{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T22:44:51Z","timestamp":1775947491222,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030624620","type":"print"},{"value":"9783030624637","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62463-7_4","type":"book-chapter","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T09:06:23Z","timestamp":1604999183000},"page":"33-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Software Entity Recognition Method Based on BERT Embedding"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3119-1172","authenticated-orcid":false,"given":"Chao","family":"Sun","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0435-8854","authenticated-orcid":false,"given":"Mingjing","family":"Tang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8004-7527","authenticated-orcid":false,"given":"Li","family":"Liang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4674-6425","authenticated-orcid":false,"given":"Wei","family":"Zou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,11]]},"reference":[{"issue":"2","key":"4_CR1","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1016\/j.dss.2011.09.003","volume":"52","author":"R Sen","year":"2016","unstructured":"Sen, R., Singh, S.S., Borle, S.: Open source software success: measure and analysis. Decis. Supp. Syst. 52(2), 364\u2013372 (2016)","journal-title":"Decis. Supp. Syst."},{"issue":"08","key":"4_CR2","first-page":"2258","volume":"29","author":"G Yin","year":"2018","unstructured":"Yin, G., et al.: A review of the research on software data mining technology for open source ecology. J. Softw. 29(08), 2258\u20132271 (2018)","journal-title":"J. Softw."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Ye, D.H., Xing, Z.C., Chee, F., Zi, A., Li, J., Nachiket, K.: Software-specific named entity recognition in software engineering social content. In: IEEE International Conference on Software Analysis, pp. 90\u2013101 (2016)","DOI":"10.1109\/SANER.2016.10"},{"key":"4_CR4","unstructured":"Devlin, J., Chang, M.W., Lee, K., et al.: Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)"},{"key":"4_CR5","unstructured":"Amirreza, S., Bowen, X., David, L., Solorio, T., Alipour, A.: Question relatedness on stack overflow: the task, dataset, and corpus-inspired models. In: Proceedings of the AAAI Rea-soning for Complex Question Answering Workshop (2019)"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"106277","DOI":"10.1016\/j.infsof.2020.106277","volume":"122","author":"U Gias","year":"2020","unstructured":"Gias, U., Foutse, K., Chanchal, K.R.: Mining API usage scenarios from stack overflow. Inf. Softw. Technol. 122, 106277 (2020)","journal-title":"Inf. Softw. Technol."},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"105633","DOI":"10.1016\/j.knosys.2020.105633","volume":"195","author":"ACD Luis","year":"2020","unstructured":"Luis, A.C.D., Nik, B., Ioannis, K.: Classifying emotions in Stack Overflow and JIRA using a multi-label approach. Knowl.-Based Syst. 195, 105633 (2020)","journal-title":"Knowl.-Based Syst."},{"issue":"2","key":"4_CR8","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1007\/s10664-019-09743-4","volume":"25","author":"M Ahasanuzzaman","year":"2019","unstructured":"Ahasanuzzaman, M., Asaduzzaman, M., Roy, C.K., Schneider, K.A.: CAPS: a supervised technique for classifying Stack Overflow posts concerning API issues. Empirical Softw. Eng. 25(2), 1493\u20131532 (2019). https:\/\/doi.org\/10.1007\/s10664-019-09743-4","journal-title":"Empirical Softw. Eng."},{"key":"4_CR9","unstructured":"Santos, C.N.D, Guimar\u00e3es, V.: Boosting named entity recognition with neural character embeddings. Comput. Sci. (2015)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Strubell, E., Verga, P., Belanger D.: Fast and accurate entity recognition with iterated dilated convolutions. arXiv preprint arXiv:1702.02098 (2017)","DOI":"10.18653\/v1\/D17-1283"},{"issue":"8","key":"4_CR11","first-page":"230","volume":"44","author":"AYF Maimathiev","year":"2008","unstructured":"Maimathiev, A.Y.F., Umur, S., Paridan, M.: Uighur named entity recognition based on bilstm-cnn-crf model. Comput. Eng. 44(8), 230\u2013236 (2008)","journal-title":"Comput. Eng."