{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T15:41:48Z","timestamp":1777650108748,"version":"3.51.4"},"reference-count":28,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,8,6]],"date-time":"2023-08-06T00:00:00Z","timestamp":1691280000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002067"],"award-info":[{"award-number":["62002067"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010838","name":"Guangdong Office of Philosophy and Social Science","doi-asserted-by":"publisher","award":["GD21YGL16"],"award-info":[{"award-number":["GD21YGL16"]}],"id":[{"id":"10.13039\/501100010838","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB2102600"],"award-info":[{"award-number":["2019YFB2102600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1016\/j.hcc.2023.100148","type":"journal-article","created":{"date-parts":[[2023,8,8]],"date-time":"2023-08-08T22:39:32Z","timestamp":1691534372000},"page":"100148","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"title":["JFinder: A novel architecture for java vulnerability identification based quad self-attention and pre-training mechanism"],"prefix":"10.1016","volume":"3","author":[{"given":"Jin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zishan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Yinhao","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.hcc.2023.100148_b1","series-title":"UniXcoder: Unified cross-modal pre-training for code representation","author":"Guo","year":"2022"},{"key":"10.1016\/j.hcc.2023.100148_b2","doi-asserted-by":"crossref","unstructured":"H.H. Nguyen, N.-M. Nguyen, C. Xie, Z. Ahmadi, D. Kudenko, T.-N. Doan, L. Jiang, MANDO: Multi-Level Heterogeneous Graph Embeddings for Fine-Grained Detection of Smart Contract Vulnerabilities, in: Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, DSAA \u201922, 2022.","DOI":"10.1109\/DSAA54385.2022.10032337"},{"key":"10.1016\/j.hcc.2023.100148_b3","series-title":"The World Wide Web Conference","isbn-type":"print","doi-asserted-by":"crossref","first-page":"2022","DOI":"10.1145\/3308558.3313562","article-title":"Heterogeneous graph attention network","author":"Wang","year":"2019","ISBN":"https:\/\/id.crossref.org\/isbn\/9781450366748"},{"issue":"11","key":"10.1016\/j.hcc.2023.100148_b4","doi-asserted-by":"crossref","first-page":"992","DOI":"10.14778\/3402707.3402736","article-title":"PathSim: Meta path-based top-K similarity search in heterogeneous information networks","volume":"4","author":"Sun","year":"2020","journal-title":"Proc. VLDB Endow."},{"key":"10.1016\/j.hcc.2023.100148_b5","series-title":"Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations","first-page":"38","article-title":"Transformers: State-of-the-art natural language processing","author":"Wolf","year":"2020"},{"key":"10.1016\/j.hcc.2023.100148_b6","series-title":"Keras","author":"Chollet","year":"2015"},{"key":"10.1016\/j.hcc.2023.100148_b7","unstructured":"M. Abadi, et al., Tensorflow: A system for large-scale machine learning, in: 12th {USENIX} Symposium on Operating Systems Design and Implementation, {OSDI} 16, 2016, pp. 265\u2013283."},{"key":"10.1016\/j.hcc.2023.100148_b8","series-title":"2013 ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement","first-page":"45","article-title":"Learning from open-source projects: An empirical study on defect prediction","author":"He","year":"2013"},{"key":"10.1016\/j.hcc.2023.100148_b9","series-title":"2016 IEEE\/ACM 38th International Conference on Software Engineering","first-page":"297","article-title":"Automatically learning semantic features for defect prediction","author":"Wang","year":"2016"},{"key":"10.1016\/j.hcc.2023.100148_b10","series-title":"Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing","first-page":"1746","article-title":"Convolutional neural networks for sentence classification","author":"Kim","year":"2014"},{"key":"10.1016\/j.hcc.2023.100148_b11","series-title":"Soft Computing and Signal Processing","isbn-type":"print","first-page":"335","article-title":"An improved CNN-based architecture for within-project software defect prediction","author":"Malohtra","year":"2021","ISBN":"https:\/\/id.crossref.org\/isbn\/9789813369122"},{"key":"10.1016\/j.hcc.2023.100148_b12","series-title":"2019 34th IEEE\/ACM International Conference on Automated Software Engineering