{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T21:07:34Z","timestamp":1774732054102,"version":"3.50.1"},"reference-count":733,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T00:00:00Z","timestamp":1734998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T00:00:00Z","timestamp":1734998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Researchers have recently achieved significant advances in deep learning techniques, which in turn has substantially advanced other research disciplines, such as natural language processing, image processing, speech recognition, and software engineering. Various deep learning techniques have been successfully employed to facilitate software engineering tasks, including code generation, software refactoring, and fault localization. Many studies have also been presented in top conferences and journals, demonstrating the applications of deep learning techniques in resolving various software engineering tasks. However, although several surveys have provided overall pictures of the application of deep learning techniques in software engineering, they focus more on learning techniques, that is, what kind of deep learning techniques are employed and how deep models are trained or fine-tuned for software engineering tasks. We still lack surveys explaining the advances of subareas in software engineering driven by deep learning techniques, as well as challenges and opportunities in each subarea. To this end, in this study, we present the first task-oriented survey on deep learning-based software engineering. It covers twelve major software engineering subareas significantly impacted by deep learning techniques. Such subareas spread out through the whole lifecycle of software development and maintenance, including requirements engineering, software development, testing, maintenance, and developer collaboration. As we believe that deep learning may provide an opportunity to revolutionize the whole discipline of software engineering, providing one survey covering as many subareas as possible in software engineering can help future research push forward the frontier of deep learning-based software engineering more systematically. For each of the selected subareas, we highlight the major advances achieved by applying deep learning techniques with pointers to the available datasets in such a subarea. We also discuss the challenges and opportunities concerning each of the surveyed software engineering subareas.<\/jats:p>","DOI":"10.1007\/s11432-023-4127-5","type":"journal-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T23:20:20Z","timestamp":1735860020000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["Deep learning-based software engineering: progress, challenges, and opportunities"],"prefix":"10.1007","volume":"68","author":[{"given":"Xiangping","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xing","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"He","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Weixing","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Yanjie","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yanyan","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiaochen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaoli","family":"Lian","sequence":"additional","affiliation":[]},{"given":"Guozhu","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Hailong","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiayi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tiantian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jifeng","family":"Xuan","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Yibiao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yixin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuming","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,24]]},"reference":[{"key":"4127_CR1","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1126\/science.1127647","volume":"313","author":"G E Hinton","year":"2006","unstructured":"Hinton G E, Salakhutdinov R R. Reducing the dimensionality of data with neural networks. Science, 2006, 313: 504\u2013507","journal-title":"Science"},{"key":"4127_CR2","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s11263-019-01247-4","volume":"128","author":"L Liu","year":"2020","unstructured":"Liu L, Ouyang W, Wang X, et al. Deep learning for generic object detection: a survey. Int J Comput Vis, 2020, 128: 261\u2013318","journal-title":"Int J Comput Vis"},{"key":"4127_CR3","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1162\/neco.2006.18.7.1527","volume":"18","author":"G E Hinton","year":"2006","unstructured":"Hinton G E, Osindero S, Teh Y W. A fast learning algorithm for deep belief nets. Neural Comput, 2006, 18: 1527\u20131554","journal-title":"Neural Comput"},{"key":"4127_CR4","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky A, Sutskever I, Hinton G E. ImageNet classification with deep convolutional neural networks. Commun ACM, 2017, 60: 84\u201390","journal-title":"Commun ACM"},{"key":"4127_CR5","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y Lecun","year":"1998","unstructured":"Lecun Y, Bottou L, Bengio Y, et al. Gradient-based learning applied to document recognition. Proc IEEE, 1998, 86: 2278\u20132324","journal-title":"Proc IEEE"},{"key":"4127_CR6","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1207\/s15516709cog1402_1","volume":"14","author":"J L Elman","year":"1990","unstructured":"Elman J L. Finding structure in time. Cogn Sci, 1990, 14: 179\u2013211","journal-title":"Cogn Sci"},{"key":"4127_CR7","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J. Long short-term memory. Neural Comput, 1997, 9: 1735\u20131780","journal-title":"Neural Comput"},{"key":"4127_CR8","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1109\/78.650093","volume":"45","author":"M Schuster","year":"1997","unstructured":"Schuster M, Paliwal K K. Bidirectional recurrent neural networks. IEEE Trans Signal Process, 1997, 45: 2673\u20132681","journal-title":"IEEE Trans Signal Process"},{"key":"4127_CR9","first-page":"30","volume-title":"Proceedings of Advances in Neural Information Processing Systems","author":"A Vaswani","year":"2017","unstructured":"Vaswani A, Shazeer N, Parmar N, et al. Attention is all you need. In: Proceedings of Advances in Neural Information Processing Systems, 2017. 30"},{"key":"4127_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3505243","volume":"54","author":"Y M Yang","year":"2022","unstructured":"Yang Y M, Xia X, Lo D, et al. A survey on deep learning for software engineering. ACM Comput Surv, 2022, 54: 1\u201373","journal-title":"ACM Comput Surv"},{"key":"4127_CR11","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10462-018-09679-z","volume":"52","author":"G Nguyen","year":"2019","unstructured":"Nguyen G, Dlugolinsky S, Bob\u00e1k M, et al. Machine learning and deep learning frameworks and libraries for large-scale data mining: a survey. Artif Intell Rev, 2019, 52: 77\u2013124","journal-title":"Artif Intell Rev"},{"key":"4127_CR12","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.jmsy.2018.01.003","volume":"48","author":"J Wang","year":"2018","unstructured":"Wang J, Ma Y, Zhang L, et al. Deep learning for smart manufacturing: Methods and applications. J Manuf Syst, 2018, 48: 144\u2013156","journal-title":"J Manuf Syst"},{"key":"4127_CR13","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1146\/annurev-bioeng-071516-044442","volume":"19","author":"D Shen","year":"2017","unstructured":"Shen D, Wu G, Suk H I. Deep learning in medical image analysis. Annu Rev Biomed Eng, 2017, 19: 221\u2013248","journal-title":"Annu Rev Biomed Eng"},{"key":"4127_CR14","doi-asserted-by":"publisher","first-page":"122","DOI":"10.3390\/info10040122","volume":"10","author":"D S Berman","year":"2019","unstructured":"Berman D S, Buczak A L, Chavis J S, et al. A survey of deep learning methods for cyber security. Information, 2019, 10: 122","journal-title":"Information"},{"key":"4127_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3383458","volume":"53","author":"T H Le","year":"2021","unstructured":"Le T H, Chen H, Babar M A. Deep learning for source code modeling and generation: models, applications, and challenges. ACM Comput Surv, 2021, 53: 1\u201338","journal-title":"ACM Comput Surv"},{"key":"4127_CR16","doi-asserted-by":"publisher","first-page":"2727","DOI":"10.1145\/3292500.3330699","volume-title":"Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","author":"A Svyatkovskiy","year":"2019","unstructured":"Svyatkovskiy A, Zhao Y, Fu S, et al. Pythia: AI-assisted code completion system. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019. 2727\u20132735"},{"key":"4127_CR17","volume-title":"Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics","author":"S Iyer","year":"2016","unstructured":"Iyer S, Konstas I, Cheung A, et al. Summarizing source code using a neural attention model. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016"},{"key":"4127_CR18","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1109\/TSE.2020.3021736","volume":"48","author":"M Aniche","year":"2020","unstructured":"Aniche M, Maziero E, Durelli R, et al. The effectiveness of supervised machine learning algorithms in predicting software refactoring. IEEE Trans Software Eng, 2020, 48: 1432\u20131450","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR19","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1145\/3180155.3180167","volume-title":"Proceedings of the 40th International Conference on Software Engineering","author":"X Gu","year":"2018","unstructured":"Gu X, Zhang H, Kim S. Deep code search. In: Proceedings of the 40th International Conference on Software Engineering, 2018. 933\u2013944"},{"key":"4127_CR20","first-page":"251","volume-title":"Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering","author":"M Wardat","year":"2021","unstructured":"Wardat M, Le W, Rajan H. Deeplocalize: fault localization for deep neural networks. In: Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering, 2021. 251\u2013262"},{"key":"4127_CR21","first-page":"602","volume-title":"Proceedings of the 42nd International Conference on Software Engineering, Seoul","author":"Y Li","year":"2020","unstructured":"Li Y, Wang S, Nguyen T N. DLFix: context-based code transformation learning for automated program repair. In: Proceedings of the 42nd International Conference on Software Engineering, Seoul, 2020. 602\u2013614"},{"key":"4127_CR22","first-page":"2224","volume":"18","author":"D Zou","year":"2019","unstructured":"Zou D, Wang S, Xu S, et al. \u03bcVulDeePecker: a deep learning-based system for multiclass vulnerability detection. IEEE Trans Dependable Secure Comput, 2019, 18: 2224\u20132236","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"4127_CR23","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/3460319.3464825","volume-title":"Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis","author":"N Humbatova","year":"2021","unstructured":"Humbatova N, Jahangirova G, Tonella P. DeepCrime: mutation testing of deep learning systems based on real faults. In: Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021. 67\u201378"},{"key":"4127_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3485275","volume":"31","author":"C Watson","year":"2022","unstructured":"Watson C, Cooper N, Palacio D N, et al. A systematic literature review on the use of deep learning in software engineering research. ACM Trans Softw Eng Methodol, 2022, 31: 1\u201358","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"4127_CR25","volume-title":"Deep learning meets software engineering: a survey on pre-trained models of source code","author":"C Niu","year":"2022","unstructured":"Niu C, Li C, Luo B, et al. Deep learning meets software engineering: a survey on pre-trained models of source code. 2022. ArXiv:2205.11739"},{"key":"4127_CR26","volume-title":"A survey on large language models for software engineering","author":"Q Zhang","year":"2023","unstructured":"Zhang Q, Fang C, Xie Y, et al. A survey on large language models for software engineering. 2023. ArXiv:2312.15223"},{"key":"4127_CR27","volume-title":"Environment Modeling-Based Requirements Engineering for Software Intensive Systems","author":"Z Jin","year":"2017","unstructured":"Jin Z. Environment Modeling-Based Requirements Engineering for Software Intensive Systems. San Francisco: Morgan Kaufmann Publishers Inc., 2017"},{"key":"4127_CR28","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/TSE.2018.2876340","volume":"46","author":"Q Huang","year":"2020","unstructured":"Huang Q, Xia X, Lo D, et al. Automating intention mining. IEEE Trans Software Eng, 2020, 46: 1098\u20131119","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR29","first-page":"211","volume-title":"Proceedings of the IEEE 27th International Requirements Engineering Conference (RE)","author":"F Pudlitz","year":"2019","unstructured":"Pudlitz F, Brokhausen F, Vogelsang A. Extraction of system states from natural language requirements. In: Proceedings of the IEEE 27th International Requirements Engineering Conference (RE), 2019. 211\u2013222"},{"key":"4127_CR30","first-page":"336","volume-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering","author":"M Li","year":"2021","unstructured":"Li M, Shi L, Yang Y, et al. A deep multitask learning approach for requirements discovery and annotation from open forum. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, 2021. 336\u2013348"},{"key":"4127_CR31","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1145\/3377811.3380924","volume-title":"Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering","author":"H Guo","year":"2020","unstructured":"Guo H, Singh M P. Caspar: extracting and synthesizing user stories of problems from app reviews. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, 2020. 628\u2013640"},{"key":"4127_CR32","first-page":"139","volume-title":"Proceedings of the IEEE 29th International Requirements Engineering Conference (RE)","author":"R R Mekala","year":"2021","unstructured":"Mekala R R, Irfan A, Groen E C, et al. Classifying user requirements from online feedback in small dataset environments using deep learning. In: Proceedings of the IEEE 29th International Requirements Engineering Conference (RE), 2021. 139\u2013149"},{"key":"4127_CR33","doi-asserted-by":"publisher","first-page":"2381","DOI":"10.1109\/TSE.2022.3219458","volume":"49","author":"J Tizard","year":"2023","unstructured":"Tizard J, Devine P, Wang H, et al. A software requirements ecosystem: linking forum, issue tracker, and faqs for requirements management. IEEE Trans Software Eng, 2023, 49: 2381\u20132393","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR34","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1145\/3377811.3380356","volume-title":"Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering","author":"L Shi","year":"2020","unstructured":"Shi L, Xing M, Li M, et al. Detection of hidden feature requests from massive chat messages via deep Siamese network. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, 2020. 641\u2013653"},{"key":"4127_CR35","first-page":"854","volume-title":"Proceedings of the 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"S Pan","year":"2021","unstructured":"Pan S, Bao L, Ren X, et al. Automating developer chat mining. In: Proceedings of the 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2021. 854\u2013866"},{"key":"4127_CR36","volume-title":"Proceedings of the 1st Conference on the Principles of Software Engineering (PRISE\u201904)","author":"O T\u00fcretken","year":"2004","unstructured":"T\u00fcretken O, Su O, Demir\u00f6rs O. Automating software requirements generation from business process models. In: Proceedings of the 1st Conference on the Principles of Software Engineering (PRISE\u201904), 2004"},{"key":"4127_CR37","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.infsof.2004.09.002","volume":"47","author":"K Cox","year":"2005","unstructured":"Cox K, Phalp K T, Bleistein S J, et al. Deriving requirements from process models via the problem frames approach. Inf Software Tech, 2005, 47: 319\u2013337","journal-title":"Inf Software Tech"},{"key":"4127_CR38","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/s00766-005-0010-9","volume":"10","author":"N A M Maiden","year":"2005","unstructured":"Maiden N A M, Manning S, Jones S, et al. Generating requirements from systems models using patterns: a case study. Requir Eng, 2005, 10: 276\u2013288","journal-title":"Requir Eng"},{"key":"4127_CR39","first-page":"194","volume-title":"Proceedings of the 3rd International Conference on Cooperative Information Systems (CoopIS-95)","author":"E S K Yu","year":"1995","unstructured":"Yu E S K, Bois P D, Dubois E, et al. From organization models to system requirements: a \u2018cooperating agents\u2019 approach. In: Proceedings of the 3rd International Conference on Cooperative Information Systems (CoopIS-95), 1995. 194\u2013204"},{"key":"4127_CR40","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/587051.587070","volume-title":"Proceedings of the 10th ACM SIGSOFT Symposium on Foundations of Software Engineering","author":"E Letier","year":"2002","unstructured":"Letier E, van Lamsweerde A. Deriving operational software specifications from system goals. In: Proceedings of the 10th ACM SIGSOFT Symposium on Foundations of Software Engineering, 2002. 