{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T00:31:03Z","timestamp":1775089863072,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,27]],"date-time":"2023-12-27T00:00:00Z","timestamp":1703635200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,27]],"date-time":"2023-12-27T00:00:00Z","timestamp":1703635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11432-021-3665-1","type":"journal-article","created":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T09:02:29Z","timestamp":1703840549000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["ASTSDL: predicting the functionality of incomplete programming code via an AST-sequence-based deep learning model"],"prefix":"10.1007","volume":"67","author":[{"given":"Yaoshen","family":"Yu","sequence":"first","affiliation":[]},{"given":"Zhiqiu","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Guohua","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Weiwei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yichao","family":"Shao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,27]]},"reference":[{"key":"3665_CR1","doi-asserted-by":"crossref","unstructured":"Lopes C V, Maj P, Martins P, et al. D\u00e9j\u00e0Vu: a map of code duplicates on GitHub. In: Proceedings of the ACM on Programming Languages, 2017","DOI":"10.1145\/3133908"},{"key":"3665_CR2","doi-asserted-by":"crossref","unstructured":"Lin Y, Peng X, Xing Z, et al. Clone-based and interactive recommendation for modifying pasted code. In: Proceedings of the 10th Joint Meeting on Foundations of Software Engineering, New York, 2015. 520\u2013531","DOI":"10.1145\/2786805.2786871"},{"key":"3665_CR3","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TSC.2016.2592909","volume":"12","author":"H Jiang","year":"2019","unstructured":"Jiang H, Nie L, Sun Z, et al. ROSF: leveraging information retrieval and supervised learning for recommending code snippets. IEEE Trans Serv Comput, 2019, 12: 34\u201346","journal-title":"IEEE Trans Serv Comput"},{"key":"3665_CR4","doi-asserted-by":"crossref","unstructured":"Zhou S, Shen B, Zhong H. Lancer: your code tell me what you need. In: Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE 2019), San Diego, 2019. 1202\u20131205","DOI":"10.1109\/ASE.2019.00137"},{"key":"3665_CR5","doi-asserted-by":"publisher","first-page":"2236","DOI":"10.1007\/s10664-019-09697-7","volume":"24","author":"C Ragkhitwetsagul","year":"2019","unstructured":"Ragkhitwetsagul C, Krinke J. Siamese: scalable and incremental code clone search via multiple code representations. Empir Software Eng, 2019, 24: 2236\u20132284","journal-title":"Empir Software Eng"},{"key":"3665_CR6","doi-asserted-by":"crossref","unstructured":"Ziegler C, McNee S, Konstan J, et al. Improving recommendation lists through topic diversification. In: Proceedings of the 14th International Conference on World Wide Web, New York, 2005. 22\u201332","DOI":"10.1145\/1060745.1060754"},{"key":"3665_CR7","doi-asserted-by":"crossref","unstructured":"Luan S, Yang D, Barnaby C, et al. Aroma: code recommendation via structural code search. In: Proceedings of the ACM on Programming Languages, 2019","DOI":"10.1145\/3360578"},{"key":"3665_CR8","doi-asserted-by":"crossref","unstructured":"Soll M, Vosgerau M. ClassifyHub: an algorithm to classify GitHub repositories. In: Proceedings of Advances in Artificial Intelligence, Dortmund, 2017. 373\u2013379","DOI":"10.1007\/978-3-319-67190-1_34"},{"key":"3665_CR9","doi-asserted-by":"crossref","unstructured":"Zhang Y, Xu F, Li S, et al. HiGitClass: keyword-driven hierarchical classification of GitHub repositories. In: Proceedings of IEEE International Conference on Data Mining (ICDM), Beijing, 2019. 876\u2013885","DOI":"10.1109\/ICDM.2019.00098"},{"key":"3665_CR10","doi-asserted-by":"crossref","unstructured":"Bui N, Yu Y, Jiang L. Infercode: self-supervised learning of code representations by predicting subtrees. In: Proceedings of IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), Madrid, 2021. 1186\u20131197","DOI":"10.1109\/ICSE43902.2021.00109"},{"key":"3665_CR11","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T Kamiya","year":"2002","unstructured":"Kamiya T, Kusumoto S, Inoue K. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IIEEE Trans Software Eng, 2002, 28: 654\u2013670","journal-title":"IIEEE Trans Software Eng"},{"key":"3665_CR12","doi-asserted-by":"crossref","unstructured":"Roy C K, Cordy J R. NICAD: accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In: Proceedings of the 16th IEEE International Conference on Program Comprehension, Amsterdam, 2008. 172\u2013181","DOI":"10.1109\/ICPC.2008.41"},{"key":"3665_CR13","doi-asserted-by":"crossref","unstructured":"Sajnani H, Saini V, Svajlenko J, et al. SourcererCC: scaling code clone detection to big-code. In: Proceedings of the 38th International Conference on Software Engineering (ICSE), Austin, 2016. 