{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:53:13Z","timestamp":1743115993968,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031262838"},{"type":"electronic","value":"9783031262845"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-26284-5_18","type":"book-chapter","created":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T08:02:59Z","timestamp":1677052979000},"page":"291-306","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CV4Code: Sourcecode Understanding via\u00a0Visual Code Representations"],"prefix":"10.1007","author":[{"given":"Ruibo","family":"Shi","sequence":"first","affiliation":[]},{"given":"Lili","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Rohan","family":"Saphal","sequence":"additional","affiliation":[]},{"given":"Fran","family":"Silavong","sequence":"additional","affiliation":[]},{"given":"Sean","family":"Moran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,23]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","unstructured":"Abnar, S., Zuidema, W.: Quantifying attention flow in transformers. In: Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, pp. 4190\u20134197. Association for Computational Linguistics (2020). https:\/\/doi.org\/10.18653\/v1\/2020.acl-main.385, https:\/\/aclanthology.org\/2020.acl-main.385\/","DOI":"10.18653\/v1\/2020.acl-main.385"},{"key":"18_CR2","doi-asserted-by":"publisher","unstructured":"Allamanis, M., Sutton, C.: Mining source code repositories at massive scale using language modeling. In: 2013 10th Working Conference on Mining Software Repositories (MSR), pp. 207\u2013216 (2013). https:\/\/doi.org\/10.1109\/MSR.2013.6624029","DOI":"10.1109\/MSR.2013.6624029"},{"issue":"4","key":"18_CR3","first-page":"81","volume":"51","author":"M Allamanis","year":"2018","unstructured":"Allamanis, M., Barr, E.T., Devanbu, P., Sutton, C.: A survey of machine learning for big code and naturalness. ACM Comput. Surv. (CSUR) 51(4), 81 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Alon, U., Brody, S., Levy, O., Yahav, E.: code2seq: generating sequences from structured representations of code. In: International Conference on Learning Representations (2019). https:\/\/openreview.net\/forum?id=H1gKYo09tX","DOI":"10.1145\/3290353"},{"key":"18_CR5","doi-asserted-by":"publisher","unstructured":"Alon, U., Zilberstein, M., Levy, O., Yahav, E.: Code2vec: learning distributed representations of code. Proc. ACM Program. Lang. 3(POPL) (2019). https:\/\/doi.org\/10.1145\/3290353","DOI":"10.1145\/3290353"},{"key":"18_CR6","unstructured":"Bilgin, Z.: Code2image: intelligent code analysis by computer vision techniques and application to vulnerability prediction. arXiv preprint arXiv:2105.03131 (2021)"},{"issue":"9","key":"18_CR7","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1109\/TSE.2019.2940179","volume":"47","author":"Z Chen","year":"2021","unstructured":"Chen, Z., Kommrusch, S., Tufano, M., Pouchet, L.N., Poshyvanyk, D., Monperrus, M.: Sequencer: Sequence-to-sequence learning for end-to-end program repair. IEEE Trans. Softw. Eng. 47(9), 1943\u20131959 (2021). https:\/\/doi.org\/10.1109\/TSE.2019.2940179","journal-title":"IEEE Trans. Softw. Eng."},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: Arcface: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4690\u20134699 (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"157158","DOI":"10.1109\/ACCESS.2019.2949483","volume":"7","author":"S Dey","year":"2019","unstructured":"Dey, S., Singh, A.K., Prasad, D.K., Mcdonald-Maier, K.D.: Socodecnn: program source code for visual CNN classification using computer vision methodology. IEEE Access 7, 157158\u2013157172 (2019)","journal-title":"IEEE Access"},{"key":"18_CR10","doi-asserted-by":"publisher","unstructured":"Feng, Z., et al.: CodeBERT: a pre-trained model for programming and natural languages. In: Findings of the Association for Computational Linguistics: EMNLP 2020, pp. 1536\u20131547. Association for Computational Linguistics (2020). https:\/\/doi.org\/10.18653\/v1\/2020.findings-emnlp.139, https:\/\/aclanthology.org\/2020.findings-emnlp.139\/","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"18_CR11","unstructured":"Hassani, A., Walton, S., Shah, N., Abuduweili, A., Li, J., Shi, H.: Escaping the big data paradigm with compact transformers. ArXiv abs\/2104.05704 (2021)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"He, K., Chen, X., Xie, S., Li, Y., Doll\u00e1r, P., Girshick, R.: Masked autoencoders are scalable vision learners. arXiv preprint arXiv:2111.06377 (2021)","DOI":"10.1109\/CVPR52688.2022.01553"},{"key":"18_CR13","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770\u2013778 (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"18_CR14","unstructured":"Kolesnikov, A., et al.: An image is worth 16$$\\times $$16 words: transformers for image recognition at scale (2021)"},{"key":"18_CR15","unstructured":"Lee, S.H., Lee, S., Song, B.C.: Vision transformer for small-size datasets. arXiv preprint abs\/2112.13492 (2021)"},{"key":"18_CR16","unstructured":"Loshchilov, I., Hutter, F.: Decoupled weight decay regularization. In: ICLR (2019)"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Luan, S., Yang, D., Barnaby, C., Sen, K., Chandra, S.: Aroma: code recommendation via structural code search. Proc. ACM Program. Lang. 3(OOPSLA) (2019)","DOI":"10.1145\/3360578"},{"key":"18_CR18","unstructured":"van der Maaten, L., Hinton, G.: Visualizing data using t-sne. J. Mach. Learn. Res. 9(86), 2579\u20132605 (2008). https:\/\/jmlr.org\/papers\/v9\/vandermaaten08a.html"},{"key":"18_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/978-3-030-58595-2_41","volume-title":"Computer Vision \u2013 ECCV 2020","author":"K Musgrave","year":"2020","unstructured":"Musgrave, K., Belongie, S., Lim, S.