119\u2013128"},{"key":"4127_CR41","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/s00766-004-0189-1","volume":"9","author":"R D Landtsheer","year":"2004","unstructured":"Landtsheer R D, Letier E, van Lamsweerde A. Deriving tabular event-based specifications from goal-oriented requirements models. Requir Eng, 2004, 9: 104\u2013120","journal-title":"Requir Eng"},{"key":"4127_CR42","first-page":"4","volume-title":"Proceedings of the 12th IEEE International Requirements Engineering Conference","author":"A van Lamsweerde","year":"2004","unstructured":"van Lamsweerde A. Goal-oriented requirements enginering: a roundtrip from research to practice [enginering read engineering]. In: Proceedings of the 12th IEEE International Requirements Engineering Conference, 2004. 4\u20137"},{"key":"4127_CR43","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1109\/32.738341","volume":"24","author":"A van Lamsweerde","year":"1998","unstructured":"van Lamsweerde A, Willemet L. Inferring declarative requirements specifications from operational scenarios. IEEE Trans Software Eng, 1998, 24: 1089\u20131114","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00766-007-0054-0","volume":"13","author":"F Meziane","year":"2008","unstructured":"Meziane F, Athanasakis N, Ananiadou S. Generating natural language specifications from UML class diagrams. Requir Eng, 2008, 13: 1\u201318","journal-title":"Requir Eng"},{"key":"4127_CR45","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1109\/ICRE.2003.1232764","volume-title":"Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003)","author":"B Berenbach","year":"2003","unstructured":"Berenbach B. The automated extraction of requirements from UML models. In: Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003), 2003. 287"},{"key":"4127_CR46","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/s00766-017-0279-5","volume":"23","author":"A Souag","year":"2018","unstructured":"Souag A, Mazo R, Salinesi C, et al. Using the AMAN-DA method to generate security requirements: a case study in the maritime domain. Requir Eng, 2018, 23: 557\u2013580","journal-title":"Requir Eng"},{"key":"4127_CR47","doi-asserted-by":"publisher","first-page":"332","DOI":"10.3390\/math11020332","volume":"11","author":"Z Zhao","year":"2023","unstructured":"Zhao Z, Zhang L, Lian X, et al. ReqGen: keywords-driven software requirements generation. Mathematics, 2023, 11: 332","journal-title":"Mathematics"},{"key":"4127_CR48","first-page":"1613","volume-title":"Proceedings of the IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","author":"V Koscinski","year":"2023","unstructured":"Koscinski V, Hashemi S, Mirakhorli M. On-demand security requirements synthesis with relational generative adversarial networks. In: Proceedings of the IEEE\/ACM 45th International Conference on Software Engineering (ICSE), 2023. 1613\u20131625"},{"key":"4127_CR49","first-page":"208","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"M Li","year":"2020","unstructured":"Li M, Yang Y, Shi L, et al. Automated extraction of requirement entities by leveraging LSTM-CRF and transfer learning. In: Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME), 2020. 208\u2013219"},{"key":"4127_CR50","doi-asserted-by":"publisher","first-page":"106853","DOI":"10.1016\/j.infsof.2022.106853","volume":"146","author":"F Casillo","year":"2022","unstructured":"Casillo F, Deufemia V, Gravino C. Detecting privacy requirements from user stories with NLP transfer learning models. Inf Software Tech, 2022, 146: 106853","journal-title":"Inf Software Tech"},{"key":"4127_CR51","first-page":"187","volume-title":"Proceedings of the IEEE\/ACM 44th International Conference on Software Engineering (ICSE)","author":"S Ezzini","year":"2022","unstructured":"Ezzini S, Abualhaija S, Arora C, et al. Automated handling of anaphoric ambiguity in requirements: a multi-solution study. In: Proceedings of the IEEE\/ACM 44th International Conference on Software Engineering (ICSE), 2022. 187\u2013199"},{"key":"4127_CR52","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s00766-022-00374-8","volume":"27","author":"Y Wang","year":"2022","unstructured":"Wang Y, Shi L, Li M, et al. Detecting coreferent entities in natural language requirements. Requir Eng, 2022, 27: 351\u2013373","journal-title":"Requir Eng"},{"key":"4127_CR53","first-page":"180","volume-title":"Proceedings of the IEEE 28th International Requirements Engineering Conference (RE)","author":"Y Wang","year":"2020","unstructured":"Wang Y, Shi L, Li M, et al. A deep context-wise method for coreference detection in natural language requirements. In: Proceedings of the IEEE 28th International Requirements Engineering Conference (RE), 2020. 180\u2013191"},{"key":"4127_CR54","volume-title":"Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","author":"S Ezzini","year":"2023","unstructured":"Ezzini S, Abualhaija S, Arora C, et al. AI-based question answering assistance for analyzing natural-language requirements. In: Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE), 2023"},{"key":"4127_CR55","first-page":"610","volume-title":"Proceedings of the IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)","author":"C Baker","year":"2019","unstructured":"Baker C, Deng L, Chakraborty S, et al. Automatic multi-class non-functional software requirements classification using neural networks. In: Proceedings of the IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), 2019. 610\u2013615"},{"key":"4127_CR56","first-page":"169","volume-title":"Proceedings of the IEEE 28th International Requirements Engineering Conference (RE)","author":"T Hey","year":"2020","unstructured":"Hey T, Keim J, Koziolek A, et al. NoRBERT: transfer learning for requirements classification. In: Proceedings of the IEEE 28th International Requirements Engineering Conference (RE), 2020. 169\u2013179"},{"key":"4127_CR57","volume-title":"Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering","author":"X Luo","year":"2023","unstructured":"Luo X, Xue Y, Xing Z, et al. PRCBERT: prompt learning for requirement classification using BERT-based pretrained language models. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, 2023"},{"key":"4127_CR58","first-page":"120","volume-title":"Proceedings of the IEEE 27th International Requirements Engineering Conference (RE)","author":"J P Winkler","year":"2019","unstructured":"Winkler J P, Gr\u00f6nberg J, Vogelsang A. Predicting how to test requirements: an automated approach. In: Proceedings of the IEEE 27th International Requirements Engineering Conference (RE), 2019. 120\u2013130"},{"key":"4127_CR59","doi-asserted-by":"publisher","first-page":"106877","DOI":"10.1016\/j.infsof.2022.106877","volume":"147","author":"O AlDhafer","year":"2022","unstructured":"AlDhafer O, Ahmad I, Mahmood S. An end-to-end deep learning system for requirements classification using recurrent neural networks. Inf Software Tech, 2022, 147: 106877","journal-title":"Inf Software Tech"},{"key":"4127_CR60","first-page":"3","volume-title":"Proceedings of the IEEE\/ACM 39th International Conference on Software Engineering (ICSE)","author":"J Guo","year":"2017","unstructured":"Guo J, Cheng J, Cleland-Huang J. Semantically enhanced software traceability using deep learning techniques. In: Proceedings of the IEEE\/ACM 39th International Conference on Software Engineering (ICSE), 2017. 3\u201314"},{"key":"4127_CR61","doi-asserted-by":"publisher","unstructured":"Jahan M S, Khan H U, Akbar S, et al. Bidirectional language modeling: a systematic literature review. Sci Program, 2021. doi: https:\/\/doi.org\/10.1155\/2021\/6641832","DOI":"10.1155\/2021\/6641832"},{"key":"4127_CR62","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.1093\/bioinformatics\/btz682","volume":"36","author":"J Lee","year":"2019","unstructured":"Lee J, Yoon W, Kim S, et al. BioBERT: a pre-trained biomedical language representation model for biomedical text mining. Bioinformatics, 2019, 36: 1234\u20131240","journal-title":"Bioinformatics"},{"key":"4127_CR63","first-page":"1536","volume-title":"Proceedings of Findings of the Association for Computational Linguistics","author":"Z Feng","year":"2020","unstructured":"Feng Z, Guo D, Tang D, et al. CodeBERT: a pre-trained model for programming and natural languages. In: Proceedings of Findings of the Association for Computational Linguistics, 2020. 1536\u20131547"},{"key":"4127_CR64","first-page":"324","volume-title":"Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)","author":"J Lin","year":"2021","unstructured":"Lin J, Liu Y, Zeng Q, et al. Traceability transformed: generating more accurate links with pre-trained BERT models. In: Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), 2021. 324\u2013335"},{"key":"4127_CR65","doi-asserted-by":"publisher","first-page":"623","DOI":"10.3390\/math11030623","volume":"11","author":"J Tian","year":"2023","unstructured":"Tian J, Zhang L, Lian X. A cross-level requirement trace link update model based on bidirectional encoder representations from transformers. Mathematics, 2023, 11: 623","journal-title":"Mathematics"},{"key":"4127_CR66","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10664-021-10050-0","volume":"27","author":"J Lin","year":"2022","unstructured":"Lin J, Liu Y, Cleland-Huang J. Information retrieval versus deep learning approaches for generating traceability links in bilingual projects. Empir Software Eng, 2022, 27: 5","journal-title":"Empir Software Eng"},{"key":"4127_CR67","series-title":"ISO\/IEC\/IEEE 29148:2018(E)","first-page":"1","volume-title":"Systems and software engineering \u2014 life cycle processes \u2014 requirements engineering","author":"ISO\/IEC\/IEEE International Standard","year":"2018","unstructured":"ISO\/IEC\/IEEE International Standard. Systems and software engineering \u2014 life cycle processes \u2014 requirements engineering. ISO\/IEC\/IEEE 29148:2018(E), 2018. 1\u2013104. https:\/\/www.iso.org\/standard\/72089.html."},{"key":"4127_CR68","first-page":"317","volume-title":"Proceedings of the 17th IEEE International Requirements Engineering Conference","author":"A Mavin","year":"2009","unstructured":"Mavin A, Wilkinson P, Harwood A, et al. Easy approach to requirements syntax (EARS). In: Proceedings of the 17th IEEE International Requirements Engineering Conference, 2009. 317\u2013322"},{"key":"4127_CR69","doi-asserted-by":"publisher","first-page":"3310","DOI":"10.1109\/TSE.2021.3087792","volume":"48","author":"X Franch","year":"2022","unstructured":"Franch X, Glinz M, Mendez D, et al. A study about the knowledge and use of requirements engineering standards in industry. IEEE Trans Software Eng, 2022, 48: 3310\u20133325","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR70","volume-title":"Proceedings of the 46th IEEE\/ACM International Conference on Software Engineering","author":"J T Liang","year":"2023","unstructured":"Liang J T, Yang C, Myers B A. A large-scale survey on the usability of AI programming assistants: successes and challenges. In: Proceedings of the 46th IEEE\/ACM International Conference on Software Engineering, 2023"},{"key":"4127_CR71","doi-asserted-by":"publisher","DOI":"10.1002\/9780470249260","volume-title":"Domain-Specific Modeling: Enabling Full Code Generation","author":"S Kelly","year":"2008","unstructured":"Kelly S, Tolvanen J P. Domain-Specific Modeling: Enabling Full Code Generation. Hoboken: John Wiley & Sons, 2008"},{"key":"4127_CR72","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3212695","volume":"51","author":"M Allamanis","year":"2018","unstructured":"Allamanis M, Barr E T, Devanbu P, et al. A survey of machine learning for big code and naturalness. ACM Comput Surv, 2018, 51: 1\u201337","journal-title":"ACM Comput Surv"},{"key":"4127_CR73","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MS.2006.105","volume":"23","author":"G C Murphy","year":"2006","unstructured":"Murphy G C, Kersten M, Findlater L. How are Java software developers using the Eclipse IDE? IEEE Softw, 2006, 23: 76\u201383","journal-title":"IEEE Softw"},{"key":"4127_CR74","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1145\/1595696.1595728","volume-title":"Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","author":"M Bruch","year":"2009","unstructured":"Bruch M, Monperrus M, Mezini M. Learning from examples to improve code completion systems. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2009. 213\u2013222"},{"key":"4127_CR75","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/2491956.2462192","volume-title":"Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation","author":"T Gvero","year":"2013","unstructured":"Gvero T, Kuncak V, Kuraj I, et al. Complete completion using types and weights. In: Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2013. 27\u201338"},{"key":"4127_CR76","volume-title":"CodeGeeX: a pre-trained model for code generation with multilingual evaluations on HumanEval-X","author":"Q Zheng","year":"2023","unstructured":"Zheng Q, Xia X, Zou X, et al. CodeGeeX: a pre-trained model for code generation with multilingual evaluations on HumanEval-X. 2023. ArXiv:2303.17568"},{"key":"4127_CR77","first-page":"1139","volume-title":"Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics","author":"M Rabinovich","year":"2017","unstructured":"Rabinovich M, Stern M, Klein D. Abstract syntax networks for code generation and semantic parsing. In: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, 2017. 1139\u20131149"},{"key":"4127_CR78","first-page":"5425","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing","author":"S Iyer","year":"2019","unstructured":"Iyer S, Cheung A, Zettlemoyer L. Learning programmatic idioms for scalable semantic parsing. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019. 5425\u20135434"},{"key":"4127_CR79","first-page":"440","volume-title":"Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics","author":"P Yin","year":"2017","unstructured":"Yin P, Neubig G. A syntactic neural model for general-purpose code generation. In: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, 2017. 440\u2013450"},{"key":"4127_CR80","first-page":"7","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing","author":"P Yin","year":"2018","unstructured":"Yin P, Neubig G. TRANX: a transition-based neural abstract syntax parser for semantic parsing and code generation. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, 2018. 7\u201312"},{"key":"4127_CR81","first-page":"5076","volume-title":"Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing","author":"H Jiang","year":"2021","unstructured":"Jiang H, Zhou C, Meng F, et al. Exploring dynamic selection of branch expansion orders for code generation. In: Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021. 5076\u20135085"},{"key":"4127_CR82","volume-title":"Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics","author":"L Dong","year":"2016","unstructured":"Dong L, Lapata M. Language to logical form with neural attention. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016"},{"key":"4127_CR83","first-page":"3911","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing, Brussels","author":"T Yu","year":"2018","unstructured":"Yu T, Zhang R, Yang K, et al. Spider: a large-scale human-labeled dataset for complex and cross-domain semantic parsing and text-to-SQL task. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, Brussels, 2018. 3911\u20133921"},{"key":"4127_CR84","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","author":"A Sethi","year":"2018","unstructured":"Sethi A, Sankaran A, Panwar N, et al. DLPaper2Code: auto-generation of code from deep learning research papers. In: Proceedings of the AAAI Conference on Artificial Intelligence, 2018"},{"key":"4127_CR85","doi-asserted-by":"publisher","first-page":"111577","DOI":"10.1016\/j.jss.2022.111577","volume":"197","author":"G Yang","year":"2023","unstructured":"Yang G, Zhou Y, Chen X, et al. ExploitGen: template-augmented exploit code generation based on CodeBERT. J Syst Software, 2023, 197: 111577","journal-title":"J Syst Software"},{"key":"4127_CR86","volume-title":"Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics","author":"W Ling","year":"2016","unstructured":"Ling W, Blunsom P, Grefenstette E, et al. Latent predictor networks for code generation. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016"},{"key":"4127_CR87","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s10664-021-09968-2","volume":"26","author":"C Lyu","year":"2021","unstructured":"Lyu C, Wang R, Zhang H, et al. Embedding API dependency graph for neural code generation. Empir Software Eng, 2021, 26: 61","journal-title":"Empir Software Eng"},{"key":"4127_CR88","first-page":"9052","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing","author":"C B Clement","year":"2020","unstructured":"Clement C B, Drain D, Timcheck J, et al. PyMT5: multi-mode translation of natural language and Python code with transformers. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, 2020. 9052\u20139065"},{"key":"4127_CR89","first-page":"21314","volume":"35","author":"H Le","year":"2022","unstructured":"Le H, Wang Y, Gotmare A D, et al. CodeRL: mastering code generation through pretrained models and deep reinforcement learning. In: Proceedings of Advances in Neural Information Processing Systems, 2022. 