journal article Open Access Jan 01, 2026

Artificial intelligence for source code understanding tasks: A systematic mapping study

View at Publisher Save 10.1016/j.infsof.2025.107915
Topics

No keywords indexed for this article. Browse by subject →

References
255
[1]
Tulili "Burnout in software engineering: A systematic mapping study" Inf. Softw. Technol. (2023) 10.1016/j.infsof.2022.107116
[2]
Sebesta (2012)
[3]
Wang "How does naming affect language models on code analysis tasks?" J. Softw. Eng. Appl. (2024) 10.4236/jsea.2024.1711044
[4]
Allamanis "A survey of machine learning for big code and naturalness" ACM Comput. Surv. (2018) 10.1145/3212695
[5]
Vasilescu "Gender and tenure diversity in GitHub teams" (2015)
[6]
Ray "The naturalness of software" (2016)
[7]
Systematic literature reviews in software engineering – A systematic literature review

Barbara Kitchenham, O. Pearl Brereton, David Budgen et al.

Information and Software Technology 2009 10.1016/j.infsof.2008.09.009
[8]
Guidelines for conducting systematic mapping studies in software engineering: An update

Kai Petersen, Sairam Vakkalanka, Ludwik Kuzniarz

Information and Software Technology 2015 10.1016/j.infsof.2015.03.007
[9]
Wohlin "Guidelines for snowballing in systematic literature studies and a replication in software engineering" Inf. Softw. Technol. (2015)
[10]
Shiri Harzevili "A systematic literature review on automated software vulnerability detection using machine learning" ACM Comput. Surv. (2024) 10.1145/3699711
[11]
Pooja "Developer’s roadmap to design software vulnerability detection model using different ai approaches" IEEE Access (2022) 10.1109/access.2022.3191115
[12]
Mehrabi Koushki "On building machine learning pipelines for android malware detection: a procedural survey of practices, challenges and opportunities" Cybersecurity (2022) 10.1186/s42400-022-00119-8
[13]
Joomye "A brief survey of deep learning methods for android malware detection" Int. J. Syst. Assur. Eng. Manag. (2024)
[14]
Bilot "A survey on malware detection with graph representation learning" ACM Comput. Surv. (2024) 10.1145/3664649
[15]
Zhao "A study of code search technology" (2024)
[16]
Xie "Survey of code search based on deep learning" ACM Trans. Softw. Eng. Methodol. (2023) 10.1145/3628161
[17]
Li "Progress of word embedding in code generation" (2019)
[18]
Martinet "From document to program embeddings: can distributional hypothesis really be used on programming languages?" (2024)
[19]
Hadj-Kacem "Application of deep learning for code smell detection: Challenges and opportunities" SN Comput. Sci. (2024) 10.1007/s42979-024-02956-5
[20]
Zhang "Deep learning for code generation: a survey" Sci. China Inf. Sci. (2024) 10.1007/s11432-023-3956-3
[21]
Wang "A review of deep learning based malware detection techniques" Neurocomputing (2024)
[22]
Karmakar "What do pre-trained code models know about code?" (2021)
[23]
Aversano "Forecasting technical debt evolution in software systems: an empirical study" Front. Comput. Sci. (2023) 10.1007/s11704-022-1541-7
[24]
Wang "Development trend of code defect detection technology based on natural language processing" (2024)
[25]
Lei "Deep learning application on code clone detection: A review of current knowledge" J. Syst. Softw. (2022) 10.1016/j.jss.2021.111141
[26]
Zhang "A review of automatic source code summarization" Empir. Softw. Eng. (2024) 10.1007/s10664-024-10553-6
[27]
Sodhi "An insight on software features supporting software transplantation: a systematic review" Arch. Comput. Methods Eng. (2022) 10.1007/s11831-021-09593-8
[28]
Samoaa "A systematic mapping study of source code representation for deep learning in software engineering" IET Softw. (2022) 10.1049/sfw2.12064
[29]
