{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:11:38Z","timestamp":1771657898179,"version":"3.50.1"},"reference-count":49,"publisher":"Zhejiang University Press","issue":"10","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front Inform Technol Electron Eng"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1631\/fitee.2500038","type":"journal-article","created":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:03:43Z","timestamp":1763341423000},"page":"1926-1941","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Large language model-enhanced probabilistic modeling for effective static analysis alarms","\u5927\u8bed\u8a00\u6a21\u578b\u589e\u5f3a\u7684\u9759\u6001\u5206\u6790\u8b66\u62a5\u6982\u7387\u6a21\u578b"],"prefix":"10.1631","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-3328-4080","authenticated-orcid":false,"given":"Xinlong","family":"Pan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6831-3973","authenticated-orcid":false,"given":"Jianhua","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3946-2478","authenticated-orcid":false,"given":"Zhihong","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Gaolei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiuzhen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Quanhai","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2025,11,17]]},"reference":[{"key":"ref1","author":"Achiam","year":"2023","journal-title":"GPT-4 technical report"},{"key":"ref2","author":"Ahmed","year":"2023","journal-title":"Improving few-shot prompts with relevant static analysis products"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/saner.2016.105"},{"key":"ref4","author":"Chen","year":"2021","journal-title":"Evaluating large language models trained on code"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468626"},{"key":"ref6","first-page":"332","article-title":"What developers want and need from program analysis: an empirical study","author":"Christakis","year":"2016","journal-title":"Proc 31st IEEE\/ACM Int Conf on Automated Software Engineering"},{"key":"ref7","author":"Eggert","year":"2010","journal-title":"sort: Commit 14ad7a2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref10","author":"Gao","year":"2023","journal-title":"How far have we gone in vulnerability detection using large language models"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/icse.2017.54"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314616"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3571730"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19584-1_4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510098"},{"key":"ref16","author":"Li","year":"2023","journal-title":"The Hitchhiker\u2019s guide to program analysis: a journey with large language models"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3649828"},{"key":"ref18","author":"Li","year":"2024","journal-title":"IRIS: LLM-assisted static analysis for detecting security vulnerabilities"},{"key":"ref19","year":"2024","journal-title":"Issue #624 - libtiff"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2678015.2682538"},{"key":"ref21","author":"Ma","year":"2023","journal-title":"LMs: understanding code syntax and semantics for code analysis"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786851"},{"key":"ref23","author":"Meyering","year":"2018","journal-title":"tar: Commit b531801"},{"key":"ref24","year":"2015a","journal-title":"CVE-2015-1345"},{"key":"ref25","year":"2015b","journal-title":"CVE-2015-8106"},{"key":"ref26","year":"2016","journal-title":"CVE-2016-10713"},{"key":"ref27","year":"2017a","journal-title":"CVE-2017-9181"},{"key":"ref28","year":"2017b","journal-title":"CVE-2017-16663"},{"key":"ref29","year":"2018","journal-title":"CVE-2018-10372"},{"key":"ref30","year":"2019a","journal-title":"CVE-2019-16166"},{"key":"ref31","year":"2019b","journal-title":"CVE-2019-18397"},{"key":"ref32","year":"2024","journal-title":"CVE-2024-7006"},{"key":"ref33","author":"Mohajer","year":"2023","journal-title":"Skip-Analyzer: an embodied agent for code analysis with large language models"},{"key":"ref34","first-page":"2169","article-title":"libDAI: a free and open source C++ library for discrete approximate inference in graphical models","volume":"11","author":"Mooij","year":"2010","journal-title":"J Mach Learn Res"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3494521"},{"key":"ref36","author":"Oh","year":"2012","journal-title":"The Sparrow static analyzer"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179324"},{"key":"ref38","first-page":"27496","article-title":"Can large language models reason about program invariants?","author":"Pei","year":"2023","journal-title":"Proc 40th Int Conf on Machine Learning"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192417"},{"key":"ref40","author":"Ruhsen","year":"2018a","journal-title":"wget: Commit b3ff8ce"},{"key":"ref41","author":"Ruhsen","year":"2018b","journal-title":"wget: Commit f0d715b"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/icst.2011.51"},{"key":"ref43","year":"2024","journal-title":"Souffl\u00e9: a Datalog Synthesis Tool-Rules"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639117"},{"key":"ref45","author":"Touvron","year":"2023","journal-title":"Llama 2: open foundation and fine-tuned chat models"},{"key":"ref46","article-title":"Chain-of-thought prompting elicits reasoning in large language models","author":"Wei","year":"2022","journal-title":"Proc 36th Int Conf on Neural Information Processing Systems"},{"key":"ref47","article-title":"Tree of thoughts: deliberate problem solving with large language models","author":"Yao","year":"2023","journal-title":"Proc 37th Int Conf on Neural Information Processing Systems"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3649845"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3708522"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2500038.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1631\/FITEE.2500038\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2500038.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:40:50Z","timestamp":1771656050000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1631\/FITEE.2500038"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":49,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2110"],"URL":"https:\/\/doi.org\/10.1631\/fitee.2500038","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"16 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"All the authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}