j.eswa.2025.130991_bib0165","article-title":"Retrieval-augmented generation for educational application: A systematic survey","volume":"8","author":"Li","year":"2025","journal-title":"Computers and Education: Artificial Intelligence"},{"key":"10.1016\/j.eswa.2025.130991_bib0166","doi-asserted-by":"crossref","first-page":"46616","DOI":"10.1109\/ACCESS.2025.3549795","article-title":"Toward low-resource languages machine translation: A language-specific fine-tuning with loRA for specialized large language models","volume":"13","author":"Liang","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.130991_bib0167","series-title":"Proceedings of the 12th ACM SIGPLAN international workshop on the state of the art in program analysis","first-page":"40","article-title":"User-assisted code query optimization","author":"Liblit","year":"2023"},{"issue":"5","key":"10.1016\/j.eswa.2025.130991_bib0168","article-title":"Refining chatGPT","volume":"33","author":"Liu","year":"2024","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0169","article-title":"Toward a large language model","author":"Liu","year":"2025","journal-title":"Engineering"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0170","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/s10515-025-00500-0","article-title":"Exploring the potential of general purpose LLMs in automated software refactoring: An empirical study","volume":"32","author":"Liu","year":"2025","journal-title":"Automated Software Engineering"},{"key":"10.1016\/j.eswa.2025.130991_bib0171","series-title":"Advances in neural information processing systems","first-page":"21558","article-title":"Is your code generated by chatGPT really correct? rigorous evaluation of large language models for code generation","volume":"vol. 36","author":"Liu","year":"2023"},{"key":"10.1016\/j.eswa.2025.130991_bib0172","series-title":"Proceedings of the 37th international conference on neural information processing systems","article-title":"Is your code generated by chatGPT really correct? rigorous evaluation of large language models for code generation","author":"Liu","year":"2023"},{"issue":"9","key":"10.1016\/j.eswa.2025.130991_bib0173","doi-asserted-by":"crossref","DOI":"10.1145\/3560815","article-title":"Pre-train, prompt, and predict: A systematic survey of prompting methods in natural language processing","volume":"55","author":"Liu","year":"2023","journal-title":"ACM Computing Surveys"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0174","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s44163-024-00149-w","article-title":"Green AI","volume":"4","author":"Liu","year":"2024","journal-title":"Discover Artificial Intelligence"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0175","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s44366-025-0060-0","article-title":"An open-source large language model for chinese education research","volume":"2","author":"Liu","year":"2025","journal-title":"Frontiers of Digital Education"},{"key":"10.1016\/j.eswa.2025.130991_bib0176","series-title":"Proceedings of the 4th international workshop on software engineering and AI for data quality in cyber-physical systems\/internet of things","first-page":"12","article-title":"A hitchhiker\u2019s guide to jailbreaking chatGPT via prompt engineering","author":"Liu","year":"2024"},{"issue":"3","key":"10.1016\/j.eswa.2025.130991_bib0177","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/s10664-025-10641-1","article-title":"Rag-driven multiple assertions generation with large language models","volume":"30","author":"Liu","year":"2025","journal-title":"Empirical Software Engineering"},{"key":"10.1016\/j.eswa.2025.130991_bib0178","series-title":"Proceedings of the 1st international conference on AI engineering: Software engineering for AI","first-page":"101","article-title":"Towards a roadmap on software engineering for responsible AI","author":"Lu","year":"2022"},{"key":"10.1016\/j.eswa.2025.130991_bib0179","series-title":"Proceedings of the neural information processing systems track on datasets and benchmarks","article-title":"CodeXGLUE: A machine learning benchmark dataset for code understanding and generation","volume":"vol. 1","author":"Lu","year":"2021"},{"issue":"7","key":"10.1016\/j.eswa.2025.130991_bib0180","doi-asserted-by":"crossref","first-page":"3632","DOI":"10.3390\/app15073632","article-title":"Codetranfix: A neural machine translation approach for context-aware java program repair with codeBERT","volume":"15","author":"Lu","year":"2025","journal-title":"Applied Sciences"},{"key":"10.1016\/j.eswa.2025.130991_bib0181","series-title":"Proceedings of the ACM\/IEEE 44th international conference on software engineering: Companion proceedings","first-page":"168","article-title":"Pynguin: Automated unit test generation for python","author":"Lukasczyk","year":"2022"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0182","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3709727","article-title":"Snails","volume":"3","author":"Luoma","year":"2025","journal-title":"Proceedings of the ACM on Management of Data"},{"key":"10.1016\/j.eswa.2025.130991_bib0183","article-title":"Automatic programming","author":"Lyu","year":"2024","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0184","doi-asserted-by":"crossref","DOI":"10.1016\/j.imavis.2024.104996","article-title":"Semantic segmentation using cross-stage feature reweighting and efficient self-attention","volume":"145","author":"Ma","year":"2024","journal-title":"Image and vision computing"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0185","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-024-64827-6","article-title":"OpenmedLM: Prompt engineering can out-perform fine-tuning in medical question-answering with open-source large language models","volume":"14","author":"Maharjan","year":"2024","journal-title":"Scientific reports"},{"key":"10.1016\/j.eswa.2025.130991_bib0186","first-page":"124069","article-title":"Llm dataset