1157\u20131168","DOI":"10.1145\/2884781.2884877"},{"key":"3665_CR14","doi-asserted-by":"crossref","unstructured":"Wang P, Svajlenko J, Wu Y, et al. CCAligner: a token based large-gap clone detector. In: Proceedings of IEEE\/ACM 40th International Conference on Software Engineering (ICSE), Gothenburg, 2018. 1066\u20131077","DOI":"10.1145\/3180155.3180179"},{"key":"3665_CR15","doi-asserted-by":"crossref","unstructured":"Nakagawa T, Higo Y, Kusumoto S. NIL: large-scale detection of large-variance clones. In Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESE\/FSE), Athens, 2021. 830\u2013841","DOI":"10.1145\/3468264.3468564"},{"key":"3665_CR16","doi-asserted-by":"crossref","unstructured":"Sheneamer, Kalita J. Semantic clone detection using machine learning. In: Proceedings of the 15th IEEE International Conference on Machine Learning and Applications (ICMLA), Anaheim, 2016. 1024\u20131028","DOI":"10.1109\/ICMLA.2016.0185"},{"key":"3665_CR17","doi-asserted-by":"crossref","unstructured":"Saini V, Farmahinifarahani F, Lu Y, et al. Oreo: detection of clones in the twilight zone. In: Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESE\/FSE), New York, 2018. 354\u2013365","DOI":"10.1145\/3236024.3236026"},{"key":"3665_CR18","doi-asserted-by":"crossref","unstructured":"White M, Tufano M, Vendome C, et al. Deep learning code fragments for code clone detection. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering, New York, 2016. 87\u201398","DOI":"10.1145\/2970276.2970326"},{"key":"3665_CR19","doi-asserted-by":"crossref","unstructured":"Mou L, Li G, Zhang L, et al. Convolutional neural networks over tree structures for programming language processing. In: Proceedings of the 30th AAAI Conference on Artificial Intelligence, Phoenix, 2016. 1287\u20131293","DOI":"10.1609\/aaai.v30i1.10139"},{"key":"3665_CR20","doi-asserted-by":"crossref","unstructured":"Wei H-H, Li M. Supervised deep features for software functional clone detection by exploiting lexical and syntactical information in source code. In: Proceedings of the 26th International Joint Conference on Artificial Intelligence, Melbourne, 2017. 3034\u20133040","DOI":"10.24963\/ijcai.2017\/423"},{"key":"3665_CR21","doi-asserted-by":"crossref","unstructured":"Zhang J, Wang X, Zhang H, et al. A novel neural source code representation based on abstract syntax tree. In: Proceedings of 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), Montreal, 2019. 783\u2013794","DOI":"10.1109\/ICSE.2019.00086"},{"key":"3665_CR22","doi-asserted-by":"crossref","unstructured":"Alon U, Zilberstein M, Levy O, et al. A general path-based representation for predicting program properties. In: Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, New York, 2018. 404\u2013419","DOI":"10.1145\/3192366.3192412"},{"key":"3665_CR23","doi-asserted-by":"crossref","unstructured":"Alon U, Zilberstein M, Levy O, et al. Code2vec: learning distributed representations of code. In: Proceedings of the ACM Programming Languages (POPL), 2019. 3","DOI":"10.1145\/3290353"},{"key":"3665_CR24","doi-asserted-by":"crossref","unstructured":"Huo X, Li M. Enhancing the unified features to locate buggy files by exploiting the sequential nature of source code. In: Proceedings of the 26th International Joint Conference on Artificial Intelligence, Melbourne, 2017. 1909\u20131915","DOI":"10.24963\/ijcai.2017\/265"},{"key":"3665_CR25","doi-asserted-by":"crossref","unstructured":"Roy C, Zibran M, Koschke R. The vision of software clone management: Past, present, and future. In: Proceedings of Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE), 2014. 18\u201333","DOI":"10.1109\/CSMR-WCRE.2014.6747168"},{"key":"3665_CR26","doi-asserted-by":"crossref","unstructured":"Sahavechaphan, Claypool K. XSnippet: mining for sample code. In: Proceedings of the 21st Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications, 2006. 413\u2013430","DOI":"10.1145\/1167473.1167508"},{"key":"3665_CR27","doi-asserted-by":"crossref","unstructured":"Zhong H, Xie T, Zhang L, et al. MAPO: mining and recommending API usage patterns. In: Proceedings of ECOOP 2009 - Object-Oriented Programming, 2009. 318\u2013343","DOI":"10.1007\/978-3-642-03013-0_15"},{"key":"3665_CR28","doi-asserted-by":"crossref","unstructured":"Lawrie D, Morrell C, Feild H, et al. What\u2019s in a name? A study of identifiers. In: Proceedings of the 14th IEEE International Conference on Program Comprehension (ICPC\u201906), 2006. 3\u201312","DOI":"10.1109\/ICPC.2006.51"},{"key":"3665_CR29","doi-asserted-by":"crossref","unstructured":"Hindle A, Barr E, Su Z, et al. On the naturalness of software. In: Proceedings of the 34th International Conference on Software Engineering, 2012. 