{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T10:44:35Z","timestamp":1773917075334,"version":"3.50.1"},"reference-count":42,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62402496"],"award-info":[{"award-number":["62402496"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005145","name":"Basic Research Program of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20242084"],"award-info":[{"award-number":["BK20242084"]}],"id":[{"id":"10.13039\/501100005145","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1016\/j.jss.2025.112742","type":"journal-article","created":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T07:59:41Z","timestamp":1765353581000},"page":"112742","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Leveraging syntactic dual-graph representations for security patch identification via structural latent alignment"],"prefix":"10.1016","volume":"234","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1401-7885","authenticated-orcid":false,"given":"Jiajun","family":"Tong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4256-1477","authenticated-orcid":false,"given":"Zhixiao","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0951-1512","authenticated-orcid":false,"given":"Xiaobin","family":"Rui","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2025.112742_bib0001","unstructured":"Achiam, J., Adler, S., Agarwal, S., Ahmad, L., Akkaya, I., Aleman, F. L., Almeida, D., Altenschmidt, J., Altman, S., Anadkat, S., et al., 2023. Gpt-4 Technical Report. arXiv preprint arXiv:2303.08774."},{"key":"10.1016\/j.jss.2025.112742_bib0002","series-title":"Normal and Student\u2019s t Distributions and Their Applications","volume":"Vol. 4","author":"Ahsanullah","year":"2014"},{"key":"10.1016\/j.jss.2025.112742_bib0003","series-title":"International Conference on Machine Learning","first-page":"1247","article-title":"Deep canonical correlation analysis","author":"Andrew","year":"2013"},{"issue":"2","key":"10.1016\/j.jss.2025.112742_bib0004","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.infoecopol.2009.10.002","article-title":"Competition and patching of security vulnerabilities: an empirical analysis","volume":"22","author":"Arora","year":"2010","journal-title":"Inf. Econ. Policy"},{"key":"10.1016\/j.jss.2025.112742_bib0005","unstructured":"Bai, J., Bai, S., Chu, Y., Cui, Z., Dang, K., Deng, X., Fan, Y., Ge, W., Han, Y., Huang, F., et al., 2023. Qwen technical report. arXiv preprint arXiv:2309.16609."},{"key":"10.1016\/j.jss.2025.112742_bib0006","doi-asserted-by":"crossref","DOI":"10.1017\/ATSIP.2020.13","article-title":"Graph representation learning: a survey","volume":"9","author":"Chen","year":"2020","journal-title":"APSIPA Trans. Signal Inf. Process."},{"key":"10.1016\/j.jss.2025.112742_bib0007","series-title":"International Conference on Machine Learning","first-page":"1597","article-title":"A simple framework for contrastive learning of visual representations","author":"Chen","year":"2020"},{"key":"10.1016\/j.jss.2025.112742_bib0008","first-page":"9735","article-title":"Latent alignment and variational attention","volume":"31","author":"Deng","year":"2018","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.jss.2025.112742_bib0009","unstructured":"Dubey, A., Jauhri, A., Pandey, A., Kadian, A., Al-Dahle, A., Letman, A., Mathur, A., Schelten, A., Yang, A., Fan, A., et al., 2024. The Llama 3 herd of models. arXiv e-prints, arXiv\u20132407."},{"key":"10.1016\/j.jss.2025.112742_bib0010","unstructured":"Ganin, Y., Ustinova, E., Ajakan, H., Germain, P., Larochelle, H., Laviolette, F., March, M., Lempitsky, V., 2016. Domain-adversarial training of neural networks. J. Mach. Learn. Res. 17 (59), 1\u201335."},{"key":"10.1016\/j.jss.2025.112742_bib0011","series-title":"2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","first-page":"761","article-title":"What makes good in-context demonstrations for code intelligence tasks with llms?","author":"Gao","year":"2023"},{"key":"10.1016\/j.jss.2025.112742_bib0012","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2021.106566","article-title":"Augmenting commit classification by using fine-grained source code changes and a pre-trained deep neural language model","volume":"135","author":"Ghadhab","year":"2021","journal-title":"Inf. Softw. Technol."},{"issue":"6","key":"10.1016\/j.jss.2025.112742_bib0013","doi-asserted-by":"crossref","first-page":"929","DOI":"10.1002\/spe.3305","article-title":"Survey on open-source digital twin frameworks\u2013a case study approach","volume":"54","author":"Gil","year":"2024","journal-title":"Softw. Pract. Exper."},{"key":"10.1016\/j.jss.2025.112742_bib0014","series-title":"2025 7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (ICHORA)","first-page":"1","article-title":"Leveraging large language models for security patch detection and CWE classification","author":"Gokkaya","year":"2025"},{"key":"10.1016\/j.jss.2025.112742_bib0015","series-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"855","article-title":"Node2Vec: scalable feature learning for networks","author":"Grover","year":"2016"},{"key":"10.1016\/j.jss.2025.112742_bib0016","series-title":"2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS)","first-page":"109","article-title":"Importance and aptitude of source code density for commit classification into maintenance activities","author":"H\u00f6nel","year":"2019"},{"issue":"1","key":"10.1016\/j.jss.2025.112742_bib0017","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3633518","article-title":"A survey on graph representation learning methods","volume":"15","author":"Khoshraftar","year":"2024","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"10.1016\/j.jss.2025.112742_bib0018","series-title":"International Conference on Learning Representations","article-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf","year":"2017"},{"key":"10.1016\/j.jss.2025.112742_bib0019","series-title":"Rtsne: T-Distributed Stochastic Neighbor Embedding using a Barnes-Hut Implementation","author":"Krijthe","year":"2014"},{"key":"10.1016\/j.jss.2025.112742_bib0020","series-title":"Proceedings of the Seventh Workshop on Noisy User-Generated Text (W-NUT 2021)","first-page":"389","article-title":"Co-training for commit classification","author":"Lee","year":"2021"},{"key":"10.1016\/j.jss.2025.112742_bib0021","series-title":"Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering","first-page":"97","article-title":"Boosting automatic commit classification into maintenance activities by utilizing source code changes","author":"Levin","year":"2017"},{"key":"10.1016\/j.jss.2025.112742_bib0022","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","first-page":"2201","article-title":"A large-scale empirical study of security patches","author":"Li","year":"2017"},{"key":"10.1016\/j.jss.2025.112742_bib0023","article-title":"Vulnerabilities and security patches detection in OSS: a survey","author":"Lin","year":"2024","journal-title":"ACM Comput. Surv."