inference","volume":"37","author":"Maini","year":"2024","journal-title":"Advances in neural information processing systems"},{"issue":"7","key":"10.1016\/j.eswa.2025.130991_bib0187","doi-asserted-by":"crossref","DOI":"10.1007\/s11704-024-40663-9","article-title":"A survey on loRA of large language models","volume":"19","author":"Mao","year":"2025","journal-title":"Frontiers of Computer Science"},{"key":"10.1016\/j.eswa.2025.130991_bib0188","series-title":"Proceedings of the 15th international conference on mining software repositories","first-page":"34","article-title":"Public git archive","author":"Markovtsev","year":"2018"},{"key":"10.1016\/j.eswa.2025.130991_bib0189","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.104151","article-title":"Secureqwen","volume":"148","author":"Mechri","year":"2025","journal-title":"Computers & Security"},{"key":"10.1016\/j.eswa.2025.130991_bib0190","unstructured":"Mistral, A. I. et al. (2023). Mistral. https:\/\/mistral.ai, Accessed: May 2025."},{"key":"10.1016\/j.eswa.2025.130991_bib0191","first-page":"24242","article-title":"RepliQA","volume":"37","author":"Monteiro","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0192","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1145\/3703408","article-title":"Leveraging large language models for automated program repair in programming education","volume":"31","author":"Murali","year":"2025","journal-title":"XRDS: Crossroads, The ACM Magazine for Students"},{"key":"10.1016\/j.eswa.2025.130991_bib0193","doi-asserted-by":"crossref","DOI":"10.1016\/j.nlp.2024.100124","article-title":"Evaluation of open and closed-source LLMs for low-resource language with zero-shot, few-shot, and chain-of-thought prompting","volume":"10","author":"Nazi","year":"2025","journal-title":"Natural Language Processing Journal"},{"key":"10.1016\/j.eswa.2025.130991_bib0194","unstructured":"Nijkamp, E., Pang, B., Hayashi, H., Tu, L., Wang, H., Zhou, Y., Savarese, S., & Xiong, C. (2022a). Codegen: An open large language model for code with multi-turn program synthesis. arXiv preprint arXiv: 2203.13474."},{"key":"10.1016\/j.eswa.2025.130991_bib0195","unstructured":"Nijkamp, E. et al. (2022b). Codegen. 10.48550\/arXiv.2203.13474."},{"key":"10.1016\/j.eswa.2025.130991_bib0196","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.neucom.2021.03.091","article-title":"A review on the attention mechanism of deep learning","volume":"452","author":"Niu","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.eswa.2025.130991_bib0197","article-title":"Optimizing pre","author":"Nizam","year":"2025","journal-title":"IEEE Access"},{"issue":"20","key":"10.1016\/j.eswa.2025.130991_bib0198","doi-asserted-by":"crossref","first-page":"4109","DOI":"10.3390\/electronics13204109","article-title":"Comparison of large language models in generating machine learning curricula in high schools","volume":"13","author":"Noveski","year":"2024","journal-title":"Electronics"},{"key":"10.1016\/j.eswa.2025.130991_bib0199","first-page":"297","article-title":"Report on the static analysis tool exposition (SATE) IV","volume":"500","author":"Okun","year":"2013","journal-title":"NIST Special Publication"},{"issue":"8","key":"10.1016\/j.eswa.2025.130991_bib0200","doi-asserted-by":"crossref","first-page":"10717","DOI":"10.1007\/s10586-024-04490-8","article-title":"Investigating large language models capabilities for automatic code repair in python","volume":"27","author":"Omari","year":"2024","journal-title":"Cluster Computing"},{"key":"10.1016\/j.eswa.2025.130991_bib0201","unstructured":"OpenAI et al. (2023). ChatGPT. https:\/\/openai.com\/research\/chatgpt, Accessed: May 2025."},{"key":"10.1016\/j.eswa.2025.130991_bib0202","series-title":"2024\u202fIEEE Conference on communications and network security (CNS)","first-page":"1","article-title":"Llm honeypot: Leveraging large language models as advanced interactive honeypot systems","author":"Otal","year":"2024"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0203","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3697010","article-title":"An empirical study of the non","volume":"34","author":"Ouyang","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0204","series-title":"Proceedings of the IEEE\/ACM 46th international conference on software engineering","first-page":"1","article-title":"Lost in translation","author":"Pan","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0205","series-title":"Proceedings of the 40th annual meeting of the association for computational linguistics","first-page":"311","article-title":"Bleu: A method for automatic evaluation of machine translation","author":"Papineni","year":"2002"},{"key":"10.1016\/j.eswa.2025.130991_bib0206","series-title":"Proceedings of the 29th ACM international conference on architectural support for programming languages and operating systems, volume 3","first-page":"207","article-title":"Characterizing power management opportunities for LLMs in the cloud","author":"Patel","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0207","series-title":"Proceedings of the 56th ACM technical symposium on computer science education v. 1","first-page":"896","article-title":"Bugspotter: Automated generation of code debugging exercises","author":"P?durean","year":"2025"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0208","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1145\/3610721","article-title":"Asleep at the keyboard? assessing the security of github copilot\u2019s code contributions","volume":"68","author":"Pearce","year":"2025","journal-title":"Communications of the ACM"},{"issue":"6","key":"10.1016\/j.eswa.2025.130991_bib0209","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3676956","article-title":"Mixture-of-languages routing for multilingual dialogues","volume":"42","author":"Pei","year":"2024","journal-title":"ACM Transactions on Information Systems"},{"key":"10.1016\/j.eswa.2025.130991_bib0210","first-page":"30811","article-title":"The fineweb