{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:57:21Z","timestamp":1775181441518,"version":"3.50.1"},"reference-count":47,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["62137001"],"award-info":[{"award-number":["62137001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["62272093"],"award-info":[{"award-number":["62272093"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.neucom.2026.133298","type":"journal-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T16:48:50Z","timestamp":1773074930000},"page":"133298","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["CL-ECDD: A contrastive learning framework for enterprise-level code defect detection"],"prefix":"10.1016","volume":"680","author":[{"given":"Liyuan","family":"Xue","sequence":"first","affiliation":[]},{"given":"Fangling","family":"Leng","sequence":"additional","affiliation":[]},{"given":"Junhao","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Yubin","family":"Bao","sequence":"additional","affiliation":[]},{"given":"Zikuan","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Ge","family":"Yu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/j.neucom.2026.133298_bib0010","first-page":"202","article-title":"Research on classified protection testing technology for infrastructure software based on code review [J].","volume":"39","author":"Ke","year":"2021","journal-title":"Digit. Technol. Appl."},{"key":"10.1016\/j.neucom.2026.133298_bib0015","author":"Mikolov"},{"key":"10.1016\/j.neucom.2026.133298_bib0020","series-title":"Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP)","first-page":"1532","article-title":"Glove: global vectors for word representation","author":"Pennington","year":"2014"},{"key":"10.1016\/j.neucom.2026.133298_bib0025","series-title":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","first-page":"519","article-title":"Path-sensitive code embedding via contrastive learning for software vulnerability detection","author":"Cheng","year":"2022"},{"key":"10.1016\/j.neucom.2026.133298_bib0030","article-title":"Code search review:from perspective of deep program comprehension","volume":"58","author":"Wen","year":"2022","journal-title":"J. Comput. Eng. Appl."},{"key":"10.1016\/j.neucom.2026.133298_bib0035","first-page":"1","article-title":"Codematcher: searching code based on sequential semantics of important query words","volume":"31","author":"Liu","year":"2021","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"12","key":"10.1016\/j.neucom.2026.133298_bib0040","first-page":"140","article-title":"Code search engine for bug localization","volume":"48","author":"Chang","year":"2021","journal-title":"Comput. Sci."},{"key":"10.1016\/j.neucom.2026.133298_bib0045","series-title":"Proceedings of the 19th International Conference on Mining Software Repositories","first-page":"596","article-title":"Linevd: statement-level vulnerability detection using graph neural networks","author":"Hin","year":"2022"},{"key":"10.1016\/j.neucom.2026.133298_bib0050","first-page":"1358","article-title":"Vulnerability detection method based on word vector model","volume":"61","author":"Xiao","year":"2023","journal-title":"J. Jilin Univ. (Sci. Ed.)"},{"key":"10.1016\/j.neucom.2026.133298_bib0055","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102417","article-title":"Vdsimilar: vulnerability detection based on code similarity of vulnerabilities and patches","volume":"110","author":"Sun","year":"2021","journal-title":"Comput. Secur."},{"key":"10.1016\/j.neucom.2026.133298_bib0060","doi-asserted-by":"crossref","first-page":"1279","DOI":"10.1007\/s00521-022-08046-y","article-title":"The application of neural network for software vulnerability detection: a review","volume":"35","author":"Zhu","year":"2023","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.neucom.2026.133298_bib0065","doi-asserted-by":"crossref","first-page":"3280","DOI":"10.1109\/TSE.2021.3087402","article-title":"Deep learning based vulnerability detection: are we there yet?","volume":"48","author":"Chakraborty","year":"2021","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.neucom.2026.133298_bib0070","author":"Gao"},{"key":"10.1016\/j.neucom.2026.133298_bib0075","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"15750","article-title":"Exploring simple siamese representation learning","author":"Chen","year":"2021"},{"key":"10.1016\/j.neucom.2026.133298_bib0080","series-title":"Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval","first-page":"511","article-title":"Self-supervised contrastive learning for code retrieval and summarization via semantic-preserving transformations","author":"Bui","year":"2021"},{"key":"10.1016\/j.neucom.2026.133298_bib0085","author":"Wang"},{"key":"10.1016\/j.neucom.2026.133298_bib0090","first-page":"1601","article-title":"Pre-training method for enhanced code representation based on multimodal contrastive learning","volume":"35","author":"Yang","year":"2023","journal-title":"J. Softw."},{"key":"10.1016\/j.neucom.2026.133298_bib0095","article-title":"Overview of deep learning-based code representation and its applications","volume":"16","author":"Zhang Xiang-Ping","year":"2022","journal-title":"J. Front. Comput. Sci. Technol."},{"key":"10.1016\/j.neucom.2026.133298_bib0100","first-page":"19","article-title":"Vulnerability awareness of open source software","volume":"35","author":"Zhan","year":"2023","journal-title":"J. Softw."