35: 21314\u201321328","journal-title":"Proceedings of Advances in Neural Information Processing Systems"},{"key":"4127_CR90","first-page":"8696","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing","author":"Y Wang","year":"2021","unstructured":"Wang Y, Wang W, Joty S R, et al. CodeT5: identifier-aware unified pre-trained encoder-decoder models for code understanding and generation. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, 2021. 8696\u20138708"},{"key":"4127_CR91","first-page":"361","volume-title":"Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics","author":"Y Sun","year":"2018","unstructured":"Sun Y, Tang D, Duan N, et al. Semantic parsing with syntax- and table-aware SQL generation. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018. 361\u2013372"},{"key":"4127_CR92","first-page":"9","volume-title":"Proceedings of Findings of the Association for Computational Linguistics","author":"X Wang","year":"2022","unstructured":"Wang X, Wang Y, Wan Y, et al. Compilable neural code generation with compiler feedback. In: Proceedings of Findings of the Association for Computational Linguistics, 2022. 9\u201319"},{"key":"4127_CR93","volume-title":"Proceedings of the 10th International Conference on Learning Representations","author":"G Poesia","year":"2022","unstructured":"Poesia G, Polozov A, Le V, et al. Synchromesh: reliable code generation from pre-trained language models. In: Proceedings of the 10th International Conference on Learning Representations, 2022"},{"key":"4127_CR94","first-page":"32","volume-title":"Proceedings of Advances in Neural Information Processing Systems","author":"B Wei","year":"2019","unstructured":"Wei B, Li G, Xia X, et al. Code generation as a dual task of code summarization. In: Proceedings of Advances in Neural Information Processing Systems, 2019. 32"},{"key":"4127_CR95","first-page":"2655","volume-title":"Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","author":"W U Ahmad","year":"2021","unstructured":"Ahmad W U, Chakraborty S, Ray B, et al. Unified pre-training for program understanding and generation. In: Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021. 2655\u20132668"},{"key":"4127_CR96","doi-asserted-by":"publisher","first-page":"2309","DOI":"10.1145\/3366423.3380295","volume-title":"Proceedings of the Web Conference 2020","author":"W Ye","year":"2020","unstructured":"Ye W, Xie R, Zhang J, et al. Leveraging code generation to improve code retrieval and summarization via dual learning. In: Proceedings of the Web Conference 2020, 2020. 2309\u20132319"},{"key":"4127_CR97","first-page":"31","volume-title":"Proceedings of Advances in Neural Information Processing Systems","author":"T B Hashimoto","year":"2018","unstructured":"Hashimoto T B, Guu K, Oren Y, et al. A retrieve-and-edit framework for predicting structured outputs. In: Proceedings of Advances in Neural Information Processing Systems, 2018. 31"},{"key":"4127_CR98","first-page":"32","volume-title":"Proceedings of Advances in Neural Information Processing Systems","author":"S Kulal","year":"2019","unstructured":"Kulal S, Pasupat P, Chandra K, et al. SPoC: search-based pseudocode to code. In: Proceedings of Advances in Neural Information Processing Systems, 2019. 32"},{"key":"4127_CR99","first-page":"2719","volume-title":"Proceedings of Findings of the Association for Computational Linguistics","author":"M R Parvez","year":"2021","unstructured":"Parvez M R, Ahmad W U, Chakraborty S, et al. Retrieval augmented code generation and summarization. In: Proceedings of Findings of the Association for Computational Linguistics, 2021. 2719\u20132734"},{"key":"4127_CR100","first-page":"1643","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing","author":"S Iyer","year":"2018","unstructured":"Iyer S, Konstas I, Cheung A, et al. Mapping language to code in programmatic context. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, 2018. 1643\u20131652"},{"key":"4127_CR101","first-page":"855","volume-title":"Proceedings of the 57th Conference of the Association for Computational Linguistics","author":"D Guo","year":"2019","unstructured":"Guo D, Tang D, Duan N, et al. Coupling retrieval and meta-learning for context-dependent semantic parsing. In: Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019. 855\u2013866"},{"key":"4127_CR102","volume-title":"SkCoder: a sketch-based approach for automatic code generation","author":"J Li","year":"2023","unstructured":"Li J, Li Y, Li G, et al. SkCoder: a sketch-based approach for automatic code generation. 2023. ArXiv:2302.06144"},{"key":"4127_CR103","first-page":"731","volume-title":"Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics","author":"L Dong","year":"2018","unstructured":"Dong L, Lapata M. Coarse-to-fine decoding for neural semantic parsing. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018. 731\u2013742"},{"key":"4127_CR104","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.1145\/3540250.3558965","volume-title":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"S Shen","year":"2022","unstructured":"Shen S, Zhu X, Dong Y, et al. Incorporating domain knowledge through task augmentation for front-end JavaScript code generation. In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022. 1533\u20131543"},{"key":"4127_CR105","first-page":"7055","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","author":"Z Sun","year":"2019","unstructured":"Sun Z, Zhu Q, Mou L, et al. A grammar-based structural CNN decoder for code generation. In: Proceedings of the AAAI Conference on Artificial Intelligence, 2019. 7055\u20137062"},{"key":"4127_CR106","first-page":"8984","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","author":"Z Sun","year":"2020","unstructured":"Sun Z, Zhu Q, Xiong Y, et al. TreeGen: a tree-based transformer architecture for code generation. In: Proceedings of the AAAI Conference on Artificial Intelligence, 2020. 8984\u20138991"},{"key":"4127_CR107","first-page":"14121","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","author":"B Xie","year":"2021","unstructured":"Xie B, Su J, Ge Y, et al. Improving tree-structured decoder training for code generation via mutual learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, 2021. 14121\u201314128"},{"key":"4127_CR108","volume-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling","author":"J Chung","year":"2014","unstructured":"Chung J, Gulcehre C, Cho K, et al. Empirical evaluation of gated recurrent neural networks on sequence modeling. 2014. ArXiv:1412.3555"},{"key":"4127_CR109","first-page":"473","volume-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering","author":"F Liu","year":"2021","unstructured":"Liu F, Li G, Zhao Y, et al. Multi-task learning based pre-trained language model for code completion. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, 2021. 473\u2013485"},{"key":"4127_CR110","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1145\/3510003.3510172","volume-title":"Proceedings of the 44th International Conference on Software Engineering","author":"M Izadi","year":"2022","unstructured":"Izadi M, Gismondi R, Gousios G. CodeFill: multi-token code completion by jointly learning from structure and naming sequences. In: Proceedings of the 44th International Conference on Software Engineering, 2022. 401\u2013412"},{"key":"4127_CR111","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00076","volume-title":"Domain adaptive code completion via language models and decoupled domain databases","author":"Z Tang","year":"2023","unstructured":"Tang Z, Ge J, Liu S, et al. Domain adaptive code completion via language models and decoupled domain databases. 2023. ArXiv:2308.09313"},{"key":"4127_CR112","volume-title":"CodeMark: imperceptible watermarking for code datasets against neural code completion models","author":"Z Sun","year":"2023","unstructured":"Sun Z, Du X, Song F, et al. CodeMark: imperceptible watermarking for code datasets against neural code completion models. 2023. ArXiv:2308.14401"},{"key":"4127_CR113","volume-title":"Practitioners\u2019 expectations on code completion","author":"C Wang","year":"2023","unstructured":"Wang C, Hu J, Gao C, et al. Practitioners\u2019 expectations on code completion. 2023. ArXiv:2301.03846"},{"key":"4127_CR114","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00178","volume-title":"Learning deep semantics for test completion","author":"P Nie","year":"2023","unstructured":"Nie P, Banerjee R, Li J J, et al. Learning deep semantics for test completion. 2023. ArXiv:2302.10166"},{"key":"4127_CR115","first-page":"4382","volume-title":"Proceedings of Findings of the Association for Computational Linguistics","author":"S Dahal","year":"2021","unstructured":"Dahal S, Maharana A, Bansal M. Analysis of tree-structured architectures for code generation. In: Proceedings of Findings of the Association for Computational Linguistics, 2021. 4382\u20134391"},{"key":"4127_CR116","first-page":"776","volume-title":"Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing","author":"S Norouzi","year":"2021","unstructured":"Norouzi S, Tang K, Cao Y. Code generation from natural language with less prior knowledge and more monolingual data. In: Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021. 776\u2013785"},{"key":"4127_CR117","volume-title":"On the robustness of code generation techniques: an empirical study on GitHub copilot","author":"A Mastropaolo","year":"2023","unstructured":"Mastropaolo A, Pascarella L, Guglielmi E, et al. On the robustness of code generation techniques: an empirical study on GitHub copilot. 2023. ArXiv:2302.00438"},{"key":"4127_CR118","first-page":"1","volume":"31","author":"F F Xu","year":"2022","unstructured":"Xu F F, Vasilescu B, Neubig G. In-IDE code generation from natural language: promise and challenges. ACM Trans Softw Eng Methodol, 2022, 31: 1\u201347","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"4127_CR119","first-page":"4238","volume-title":"Proceedings of the 31st International Joint Conference on Artificial Intelligence","author":"Q Liang","year":"2022","unstructured":"Liang Q, Sun Z, Zhu Q, et al. Lyra: a benchmark for turducken-style code generation. In: Proceedings of the 31st International Joint Conference on Artificial Intelligence, 2022. 4238\u20134244"},{"key":"4127_CR120","volume-title":"Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks","author":"D Hendrycks","year":"2021","unstructured":"Hendrycks D, Basart S, Kadavath S, et al. Measuring coding challenge competence with APPS. In: Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks, 2021"},{"key":"4127_CR121","volume-title":"Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks","author":"S Lu","year":"2021","unstructured":"Lu S, Guo D, Ren S, et al. CodeXGLUE: a machine learning benchmark dataset for code understanding and generation. In: Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks, 2021"},{"key":"4127_CR122","volume-title":"In ChatGPT we trust? Measuring and characterizing the reliability of ChatGPT","author":"X Shen","year":"2023","unstructured":"Shen X, Chen Z, Backes M, et al. In ChatGPT we trust? Measuring and characterizing the reliability of ChatGPT. 2023. ArXiv:2304.08979"},{"key":"4127_CR123","first-page":"155","volume-title":"Proceedings of the 15th Working Conference on Reverse Engineering, Antwerp","author":"S K Lukins","year":"2008","unstructured":"Lukins S K, Kraft N A, Etzkorn L H. Source code retrieval for bug localization using latent Dirichlet allocation. In: Proceedings of the 15th Working Conference on Reverse Engineering, Antwerp, 2008. 155\u2013164"},{"key":"4127_CR124","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/978-3-642-00593-0_26","volume-title":"Fundamental Approaches to Software Engineering. Berlin: Springer","author":"S Chatterjee","year":"2009","unstructured":"Chatterjee S, Juvekar S, Sen K. SNIFF: a search engine for Java using free-form queries. In: Fundamental Approaches to Software Engineering. Berlin: Springer, 2009. 385\u2013400"},{"key":"4127_CR125","first-page":"34","volume-title":"Proceedings of IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering","author":"E Hill","year":"2014","unstructured":"Hill E, Roldan-Vega M, Fails J A, et al. NL-based query refinement and contextualized code search results: a user study. In: Proceedings of IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering, 2014. 34\u201343"},{"key":"4127_CR126","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1145\/1985793.1985809","volume-title":"Proceedings of the 33rd International Conference on Software Engineering","author":"C McMillan","year":"2011","unstructured":"McMillan C, Grechanik M, Poshyvanyk D, et al. Portfolio: finding relevant functions and their usage. In: Proceedings of the 33rd International Conference on Software Engineering, 2011. 111\u2013120"},{"key":"4127_CR127","first-page":"690","volume-title":"Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering","author":"X Li","year":"2016","unstructured":"Li X, Wang Z, Wang Q, et al. Relationship-aware code search for JavaScript frameworks. In: Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016. 690\u2013701"},{"key":"4127_CR128","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/3211346.3211353","volume-title":"Proceedings of the 2nd ACM SIGPLAN International Workshop on Machine Learning and Programming Languages","author":"S Sachdev","year":"2018","unstructured":"Sachdev S, Li H, Luan S, et al. Retrieval on source code: a neural code search. In: Proceedings of the 2nd ACM SIGPLAN International Workshop on Machine Learning and Programming Languages, 2018. 31\u201341"},{"key":"4127_CR129","first-page":"1","volume-title":"Proceedings of the 10th Asia-Pacific Symposium on Internetware","author":"Y Zou","year":"2018","unstructured":"Zou Y, Ling C, Lin Z, et al. Graph embedding based code search in software project. In: Proceedings of the 10th Asia-Pacific Symposium on Internetware, 2018. 1\u201310"},{"key":"4127_CR130","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.neunet.2021.04.019","volume":"141","author":"W Gu","year":"2021","unstructured":"Gu W, Li Z, Gao C, et al. Cradle: deep code retrieval based on semantic dependency learning. Neural Networks, 2021, 141: 385\u2013394","journal-title":"Neural Networks"},{"key":"4127_CR131","first-page":"13","volume-title":"Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering","author":"Y Wan","year":"2019","unstructured":"Wan Y, Shu J, Sui Y, et al. Multi-modal attention network learning for semantic source code retrieval. In: Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering, 2019. 13\u201325"},{"key":"4127_CR132","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3447571","volume":"15","author":"X Ling","year":"2021","unstructured":"Ling X, Wu L, Wang S, et al. Deep graph matching and searching for semantic code retrieval. ACM Trans Knowledge Discov Data, 2021, 15: 1\u201321","journal-title":"ACM Trans Knowledge Discov Data"},{"key":"4127_CR133","volume-title":"GraphSearchNET: enhancing GNNs via capturing global dependency for semantic code search","author":"S Liu","year":"2021","unstructured":"Liu S, Xie X, Ma L, et al. GraphSearchNET: enhancing GNNs via capturing global dependency for semantic code search. 2021. ArXiv:2111.02671"},{"key":"4127_CR134","volume-title":"CodeRetriever: unimodal and bimodal contrastive learning","author":"X Li","year":"2022","unstructured":"Li X, Gong Y, Shen Y, et al. CodeRetriever: unimodal and bimodal contrastive learning. 2022. ArXiv:2201.10866"},{"key":"4127_CR135","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TSC.2016.2592909","volume":"12","author":"H Jiang","year":"2019","unstructured":"Jiang H, Nie L, Sun Z, et al. ROSF: leveraging Information Retrieval and Supervised Learning for Recommending Code Snippets. IEEE Trans Serv Comput, 2019, 12: 34\u201346","journal-title":"IEEE Trans Serv Comput"},{"key":"4127_CR136","volume-title":"Proceedings of the 9th International Conference on Learning Representations","author":"D Guo","year":"2021","unstructured":"Guo D, Ren S, Lu S, et al. GraphCodeBERT: pre-training code representations with data flow. In: Proceedings of the 9th International Conference on Learning Representations, 2021"},{"key":"4127_CR137","first-page":"7212","volume-title":"Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics","author":"D Guo","year":"2022","unstructured":"Guo D, Lu S, Duan N, et al. UniXcoder: unified cross-modal pre-training for code representation. In: Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics, 2022. 7212\u20137225"},{"key":"4127_CR138","first-page":"94","volume-title":"Proceedings of IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"Z Shi","year":"2022","unstructured":"Shi Z, Xiong Y, Zhang X, et al. Cross-modal contrastive learning for code search. In: Proceedings of IEEE International Conference on Software Maintenance and Evolution (ICSME), 2022. 94\u2013105"},{"key":"4127_CR139","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1145\/3404835.3462840","volume-title":"Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"N D Q Bui","year":"2021","unstructured":"Bui N D Q, Yu Y, Jiang L. Self-supervised contrastive learning for code retrieval and summarization via semantic-preserving transformations. In: Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021. 