datasets","volume":"37","author":"Penedo","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.eswa.2025.130991_bib0211","doi-asserted-by":"crossref","DOI":"10.1145\/3718088","article-title":"Revisiting verilogeval","author":"Pinckney","year":"2025","journal-title":"ACM Transactions on Design Automation of Electronic Systems"},{"issue":"14","key":"10.1016\/j.eswa.2025.130991_bib0212","doi-asserted-by":"crossref","DOI":"10.3390\/electronics12143170","article-title":"Ethical challenges in the development of virtual assistants powered by large language models","volume":"12","author":"Pi\u00f1eiro-Mart\u00edn","year":"2023","journal-title":"Electronics"},{"issue":"3","key":"10.1016\/j.eswa.2025.130991_bib0213","doi-asserted-by":"crossref","first-page":"1192","DOI":"10.3390\/app15031192","article-title":"Context is king","volume":"15","author":"Pi\u00f1eiro-Mart\u00edn","year":"2025","journal-title":"Applied Sciences"},{"key":"10.1016\/j.eswa.2025.130991_bib0214","article-title":"Fine","volume":"175","author":"Pornprasit","year":"2024","journal-title":"Information and Software Technology"},{"key":"10.1016\/j.eswa.2025.130991_bib0215","unstructured":"Press, O., Smith, N. A., & Lewis, M. (2021). Train short, test long: Attention with linear biases enables input length extrapolation. 10.48550\/arXiv.2108.12409."},{"key":"10.1016\/j.eswa.2025.130991_bib0216","series-title":"Proceedings of the 2023 conference on empirical methods in natural language processing","first-page":"7957","article-title":"Automatic prompt optimization with \u201cgradient descent\u201d and beam search","author":"Pryzant","year":"2023"},{"key":"10.1016\/j.eswa.2025.130991_bib0217","series-title":"2025\u202fIEEE 14Th international conference on communication systems and network technologies (CSNT)","first-page":"680","article-title":"Coding agents: A comprehensive survey of automated bug fixing systems and benchmarks","author":"Puvvadi","year":"2025"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0218","doi-asserted-by":"crossref","DOI":"10.1016\/j.patter.2024.101118","article-title":"A survey of multilingual large language models","volume":"6","author":"Qin","year":"2025","journal-title":"Patterns"},{"key":"10.1016\/j.eswa.2025.130991_bib0219","first-page":"1","article-title":"Harnessing the power of large language model for effective web API recommendation","author":"Qin","year":"2025","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10.1016\/j.eswa.2025.130991_bib0220","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2024.107661","article-title":"An input-denoising-based defense against stealthy backdoor attacks in large language models for code","volume":"180","author":"Qu","year":"2025","journal-title":"Information and Software Technology"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0221","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s10515-024-00485-2","article-title":"Badcodeprompt","volume":"32","author":"Qu","year":"2025","journal-title":"Automated Software Engineering"},{"key":"10.1016\/j.eswa.2025.130991_bib0222","series-title":"Proceedings of the 18th conference of the european chapter of the association for computational linguistics (volume 1: Long papers)","first-page":"1812","article-title":"Aligning large and small language models via chain-of-thought reasoning","author":"Ranaldi","year":"2024"},{"issue":"3","key":"10.1016\/j.eswa.2025.130991_bib0223","doi-asserted-by":"crossref","DOI":"10.3390\/ai6030056","article-title":"Emotion-aware embedding fusion in large language models (flan-t5, llama 2, deepseek-r1, and chatGPT 4) for intelligent response generation","volume":"6","author":"Rasool","year":"2025","journal-title":"AI"},{"issue":"10","key":"10.1016\/j.eswa.2025.130991_bib0224","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1145\/3022671.2984041","article-title":"Probabilistic model for code with decision trees","volume":"51","author":"Raychev","year":"2016","journal-title":"ACM SIGPLAN Notices"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0225","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1186\/s40537-025-01167-w","article-title":"Detecting hate in diversity: A survey of multilingual code-mixed image and video analysis","volume":"12","author":"Raza Ur Rehman","year":"2025","journal-title":"Journal of Big Data"},{"issue":"4","key":"10.1016\/j.eswa.2025.130991_bib0226","doi-asserted-by":"crossref","DOI":"10.1145\/3705306","article-title":"Rose: An ide-based interactive repair framework for debugging","volume":"34","author":"Reiss","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0227","series-title":"Proceedings of the 2025 conference on empirical methods in natural language processing","first-page":"8315","article-title":"Alignment with fill-in-the-middle for enhancing code generation","author":"Ren","year":"2025"},{"key":"10.1016\/j.eswa.2025.130991_bib0228","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2025.103301","article-title":"Large language model for patent concept generation","volume":"65","author":"Ren","year":"2025","journal-title":"Advanced Engineering Informatics"},{"key":"10.1016\/j.eswa.2025.130991_bib0229","first-page":"1","article-title":"On the use of large language models in model","author":"Rocco","year":"2025","journal-title":"Software and Systems Modeling"},{"key":"10.1016\/j.eswa.2025.130991_bib0230","unstructured":"Roffo, G. et al. (2024). Exploring advanced large language models with LLMsuite. 10.13140\/RG.2.2.11774.80963."