Niu "An empirical comparison of pre-trained models of source code" (2023)
[30]
Wan "Deep learning for code intelligence: Survey, benchmark and toolkit" ACM Comput. Surv. (2024) 10.1145/3664597
[31]
Zhang "A survey of learning-based automated program repair" ACM Trans. Softw. Eng. Methodol. (2023)
[32]
D.R. Fudholi, A. Capiluppi, Studies Dataset for “Artificial Intelligence for Source Code Understanding Tasks: A Systematic Mapping Study”, Zenodo, 2025. http://dx.doi.org/10.5281/zenodo.16947597, https://zenodo.org/records/16947597.
[33]
Avetisyan "LLVM-based code clone detection framework" (2015)
[34]
Liu "Detect software vulnerabilities with weight biases via graph neural networks" Expert Syst. Appl. (2024) 10.1016/j.eswa.2023.121764
[35]
Bahaa "DB-CBIL: A DistilBert-based transformer hybrid model using CNN and BiLSTM for software vulnerability detection" IEEE Access (2024) 10.1109/access.2024.3396410
[36]
Cai "CSVD-TF: Cross-project software vulnerability detection with TrAdaBoost by fusing expert metrics and semantic metrics" J. Syst. Softw. (2024) 10.1016/j.jss.2024.112038
[37]
Li "BABEL: A novel software vulnerability detection framework for breaking language barriers" (2024)
[38]
J. Wu, X. Ling, X. Duan, T. Luo, M. Yang, VulDL: Tree-based and Graph-based Neural Networks for Vulnerability Detection and Localization, in: Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering, 2024, pp. 323–332. 10.1145/3661167.3661211
[39]
Y. Wu, D. Zou, S. Dou, W. Yang, D. Xu, H. Jin, Vulcnn: An image-inspired scalable vulnerability detection system, in: Proceedings of the 44th International Conference on Software Engineering, 2022, pp. 2365–2376. 10.1145/3510003.3510229
[40]
X. Zhang, F. Zhang, B. Zhao, B. Zhou, B. Xiao, VulD-Transformer: source code vulnerability detection via transformer, in: Proceedings of the 14th Asia-Pacific Symposium on Internetware, 2023, pp. 185–193. 10.1145/3609437.3609451
[41]
Du "A vulnerability severity prediction method based on bimodal data and multi-task learning" J. Syst. Softw. (2024) 10.1016/j.jss.2024.112039
[42]
Feng "Bejagnn: behavior-based java malware detection via graph neural network" J. Supercomput. (2023) 10.1007/s11227-023-05243-x
[43]
Narayanan "A multi-view context-aware approach to android malware detection and malicious code localization" Empir. Softw. Eng. (2018) 10.1007/s10664-017-9539-8
[44]
Bao "Multi-label code smell detection method based on codebert" (2024)
[45]
Kovačević "Automatic detection of long method and god class code smells through neural source code embeddings" Expert Syst. Appl. (2022) 10.1016/j.eswa.2022.117607
[46]
Sahar "DP-CCL: A supervised contrastive learning approach using codebert model in software defect prediction" IEEE Access (2024) 10.1109/access.2024.3362896
[47]
Zhuang "Just-in-time defect prediction based on AST change embedding" Knowl.-Based Syst. (2022) 10.1016/j.knosys.2022.108852
[48]
Yao "A software defect prediction method based on program semantic feature mining" Electronics (2023) 10.3390/electronics12071546
[49]
Wang "Detecting source code vulnerabilities using high-precision code representation and bimodal contrastive learning" (2024)
[50]
Zhang "ECET: Enhanced vulnerability detection through code embedding techniques" (2024)

Showing 50 of 255 references

Metrics
1
Citations
255
References
Details
Published
Jan 01, 2026
Vol/Issue
189
Pages
107915
License
View
Funding
Lembaga Pengelola Dana Pendidikan
Kementerian Keuangan Republik Indonesia
Cite This Article
Dzikri Rahadian Fudholi, Andrea Capiluppi (2026). Artificial intelligence for source code understanding tasks: A systematic mapping study. Information and Software Technology, 189, 107915. https://doi.org/10.1016/j.infsof.2025.107915
Related

You May Also Like