511\u2013521"},{"key":"4127_CR140","first-page":"2198","volume-title":"Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","author":"E Shi","year":"2023","unstructured":"Shi E, Wang Y, Gu W, et al. CoCoSoDa: effective contrastive learning for code search. In: Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE), 2023. 2198\u20132210"},{"key":"4127_CR141","first-page":"681","volume-title":"Proceedings of Companion to the 21st Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications","author":"S K Bajracharya","year":"2006","unstructured":"Bajracharya S K, Ngo T C, Linstead E, et al. Sourcerer: a search engine for open source code supporting structure-based search. In: Proceedings of Companion to the 21st Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, 2006. 681\u2013682"},{"key":"4127_CR142","first-page":"545","volume-title":"Proceedings of the 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering","author":"M Lu","year":"2015","unstructured":"Lu M, Sun X, Wang S, et al. Query expansion via WordNet for effective code search. In: Proceedings of the 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering, 2015. 545\u2013549"},{"key":"4127_CR143","first-page":"260","volume-title":"Proceedings of the 30th IEEE\/ACM International Conference on Automated Software Engineering","author":"F Lv","year":"2015","unstructured":"Lv F, Zhang H, Lou J, et al. CodeHow: effective code search based on API understanding and extended Boolean model (E). In: Proceedings of the 30th IEEE\/ACM International Conference on Automated Software Engineering, 2015. 260\u2013270"},{"key":"4127_CR144","first-page":"226","volume-title":"Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings","author":"M M Rahman","year":"2019","unstructured":"Rahman M M. Supporting code search with context-aware, analytics-driven, effective query reformulation. In: Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019. 226\u2013229"},{"key":"4127_CR145","first-page":"524","volume-title":"Proceedings of the 26th IEEE\/ACM International Conference on Automated Software Engineering","author":"E Hill","year":"2011","unstructured":"Hill E, Pollock L L, Vijay-Shanker K. Improving source code search with natural language phrasal representations of method signatures. In: Proceedings of the 26th IEEE\/ACM International Conference on Automated Software Engineering, 2011. 524\u2013527"},{"key":"4127_CR146","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/3315508.3329975","volume-title":"Proceedings of the 3rd ACM SIGPLAN International Workshop on Machine Learning and Programming Languages","author":"J Liu","year":"2019","unstructured":"Liu J, Kim S, Murali V, et al. Neural query expansion for code search. In: Proceedings of the 3rd ACM SIGPLAN International Workshop on Machine Learning and Programming Languages, 2019. 29\u201337"},{"key":"4127_CR147","first-page":"1273","volume-title":"Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)","author":"K Cao","year":"2021","unstructured":"Cao K, Chen C, Baltes S, et al. Automated query reformulation for efficient search based on query logs from stack overflow. In: Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), 2021. 1273\u20131285"},{"key":"4127_CR148","volume-title":"Generation-augmented query expansion for code retrieval","author":"D Li","year":"2022","unstructured":"Li D, Shen Y, Jin R, et al. Generation-augmented query expansion for code retrieval. 2022. arXiv:2212.10692"},{"key":"4127_CR149","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3360578","volume":"3","author":"S Luan","year":"2019","unstructured":"Luan S, Yang D, Barnaby C, et al. Aroma: code recommendation via structural code search. Proc ACM Program Lang, 2019, 3: 1\u201328","journal-title":"Proc ACM Program Lang"},{"key":"4127_CR150","first-page":"205","volume-title":"Proceedings of the 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Athens","author":"G Mathew","year":"2021","unstructured":"Mathew G, Stolee K T. Cross-language code search using static and dynamic analyses. In: Proceedings of the 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Athens, 2021. 205\u2013217"},{"key":"4127_CR151","first-page":"518","volume-title":"Proceedings of the IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR)","author":"D Perez","year":"2019","unstructured":"Perez D, Chiba S. Cross-language clone detection by learning over abstract syntax trees. In: Proceedings of the IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR), 2019. 518\u2013528"},{"key":"4127_CR152","first-page":"438","volume-title":"Proceedings of the 39th International Conference on Software Engineering","author":"T D Nguyen","year":"2017","unstructured":"Nguyen T D, Nguyen A T, Phan H D, et al. Exploring API embedding for API usages and applications. In: Proceedings of the 39th International Conference on Software Engineering, 2017. 438\u2013449"},{"key":"4127_CR153","first-page":"167","volume-title":"Proceedings of the 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"B Chen","year":"2021","unstructured":"Chen B, Abedjan Z. Interactive cross-language code retrieval with auto-encoders. In: Proceedings of the 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2021. 167\u2013178"},{"key":"4127_CR154","first-page":"5690","volume-title":"Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing","author":"J Huang","year":"2021","unstructured":"Huang J, Tang D, Shou L, et al. CoSQA: 20,000+ web queries for code search and question answering. In: Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021. 5690\u20135700"},{"key":"4127_CR155","volume-title":"xCodeEval: a large scale multilingual multitask benchmark for code understanding, generation, translation and retrieval","author":"M A M Khan","year":"2023","unstructured":"Khan M A M, Bari M S, Do X L, et al. xCodeEval: a large scale multilingual multitask benchmark for code understanding, generation, translation and retrieval. 2023. ArXiv:2303.03004"},{"key":"4127_CR156","first-page":"1","volume":"32","author":"C Wang","year":"2023","unstructured":"Wang C, Peng X, Xing Z C, et al. XCoS: explainable code search based on query scoping and knowledge graph. ACM Trans Softw Eng Methodol, 2023, 32: 1\u201328","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"4127_CR157","first-page":"1609","volume-title":"Proceedings of IEEE\/ACM 44th International Conference on Software Engineering","author":"Z Sun","year":"2022","unstructured":"Sun Z, Li L, Liu Y, et al. On the importance of building high-quality training datasets for neural code search. In: Proceedings of IEEE\/ACM 44th International Conference on Software Engineering, 2022. 1609\u20131620"},{"key":"4127_CR158","volume-title":"Cascaded fast and slow models for efficient semantic code search","author":"A D Gotmare","year":"2021","unstructured":"Gotmare A D, Li J, Joty S R, et al. Cascaded fast and slow models for efficient semantic code search. 2021. ArXiv:2110.07811"},{"key":"4127_CR159","first-page":"2534","volume-title":"Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics","author":"W Gu","year":"2022","unstructured":"Gu W, Wang Y, Du L, et al. Accelerating code search with deep hashing and code classification. In: Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics, 2022. 2534\u20132544"},{"key":"4127_CR160","first-page":"379","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing","author":"A M Rush","year":"2015","unstructured":"Rush A M, Chopra S, Weston J. A neural attention model for abstractive sentence summarization. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, 2015. 379\u2013389"},{"key":"4127_CR161","volume-title":"Proceedings of the 7th International Conference on Learning Representations","author":"U Alon","year":"2019","unstructured":"Alon U, Brody S, Levy O, et al. code2seq: generating sequences from structured representations of code. In: Proceedings of the 7th International Conference on Learning Representations, 2019"},{"key":"4127_CR162","volume-title":"Graph2Seq: graph to sequence learning with attention-based neural networks","author":"K Xu","year":"2018","unstructured":"Xu K, Wu L, Wang Z, et al. Graph2Seq: graph to sequence learning with attention-based neural networks. 2018. ArXiv:1804.00823"},{"key":"4127_CR163","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/1858996.1859006","volume-title":"Proceedings of the 25th IEEE\/ACM International Conference on Automated Software Engineering","author":"G Sridhara","year":"2010","unstructured":"Sridhara G, Hill E, Muppaneni D, et al. Towards automatically generating summary comments for Java methods. In: Proceedings of the 25th IEEE\/ACM International Conference on Automated Software Engineering, 2010. 43\u201352"},{"key":"4127_CR164","first-page":"561","volume-title":"Proceedings of IEEE International Conference on Software Maintenance and Evolution","author":"N J Abid","year":"2015","unstructured":"Abid N J, Dragan N, Collard M L, et al. Using stereotypes in the automatic generation of natural language summaries for C++ methods. In: Proceedings of IEEE International Conference on Software Maintenance and Evolution, 2015. 561\u2013565"},{"key":"4127_CR165","first-page":"35","volume-title":"Proceedings of the 17th Working Conference on Reverse Engineering","author":"S Haiduc","year":"2010","unstructured":"Haiduc S, Aponte J, Moreno L, et al. On the use of automated text summarization techniques for summarizing source code. In: Proceedings of the 17th Working Conference on Reverse Engineering, 2010. 35\u201344"},{"key":"4127_CR166","first-page":"223","volume-title":"Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering","author":"S Haiduc","year":"2010","unstructured":"Haiduc S, Aponte J, Marcus A. Supporting program comprehension with source code summarization. In: Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering, 2010. 223\u2013226"},{"key":"4127_CR167","first-page":"3104","volume-title":"Proceedings of Advances in Neural Information Processing Systems","author":"I Sutskever","year":"2014","unstructured":"Sutskever I, Vinyals O, Le Q V. Sequence to sequence learning with neural networks. In: Proceedings of Advances in Neural Information Processing Systems, 2014. 3104\u20133112"},{"key":"4127_CR168","first-page":"2091","volume-title":"Proceedings of the 33rd International Conference on Machine Learning","author":"M Allamanis","year":"2016","unstructured":"Allamanis M, Peng H, Sutton C. A convolutional attention network for extreme summarization of source code. In: Proceedings of the 33rd International Conference on Machine Learning, 2016. 2091\u20132100"},{"key":"4127_CR169","doi-asserted-by":"publisher","first-page":"4998","DOI":"10.18653\/v1\/2020.acl-main.449","volume-title":"Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics","author":"W U Ahmad","year":"2020","unstructured":"Ahmad W U, Chakraborty S, Ray B, et al. A transformer-based approach for source code summarization. In: Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020. 4998\u20135007"},{"key":"4127_CR170","doi-asserted-by":"publisher","first-page":"135591","DOI":"10.1109\/ACCESS.2020.3011744","volume":"8","author":"R Wang","year":"2020","unstructured":"Wang R, Zhang H, Lu G, et al. Fret: functional reinforced transformer with BERT for code summarization. IEEE Access, 2020, 8: 135591","journal-title":"IEEE Access"},{"key":"4127_CR171","first-page":"1385","volume-title":"Proceedings of the 42nd International Conference on Software Engineering, Seoul","author":"J Zhang","year":"2020","unstructured":"Zhang J, Wang X, Zhang H, et al. Retrieval-based neural source code summarization. In: Proceedings of the 42nd International Conference on Software Engineering, Seoul, 2020. 1385\u20131397"},{"key":"4127_CR172","first-page":"286","volume-title":"Proceedings of IEEE International Conference on Software Maintenance and Evolution","author":"A LeClair","year":"2021","unstructured":"LeClair A, Bansal A, McMillan C. Ensemble models for neural source code summarization of subroutines. In: Proceedings of IEEE International Conference on Software Maintenance and Evolution, 2021. 286\u2013297"},{"key":"4127_CR173","first-page":"13","volume-title":"Proceedings of IEEE International Conference on Software Analysis, Evolution and Reengineering","author":"Z Gong","year":"2022","unstructured":"Gong Z, Gao C, Wang Y, et al. Source code summarization with structural relative position guided transformer. In: Proceedings of IEEE International Conference on Software Analysis, Evolution and Reengineering, 2022. 13\u201324"},{"key":"4127_CR174","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1145\/3238147.3240471","volume-title":"Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering","author":"Q Chen","year":"2018","unstructured":"Chen Q, Zhou M. A neural framework for retrieval and summarization of source code. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, 2018. 826\u2013831"},{"key":"4127_CR175","first-page":"135","volume-title":"Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering","author":"S Jiang","year":"2017","unstructured":"Jiang S, Armaly A, McMillan C. Automatically generating commit messages from diffs using neural machine translation. In: Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering, 2017. 135\u2013146"},{"key":"4127_CR176","first-page":"320","volume-title":"Proceedings of the 25th International Conference on Program Comprehension","author":"S Jiang","year":"2017","unstructured":"Jiang S, McMillan C. Towards automatic generation of short summaries of commits. In: Proceedings of the 25th International Conference on Program Comprehension, 2017. 320\u2013323"},{"key":"4127_CR177","first-page":"1280","volume-title":"Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering","author":"S Jiang","year":"2019","unstructured":"Jiang S. Boosting neural commit message generation with code semantic analysis. In: Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering, 2019. 1280\u20131282"},{"key":"4127_CR178","first-page":"176","volume-title":"Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering","author":"Z Liu","year":"2019","unstructured":"Liu Z, Xia X, Treude C, et al. Automatic generation of pull request descriptions. In: Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering, 2019. 176\u2013188"},{"key":"4127_CR179","first-page":"253","volume-title":"Proceedings of the 29th IEEE\/ACM International Conference on Program Comprehension","author":"A Bansal","year":"2021","unstructured":"Bansal A, Haque S, McMillan C. Project-level encoding for neural source code summarization of subroutines. In: Proceedings of the 29th IEEE\/ACM International Conference on Program Comprehension, 2021. 253\u2013264"},{"key":"4127_CR180","first-page":"138","volume-title":"Proceedings of the 29th IEEE\/ACM International Conference on Program Comprehension","author":"R Xie","year":"2021","unstructured":"Xie R, Ye W, Sun J, et al. Exploiting method names to improve code summarization: a deliberation multi-task learning approach. In: Proceedings of the 29th IEEE\/ACM International Conference on Program Comprehension, 2021. 138\u2013148"},{"key":"4127_CR181","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1145\/3196321.3196334","volume-title":"Proceedings of the 26th Conference on Program Comprehension","author":"X Hu","year":"2018","unstructured":"Hu X, Li G, Xia X, et al. Deep code comment generation. In: Proceedings of the 26th Conference on Program Comprehension, 2018. 200\u2013210"},{"key":"4127_CR182","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1007\/s10664-019-09730-9","volume":"25","author":"X Hu","year":"2020","unstructured":"Hu X, Li G, Xia X, et al. Deep code comment generation with hybrid lexical and syntactical information. Empir Software Eng, 2020, 25: 2179\u20132217","journal-title":"Empir Software Eng"},{"key":"4127_CR183","doi-asserted-by":"publisher","first-page":"106373","DOI":"10.1016\/j.infsof.2020.106373","volume":"127","author":"Y Huang","year":"2020","unstructured":"Huang Y, Huang S, Chen H, et al. Towards automatically generating block comments for code snippets. Inf Software Tech, 2020, 127: 106373","journal-title":"Inf Software Tech"},{"key":"4127_CR184","first-page":"150","volume-title":"Proceedings of IEEE\/ACM 44th International Conference on Software Engineering","author":"Z Tang","year":"2022","unstructured":"Tang Z, Shen X, Li C, et al. AST-Trans: code summarization with efficient tree-structured attention. In: Proceedings of IEEE\/ACM 44th International Conference on Software Engineering, 2022. 150\u2013162"},{"key":"4127_CR185","doi-asserted-by":"publisher","first-page":"1800","DOI":"10.1109\/TSE.2020.3038681","volume":"48","author":"S Liu","year":"2022","unstructured":"Liu S, Gao C, Chen S, et al. ATOM: commit message generation based on abstract syntax tree and hybrid ranking. IEEE Trans Software Eng, 2022, 48: 1800\u20131817","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR186","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1145\/3238147.3238206","volume-title":"Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering","author":"Y Wan","year":"2018","unstructured":"Wan Y, Zhao Z, Yang M, et al. Improving automatic source code summarization via deep reinforcement learning. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, 2018. 397\u2013407"},{"key":"4127_CR187","first-page":"795","volume-title":"Proceedings of the 41st International Conference on Software Engineering","author":"A LeClair","year":"2019","unstructured":"LeClair A, Jiang S, McMillan C. A neural model for generating natural language summaries of program subroutines. In: Proceedings of the 41st International Conference on Software Engineering, 2019. 795\u2013806"},{"key":"4127_CR188","first-page":"3975","volume-title":"Proceedings of the 28th International Joint Conference on Artificial Intelligence","author":"S Xu","year":"2019","unstructured":"Xu S, Yao Y, Xu F, et al. Commit message generation for source code changes. In: Proceedings of the 28th International Joint Conference on Artificial Intelligence, 2019. 3975\u20133981"},{"key":"4127_CR189","doi-asserted-by":"publisher","first-page":"111257","DOI":"10.1016\/j.jss.2022.111257","volume":"188","author":"Y Zhou","year":"2022","unstructured":"Zhou Y, Shen J, Zhang X, et al. Automatic source code summarization with graph attention networks. J Syst Softw, 2022, 188: 111257","journal-title":"J Syst Softw"},{"key":"4127_CR190","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","author":"Y Liang","year":"2018","unstructured":"Liang Y, Zhu K. Automatic generation of text descriptive comments for code blocks. In: Proceedings of the AAAI Conference on Artificial Intelligence, 2018"},{"key":"4127_CR191","volume-title":"TranS3: a transformer-based framework for unifying code summarization and code search","author":"W Wang","year":"2020","unstructured":"Wang W, Zhang Y, Zeng Z, et al. TranS3: a transformer-based framework for unifying code summarization and code search. 2020. ArXiv:2003.03238"},{"key":"4127_CR192","first-page":"184","volume-title":"Proceedings of the 29th IEEE\/ACM International Conference on Program Comprehension","author":"C Lin","year":"2021","unstructured":"Lin C, Ouyang Z, Zhuang J, et al. Improving code summarization with block-wise abstract syntax tree splitting. In: Proceedings of the 29th IEEE\/ACM International Conference on Program Comprehension, 2021. 184\u2013195"},{"key":"4127_CR193","first-page":"4053","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing","author":"E Shi","year":"2021","unstructured":"Shi E, Wang Y, Du L, et al. CAST: enhancing code summarization with hierarchical splitting and reconstruction of abstract syntax trees. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, 2021. 4053\u20134062"},{"key":"4127_CR194","volume-title":"Proceedings of the 7th International Conference on Learning Representations","author":"P Fernandes","year":"2019","unstructured":"Fernandes P, Allamanis M, Brockschmidt M. Structured neural summarization. In: Proceedings of the 7th International Conference on Learning Representations, 2019"},{"key":"4127_CR195","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1145\/3387904.3389268","volume-title":"Proceedings of the 28th International Conference on Program Comprehension, Seoul","author":"A LeClair","year":"2020","unstructured":"LeClair A, Haque S, Wu L, et al. Improved code summarization via a graph neural network. In: Proceedings of the 28th International Conference on Program Comprehension, Seoul, 2020. 184\u2013195"},{"key":"4127_CR196","volume-title":"Proceedings of the 9th International Conference on Learning Representations","author":"S Liu","year":"2021","unstructured":"Liu S, Chen Y, Xie X, et al. Retrieval-augmented generation for code summarization via hybrid GNN. In: Proceedings of the 9th International Conference on Learning Representations, 2021"},{"key":"4127_CR197","first-page":"4473","volume-title":"Proceedings of Findings of the Association for Computational Linguistics","author":"X Liu","year":"2021","unstructured":"Liu X, Wang D, Wang A Y, et al. HAConvGNN: hierarchical attention based convolutional graph neural network for code documentation generation in Jupyter notebooks. In: Proceedings of Findings of the Association for Computational Linguistics, 2021. 4473\u20134485"},{"key":"4127_CR198","doi-asserted-by":"publisher","first-page":"106987","DOI":"10.1016\/j.infsof.2022.106987","volume":"150","author":"W Cheng","year":"2022","unstructured":"Cheng W, Hu P, Wei S, et al. Keyword-guided abstractive code summarization via incorporating structural and contextual information. Inf Software Tech, 2022, 150: 106987","journal-title":"Inf Software Tech"},{"key":"4127_CR199","first-page":"486","volume-title":"Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics","author":"J Guo","year":"2022","unstructured":"Guo J, Liu J, Wan Y, et al. Modeling hierarchical syntax structure with triplet position for source code summarization. In: Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics, 2022. 486\u2013500"},{"key":"4127_CR200","first-page":"171","volume-title":"Proceedings of ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, Helsinki Finland","author":"Z Ma","year":"2022","unstructured":"Ma Z, Gao Y, Lyu L, et al. MMF3: neural code summarization based on multi-modal fine-grained feature fusion. In: Proceedings of ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, Helsinki Finland, 2022. 171\u2013182"},{"key":"4127_CR201","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/3524610.3527903","volume-title":"Proceedings of the 30th IEEE\/ACM International Conference on Program Comprehension","author":"Y Wang","year":"2022","unstructured":"Wang Y, Dong Y, Lu X, et al. GypSum: learning hybrid representations for code summarization. In: Proceedings of the 30th IEEE\/ACM International Conference on Program Comprehension, 2022. 12\u201323"},{"key":"4127_CR202","first-page":"2269","volume-title":"Proceedings of the 27th International Joint Conference on Artificial Intelligence","author":"X Hu","year":"2018","unstructured":"Hu X, Li G, Xia X, et al. Summarizing source code with transferred API knowledge. In: Proceedings of the 27th International Joint Conference on Artificial Intelligence, 2018. 2269\u20132275"},{"key":"4127_CR203","first-page":"411","volume-title":"Proceedings of the 29th IEEE\/ACM International Conference on Program Comprehension","author":"R Shahbazi","year":"2021","unstructured":"Shahbazi R, Sharma R, Fard F H. API2Com: on the improvement of automatically generated code comments using API documentations. In: Proceedings of the 29th IEEE\/ACM International Conference on Program Comprehension, 2021. 411\u2013421"},{"key":"4127_CR204","doi-asserted-by":"publisher","first-page":"111495","DOI":"10.1016\/j.jss.2022.111495","volume":"194","author":"X Gao","year":"2022","unstructured":"Gao X, Jiang X, Wu Q, et al. GT-SimNet: improving code automatic summarization via multi-modal similarity networks. J Syst Software, 2022, 194: 111495","journal-title":"J Syst Software"},{"key":"4127_CR205","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1016\/j.jss.2019.07.087","volume":"156","author":"Y Zhou","year":"2019","unstructured":"Zhou Y, Yan X, Yang W, et al. Augmenting Java method comments generation with context information based on neural networks. J Syst Software, 2019, 156: 328\u2013340","journal-title":"J Syst Software"},{"key":"4127_CR206","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/TSE.2020.2979701","volume":"48","author":"W Wang","year":"2022","unstructured":"Wang W, Zhang Y, Sui Y, et al. Reinforcement-learning-guided source code summarization using hierarchical attention. IEEE Trans Software Eng, 2022, 48: 102\u2013119","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR207","series-title":"Microsoft, Technical Report, MSR-TR-2020-16","volume-title":"CoCoGUM: Contextual Code Summarization With Multi-Relational GNN on UMLs","author":"Y Wang","year":"2020","unstructured":"Wang Y, Du L, Shi E, et al. CoCoGUM: Contextual Code Summarization With Multi-Relational GNN on UMLs. Microsoft, Technical Report, MSR-TR-2020-16, 2020"},{"key":"4127_CR208","first-page":"5966","volume-title":"Proceedings of the 29th International Conference on Computational Linguistics","author":"J Son","year":"2022","unstructured":"Son J, Hahn J, Seo H, et al. Boosting code summarization by embedding code structures. In: Proceedings of the 29th International Conference on Computational Linguistics, 2022. 5966\u20135977"},{"key":"4127_CR209","doi-asserted-by":"publisher","first-page":"1372","DOI":"10.3390\/e24101372","volume":"24","author":"C Zhang","year":"2022","unstructured":"Zhang C, Zhou Q, Qiao M, et al. Re_Trans: combined retrieval and transformer model for source code summarization. Entropy, 2022, 24: 1372","journal-title":"Entropy"},{"key":"4127_CR210","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10515-022-00374-6","volume":"30","author":"Y Huang","year":"2023","unstructured":"Huang Y, Huang J, Chen X, et al. BCGen: a comment generation method for bytecode. Autom Softw Eng, 2023, 30: 5","journal-title":"Autom Softw Eng"},{"key":"4127_CR211","first-page":"314","volume-title":"Proceedings of the 8th International Joint Conference on Natural Language Processing","author":"A V M Barone","year":"2017","unstructured":"Barone A V M, Sennrich R. A parallel corpus of python functions and documentation strings for automated code documentation and code generation. In: Proceedings of the 8th International Joint Conference on Natural Language Processing, 2017. 314\u2013319"},{"key":"4127_CR212","first-page":"1","volume":"33","author":"H Y Guo","year":"2024","unstructured":"Guo H Y, Chen X P, Huang Y, et al. Snippet comment generation based on code context expansion. ACM Trans Softw Eng Methodol, 2024, 33: 1\u201330","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"4127_CR213","volume-title":"Refactoring: Improving the Design of Existing Code","author":"M Fowler","year":"1999","unstructured":"Fowler M, Beck K, Brant J, et al. Refactoring: Improving the Design of Existing Code. Redding: Addison-Wesley Professional, 1999"},{"key":"4127_CR214","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/TSE.2009.1","volume":"35","author":"N Tsantalis","year":"2009","unstructured":"Tsantalis N, Chatzigeorgiou A. Identification of move method refactoring opportunities. IEEE Trans Software Eng, 2009, 35: 347\u2013367","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR215","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jss.2017.11.073","volume":"138","author":"R Terra","year":"2018","unstructured":"Terra R, Valente M T, Miranda S, et al. JMove: a novel heuristic and tool to detect move method refactoring opportunities. J Syst Software, 2018, 138: 19\u201336","journal-title":"J Syst Software"},{"key":"4127_CR216","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/3238147.3238166","volume-title":"Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering","author":"H Liu","year":"2018","unstructured":"Liu H, Xu Z, Zou Y. Deep learning based feature envy detection. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, 2018. 385\u2013396"},{"key":"4127_CR217","first-page":"315","volume-title":"Proceedings of the 4th International Workshop on Refactoring","author":"Z Kurbatova","year":"2020","unstructured":"Kurbatova Z, Veselov I, Golubev Y, et al. Recommendation of move method refactoring using path-based representation of code. In: Proceedings of the 4th International Workshop on Refactoring, 2020. 315\u2013322"},{"key":"4127_CR218","doi-asserted-by":"publisher","first-page":"110936","DOI":"10.1016\/j.jss.2021.110936","volume":"176","author":"T Sharma","year":"2021","unstructured":"Sharma T, Efstathiou V, Louridas P, et al. Code smell detection by deep direct-learning and transfer-learning. J Syst Software, 2021, 176: 110936","journal-title":"J Syst Software"},{"key":"4127_CR219","first-page":"1811","volume":"47","author":"H Liu","year":"2021","unstructured":"Liu H, Jin J H, Xu Z F, et al. Deep learning based code smell detection. IEEE Trans Software Eng, 2021, 47: 1811\u20131837","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR220","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G. Deep learning. Nature, 2015, 521: 436\u2013444","journal-title":"Nature"},{"key":"4127_CR221","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/s13042-020-01096-5","volume":"11","author":"X Wang","year":"2020","unstructured":"Wang X, Zhao Y, Pourpanah F. Recent advances in deep learning. Int J Mach Learn Cyber, 2020, 11: 747\u2013750","journal-title":"Int J Mach Learn Cyber"},{"key":"4127_CR222","first-page":"114","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution","author":"A Barbez","year":"2019","unstructured":"Barbez A, Khomh F, Gu\u00e9h\u00e9neuc Y G. Deep learning anti-patterns from code metrics history. In: Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2019. 114\u2013124"},{"key":"4127_CR223","first-page":"458","volume-title":"Proceedings of the 33rd International Symposium on Software Reliability Engineering","author":"D Yu","year":"2022","unstructured":"Yu D, Xu Y, Weng L, et al. Detecting and refactoring feature envybased on graph neural network. In: Proceedings of the 33rd International Symposium on Software Reliability Engineering, 2022. 458\u2013469"},{"key":"4127_CR224","first-page":"1","volume-title":"Proceedings of the ACM on Programming Languages","author":"U Alon","year":"2019","unstructured":"Alon U, Zilberstein M, Levy O, et al. Code2vec: learning distributed representations of code. In: Proceedings of the ACM on Programming Languages, 2019. 1\u201329"},{"key":"4127_CR225","first-page":"281","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution","author":"D Cui","year":"2022","unstructured":"Cui D, Wang S, Luo Y, et al. RMove: recommending move method refactoring opportunities using structural and semantic representations of code. In: Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2022. 281\u2013292"},{"key":"4127_CR226","doi-asserted-by":"publisher","first-page":"3103","DOI":"10.1109\/TSE.2021.3079841","volume":"48","author":"R Yedida","year":"2022","unstructured":"Yedida R, Menzies T. On the value of oversampling for deep learning in software defect prediction. IEEE Trans Software Eng, 2022, 48: 3103\u20133116","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR227","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1145\/3524842.3528458","volume-title":"Proceedings of the 19th International Conference on Mining Software Repositories","author":"R Yedida","year":"2022","unstructured":"Yedida R, Menzies T. How to improve deep learning for software analytics: (a case study with code smell detection). In: Proceedings of the 19th International Conference on Mining Software Repositories, 2022. 156\u2013166"},{"key":"4127_CR228","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1109\/TSE.2015.2427831","volume":"41","author":"H Liu","year":"2015","unstructured":"Liu H, Liu Q, Liu Y, et al. Identifying renaming opportunities by expanding conducted rename refactorings. IEEE Trans Software Eng, 2015, 41: 887\u2013900","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR229","first-page":"404","volume-title":"Proceedings of the 21st International Conference on Software Quality, Reliability and Security)","author":"J Liang","year":"2021","unstructured":"Liang J, Zou W, Zhang J, et al. A deep method renaming prediction and refinement approach for Java projects. In: Proceedings of the 21st International Conference on Software Quality, Reliability and Security), 2021. 404\u2013413"},{"key":"4127_CR230","first-page":"4171","volume-title":"Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","author":"J D M W C Kenton","year":"2019","unstructured":"Kenton J D M W C, Toutanova L K. BERT: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2019. 4171\u20134186"},{"key":"4127_CR231","first-page":"502","volume-title":"Proceedings of the 11th International Workshop on Semantic Evaluation","author":"S Rosenthal","year":"2017","unstructured":"Rosenthal S, Farra N, Nakov P. SemEval-2017 task 4: sentiment analysis in Twitter. In: Proceedings of the 11th International Workshop on Semantic Evaluation, 2017. 502\u2013518"},{"key":"4127_CR232","first-page":"1","volume-title":"Proceedings of the 41st International Conference on Software Engineering","author":"K Liu","year":"2019","unstructured":"Liu K, Kim D, Bissyand\u00e9 T F, et al. Learning to spot and refactor inconsistent method names. In: Proceedings of the 41st International Conference on Software Engineering, 2019. 1\u201312"},{"key":"4127_CR233","first-page":"1188","volume-title":"Proceedings of the 31st International Conference on Machine Learning","author":"Q Le","year":"2014","unstructured":"Le Q, Mikolov T. Distributed representations of sentences and documents. In: Proceedings of the 31st International Conference on Machine Learning, 2014. 1188\u20131196"},{"key":"4127_CR234","first-page":"25","volume-title":"Proceedings of the 41st International Conference on Software Engineering","author":"M Tufano","year":"2019","unstructured":"Tufano M, Pantiuchina J, Watson C, et al. On learning meaningful code changes via neural machine translation. In: Proceedings of the 41st International Conference on Software Engineering, 2019. 