},{"issue":"10","key":"10.1016\/j.eswa.2025.130991_bib0231","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3560260","article-title":"Qa dataset explosion: A taxonomy of nlp resources for question answering and reading comprehension","volume":"55","author":"Rogers","year":"2023","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/j.eswa.2025.130991_bib0232","doi-asserted-by":"crossref","DOI":"10.1016\/j.datak.2025.102409","article-title":"Ensuring safety in digital spaces","author":"Roy","year":"2025","journal-title":"Data & Knowledge Engineering"},{"issue":"5","key":"10.1016\/j.eswa.2025.130991_bib0233","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3652154","article-title":"Navigating the complexity of generative AI adoption in software engineering","volume":"33","author":"Russo","year":"2024","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"4","key":"10.1016\/j.eswa.2025.130991_bib0234","doi-asserted-by":"crossref","first-page":"1104","DOI":"10.1109\/TSE.2025.3541166","article-title":"Automated test case repair using language models","volume":"51","author":"Saboor Yaraghi","year":"2025","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.eswa.2025.130991_bib0235","series-title":"Proceedings of the eighteenth ACM international conference on web search and data mining","first-page":"801","article-title":"Improving FIM code completions via context & curriculum based learning","author":"Sagtani","year":"2025"},{"key":"10.1016\/j.eswa.2025.130991_bib0236","series-title":"Deep Reinforcement Learning with Python: RLHF for Chatbots and Large Language Models","author":"Sanghi","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0237","first-page":"36976","article-title":"Stackeval","volume":"37","author":"Shah","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0238","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s43621-025-00815-8","article-title":"A comprehensive review of large language models","volume":"6","author":"Shahzad","year":"2025","journal-title":"Discover Sustainability"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0239","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10664-024-10581-2","article-title":"Understanding vulnerabilities in software supply chains","volume":"30","author":"Shen","year":"2025","journal-title":"Empirical Software Engineering"},{"key":"10.1016\/j.eswa.2025.130991_bib0240","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2025.3546700","article-title":"Finetuning large language models for vulnerability detection","author":"Shestov","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.130991_bib0241","article-title":"Continual learning of large language models: A comprehensive survey","author":"Shi","year":"2025","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/j.eswa.2025.130991_bib0242","series-title":"Proceedings of the 46th international conference on software engineering: Software engineering in society","first-page":"142","article-title":"Greening large language models of code","author":"Shi","year":"2024"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0243","article-title":"A fine-tuned large language model based molecular dynamics agent for code generation to obtain material thermodynamic parameters","volume":"15","author":"Shi","year":"2025","journal-title":"Scientific Reports"},{"key":"10.1016\/j.eswa.2025.130991_bib0244","series-title":"Proceedings of the 39th IEEE\/ACM international conference on automated software engineering workshops","first-page":"54","article-title":"Sallm: Security assessment of generated code","author":"Siddiq","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0245","article-title":"A comparison of large language models and genetic programming for program synthesis","author":"Sobania","year":"2024","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"11","key":"10.1016\/j.eswa.2025.130991_bib0246","doi-asserted-by":"crossref","DOI":"10.3390\/info14110602","article-title":"Trend analysis of large language models through a developer community: A focus on stack overflow","volume":"14","author":"Son","year":"2023","journal-title":"Information"},{"key":"10.1016\/j.eswa.2025.130991_bib0247","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2024.3446854","article-title":"Towards robust evaluation: A comprehensive taxonomy of datasets and metrics for open domain question answering in the era of large language models","author":"Srivastava","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.130991_bib0248","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2024.129219","article-title":"Improving intermediate reasoning in zero-shot chain-of-thought for large language models with filter supervisor-self correction","volume":"620","author":"Sun","year":"2025","journal-title":"Neurocomputing"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0249","doi-asserted-by":"crossref","DOI":"10.1145\/3688831","article-title":"Don\u2019t complete it! preventing unhelpful code completion for productive and sustainable neural code completion systems","volume":"34","author":"Sun","year":"2024","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"3","key":"10.1016\/j.eswa.2025.130991_bib0250","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3715964","article-title":"Automating research synthesis with domain-specific large language model fine-tuning","volume":"19","author":"Susnjak","year":"2025","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"10.1016\/j.eswa.2025.130991_bib0251","series-title":"Proceedings of the 28th international conference on neural information processing systems - volume 2","first-page":"3104","article-title":"Sequence to sequence learning with neural networks","author":"Sutskever","year":"2014"},{"key":"10.1016\/j.eswa.2025.130991_bib0252","series-title":"Proceedings of the 6th ACM conference on conversational user interfaces","first-page":"1","article-title":"Large language models and video games: A preliminary scoping review","author":"Sweetser","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0253","series-title":"Proceedings of international conference on recent innovations in computing","first-page":"497","article-title":"Fine-tuning codellama to fix bugs","author":"Szalontai","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0254","series-title":"Proceedings of the 30th international conference on intelligent user interfaces","first-page":"70","article-title":"A framework for efficient development and debugging of role-playing agents with large language