-N.: A metric learning reality check. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12370, pp. 681\u2013699. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58595-2_41"},{"issue":"1","key":"18_CR20","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/s10664-019-09769-8","volume":"25","author":"M Ochodek","year":"2020","unstructured":"Ochodek, M., Hebig, R., Meding, W., Frost, G., Staron, M.: Recognizing lines of code violating company-specific coding guidelines using machine learning. Empir. Softw. Eng. 25(1), 220\u2013265 (2020)","journal-title":"Empir. Softw. Eng."},{"key":"18_CR21","doi-asserted-by":"publisher","unstructured":"Pradel, M., Sen, K.: Deepbugs: a learning approach to name-based bug detection. Proc. ACM Program. Lang. 2(OOPSLA) (2018). https:\/\/doi.org\/10.1145\/3276517","DOI":"10.1145\/3276517"},{"key":"18_CR22","unstructured":"Puri, R., et al.: Project codenet: a large-scale AI for code dataset for learning a diversity of coding tasks (2021)"},{"key":"18_CR23","unstructured":"Rabin, M.R.I., Alipour, M.A.: Encoding program as image: evaluating visual representation of source code. arXiv preprint arXiv:2111.01097 (2021)"},{"key":"18_CR24","unstructured":"Russell, R.L., et al.: Automated vulnerability detection in source code using deep representation learning. CoRR abs\/1807.04320 (2018). https:\/\/arxiv.org\/abs\/1807.04320"},{"key":"18_CR25","unstructured":"Sharma, T., Kechagia, M., Georgiou, S., Tiwari, R., Sarro, F.: A survey on machine learning techniques for source code analysis. arXiv preprint arXiv:2110.09610 (2021)"},{"key":"18_CR26","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: International Conference on Learning Representations (2015)"},{"key":"18_CR27","doi-asserted-by":"publisher","unstructured":"Svyatkovskiy, A., Lee, S., Hadjitofi, A., Riechert, M., Franco, J.V., Allamanis, M.: Fast and memory-efficient neural code completion. In: 18th IEEE\/ACM International Conference on Mining Software Repositories, MSR 2021, Madrid, Spain, 17\u201319 May 2021, pp. 329\u2013340. IEEE (2021). https:\/\/doi.org\/10.1109\/MSR52588.2021.00045","DOI":"10.1109\/MSR52588.2021.00045"},{"key":"18_CR28","doi-asserted-by":"publisher","unstructured":"Yan, S., Yu, H., Chen, Y., Shen, B., Jiang, L.: Are the code snippets what we are searching for? a benchmark and an empirical study on code search with natural-language queries. In: 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 344\u2013354 (2020). https:\/\/doi.org\/10.1109\/SANER48275.2020.9054840","DOI":"10.1109\/SANER48275.2020.9054840"},{"key":"18_CR29","doi-asserted-by":"publisher","unstructured":"Zanoni, M., Arcelli Fontana, F., Stella, F.: On applying machine learning techniques for design pattern detection. J. Syst. Softw. 103(C), 102\u2013117 (2015). https:\/\/doi.org\/10.1016\/j.jss.2015.01.037","DOI":"10.1016\/j.jss.2015.01.037"},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, J., Wang, X., Zhang, H., Sun, H., Wang, K., Liu, X.: A novel neural source code representation based on abstract syntax tree. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pp. 783\u2013794. IEEE (2019)","DOI":"10.1109\/ICSE.2019.00086"},{"key":"18_CR31","unstructured":"Z\u00fcgner, D., Kirschstein, T., Catasta, M., Leskovec, J., G\u00fcnnemann, S.: Language-agnostic representation learning of source code from structure and context. In: International Conference on Learning Representations (ICLR) (2021)"},{"key":"18_CR32","unstructured":"Z\u00fcgner, D., Kirschstein, T., Catasta, M., Leskovec, J., G\u00fcnnemann, S.: Language-agnostic representation learning of source code from structure and context. arXiv preprint arXiv:2103.11318 (2021)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ACCV 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-26284-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T08:10:39Z","timestamp":1677053439000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-26284-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031262838","9783031262845"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-26284-5_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"23 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"accv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.accv2022.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT Microsoft","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"836","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"277","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the ACCV 2022 workshops 25 papers have been accepted from 40 submissions","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}