25\u201336"},{"key":"4127_CR235","doi-asserted-by":"publisher","first-page":"4315","DOI":"10.1007\/s10664-020-09871-2","volume":"25","author":"A S Nyamawe","year":"2020","unstructured":"Nyamawe A S, Liu H, Niu N, et al. Feature requests-based recommendation of software refactorings. Empir Software Eng, 2020, 25: 4315\u20134347","journal-title":"Empir Software Eng"},{"key":"4127_CR236","doi-asserted-by":"publisher","first-page":"107169","DOI":"10.1016\/j.infsof.2023.107169","volume":"158","author":"E A AlOmar","year":"2023","unstructured":"AlOmar E A, Ivanov A, Kurbatova Z, et al. Just-in-time code duplicates extraction. Inf Software Tech, 2023, 158: 107169","journal-title":"Inf Software Tech"},{"key":"4127_CR237","volume-title":"Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, San Francisco","author":"X Y Chi","year":"2023","unstructured":"Chi X Y, Liu H, Li G J, et al. An automated approach to extracting local variables. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, San Francisco, 2023"},{"key":"4127_CR238","first-page":"72","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","author":"U Desai","year":"2021","unstructured":"Desai U, Bandyopadhyay S, Tamilselvam S. Graph neural network to dilute outliers for refactoring monolith application. In: Proceedings of the AAAI Conference on Artificial Intelligence, 2021. 72\u201380"},{"key":"4127_CR239","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1145\/3383219.3383264","volume-title":"Proceedings of the 24th Evaluation and Assessment in Software Engineering","author":"L Madeyski","year":"2020","unstructured":"Madeyski L, Lewowski T. MLCQ: industry-relevant code smell data set. In: Proceedings of the 24th Evaluation and Assessment in Software Engineering, 2020. 342\u2013347"},{"key":"4127_CR240","volume-title":"Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, San Francisco","author":"B Liu","year":"2023","unstructured":"Liu B, Liu H, Li G J, et al. Deep learning based feature envy detection boosted by real-world examples. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, San Francisco, 2023"},{"key":"4127_CR241","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1109\/TSE.2020.3007722","volume":"48","author":"N Tsantalis","year":"2022","unstructured":"Tsantalis N, Ketkar A, Dig D. RefactoringMiner 2.0. IEEE Trans Software Eng, 2022, 48: 930\u2013950","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR242","doi-asserted-by":"publisher","first-page":"2786","DOI":"10.1109\/TSE.2020.2968072","volume":"47","author":"D Silva","year":"2021","unstructured":"Silva D, da Silva J P, Santos G, et al. RefDiff 2.0: a multi-language refactoring detection tool. IEEE Trans Software Eng, 2021, 47: 2786\u20132802","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR243","first-page":"371","volume-title":"Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, Santa Fe","author":"M Kim","year":"2010","unstructured":"Kim M, Gee M, Loh A, et al. Ref-Finder: a refactoring reconstruction tool based on logic query templates. In: Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, Santa Fe, 2010. 371\u2013372"},{"key":"4127_CR244","first-page":"942","volume-title":"Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference","author":"X Yin","year":"2021","unstructured":"Yin X, Shi C, Zhao S. Local and global feature based explainable feature envy detection. In: Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021. 942\u2013951"},{"key":"4127_CR245","volume-title":"Proceedings of the 38th IEEE\/ACM International Conference on Automated Software Engineering","author":"B Liu","year":"2023","unstructured":"Liu B, Liu H, Li G J, et al. Automated software entity matching between successive versions. In: Proceedings of the 38th IEEE\/ACM International Conference on Automated Software Engineering, 2023"},{"key":"4127_CR246","first-page":"476","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution","author":"J Svajlenko","year":"2014","unstructured":"Svajlenko J, Islam J F, Keivanloo I, et al. Towards a big data curated benchmark of inter-project code clones. In: Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2014. 476\u2013480"},{"key":"4127_CR247","first-page":"582","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"M Chochlov","year":"2022","unstructured":"Chochlov M, Ahmed G A, Patten J V, et al. Using a nearest-neighbour, BERT-based approach for scalable clone detection. In: Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME), 2022. 582\u2013591"},{"key":"4127_CR248","first-page":"1157","volume-title":"Proceedings of IEEE\/ACM 38th International Conference on Software Engineering (ICSE)","author":"H Sajnani","year":"2016","unstructured":"Sajnani H, Saini V, Svajlenko J, et al. SourcererCC: scaling code clone detection to big-code. In: Proceedings of IEEE\/ACM 38th International Conference on Software Engineering (ICSE), 2016. 1157\u20131168"},{"key":"4127_CR249","first-page":"39","volume-title":"Proceedings of the IEEE 16th International Workshop on Software Clones (IWSC)","author":"S Arshad","year":"2022","unstructured":"Arshad S, Abid S, Shamail S. CodeBERT for code clone detection: a replication study. In: Proceedings of the IEEE 16th International Workshop on Software Clones (IWSC), 2022. 39\u201345"},{"key":"4127_CR250","doi-asserted-by":"publisher","first-page":"3771","DOI":"10.1109\/TSE.2021.3105556","volume":"48","author":"N Mehrotra","year":"2022","unstructured":"Mehrotra N, Agarwal N, Gupta P, et al. Modeling functional similarity in source code with graph-based siamese networks. IEEE Trans Software Eng, 2022, 48: 3771\u20133789","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR251","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-031-08129-3_8","volume-title":"Proceedings of Reuse and Software Quality","author":"Z Xue","year":"2022","unstructured":"Xue Z, Jiang Z, Huang C, et al. SEED: semantic graph based deep detection for Type-4 clone. In: Proceedings of Reuse and Software Quality, 2022. 120\u2013137"},{"key":"4127_CR252","doi-asserted-by":"publisher","first-page":"103327","DOI":"10.1016\/j.advengsoft.2022.103327","volume":"174","author":"S Karthik","year":"2022","unstructured":"Karthik S, Rajdeepa B. A collaborative method for code clone detection using a deep learning model. Adv Eng Software, 2022, 174: 103327","journal-title":"Adv Eng Software"},{"key":"4127_CR253","first-page":"382","volume-title":"Proceedings of the IEEE 20th International Conference on Software Quality, Reliability and Security (QRS)","author":"B Li","year":"2020","unstructured":"Li B, Ye C, Guan S, et al. Semantic code clone detection via event embedding tree and gat network. In: Proceedings of the IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), 2020. 382\u2013393"},{"key":"4127_CR254","first-page":"1","volume-title":"Proceedings of the 28th Asia-Pacific Software Engineering Conference (APSEC)","author":"A Zhang","year":"2021","unstructured":"Zhang A, Liu K, Fang L, et al. Learn to align: a code alignment network for code clone detection. In: Proceedings of the 28th Asia-Pacific Software Engineering Conference (APSEC), 2021. 1\u201311"},{"key":"4127_CR255","doi-asserted-by":"publisher","first-page":"6613","DOI":"10.3390\/app11146613","volume":"11","author":"Y B Jo","year":"2021","unstructured":"Jo Y B, Lee J, Yoo C J. Two-pass technique for clone detection and type classification using tree-based convolution neural network. Appl Sci, 2021, 11: 6613","journal-title":"Appl Sci"},{"key":"4127_CR256","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1587\/transinf.2019EDL8195","volume":"E103.D","author":"D K Kim","year":"2020","unstructured":"Kim D K. A deep neural network-based approach to finding similar code segments. IEICE Trans Inf Syst, 2020, E103.D: 874\u2013878","journal-title":"IEICE Trans Inf Syst"},{"key":"4127_CR257","first-page":"821","volume-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"Y Wu","year":"2020","unstructured":"Wu Y, Zou D, Dou S, et al. SCDetector: software functional clone detection based on semantic tokens analysis. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2020. 821\u2013833"},{"key":"4127_CR258","first-page":"238","volume-title":"Proceedings of the 27th Asia-Pacific Software Engineering Conference (APSEC)","author":"C Feng","year":"2020","unstructured":"Feng C, Wang T, Yu Y, et al. Sia-RAE: a siamese network based on recursive AutoEncoder for effective clone detection. In: Proceedings of the 27th Asia-Pacific Software Engineering Conference (APSEC), 2020. 238\u2013246"},{"key":"4127_CR259","first-page":"13","volume-title":"Proceedings of the 6th International Conference on Dependable Systems and Their Applications (DSA)","author":"Y Yuan","year":"2020","unstructured":"Yuan Y, Kong W, Hou G, et al. From local to global semantic clone detection. In: Proceedings of the 6th International Conference on Dependable Systems and Their Applications (DSA), 2020. 13\u201324"},{"key":"4127_CR260","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1109\/TR.2020.3001918","volume":"70","author":"W Hua","year":"2021","unstructured":"Hua W, Sui Y, Wan Y, et al. FCCA: hybrid code representation for functional clone detection using attention networks. IEEE Trans Rel, 2021, 70: 304\u2013318","journal-title":"IEEE Trans Rel"},{"key":"4127_CR261","first-page":"261","volume-title":"Proceedings of the IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)","author":"W Wang","year":"2020","unstructured":"Wang W, Li G, Ma B, et al. Detecting code clones with graph neural network and flow-augmented abstract syntax tree. In: Proceedings of the IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2020. 261\u2013271"},{"key":"4127_CR262","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1145\/3395363.3397362","volume-title":"Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis","author":"C Fang","year":"2020","unstructured":"Fang C, Liu Z, Shi Y, et al. Functional code clone detection with syntax and semantics fusion learning. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020. 516\u2013527"},{"key":"4127_CR263","doi-asserted-by":"publisher","first-page":"24948","DOI":"10.1109\/ACCESS.2020.2966532","volume":"8","author":"C Guo","year":"2020","unstructured":"Guo C, Yang H, Huang D, et al. Review sharing via deep semi-supervised code clone detection. IEEE Access, 2020, 8: 24948\u201324965","journal-title":"IEEE Access"},{"key":"4127_CR264","first-page":"1","volume":"2020","author":"Y Meng","year":"2020","unstructured":"Meng Y, Liu L. A deep learning approach for a source code detection model using self-attention. Complexity, 2020, 2020: 1\u201315","journal-title":"Complexity"},{"key":"4127_CR265","doi-asserted-by":"publisher","first-page":"125062","DOI":"10.1109\/ACCESS.2019.2938825","volume":"7","author":"J Zeng","year":"2019","unstructured":"Zeng J, Ben K, Li X, et al. Fast code clone detection based on weighted recursive autoencoders. IEEE Access, 2019, 7: 125062","journal-title":"IEEE Access"},{"key":"4127_CR266","doi-asserted-by":"publisher","first-page":"5813","DOI":"10.1609\/aaai.v33i01.33015813","volume":"33","author":"Y Y Zhang","year":"2019","unstructured":"Zhang Y Y, Li M. Find me if you can: deep software clone detection by exploiting the contest between the plagiarist and the detector. In: Proceedings of the AAAI Conference on Artificial Intelligence, 2019. 33: 5813\u20135820","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"4127_CR267","first-page":"95","volume-title":"Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER)","author":"L B\u00fcch","year":"2019","unstructured":"B\u00fcch L, Andrzejak A. Learning-based recursive aggregation of abstract syntax trees for code clone detection. In: Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2019. 95\u2013104"},{"key":"4127_CR268","first-page":"70","volume-title":"Proceedings of the IEEE\/ACM 27th International Conference on Program Comprehension (ICPC)","author":"H Yu","year":"2019","unstructured":"Yu H, Lam W, Chen L, et al. Neural detection of semantic code clones via tree-based convolution. In: Proceedings of the IEEE\/ACM 27th International Conference on Program Comprehension (ICPC), 2019. 70\u201380"},{"key":"4127_CR269","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1145\/3293882.3338996","volume-title":"Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis","author":"C Wang","year":"2019","unstructured":"Wang C, Gao J, Jiang Y, et al. Go-clone: graph-embedding based clone detector for Golang. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019. 374\u2013377"},{"key":"4127_CR270","doi-asserted-by":"publisher","first-page":"6551","DOI":"10.1109\/TII.2019.2929739","volume":"15","author":"H Shi","year":"2019","unstructured":"Shi H, Wang R, Fu Y, et al. Vulnerable code clone detection for operating system through correlation-induced learning. IEEE Trans Ind Inf, 2019, 15: 6551\u20136559","journal-title":"IEEE Trans Ind Inf"},{"key":"4127_CR271","first-page":"354","volume-title":"Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"V Saini","year":"2018","unstructured":"Saini V, Farmahinifarahani F, Lu Y, et al. Oreo: detection of clones in the twilight zone. In: Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018. 354\u2013365"},{"key":"4127_CR272","first-page":"141","volume-title":"Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"G Zhao","year":"2018","unstructured":"Zhao G, Huang J. DeepSim: deep learning code functional similarity. In: Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018. 141\u2013151"},{"key":"4127_CR273","first-page":"701","volume-title":"Proceedings of the 17th IEEE International Conference on Machine Learning and Applications (ICMLA)","author":"A Sheneamer","year":"2018","unstructured":"Sheneamer A. CCDLC detection framework-combining clustering with deep learning classification for semantic clones. In: Proceedings of the 17th IEEE International Conference on Machine Learning and Applications (ICMLA), 2018. 701\u2013706"},{"key":"4127_CR274","first-page":"2840","volume-title":"Proceedings of the 27th International Joint Conference on Artificial Intelligence","author":"H H Wei","year":"2018","unstructured":"Wei H H, Li M. Positive and unlabeled learning for detecting software functional clones with adversarial training. In: Proceedings of the 27th International Joint Conference on Artificial Intelligence, 2018. 2840\u20132846"},{"key":"4127_CR275","first-page":"3034","volume-title":"Proceedings of the 26th International Joint Conference on Artificial Intelligence","author":"H H Wei","year":"2017","unstructured":"Wei H H, Li M. Supervised deep features for software functional clone detection by exploiting lexical and syntactical information in source code. In: Proceedings of the 26th International Joint Conference on Artificial Intelligence, 2017. 3034\u20133040"},{"key":"4127_CR276","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/2970276.2970326","volume-title":"Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering","author":"M White","year":"2016","unstructured":"White M, Tufano M, Vendome C, et al. Deep learning code fragments for code clone detection. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering, 2016. 87\u201398"},{"key":"4127_CR277","first-page":"1024","volume-title":"Proceedings of the 15th IEEE International Conference on Machine Learning and Applications (ICMLA)","author":"A Sheneamer","year":"2016","unstructured":"Sheneamer A, Kalita J. Semantic clone detection using machine learning. In: Proceedings of the 15th IEEE International Conference on Machine Learning and Applications (ICMLA), 2016. 1024\u20131028"},{"key":"4127_CR278","first-page":"783","volume-title":"Proceedings of the IEEE\/ACM 41st International Conference on Software Engineering (ICSE)","author":"J Zhang","year":"2019","unstructured":"Zhang J, Wang X, Zhang H, et al. A novel neural source code representation based on abstract syntax tree. In: Proceedings of the IEEE\/ACM 41st International Conference on Software Engineering (ICSE), 2019. 783\u2013794"},{"key":"4127_CR279","doi-asserted-by":"publisher","first-page":"27986","DOI":"10.1109\/ACCESS.2020.2971545","volume":"8","author":"M Wu","year":"2020","unstructured":"Wu M, Wang P, Yin K, et al. LVMapper: a large-variance clone detector using sequencing alignment approach. IEEE Access, 2020, 8: 27986\u201327997","journal-title":"IEEE Access"},{"key":"4127_CR280","first-page":"249","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"L Li","year":"2017","unstructured":"Li L, Feng H, Zhuang W, et al. CCLearner: a deep learning-based clone detection approach. In: Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME), 2017. 249\u2013260"},{"key":"4127_CR281","first-page":"96","volume-title":"Proceedings of the 29th International Conference on Software Engineering","author":"L Jiang","year":"2007","unstructured":"Jiang L, Misherghi G, Su Z, et al. DECKARD: scalable and accurate tree-based detection of code clones. In: Proceedings of the 29th International Conference on Software Engineering, 2007. 96\u2013105"},{"key":"4127_CR282","first-page":"27","volume-title":"Proceedings of the IEEE\/ACM 39th International Conference on Software Engineering Companion (ICSE-C)","author":"J Svajlenko","year":"2017","unstructured":"Svajlenko J, Roy C K. Fast and flexible large-scale clone detection with cloneworks. In: Proceedings of the IEEE\/ACM 39th International Conference on Software Engineering Companion (ICSE-C), 2017. 