models","author":"Takagi","year":"2025"},{"key":"10.1016\/j.eswa.2025.130991_bib0255","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2025.3541146","article-title":"Harnessing large language models for software vulnerability detection","author":"Tamberg","year":"2025","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.eswa.2025.130991_bib0256","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10664-025-10614-4","article-title":"Bugs in large language models generated code","volume":"30","author":"Tambon","year":"2025","journal-title":"Empirical Software Engineering"},{"issue":"7","key":"10.1016\/j.eswa.2025.130991_bib0257","doi-asserted-by":"crossref","first-page":"287","DOI":"10.3390\/a17070287","article-title":"Enhancing program synthesis with large language models using many","volume":"17","author":"Tao","year":"2024","journal-title":"Algorithms"},{"key":"10.1016\/j.eswa.2025.130991_bib0258","article-title":"Grammar","volume":"92","author":"Tao","year":"2025","journal-title":"Computer Standards & Interfaces"},{"key":"10.1016\/j.eswa.2025.130991_bib0259","series-title":"Proceedings of the 35th ACM conference on hypertext and social media","first-page":"337","article-title":"Leveraging gpt for the generation of multi","author":"Tari","year":"2024"},{"issue":"8018","key":"10.1016\/j.eswa.2025.130991_bib0260","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1038\/s41586-024-07335-x","article-title":"Scaling neural machine translation to 200 languages","volume":"630","year":"2024","journal-title":"Nature"},{"key":"10.1016\/j.eswa.2025.130991_bib0261","series-title":"Proceedings of the 40th international conference on software engineering: Companion proceeedings","first-page":"446","article-title":"Bugzoo: A platform for studying software bugs","author":"Timperley","year":"2018"},{"key":"10.1016\/j.eswa.2025.130991_bib0262","series-title":"Proceedings of the 61st ACM\/IEEE design automation conference","article-title":"Rtlfixer: Automatically fixing rtl syntax errors with large language model","author":"Tsai","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0263","doi-asserted-by":"crossref","DOI":"10.1145\/3771922","article-title":"Assessing the latent automated program repair capabilities of large language models using round-trip translation","author":"Vallecillos Ruiz","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0264","series-title":"Advances in neural information processing systems","article-title":"Attention is all you need","volume":"vol. 30","author":"Vaswani","year":"2017"},{"key":"10.1016\/j.eswa.2025.130991_bib0265","article-title":"A catalog of data smells for coding tasks","author":"Vitale","year":"2024","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0266","series-title":"2025\u202fIEEE\/ACM 47Th international conference on software engineering (ICSE)","first-page":"781","article-title":"Llms meet library evolution: Evaluating deprecated api usage in llm-based code completion","author":"Wang","year":"2025"},{"key":"10.1016\/j.eswa.2025.130991_bib0267","article-title":"Software testing with large language models","author":"Wang","year":"2024","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0268","first-page":"1","article-title":"User behavior simulation with large language model","volume":"43","author":"Wang","year":"2025","journal-title":"ACM Transactions on Information Systems"},{"issue":"3","key":"10.1016\/j.eswa.2025.130991_bib0269","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1007\/s10664-025-10634-0","article-title":"Fixer","volume":"30","author":"Wang","year":"2025","journal-title":"Empirical Software Engineering"},{"issue":"3","key":"10.1016\/j.eswa.2025.130991_bib0270","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3697013","article-title":"Divide","volume":"34","author":"Wang","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0271","unstructured":"Wang, X., Li, C., Wang, Z., Bai, F., Luo, H., Zhang, J., Jojic, N., Xing, E. P., & Hu, Z. (2023a). Promptagent: Strategic planning with language models enables expert-level prompt optimization. 10.48550\/arXiv.2310.16427."},{"key":"10.1016\/j.eswa.2025.130991_bib0272","unstructured":"Wang, X., Wei, J., Schuurmans, D., Le, Q., Chi, E., Narang, S., Chowdhery, A., & Zhou, D. (2023b). Self-consistency improves chain of thought reasoning in language models. arXiv preprint arXiv: 2203.11171."},{"key":"10.1016\/j.eswa.2025.130991_bib0273","series-title":"Proceedings of the 2021 conference on empirical methods in natural language processing","first-page":"8696","article-title":"Codet5: Identifier-aware unified pre-trained encoder-decoder models for code understanding and generation","author":"Wang","year":"2021"},{"key":"10.1016\/j.eswa.2025.130991_bib0274","article-title":"Syntax-aware on-the-fly code completion","volume":"165","author":"Wannita Takerngsaksiri","year":"2024","journal-title":"Information and Software Technology"},{"key":"10.1016\/j.eswa.2025.130991_bib0275","first-page":"116462","article-title":"Redpajama","volume":"37","author":"Weber","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"EICS","key":"10.1016\/j.eswa.2025.130991_bib0276","first-page":"1","article-title":"Extending jupyter with multi","volume":"8","author":"Weber","year":"2024","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"issue":"EICS","key":"10.1016\/j.eswa.2025.130991_bib0277","first-page":"1","article-title":"Significant productivity gains through programming with large language models","volume":"8","author":"Weber","year":"2024","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"issue":"5","key":"10.1016\/j.eswa.2025.130991_bib0278","doi-asserted-by":"crossref","first-page":"2467","DOI":"10.3390\/app15052467","article-title":"Be sure to use the same writing style","volume":"15","author":"Weerasinghe","year":"2025","journal-title":"Applied Sciences"},{"issue":"33","key":"10.1016\/j.eswa.2025.130991_bib0279","doi-asserted-by":"crossref","first-page":"20849","DOI":"10.1007\/s00521-024-10310-2","article-title":"Enhancing human-like multimodal reasoning: A new challenging dataset and