},{"key":"10.1016\/j.neucom.2026.133298_bib0105","series-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers)","first-page":"4171","article-title":"BERT: pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2019"},{"key":"10.1016\/j.neucom.2026.133298_bib0110","series-title":"International Conference on Machine Learning","first-page":"5110","article-title":"Learning and evaluating contextual embedding of source code","author":"Kanade","year":"2020"},{"key":"10.1016\/j.neucom.2026.133298_bib0115","author":"Feng"},{"key":"10.1016\/j.neucom.2026.133298_bib0120","author":"Guo"},{"key":"10.1016\/j.neucom.2026.133298_bib0125","first-page":"1","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume":"21","author":"Raffel","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.neucom.2026.133298_bib0130","author":"Wang"},{"key":"10.1016\/j.neucom.2026.133298_bib0135","first-page":"307","article-title":"Noise-contrastive estimation of unnormalized statistical models, with applications to natural image statistics","volume":"13","author":"Gutmann","year":"2012","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.neucom.2026.133298_bib0140","author":"Oord van den"},{"key":"10.1016\/j.neucom.2026.133298_bib0145","series-title":"International Conference on Machine Learning","first-page":"1597","article-title":"A simple framework for contrastive learning of visual representations","author":"Chen","year":"2020"},{"key":"10.1016\/j.neucom.2026.133298_bib0150","first-page":"21271","article-title":"Bootstrap your own latent-a new approach to self-supervised learning","volume":"33","author":"Grill","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133298_bib0155","first-page":"6827","article-title":"What makes for good views for contrastive learning?","volume":"33","author":"Tian","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133298_bib0160","author":"Robinson"},{"key":"10.1016\/j.neucom.2026.133298_bib0165","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1093\/nsr\/nwx105","article-title":"An overview of multi-task learning","volume":"5","author":"Zhang","year":"2018","journal-title":"Natl. Sci. Rev."},{"key":"10.1016\/j.neucom.2026.133298_bib0170","doi-asserted-by":"crossref","first-page":"5586","DOI":"10.1109\/TKDE.2021.3070203","article-title":"A survey on multi-task learning","volume":"34","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.neucom.2026.133298_bib0175","author":"Reimers"},{"key":"10.1016\/j.neucom.2026.133298_bib0180","first-page":"661","article-title":"Defective code characteristics analysis of stack overflow and similar defect detection","volume":"42","author":"Kang","year":"2021","journal-title":"J. Chin. Comput. Syst."},{"key":"10.1016\/j.neucom.2026.133298_bib0185","series-title":"Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 2: Short Papers)","first-page":"425","article-title":"Ppdb 2.0: better paraphrase ranking, fine-grained entailment relations, word embeddings, and style classification","author":"Pavlick","year":"2015"},{"key":"10.1016\/j.neucom.2026.133298_bib0190","author":"Thakur"},{"key":"10.1016\/j.neucom.2026.133298_bib0195","author":"Ding"},{"key":"10.1016\/j.neucom.2026.133298_bib0200","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"9729","article-title":"Momentum contrast for unsupervised visual representation learning","author":"He","year":"2020"},{"key":"10.1016\/j.neucom.2026.133298_bib0205","series-title":"International Conference on Machine Learning","first-page":"794","article-title":"Gradnorm: gradient normalization for adaptive loss balancing in deep multitask networks","author":"Chen","year":"2018"},{"key":"10.1016\/j.neucom.2026.133298_bib0210","article-title":"Attention is all you need","volume":"30","author":"Vaswani","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133298_bib0215","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3340544","article-title":"An empirical study on learning bug-fixing patches in the wild via neural machine translation","volume":"28","author":"Tufano","year":"2019","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"3","key":"10.1016\/j.neucom.2026.133298_bib0220","first-page":"316","article-title":"API execution sequences-based malware detection method [j]","volume":"24","author":"Hai-Ren","year":"2023","journal-title":"J. Inf. Eng. Univ."},{"key":"10.1016\/j.neucom.2026.133298_bib0225","first-page":"78","article-title":"Function-level code vulnerability detection method based on multi-representation fusion","volume":"28","author":"Zhen-Zhou","year":"2023","journal-title":"J. Xi\u2019an Univ. Posts Telecommun."},{"key":"10.1016\/j.neucom.2026.133298_bib0230","series-title":"Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)","first-page":"4892","article-title":"A contrastive framework for learning sentence representations from pairwise and triple-wise perspective in angular space","author":"Zhang","year":"2022"},{"key":"10.1016\/j.neucom.2026.133298_bib0235","first-page":"95","article-title":"Python source code vulnerability detection method based on attention-bilstm model","volume":"45","author":"Zhao-Yang","year":"2023","journal-title":"J. N. China Univ. Sci. Technol. (Nat. Sci. Ed.)"},{"key":"10.1016\/j.neucom.2026.133298_bib0240","series-title":"2020 IEEE International Conference on Big Data (Big Data)","first-page":"4651","article-title":"Explainable software vulnerability detection based on attention-based bidirectional recurrent neural networks","author":"Mao","year":"2020"}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226006958?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226006958?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:21:04Z","timestamp":1775179264000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231226006958"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":47,"alternative-id":["S0925231226006958"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133298","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"CL-ECDD: A contrastive learning framework for enterprise-level code defect detection","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133298","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"133298"}}