27\u201330"},{"key":"4127_CR283","first-page":"172","volume-title":"Proceedings of the 16th IEEE International Conference on Program Comprehension","author":"C K Roy","year":"2008","unstructured":"Roy C K, Cordy J R. NICAD: accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In: Proceedings of the 16th IEEE International Conference on Program Comprehension, 2008. 172\u2013181"},{"key":"4127_CR284","first-page":"595","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP)","author":"S Kim","year":"2017","unstructured":"Kim S, Woo S, Lee H, et al. VUDDY: a scalable approach for vulnerable code clone discovery. In: Proceedings of the IEEE Symposium on Security and Privacy (SP), 2017. 595\u2013614"},{"key":"4127_CR285","first-page":"287","volume-title":"Proceedings of the IEEE\/ACM 44th International Conference on Software Engineering (ICSE)","author":"D Wang","year":"2022","unstructured":"Wang D, Jia Z, Li S, et al. Bridging pre-trained models and downstream tasks for source code understanding. In: Proceedings of the IEEE\/ACM 44th International Conference on Software Engineering (ICSE), 2022. 287\u2013298"},{"key":"4127_CR286","first-page":"554","volume-title":"Proceedings of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)","author":"J K Siow","year":"2022","unstructured":"Siow J K, Liu S, Xie X, et al. Learning program semantics with code representations: an empirical study. In: Proceedings of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2022. 554\u2013565"},{"key":"4127_CR287","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/s10664-022-10122-9","volume":"27","author":"S Karakati\u010d","year":"2022","unstructured":"Karakati\u010d S, Milo\u0161evi\u010d A, Heri\u010dko T. Software system comparison with semantic source code embeddings. Empir Software Eng, 2022, 27: 70","journal-title":"Empir Software Eng"},{"key":"4127_CR288","first-page":"1186","volume-title":"Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)","author":"N D Q Bui","year":"2021","unstructured":"Bui N D Q, Yu Y, Jiang L. InferCode: self-supervised learning of code representations by predicting subtrees. In: Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), 2021. 1186\u20131197"},{"key":"4127_CR289","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-030-92307-5_35","volume-title":"Proceedings of Neural Information Processing. Cham: Springer International Publishing","author":"Q Wu","year":"2021","unstructured":"Wu Q, Jiang X, Zheng Z, et al. Code representation based on hybrid graph modelling. In: Proceedings of Neural Information Processing. Cham: Springer International Publishing, 2021. 298\u2013306"},{"key":"4127_CR290","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1145\/3310273.3321560","volume-title":"Proceedings of the 16th ACM International Conference on Computing Frontiers","author":"L Chen","year":"2019","unstructured":"Chen L, Ye W, Zhang S. Capturing source code semantics via tree-based convolution over API-enhanced AST. In: Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019. 174\u2013182"},{"key":"4127_CR291","first-page":"145","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"Y Gao","year":"2019","unstructured":"Gao Y, Wang Z, Liu S, et al. TECCD: a tree embedding approach for code clone detection. In: Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME), 2019. 145\u2013156"},{"key":"4127_CR292","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1145\/3196398.3196431","volume-title":"Proceedings of the IEEE\/ACM 15th International Conference on Mining Software Repositories (MSR)","author":"M Tufano","year":"2018","unstructured":"Tufano M, Watson C, Bavota G, et al. Deep learning similarities from different representations of source code. In: Proceedings of the IEEE\/ACM 15th International Conference on Mining Software Repositories (MSR), 2018. 542\u2013553"},{"key":"4127_CR293","first-page":"1287","volume-title":"Proceedings of the 30th AAAI Conference on Artificial Intelligence","author":"L Mou","year":"2016","unstructured":"Mou L, Li G, Zhang L, et al. Convolutional neural networks over tree structures for programming language processing. In: Proceedings of the 30th AAAI Conference on Artificial Intelligence, 2016. 1287\u20131293"},{"key":"4127_CR294","first-page":"1066","volume-title":"Proceedings of the IEEE\/ACM 40th International Conference on Software Engineering (ICSE)","author":"P Wang","year":"2018","unstructured":"Wang P, Svajlenko J, Wu Y, et al. CCAligner: a token based large-gap clone detector. In: Proceedings of the IEEE\/ACM 40th International Conference on Software Engineering (ICSE), 2018. 1066\u20131077"},{"key":"4127_CR295","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2507288.2507314","volume":"38","author":"R Terra","year":"2013","unstructured":"Terra R, Miranda L F, Valente M T, et al. Qualitas.class corpus: a compiled version of the qualitas corpus. SIGSOFT Softw Eng Notes, 2013, 38: 1\u20134","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"4127_CR296","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3390\/computers12010012","volume":"12","author":"M A Yahya","year":"2023","unstructured":"Yahya M A, Kim D K. CLCD-I: cross-language clone detection by using deep learning with InferCode. Computers, 2023, 12: 12","journal-title":"Computers"},{"key":"4127_CR297","first-page":"390","volume-title":"Proceedings of the IEEE\/ACM 30th International Conference on Program Comprehension (ICPC)","author":"K Wang","year":"2022","unstructured":"Wang K, Yan M, Zhang H, et al. Unified abstract syntax tree representation learning for cross-language program classification. In: Proceedings of the IEEE\/ACM 30th International Conference on Program Comprehension (ICPC), 2022. 390\u2013400"},{"key":"4127_CR298","first-page":"422","volume-title":"Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER)","author":"N D Q Bui","year":"2019","unstructured":"Bui N D Q, Yu Y, Jiang L. Bilateral dependency neural networks for cross-language algorithm classification. In: Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2019. 422\u2013433"},{"key":"4127_CR299","first-page":"1026","volume-title":"Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"K W Nafi","year":"2019","unstructured":"Nafi K W, Kar T S, Roy B, et al. CLCDSA: cross language code clone detection using syntactical features and API documentation. In: Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2019. 1026\u20131037"},{"key":"4127_CR300","first-page":"737","volume-title":"Proceedings of the 6th International Conference on Neural Information Processing Systems, San Francisco","author":"J Bromley","year":"1993","unstructured":"Bromley J, Guyon I, LeCun Y, et al. Signature verification using a \u201cSiamese\u201d time delay neural network. In: Proceedings of the 6th International Conference on Neural Information Processing Systems, San Francisco, 1993. 737\u2013744"},{"key":"4127_CR301","first-page":"512","volume-title":"Proceedings of the IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)","author":"T Vislavski","year":"2018","unstructured":"Vislavski T, Raki\u0107 G, Cardozo N, et al. LICCA: a tool for cross-language clone detection. In: Proceedings of the IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2018. 512\u2013516"},{"key":"4127_CR302","first-page":"696","volume-title":"Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"X Cheng","year":"2016","unstructured":"Cheng X, Peng Z, Jiang L, et al. Mining revision histories to detect cross-language clones without intermediates. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2016. 696\u2013701"},{"key":"4127_CR303","first-page":"26","volume-title":"Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis","author":"N Marastoni","year":"2018","unstructured":"Marastoni N, Giacobazzi R, Preda M D. A deep learning approach to program similarity. In: Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis, 2018. 26\u201335"},{"key":"4127_CR304","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/3273045.3273047","volume-title":"Proceedings of the Workshop on Forming an Ecosystem Around Software Transformation","author":"H Xue","year":"2018","unstructured":"Xue H, Venkataramani G, Lan T. Clone-Slicer: detecting domain specific binary code clones through program slicing. In: Proceedings of the Workshop on Forming an Ecosystem Around Software Transformation, 2018. 27\u201333"},{"key":"4127_CR305","first-page":"363","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"X Xu","year":"2017","unstructured":"Xu X, Liu C, Feng Q, et al. Neural network-based graph embedding for cross-platform binary code similarity detection. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2017. 363\u2013376"},{"key":"4127_CR306","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/3211346.3211347","volume-title":"Proceedings of the 2nd ACM SIGPLAN International Workshop on Machine Learning and Programming Languages","author":"H Xue","year":"2018","unstructured":"Xue H, Venkataramani G, Lan T. Clone-hunter: accelerated bound checks elimination via binary code clone detection. In: Proceedings of the 2nd ACM SIGPLAN International Workshop on Machine Learning and Programming Languages, 2018. 11\u201319"},{"key":"4127_CR307","first-page":"480","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"Q Feng","year":"2016","unstructured":"Feng Q, Zhou R, Xu C, et al. Scalable graph-based bug search for firmware images. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2016. 480\u2013491"},{"key":"4127_CR308","first-page":"155","volume-title":"Proceedings of the IEEE 18th International Working Conference on Source Code Analysis and Manipulation (SCAM)","author":"G Mostaeen","year":"2018","unstructured":"Mostaeen G, Svajlenko J, Roy B, et al. On the use of machine learning techniques towards the design of cloud based automatic code clone validation tools. In: Proceedings of the IEEE 18th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2018. 155\u2013164"},{"key":"4127_CR309","first-page":"49","volume-title":"Proceedings of the IEEE\/ACM 41st International Conference on Software Engineering (ICSE)","author":"V Saini","year":"2019","unstructured":"Saini V, Farmahinifarahani F, Lu Y, et al. Towards automating precision studies of clone detectors. In: Proceedings of the IEEE\/ACM 41st International Conference on Software Engineering (ICSE), 2019. 49\u201359"},{"key":"4127_CR310","first-page":"617","volume-title":"Proceedings of the 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"C Liu","year":"2021","unstructured":"Liu C, Lin Z, Lou J G, et al. Can neural clone detection generalize to unseen functionalities? In: Proceedings of the 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2021. 617\u2013629"},{"key":"4127_CR311","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3502852","volume":"31","author":"H Yu","year":"2022","unstructured":"Yu H, Hu X, Li G, et al. Assessing and improving an evaluation dataset for detecting semantic code clones via deep learning. ACM Trans Softw Eng Methodol, 2022, 31: 1\u201325","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"4127_CR312","first-page":"1","volume-title":"Proceedings of the IEEE 16th International Workshop on Software Clones (IWSC)","author":"J Krinke","year":"2022","unstructured":"Krinke J, Ragkhitwetsagul C. Bigclonebench considered harmful for machine learning. In: Proceedings of the IEEE 16th International Workshop on Software Clones (IWSC), 2022. 1\u20137"},{"key":"4127_CR313","first-page":"57","volume-title":"Proceedings of the IEEE 14th International Workshop on Software Clones (IWSC)","author":"F Al-Omari","year":"2020","unstructured":"Al-Omari F, Roy C K, Chen T. SemanticCloneBench: a semantic code clone benchmark using crowd-source knowledge. In: Proceedings of the IEEE 14th International Workshop on Software Clones (IWSC), 2020. 57\u201363"},{"key":"4127_CR314","first-page":"529","volume-title":"Proceedings of the IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR)","author":"M Kamp","year":"2019","unstructured":"Kamp M, Kreutzer P, Philippsen M. SeSaMe: a data set of semantically similar Java methods. In: Proceedings of the IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR), 2019. 529\u2013533"},{"key":"4127_CR315","first-page":"17","volume-title":"Proceedings of the IEEE International Conference on Software Quality, Reliability and Security","author":"X Yang","year":"2015","unstructured":"Yang X, Lo D, Xia X, et al. Deep learning for just-in-time defect prediction. In: Proceedings of the IEEE International Conference on Software Quality, Reliability and Security, 2015. 17\u201326"},{"key":"4127_CR316","first-page":"45","volume-title":"Proceedings of the IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI)","author":"A V Phan","year":"2017","unstructured":"Phan A V, Nguyen M L, Bui L T. Convolutional neural networks over control flow graphs for software defect prediction. In: Proceedings of the IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI), 2017. 45\u201352"},{"key":"4127_CR317","first-page":"318","volume-title":"Proceedings of the IEEE International Conference on Software Quality, Reliability and Security (QRS)","author":"J Li","year":"2017","unstructured":"Li J, He P, Zhu J, et al. Software defect prediction via convolutional neural network. In: Proceedings of the IEEE International Conference on Software Quality, Reliability and Security (QRS), 2017. 318\u2013328"},{"key":"4127_CR318","first-page":"1049","volume-title":"Proceedings of the IEEE International Conference on Data Mining (ICDM)","author":"X Huo","year":"2018","unstructured":"Huo X, Yang Y, Li M, et al. Learning semantic features for software defect prediction by code comments embedding. In: Proceedings of the IEEE International Conference on Data Mining (ICDM), 2018. 1049\u20131054"},{"key":"4127_CR319","first-page":"232","volume-title":"Proceedings of the IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)","author":"Y Liu","year":"2018","unstructured":"Liu Y, Li Y, Guo J, et al. Connecting software metrics across versions to predict defects. In: Proceedings of the IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2018. 232\u2013243"},{"key":"4127_CR320","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.infsof.2017.11.008","volume":"96","author":"H Tong","year":"2018","unstructured":"Tong H, Liu B, Wang S. Software defect prediction using stacked denoising autoencoders and two-stage ensemble learning. Inf Software Tech, 2018, 96: 94\u2013111","journal-title":"Inf Software Tech"},{"key":"4127_CR321","volume-title":"Proceedings of International Conference on Software Engineering and Knowledge Engineering","author":"S Qiu","year":"2019","unstructured":"Qiu S, Lu L, Cai Z, et al. Cross-project defect prediction via transferable deep learning-generated and handcrafted features. In: Proceedings of International Conference on Software Engineering and Knowledge Engineering, 2019"},{"key":"4127_CR322","first-page":"34","volume-title":"Proceedings of the IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR)","author":"T Hoang","year":"2019","unstructured":"Hoang T, Dam H K, Kamei Y, et al. DeepJIT: an end-to-end deep learning framework for just-in-time defect prediction. In: Proceedings of the IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR), 2019. 34\u201345"},{"key":"4127_CR323","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.infsof.2019.07.003","volume":"114","author":"T Zhou","year":"2019","unstructured":"Zhou T, Sun X, Xia X, et al. Improving defect prediction with deep forest. Inf Software Tech, 2019, 114: 204\u2013216","journal-title":"Inf Software Tech"},{"key":"4127_CR324","doi-asserted-by":"publisher","first-page":"110402","DOI":"10.1016\/j.jss.2019.110402","volume":"158","author":"Z Xu","year":"2019","unstructured":"Xu Z, Li S, Xu J, et al. LDFR: learning deep feature representation for software defect prediction. J Syst Software, 2019, 158: 110402","journal-title":"J Syst Software"},{"key":"4127_CR325","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.eswa.2018.12.033","volume":"122","author":"H Turabieh","year":"2019","unstructured":"Turabieh H, Mafarja M, Li X. Iterated feature selection algorithms with layered recurrent neural network for software fault prediction. Expert Syst Appl, 2019, 122: 27\u201342","journal-title":"Expert Syst Appl"},{"key":"4127_CR326","first-page":"46","volume-title":"Proceedings of the 16th International Conference on Mining Software Repositories","author":"H K Dam","year":"2019","unstructured":"Dam H K, Pham T, Ng S W, et al. Lessons learned from using a deep tree-based model for software defect prediction in practice. In: Proceedings of the 16th International Conference on Mining Software Repositories, 2019. 46\u201357"},{"key":"4127_CR327","first-page":"1","volume-title":"Proceedings of the International Joint Conference on Neural Networks (IJCNN)","author":"H Li","year":"2019","unstructured":"Li H, Li X, Chen X, et al. Cross-project defect prediction via AST Token2Vec and BLSTM-based neural network. In: Proceedings of the International Joint Conference on Neural Networks (IJCNN), 2019. 