},{"key":"4_CR12","unstructured":"Shen, Y., Yun, H., Lipton, Z.C., et al.: Deep Active Learning for Named Entity Recognition, pp. 252\u2013256 (2008)"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Bharadwaj, A., Mortensen, D., Dyer, C.: Phonologically aware neural model for named entity recognition in low resource transfer settings. In: Conference on Empirical Methods in Natural Language Processing, pp. 1462\u20131472 (2016)","DOI":"10.18653\/v1\/D16-1153"},{"issue":"9","key":"4_CR14","first-page":"1851","volume":"56","author":"H Zhang","year":"2019","unstructured":"Zhang, H., Guo, Y.B., Li, T.: Domain named entity recognition combining GAN and BiLSTM-attention-CRF. Comput. Res. Dev. 56(9), 1851 (2019)","journal-title":"Comput. Res. Dev."},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"105842","DOI":"10.1016\/j.knosys.2020.105842","volume":"197","author":"JN Wang","year":"2020","unstructured":"Wang, J.N., Xu, W.J., Fu, X.Y., Xu, G.L., Wu, Y.R.: ASTRAL: adversarial trained LSTM-CNN for named entity recognition. Knowl.-Based Syst. 197, 105842 (2020)","journal-title":"Knowl.-Based Syst."},{"issue":"09","key":"4_CR16","first-page":"18","volume":"27","author":"J Wang","year":"2008","unstructured":"Wang, J., Zhang, R.D., Wu, C.S.: Named entity recognition method based on GRU. Comput. Syst. Appl. 27(09), 18\u201324 (2008)","journal-title":"Comput. Syst. Appl."},{"key":"4_CR17","unstructured":"Li, L.H., Guo, Y.K.: Biomedical named entity recognition based on CNN-BLSTM-CRF model. Chin. J. Inf. (2018)"},{"issue":"01","key":"4_CR18","first-page":"245","volume":"28","author":"XL Zhou","year":"2019","unstructured":"Zhou, X.L., Zhao, X.J., Liu, T.L., Zong, Z.X., Wang, Q.L., Li, J.Q.: Named entity identification method for property dispute based on SVM-BiLSTM-CRF model. Comput. Syst. Appl. 28(01), 245\u2013250 (2019)","journal-title":"Comput. Syst. Appl."},{"issue":"02","key":"4_CR19","first-page":"8","volume":"28","author":"WM Yang","year":"2019","unstructured":"Yang, W.M., Chu, W.J.: Named entity recognition of online medical Q & A texts. Comput. Syst. Appl. 28(02), 8\u201314 (2019)","journal-title":"Comput. Syst. Appl."},{"key":"4_CR20","unstructured":"Li, G., Pan, R.Q., Mao, J., Cao, Y.J.: Entity identification of Chinese electronic medical records integrating BiLSTM-CRF network and dictionary resources. Modern Intell. 40(04), 3\u201312\u2009+\u200958 (2020)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Yang, X.M., et al.: Bidirectional LSTM-CRF for biomedical named entity recognition. In: 2018 14th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) (2018)","DOI":"10.1109\/FSKD.2018.8687117"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Chen, C.Y., Xing, Z.C., Wang, X.M.: Unsupervised software-specific morphological forms inference from informal discussions. In: 2017 IEEE\/ACM 39th International Conference on Software Engineering (2017)","DOI":"10.1109\/ICSE.2017.48"},{"key":"4_CR23","unstructured":"Vasiliki, E., Christos, C., Diomidis, S.: Word embeddings for the software engineering domain. In: 2018 ACM\/IEEE 15th International Conference on Mining Software Repositories (2018)"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62463-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T07:55:29Z","timestamp":1607932529000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62463-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030624620","9783030624637"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62463-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2020\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"360","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"118","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}