837\u2013847","DOI":"10.1109\/ICSE.2012.6227135"},{"key":"3665_CR30","doi-asserted-by":"crossref","unstructured":"Holmes, Murphy G. Using structural context to recommend source code examples. In: Proceedings of the 27th International Conference on Software Engineering, 2005. 117\u2013125","DOI":"10.1109\/ICSE.2005.1553554"},{"key":"3665_CR31","doi-asserted-by":"crossref","unstructured":"Zhong, Wang X. Boosting complete-code tool for partial program. In: Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2017. 671\u2013681","DOI":"10.1109\/ASE.2017.8115677"},{"key":"3665_CR32","doi-asserted-by":"crossref","unstructured":"Lee M, Roh J, Hwang S, et al. Instant code clone search. In: Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2010. 167\u2013176","DOI":"10.1145\/1882291.1882317"},{"key":"3665_CR33","doi-asserted-by":"crossref","unstructured":"Grechanik M, Fu C, Xie Q, et al. A search engine for finding highly relevant applications. In: Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering, 2010. 475\u2013484","DOI":"10.1145\/1806799.1806868"},{"key":"3665_CR34","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1109\/TSE.2011.84","volume":"38","author":"C McMillan","year":"2012","unstructured":"McMillan C, Grechanik M, Poshyvanyk D, et al. Exemplar: a source code search engine for finding highly relevant applications. IIEEE Trans Software Eng, 2012, 38: 1069\u20131087","journal-title":"IIEEE Trans Software Eng"},{"key":"3665_CR35","unstructured":"Kim K, Kim D, Bissyand\u00e9 T, et al. FaCoY: a code-to-code search engine. In: Proceedings of the 40th International Conference on Software Engineering, 2018. 946\u2013957"},{"key":"3665_CR36","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1007\/s10664-019-09730-9","volume":"25","author":"X Hu","year":"2019","unstructured":"Hu X, Li G, Xia X, et al. Deep code comment generation with hybrid lexical and syntactical information. Empir Software Eng, 2019, 25: 2179\u20132217","journal-title":"Empir Software Eng"},{"key":"3665_CR37","doi-asserted-by":"publisher","first-page":"2313","DOI":"10.1002\/spe.2893","volume":"50","author":"Z Zhou","year":"2020","unstructured":"Zhou Z, Yu H, Fan G. Effective approaches to combining lexical and syntactical information for code summarization. Softw Pract Exper, 2020, 50: 2313\u20132336","journal-title":"Softw Pract Exper"},{"key":"3665_CR38","doi-asserted-by":"crossref","unstructured":"Baxter I D, Yahin A, Moura L, et al. Clone detection using abstract syntax trees. In: Proceedings of International Conference on Software Maintenance, 1998. 368\u2013377","DOI":"10.1109\/ICSM.1998.738528"},{"key":"3665_CR39","doi-asserted-by":"crossref","unstructured":"Koschke R, Falke R, Frenzel P. Clone detection using abstract syntax suffix trees. In: Proceedings of the 13th Working Conference on Reverse Engineering, Benevento, 2006. 253\u2013262","DOI":"10.1109\/WCRE.2006.18"},{"key":"3665_CR40","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/s10664-008-9073-9","volume":"13","author":"R Falke","year":"2008","unstructured":"Falke R, Frenzel P, Koschke R. Empirical evaluation of clone detection using syntax suffix trees. Empir Software Eng, 2008, 13: 601\u2013643","journal-title":"Empir Software Eng"},{"key":"3665_CR41","doi-asserted-by":"crossref","unstructured":"Fang C, Liu Z, Shi Y, et al. Functional code clone detection with syntax and semantics fusion learning. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020. 516\u2013527","DOI":"10.1145\/3395363.3397362"},{"key":"3665_CR42","doi-asserted-by":"crossref","unstructured":"Gajbhiye A, Jaf S, Moubayed N A, et al. An exploration of dropout with RNNs for natural language inference. In: Proceedings of Artificial Neural Networks and Machine Learning (ICANN 2018), 2018. 157\u2013167","DOI":"10.1007\/978-3-030-01424-7_16"},{"key":"3665_CR43","doi-asserted-by":"crossref","unstructured":"Svajlenko, Roy C K. CloneWorks: a fast and flexible large-scale near-miss clone detection tool. In: Proceedings of 2017 IEEE\/ACM 39th International Conference on Software Engineering Companion (ICSE-C), 2017. 177\u2013179","DOI":"10.1109\/ICSE-C.2017.78"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-021-3665-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-021-3665-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-021-3665-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T14:14:45Z","timestamp":1746627285000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-021-3665-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,27]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["3665"],"URL":"https:\/\/doi.org\/10.1007\/s11432-021-3665-1","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,27]]},"assertion":[{"value":"28 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"112105"}}