comprehensive framework","volume":"36","author":"Wei","year":"2024","journal-title":"Neural Computing and Applications"},{"key":"10.1016\/j.eswa.2025.130991_bib0280","series-title":"Advances in neural information processing systems","first-page":"24824","article-title":"Chain-of-thought prompting elicits reasoning in large language models","volume":"vol. 35","author":"Wei","year":"2022"},{"key":"10.1016\/j.eswa.2025.130991_bib0281","article-title":"Exploring parameter","author":"Weyssow","year":"2023","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0282","article-title":"Aligning crowd","author":"Wong","year":"2024","journal-title":"IEEE Transactions on Big Data"},{"key":"10.1016\/j.eswa.2025.130991_bib0283","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1016\/j.jmsy.2025.03.016","article-title":"H2r Bridge: Transferring vision-language models to few-shot intention meta-perception in human robot collaboration","volume":"80","author":"Wu","year":"2025","journal-title":"Journal of Manufacturing Systems"},{"issue":"4","key":"10.1016\/j.eswa.2025.130991_bib0284","doi-asserted-by":"crossref","DOI":"10.1145\/3661308","article-title":"Survey of machine learning for software-assisted hardware design verification: Past, present, and prospect","volume":"29","author":"Wu","year":"2024","journal-title":"ACM Transactions on Design Automation of Electronic Systems"},{"key":"10.1016\/j.eswa.2025.130991_bib0285","series-title":"Proceedings of the eighteenth ACM international conference on web search and data mining","first-page":"754","article-title":"Towards reliable latent knowledge estimation in LLMs: Zero-prompt many-shot based factual knowledge extraction","author":"Wu","year":"2025"},{"key":"10.1016\/j.eswa.2025.130991_bib0286","doi-asserted-by":"crossref","DOI":"10.1016\/j.neunet.2024.107067","article-title":"Promises and perils of using transformer-based models for SE research","volume":"184","author":"Xiao","year":"2025","journal-title":"Neural Networks"},{"issue":"3","key":"10.1016\/j.eswa.2025.130991_bib0287","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3625291","article-title":"Measurement of embedding choices on cryptographic API completion tasks","volume":"33","author":"Xiao","year":"2024","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0288","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1038\/s41746-025-01533-1","article-title":"Medical foundation large language models for comprehensive text analysis and beyond","volume":"8","author":"Xie","year":"2025","journal-title":"npj Digital Medicine"},{"key":"10.1016\/j.eswa.2025.130991_bib0289","doi-asserted-by":"crossref","DOI":"10.1109\/TSC.2024.3451185","article-title":"When search engine services meet large language models","author":"Xiong","year":"2024","journal-title":"IEEE Transactions on Services Computing"},{"key":"10.1016\/j.eswa.2025.130991_bib0290","unstructured":"Xu, C. et al. (2024). FlexFL. 10.1109\/TSE.2025.3553363."},{"key":"10.1016\/j.eswa.2025.130991_bib0291","series-title":"Proceedings of the 6th ACM SIGPLAN international symposium on machine programming","first-page":"1","article-title":"A systematic evaluation of large language models of code","author":"Xu","year":"2022"},{"key":"10.1016\/j.eswa.2025.130991_bib0292","series-title":"Proceedings of the 6th ACM SIGPLAN international symposium on machine programming","first-page":"1","article-title":"A systematic evaluation of large language models of code","author":"Xu","year":"2022"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0293","doi-asserted-by":"crossref","DOI":"10.1080\/17538947.2025.2480268","article-title":"Evaluating large language models on geospatial tasks: a multiple geospatial task benchmarking study","volume":"18","author":"Xu","year":"2025","journal-title":"International Journal of Digital Earth"},{"key":"10.1016\/j.eswa.2025.130991_bib0294","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2025.126951","article-title":"Diff-zsVQA: Zero-shot visual question answering with frozen large language models using diffusion model","volume":"275","author":"Xu","year":"2025","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2025.130991_bib0295","series-title":"Proceedings of the 2024 3rd international conference on algorithms, data mining, and information technology","first-page":"300","article-title":"Research on carbon footprint in the whole process of LLM based on refined modeling","author":"Xu","year":"2025"},{"key":"10.1016\/j.eswa.2025.130991_bib0296","doi-asserted-by":"crossref","DOI":"10.1145\/3716849","article-title":"Weighted suspiciousness and balanced aggregation to boost spectrum-based fault localization of deep learning models","author":"Xu","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0297","doi-asserted-by":"crossref","DOI":"10.1016\/j.dsm.2025.09.001","article-title":"Deepseek: Implications for data science and management in the AI era","author":"Xu","year":"2025","journal-title":"Data Science and Management"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0298","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s10207-025-00983-8","article-title":"Large language models based vulnerability detection","volume":"24","author":"Xuan","year":"2025","journal-title":"International Journal of Information Security"},{"key":"10.1016\/j.eswa.2025.130991_bib0299","series-title":"Proceedings of the IEEE\/ACM 46th international conference on software engineering","first-page":"1","article-title":"Unveiling memorization in code models","author":"Yang","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0300","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1016\/j.isprsjprs.2025.03.027","article-title":"Multimodal large language model for wheat breeding: A new exploration of smart breeding","volume":"225","author":"Yang","year":"2025","journal-title":"ISPRS Journal of Photogrammetry and Remote Sensing"},{"key":"10.1016\/j.eswa.2025.130991_bib0301","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2025.107699","article-title":"Assessing