},{"issue":"3","key":"10.1016\/j.jss.2025.112742_bib0024","doi-asserted-by":"crossref","first-page":"1755","DOI":"10.1109\/TITS.2020.3026025","article-title":"Graph SAGE-based traffic speed forecasting for segment network with sparse data","volume":"23","author":"Liu","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.jss.2025.112742_bib0025","series-title":"Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)","first-page":"397","article-title":"AMR parsing as graph prediction with latent alignment","author":"Lyu","year":"2018"},{"key":"10.1016\/j.jss.2025.112742_bib0026","series-title":"2019 18th IEEE International Conference on Machine Learning and Applications (ICMLA)","first-page":"515","article-title":"Feature changes in source code for commit classification into maintenance activities","author":"Mariano","year":"2019"},{"key":"10.1016\/j.jss.2025.112742_bib0027","series-title":"2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","first-page":"2450","article-title":"Retrieval-based prompt selection for code-related few-shot learning","author":"Nashid","year":"2023"},{"key":"10.1016\/j.jss.2025.112742_bib0028","series-title":"Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"701","article-title":"DeepWalk: online learning of social representations","author":"Perozzi","year":"2014"},{"key":"10.1016\/j.jss.2025.112742_bib0029","series-title":"International Conference on Machine Learning","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","author":"Radford","year":"2021"},{"key":"10.1016\/j.jss.2025.112742_bib0030","series-title":"2018 IEEE International Conference on Software Maintenance and Evolution (ICSME)","first-page":"579","article-title":"A practical approach to the automatic classification of security-relevant commits","author":"Sabetta","year":"2018"},{"key":"10.1016\/j.jss.2025.112742_bib0031","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"3723","article-title":"Maximum classifier discrepancy for unsupervised domain adaptation","author":"Saito","year":"2018"},{"key":"10.1016\/j.jss.2025.112742_bib0032","article-title":"Attention is all you need","volume":"30","author":"Vaswani","year":"2017","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10.1016\/j.jss.2025.112742_bib0033","series-title":"International Conference on Learning Representations","article-title":"Graph attention networks","author":"Veli\u010dkovi\u0107","year":"2018"},{"key":"10.1016\/j.jss.2025.112742_bib0034","series-title":"Proceedings of the 25th International Conference on Machine Learning","first-page":"1120","article-title":"Manifold alignment using procrustes analysis","author":"Wang","year":"2008"},{"key":"10.1016\/j.jss.2025.112742_bib0035","series-title":"2023 IEEE Symposium on Security and Privacy (SP)","first-page":"2409","article-title":"Graphspd: graph-based security patch detection with enriched code semantics","author":"Wang","year":"2023"},{"key":"10.1016\/j.jss.2025.112742_bib0036","series-title":"2021 51st Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","first-page":"149","article-title":"PatchDB: a large-scale security patch dataset","author":"Wang","year":"2021"},{"key":"10.1016\/j.jss.2025.112742_bib0037","series-title":"MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM)","first-page":"595","article-title":"PatchRNN: a deep learning-based system for security patch identification","author":"Wang","year":"2021"},{"key":"10.1016\/j.jss.2025.112742_bib0038","first-page":"1","article-title":"Enhancing security patch identification by capturing structures in commits","author":"Wu","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput"},{"issue":"1","key":"10.1016\/j.jss.2025.112742_bib0039","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","article-title":"A comprehensive survey on graph neural networks","volume":"32","author":"Wu","year":"2020","journal-title":"IEEE Trans. Neural. Netw. Learn. Syst."},{"key":"10.1016\/j.jss.2025.112742_bib0040","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.aiopen.2021.01.001","article-title":"Graph neural networks: a review of methods and applications","volume":"1","author":"Zhou","year":"2020","journal-title":"AI Open"},{"key":"10.1016\/j.jss.2025.112742_bib0041","first-page":"10197","article-title":"Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks","volume":"32","author":"Zhou","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"1","key":"10.1016\/j.jss.2025.112742_bib0042","first-page":"1","article-title":"SPI: automated identification of security patches via commits","volume":"31","author":"Zhou","year":"2021","journal-title":"ACM Trans. Software Eng. Methodol."}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016412122500411X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016412122500411X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T05:31:27Z","timestamp":1773898287000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S016412122500411X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":42,"alternative-id":["S016412122500411X"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2025.112742","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Leveraging syntactic dual-graph representations for security patch identification via structural latent alignment","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jss.2025.112742","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112742"}}