Workshop","first-page":"114","article-title":"Project achilles: A prototype tool for static method-level vulnerability detection of java source code using a recurrent neural network","author":"Saccente","year":"2019"},{"issue":"1","key":"10.1016\/j.hcc.2023.100148_b13","doi-asserted-by":"crossref","first-page":"1032","DOI":"10.1109\/JSYST.2021.3072154","article-title":"ISVSF: Intelligent vulnerability detection against java via sentence-level pattern exploring","volume":"16","author":"Zhang","year":"2022","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.hcc.2023.100148_b14","series-title":"2017 IEEE International Conference on Software Quality, Reliability and Security","first-page":"318","article-title":"Software defect prediction via convolutional neural network","author":"Li","year":"2017"},{"key":"10.1016\/j.hcc.2023.100148_b15","doi-asserted-by":"crossref","first-page":"2023","DOI":"10.1016\/j.procs.2020.04.217","article-title":"A comparative study of static code analysis tools for vulnerability detection in C\/C++ and JAVA source code","volume":"171","author":"Kaur","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.hcc.2023.100148_b16","series-title":"Flawfinder","year":"2001"},{"key":"10.1016\/j.hcc.2023.100148_b17","series-title":"RATS","year":"2016"},{"key":"10.1016\/j.hcc.2023.100148_b18","series-title":"SpotBugs","year":"2023"},{"key":"10.1016\/j.hcc.2023.100148_b19","series-title":"PMD","year":"2015"},{"issue":"2","key":"10.1016\/j.hcc.2023.100148_b20","article-title":"Electrolint and security of electron applications","volume":"1","author":"Peguero","year":"2021","journal-title":"High-Conf. Comput."},{"key":"10.1016\/j.hcc.2023.100148_b21","series-title":"2015 IEEE International Conference on Software Quality, Reliability and Security","first-page":"17","article-title":"Deep learning for just-in-time defect prediction","author":"Yang","year":"2015"},{"key":"10.1016\/j.hcc.2023.100148_b22","doi-asserted-by":"crossref","first-page":"01004","DOI":"10.1051\/matecconf\/201817301004","article-title":"Research on SQL injection detection technology based on SVM","volume":"173","author":"Chen","year":"2018","journal-title":"MATEC Web Conf."},{"issue":"C","key":"10.1016\/j.hcc.2023.100148_b23","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/j.eswa.2016.09.041","article-title":"Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system","volume":"67","author":"Al-Yaseen","year":"2017","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.hcc.2023.100148_b24","article-title":"A method for detecting software vulnerabilities based on clustering and model analyzing","volume":"7","author":"Ren","year":"2011","journal-title":"J. Comput. Inf. Syst."},{"issue":"2","key":"10.1016\/j.hcc.2023.100148_b25","article-title":"CSRF protection in JavaScript frameworks and the security of JavaScript applications","volume":"1","author":"Peguero","year":"2021","journal-title":"High-Conf. Comput."},{"issue":"2","key":"10.1016\/j.hcc.2023.100148_b26","doi-asserted-by":"crossref","DOI":"10.3390\/app13020825","article-title":"VulEye: A novel graph neural network vulnerability detection approach for PHP application","volume":"13","author":"Lin","year":"2023","journal-title":"Appl. Sci."},{"key":"10.1016\/j.hcc.2023.100148_b27","series-title":"CodeGeeX: A pre-trained model for code generation with multilingual evaluations on HumanEval-X","author":"Zheng","year":"2023"},{"key":"10.1016\/j.hcc.2023.100148_b28","series-title":"StarCoder: may the source be with you!","author":"Li","year":"2023"}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295223000466?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295223000466?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T23:09:07Z","timestamp":1762643347000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295223000466"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["S2667295223000466"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2023.100148","relation":{},"ISSN":["2667-2952"],"issn-type":[{"value":"2667-2952","type":"print"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"JFinder: A novel architecture for java vulnerability identification based quad self-attention and pre-training mechanism","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2023.100148","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100148"}}