and improving syntactic adversarial robustness of pre-trained models for code translation","volume":"181","author":"Yang","year":"2025","journal-title":"Information and Software Technology"},{"issue":"FSE","key":"10.1016\/j.eswa.2025.130991_bib0302","doi-asserted-by":"crossref","DOI":"10.1145\/3660804","article-title":"Learning to detect and localize multilingual bugs","volume":"1","author":"Yang","year":"2024","journal-title":"Proceedings of the ACM on Software Engineering"},{"key":"10.1016\/j.eswa.2025.130991_bib0303","series-title":"Proceedings of the 2025 conference on empirical methods in natural language processing","first-page":"9683","article-title":"Codearena: Evaluating and aligning codeLLMs on human preference","author":"Yang","year":"2025"},{"key":"10.1016\/j.eswa.2025.130991_bib0304","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2025.107741","article-title":"RaxCS: Towards cross-language code summarization with contrastive pre-training and retrieval augmentation","volume":"183","author":"Yang","year":"2025","journal-title":"Information and Software Technology"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0305","article-title":"Difficulty aware programming knowledge tracing via large language models","volume":"15","author":"Yang","year":"2025","journal-title":"Scientific Reports"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0306","doi-asserted-by":"crossref","first-page":"2061","DOI":"10.32604\/cmc.2024.058248","article-title":"Improving machine translation formality with large language models","volume":"82","author":"Yang","year":"2025","journal-title":"Computers, Materials and Continua"},{"key":"10.1016\/j.eswa.2025.130991_bib0307","first-page":"71995","article-title":"Gpt4tools","volume":"36","author":"Yang","year":"2023","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.eswa.2025.130991_bib0308","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2025.103204","article-title":"Mm-instructeval: Zero-shot evaluation of (multimodal) large language models on multimodal reasoning tasks","volume":"122","author":"Yang","year":"2025","journal-title":"Information Fusion"},{"key":"10.1016\/j.eswa.2025.130991_bib0309","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2024.112234","article-title":"Dlap: A deep learning augmented large language model prompting framework for software vulnerability detection","volume":"219","author":"Yang","year":"2025","journal-title":"Journal of Systems and Software"},{"key":"10.1016\/j.eswa.2025.130991_bib0310","doi-asserted-by":"crossref","DOI":"10.1145\/3717061","article-title":"An empirical study of retrieval-augmented code generation: Challenges and opportunities","author":"Yang","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"FSE","key":"10.1016\/j.eswa.2025.130991_bib0311","doi-asserted-by":"crossref","first-page":"1585","DOI":"10.1145\/3660778","article-title":"Exploring and unleashing the power of large language models in automated code translation","volume":"1","author":"Yang","year":"2024","journal-title":"Proceedings of the ACM on Software Engineering"},{"key":"10.1016\/j.eswa.2025.130991_bib0312","doi-asserted-by":"crossref","DOI":"10.1145\/3735638","article-title":"Hdldebugger: Streamlining hdl debugging with large language models","author":"Yao","year":"2025","journal-title":"ACM Transactions on Design Automation of Electronic Systems"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0313","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2024.100211","article-title":"A survey on large language model (LLM) security and privacy: The good, the bad, and the ugly","volume":"4","author":"Yao","year":"2024","journal-title":"High-Confidence Computing"},{"key":"10.1016\/j.eswa.2025.130991_bib0314","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2024.100211","article-title":"A survey on large language model (LLM) security and privacy","author":"Yao","year":"2024","journal-title":"High-Confidence Computing"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0315","doi-asserted-by":"crossref","first-page":"106","DOI":"10.4218\/etrij.2023-0357","article-title":"Framework for evaluating code generation ability of large language models","volume":"46","author":"Yeo","year":"2024","journal-title":"ETRI Journal"},{"key":"10.1016\/j.eswa.2025.130991_bib0316","doi-asserted-by":"crossref","DOI":"10.1145\/3725213","article-title":"Wenwang: Toward effectively generating code beyond standalone functions via generative pre-trained models","author":"Yu","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0317","series-title":"Proceedings of the fourteenth ACM conference on data and application security and privacy","first-page":"55","article-title":"Nothing personal: Understanding the spread and use of personally identifiable information in the financial ecosystem","author":"Zaeifi","year":"2024"},{"issue":"11","key":"10.1016\/j.eswa.2025.130991_bib0318","doi-asserted-by":"crossref","first-page":"4466","DOI":"10.3390\/app14114466","article-title":"Greenru: A russian dataset for detecting mentions of green practices in social media posts","volume":"14","author":"Zakharova","year":"2024","journal-title":"Applied Sciences"},{"key":"10.1016\/j.eswa.2025.130991_bib0319","series-title":"Proceedings of the 61st annual meeting of the association for computational linguistics (volume 1: Long papers)","first-page":"7443","article-title":"Large language models meet NL2code: A survey","author":"Zan","year":"2023"},{"key":"10.1016\/j.eswa.2025.130991_bib0320","series-title":"Proceedings of the 19th international conference on availability, reliability and security","first-page":"1","article-title":"On the effectiveness of large language models for github workflows","author":"Zhang","year":"2024"},{"issue":"1","key":"10.1016\/j.eswa.2025.130991_bib0321","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1038\/s41597-025-04417-x","article-title":"A dataset for evaluating clinical research claims in large language models","volume":"12","author":"Zhang","year":"2025","journal-title":"Scientific Data"},{"issue":"8","key":"10.1016\/j.eswa.2025.130991_bib0322","doi-asserted-by":"crossref","DOI":"10.1145\/3719341","article-title":"Igniting language intelligence: The hitchhiker\u2019s guide from chain-of-thought reasoning to language agents","volume":"57","author":"Zhang","year":"2025","journal-title":"ACM Computing Surveys"},{"issue":"3","key":"10.1016\/j.eswa.2025.130991_bib0323","first-page":"1","article-title":"Revisiting sentiment analysis for software engineering in the era of large language models","volume":"34","author":"Zhang","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0324","doi-asserted-by":"crossref","first-page":"56296","DOI":"10.1109\/ACCESS.2025.3554586","article-title":"Distilling wisdom: A review on optimizing learning from massive language models","volume":"13","author":"Zhang","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.130991_bib0325","doi-asserted-by":"crossref","DOI":"10.1016\/j.jisa.2025.103973","article-title":"CodeSAGE: A multi-feature fusion vulnerability detection approach using code attribute graphs and attention mechanisms","volume":"89","author":"Zhang","year":"2025","journal-title":"Journal of Information Security and Applications"},{"key":"10.1016\/j.eswa.2025.130991_bib0326","doi-asserted-by":"crossref","DOI":"10.1016\/j.enbuild.2024.115116","article-title":"Automatic building energy model development and debugging using large language models agentic workflow","volume":"327","author":"Zhang","year":"2025","journal-title":"Energy and Buildings"},{"issue":"6","key":"10.1016\/j.eswa.2025.130991_bib0327","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3715318","article-title":"Scientific large language models: A survey on biological & chemical domains","volume":"57","author":"Zhang","year":"2025","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/j.eswa.2025.130991_bib0328","series-title":"Proceedings of the ACM collective intelligence conference","first-page":"63","article-title":"Tripartite intelligence: Synergizing deep neural network, large language model, and human intelligence for public health misinformation detection (archival full paper)","author":"Zhang","year":"2024"},{"key":"10.1016\/j.eswa.2025.130991_bib0329","article-title":"Patch","author":"Zhang","year":"2025","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.eswa.2025.130991_bib0330","article-title":"Assessing code clone detection capabilities of large language models on human and AI","author":"Zhang","year":"2024","journal-title":"Available at SSRN 4979508"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0331","doi-asserted-by":"crossref","first-page":"41","DOI":"10.3390\/bdcc9020041","article-title":"Exploring the boundaries between LLM code clone detection and code similarity assessment on human and AI","volume":"9","author":"Zhang","year":"2025","journal-title":"Big Data and Cognitive Computing"},{"key":"10.1016\/j.eswa.2025.130991_bib0332","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2024.107405","article-title":"Automatic smart contract comment generation via large language models and in","volume":"168","author":"Zhao","year":"2024","journal-title":"Information and Software Technology"},{"key":"10.1016\/j.eswa.2025.130991_bib0333","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2025.112493","article-title":"Variational prefix tuning for diverse and accurate code summarization using pre-trained language models","volume":"229","author":"Zhao","year":"2025","journal-title":"Journal of Systems and Software"},{"key":"10.1016\/j.eswa.2025.130991_bib0334","first-page":"1","article-title":"On the applicability of code language models to scientific computing programs","author":"Zhao","year":"2025","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.eswa.2025.130991_bib0335","first-page":"1","article-title":"Learning from models beyond fine","author":"Zheng","year":"2025","journal-title":"Nature Machine Intelligence"},{"issue":"8","key":"10.1016\/j.eswa.2025.130991_bib0336","doi-asserted-by":"crossref","DOI":"10.1145\/3719664","article-title":"A review on edge large language models: Design, execution, and applications","volume":"57","author":"Zheng","year":"2025","journal-title":"ACM Computing Surveys"},{"issue":"2","key":"10.1016\/j.eswa.2025.130991_bib0337","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/s10664-024-10602-0","article-title":"Towards an understanding of large language models in software engineering tasks","volume":"30","author":"Zheng","year":"2025","journal-title":"Empirical Software Engineering"},{"issue":"4","key":"10.1016\/j.eswa.2025.130991_bib0338","doi-asserted-by":"crossref","first-page":"2117","DOI":"10.3390\/app15042117","article-title":"PenQA","volume":"15","author":"Zhong","year":"2025","journal-title":"Applied Sciences"},{"issue":"10","key":"10.1016\/j.eswa.2025.130991_bib0339","doi-asserted-by":"crossref","DOI":"10.3390\/app15105306","article-title":"Refining zero-shot text-to-SQL benchmarks via prompt strategies with large language models","volume":"15","author":"Zhou","year":"2025","journal-title":"Applied Sciences"},{"key":"10.1016\/j.eswa.2025.130991_bib0340","article-title":"The use of large language models for program repair","author":"Zubair","year":"2024","journal-title":"Computer Standards & Interfaces"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417425046068?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417425046068?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T05:19:05Z","timestamp":1773983945000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417425046068"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":340,"alternative-id":["S0957417425046068"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2025.130991","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"CSLLM: Code-Specific Large Language Models\u2014A Survey","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2025.130991","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"130991"}}