1\u20138"},{"key":"4127_CR328","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1145\/3377811.3380389","volume-title":"Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering","author":"J Chen","year":"2020","unstructured":"Chen J, Hu K, Yu Y, et al. Software visualization and deep transfer learning for effective software defect prediction. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, 2020. 578\u2013589"},{"key":"4127_CR329","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1049\/iet-sen.2019.0278","volume":"14","author":"K Zhu","year":"2020","unstructured":"Zhu K, Zhang N, Ying S, et al. Within-project and cross-project just-in-time defect prediction based on denoising autoencoder and convolutional neural network. IET Softw, 2020, 14: 185\u2013195","journal-title":"IET Softw"},{"key":"4127_CR330","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1109\/TSE.2018.2877612","volume":"46","author":"S Wang","year":"2020","unstructured":"Wang S, Liu T, Nam J, et al. Deep semantic feature learning for software defect prediction. IEEE Trans Software Eng, 2020, 46: 1267\u20131293","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR331","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1049\/iet-sen.2019.0149","volume":"14","author":"J Deng","year":"2020","unstructured":"Deng J, Lu L, Qiu S. Software defect prediction via LSTM. IET softw, 2020, 14: 443\u2013450","journal-title":"IET softw"},{"key":"4127_CR332","doi-asserted-by":"publisher","first-page":"100979","DOI":"10.1016\/j.cola.2020.100979","volume":"59","author":"K Shi","year":"2020","unstructured":"Shi K, Lu Y, Chang J, et al. PathPair2Vec: an AST path pair-based code representation method for defect prediction. J Comput Languages, 2020, 59: 100979","journal-title":"J Comput Languages"},{"key":"4127_CR333","doi-asserted-by":"publisher","first-page":"113156","DOI":"10.1016\/j.eswa.2019.113156","volume":"147","author":"A Majd","year":"2020","unstructured":"Majd A, Vahidi-Asl M, Khalilian A, et al. SLDeep: statement-level software defect prediction using deep-learning model on static code features. Expert Syst Appl, 2020, 147: 113156","journal-title":"Expert Syst Appl"},{"key":"4127_CR334","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1109\/TSE.2018.2876256","volume":"46","author":"M Wen","year":"2018","unstructured":"Wen M, Wu R, Cheung S C. How well do change sequences predict defects? Sequence learning from software changes. IEEE Trans Software Eng, 2018, 46: 1155\u20131175","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR335","doi-asserted-by":"publisher","first-page":"e2330","DOI":"10.1002\/smr.2330","volume":"33","author":"K Shi","year":"2021","unstructured":"Shi K, Lu Y, Liu G, et al. MPT-embedding: an unsupervised representation learning of code for software defect prediction. J Software Evolu Process, 2021, 33: e2330","journal-title":"J Software Evolu Process"},{"key":"4127_CR336","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TR.2021.3066170","volume":"71","author":"Z Xu","year":"2022","unstructured":"Xu Z, Zhao K, Zhang T, et al. Effort-aware just-in-time bug prediction for mobile apps via cross-triplet deep feature embedding. IEEE Trans Rel, 2022, 71: 204\u2013220","journal-title":"IEEE Trans Rel"},{"key":"4127_CR337","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1109\/TR.2020.3040191","volume":"70","author":"J Xu","year":"2020","unstructured":"Xu J, Wang F, Ai J. Defect prediction with semantics and context features of codes based on graph representation learning. IEEE Trans Rel, 2020, 70: 613\u2013625","journal-title":"IEEE Trans Rel"},{"key":"4127_CR338","first-page":"69","volume-title":"Proceedings of the IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)","author":"C Zeng","year":"2021","unstructured":"Zeng C, Zhou C Y, Lv S K, et al. GCN2defect: graph convolutional networks for SMOTETomek-based software defect prediction. In: Proceedings of the IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE), 2021. 69\u201379"},{"key":"4127_CR339","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1109\/TR.2022.3161581","volume":"71","author":"J Xu","year":"2022","unstructured":"Xu J, Ai J, Liu J, et al. ACGDP: an augmented code graph-based system for software defect prediction. IEEE Trans Rel, 2022, 71: 850\u2013864","journal-title":"IEEE Trans Rel"},{"key":"4127_CR340","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/TR.2020.3047396","volume":"70","author":"H Wang","year":"2021","unstructured":"Wang H, Zhuang W, Zhang X. Software defect prediction based on gated hierarchical LSTMs. IEEE Trans Rel, 2021, 70: 711\u2013727","journal-title":"IEEE Trans Rel"},{"key":"4127_CR341","doi-asserted-by":"publisher","first-page":"106588","DOI":"10.1016\/j.infsof.2021.106588","volume":"137","author":"Q Zou","year":"2021","unstructured":"Zou Q, Lu L, Yang Z, et al. Joint feature representation learning and progressive distribution matching for cross-project defect prediction. Inf Software Tech, 2021, 137: 106588","journal-title":"Inf Software Tech"},{"key":"4127_CR342","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1049\/sfw2.12029","volume":"16","author":"N Zhang","year":"2022","unstructured":"Zhang N, Ying S, Zhu K, et al. Software defect prediction based on stacked sparse denoising autoencoders and enhanced extreme learning machine. IET Software, 2022, 16: 29\u201347","journal-title":"IET Software"},{"key":"4127_CR343","doi-asserted-by":"publisher","first-page":"7877","DOI":"10.1007\/s00500-022-06830-5","volume":"26","author":"M N Uddin","year":"2022","unstructured":"Uddin M N, Li B, Ali Z, et al. Software defect prediction employing BiLSTM and BERT-based semantic feature. Soft Comput, 2022, 26: 7877\u20137891","journal-title":"Soft Comput"},{"key":"4127_CR344","doi-asserted-by":"publisher","first-page":"3981","DOI":"10.1007\/s00521-021-06659-3","volume":"34","author":"P Ardimento","year":"2022","unstructured":"Ardimento P, Aversano L, Bernardi M L, et al. Just-in-time software defect prediction using deep temporal convolutional networks. Neural Comput Applic, 2022, 34: 3981\u20134001","journal-title":"Neural Comput Applic"},{"key":"4127_CR345","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TSE.2022.3144348","volume":"49","author":"C Pornprasit","year":"2023","unstructured":"Pornprasit C, Tantithamthavorn C K. DeepLineDP: towards a deep learning approach for line-level defect prediction. IEEE Trans Software Eng, 2023, 49: 84\u201398","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR346","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1109\/TSUSC.2023.3248965","volume":"9","author":"S Qiu","year":"2024","unstructured":"Qiu S, Huang H, Jiang W, et al. Defect prediction via tree-based encoding with hybrid granularity for software sustainability. IEEE Trans Sustain Comput, 2024, 9: 249\u2013260","journal-title":"IEEE Trans Sustain Comput"},{"key":"4127_CR347","volume-title":"Lint, a C program checker","author":"S C Johnson","year":"1977","unstructured":"Johnson S C. Lint, a C program checker. 1977. oai:CiteSeerX.psu:10.1.1.56.1841"},{"key":"4127_CR348","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/1052883.1052895","volume":"39","author":"D Hovemeyer","year":"2004","unstructured":"Hovemeyer D, Pugh W. Finding bugs is easy. ACM SIGPLAN Not, 2004, 39: 92\u2013106","journal-title":"ACM SIGPLAN Not"},{"key":"4127_CR349","volume-title":"Infer: a tool to detect bugs in Java and C\/C++\/objective-C code before it ships","author":"Facebook","year":"2015","unstructured":"Facebook. Infer: a tool to detect bugs in Java and C\/C++\/objective-C code before it ships, 2015. https:\/\/fbinfer.com\/"},{"key":"4127_CR350","volume-title":"Proceedings of Future of Software Engineering Proceedings","author":"A Orso","year":"2014","unstructured":"Orso A, Rothermel G. Software testing: a research travelogue (2000\u20132014). In: Proceedings of Future of Software Engineering Proceedings, 2014"},{"key":"4127_CR351","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation","author":"C Cadar","year":"2008","unstructured":"Cadar C, Dunbar D, Engler D R, et al. KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, 2008"},{"key":"4127_CR352","volume-title":"Proceedings of the 26th ACM Symposium on Operating Systems Principles (SOSP)","author":"L Nelson","year":"2017","unstructured":"Nelson L, Sigurbjarnarson H, Zhang K, et al. Hyperkernel: push-button verification of an OS kernel. In: Proceedings of the 26th ACM Symposium on Operating Systems Principles (SOSP), 2017"},{"key":"4127_CR353","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1538788.1538814","volume":"52","author":"X Leroy","year":"2009","unstructured":"Leroy X. Formal verification of a realistic compiler. Commun ACM, 2009, 52: 107\u2013115","journal-title":"Commun ACM"},{"key":"4127_CR354","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1743546.1743574","volume":"53","author":"G Klein","year":"2010","unstructured":"Klein G, Andronick J, Elphinstone K, et al. seL4: formal verification of an OS kernel. Commun ACM, 2010, 53: 107\u2013115","journal-title":"Commun ACM"},{"key":"4127_CR355","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1109\/TCAD.2008.923410","volume":"27","author":"V D\u2019Silva","year":"2008","unstructured":"D\u2019Silva V, Kroening D, Weissenbacher G. A survey of automated techniques for formal software verification. IEEE Trans Comput-Aided Des Integr Circ Syst, 2008, 27: 1165\u20131178","journal-title":"IEEE Trans Comput-Aided Des Integr Circ Syst"},{"key":"4127_CR356","volume-title":"The Art of Computer Programming, Volume 1: Fundamental Algorithms","author":"D E Knuth","year":"1997","unstructured":"Knuth D E. The Art of Computer Programming, Volume 1: Fundamental Algorithms. 3rd ed. Redding: Addison-Wesley Professional, 1997","edition":"3rd ed"},{"key":"4127_CR357","volume-title":"Large language models for software engineering: a systematic literature review","author":"X Hou","year":"2023","unstructured":"Hou X, Zhao Y, Liu Y, et al. Large language models for software engineering: a systematic literature review. 2023. ArXiv:2308.10620"},{"key":"4127_CR358","volume-title":"Large language models for software engineering: survey and open problems","author":"A Fan","year":"2023","unstructured":"Fan A, Gokkaya B, Harman M, et al. Large language models for software engineering: survey and open problems. 2023. ArXiv:2310.03533"},{"key":"4127_CR359","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1038\/nature16961","volume":"529","author":"D Silver","year":"2016","unstructured":"Silver D, Huang A, Maddison C J, et al. Mastering the game of Go with deep neural networks and tree search. Nature, 2016, 529: 484\u2013489","journal-title":"Nature"},{"key":"4127_CR360","volume-title":"Reasoning with language model prompting: a survey","author":"S Qiao","year":"2022","unstructured":"Qiao S, Ou Y, Zhang N, et al. Reasoning with language model prompting: a survey. 2022. ArXiv:2212.09597"},{"key":"4127_CR361","volume-title":"Towards reasoning in large language models: a survey","author":"J Huang","year":"2022","unstructured":"Huang J, Chang K C C. Towards reasoning in large language models: a survey. 2022. ArXiv:2212.10403"},{"key":"4127_CR362","volume-title":"Structure and Interpretation of Computer Programs","author":"H Abelson","year":"1996","unstructured":"Abelson H, Sussman G J. Structure and Interpretation of Computer Programs. 2nd ed. Cambridge: The MIT Press, 1996","edition":"2nd ed"},{"key":"4127_CR363","volume-title":"Proceedings of the 34th International Conference on Software Engineering (ICSE)","author":"A Hindle","year":"2016","unstructured":"Hindle A, Barr E T, Gabel M, et al. On the naturalness of software. In: Proceedings of the 34th International Conference on Software Engineering (ICSE), 2016"},{"key":"4127_CR364","volume-title":"PEP 8\u2013style guide for python code","author":"G van Rossum","year":"2001","unstructured":"van Rossum G, Warsaw B, Coghlan N. PEP 8\u2013style guide for python code. 2001. https:\/\/peps.python.org\/pep-0008\/"},{"key":"4127_CR365","volume-title":"Java coding style guide","author":"A Reddy","year":"2000","unstructured":"Reddy A. Java coding style guide, 2000"},{"key":"4127_CR366","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/502059.502041","volume":"35","author":"D Engler","year":"2001","unstructured":"Engler D, Chen D Y, Hallem S, et al. Bugs as deviant behavior: a general approach to inferring errors in systems code. SIGOPS Oper Syst Rev, 2001, 35: 57\u201372","journal-title":"SIGOPS Oper Syst Rev"},{"key":"4127_CR367","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TSE.2006.28","volume":"32","author":"Z Li","year":"2006","unstructured":"Li Z, Lu S, Myagmar S, et al. CP-Miner: finding copy-paste and related bugs in large-scale software code. IEEE Trans Software Eng, 2006, 32: 176\u2013192","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR368","first-page":"27865","volume-title":"Proceedings of Advances in Neural Information Processing Systems","author":"M Allamanis","year":"2021","unstructured":"Allamanis M, Jackson-Flux H, Brockschmidt M. Self-supervised bug detection and repair. In: Proceedings of Advances in Neural Information Processing Systems, 2021. 27865\u201327876"},{"key":"4127_CR369","volume-title":"A survey on machine learning techniques for source code analysis","author":"T Sharma","year":"2021","unstructured":"Sharma T, Kechagia M, Georgiou S, et al. A survey on machine learning techniques for source code analysis. 2021. ArXiv:2110.09610v2"},{"key":"4127_CR370","volume-title":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"Y Jiang","year":"2022","unstructured":"Jiang Y, Liu H, Zhang Y, et al. Do bugs lead to unnaturalness of source code? In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022"},{"key":"4127_CR371","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1090\/S0002-9947-1953-0053041-6","volume":"74","author":"H G Rice","year":"1953","unstructured":"Rice H G. Classes of recursively enumerable sets and their decision problems. Trans Amer Math Soc, 1953, 74: 358\u2013366","journal-title":"Trans Amer Math Soc"},{"key":"4127_CR372","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/2644805","volume":"58","author":"B Livshits","year":"2015","unstructured":"Livshits B, Sridharan M, Smaragdakis Y, et al. In defense of soundiness: a manifesto. Commun ACM, 2015, 58: 44\u201346","journal-title":"Commun ACM"},{"key":"4127_CR373","volume-title":"Proceedings of IEEE\/ACM 41st International Conference on Software Engineering (ICSE)","author":"K Heo","year":"2019","unstructured":"Heo K, Oh H, Yang H. Resource-aware program analysis via online abstraction coarsening. In: Proceedings of IEEE\/ACM 41st International Conference on Software Engineering (ICSE), 2019"},{"key":"4127_CR374","volume-title":"Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","author":"Y Ko","year":"2023","unstructured":"Ko Y, Oh H. Learning to boost disjunctive static bug-finders. In: Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE), 2023"},{"key":"4127_CR375","volume-title":"The hitchhiker\u2019s guide to program analysis: a journey with large language models","author":"H Li","year":"2023","unstructured":"Li H, Hao Y, Zhai Y, et al. The hitchhiker\u2019s guide to program analysis: a journey with large language models. 2023. ArXiv:2308.00245"},{"key":"4127_CR376","volume-title":"Proceedings of the ACM on Programming Languages","author":"K Chae","year":"2017","unstructured":"Chae K, Oh H, Heo K, et al. Automatically generating features for learning program analysis heuristics for C-like languages. In: Proceedings of the ACM on Programming Languages, 2017"},{"key":"4127_CR377","volume-title":"Proceedings of IEEE\/ACM 39th International Conference on Software Engineering (ICSE)","author":"K Heo","year":"2017","unstructured":"Heo K, Oh H, Yi K. Machine-learning-guided selectively unsound static analysis. In: Proceedings of IEEE\/ACM 39th International Conference on Software Engineering (ICSE), 2017"},{"key":"4127_CR378","volume-title":"Proceedings of the ACM on Programming Languages","author":"M Jeon","year":"2020","unstructured":"Jeon M, Lee M, Oh H. Learning graph-based heuristics for pointer analysis without handcrafting application-specific features. In: Proceedings of the ACM on Programming Languages, 2020"},{"key":"4127_CR379","volume-title":"Proceedings of the ACM on Programming Languages","author":"S Jeong","year":"2017","unstructured":"Jeong S, Jeon M, Cha S, et al. Data-driven context-sensitivity for points-to analysis. In: Proceedings of the ACM on Programming Languages, 2017"},{"key":"4127_CR380","volume-title":"Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation","author":"J He","year":"2020","unstructured":"He J, Singh G, P\u00fcschel M, et al. Learning fast and precise numerical analysis. In: Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation, 2020"},{"key":"4127_CR381","volume-title":"Learning to execute","author":"W Zaremba","year":"2014","unstructured":"Zaremba W, Sutskever I. Learning to execute. 2014. ArXiv:1410.4615"},{"key":"4127_CR382","volume-title":"Proceedings of IEEE\/ACM 41st International Conference on Software Engineering (ICSE)","author":"R S Malik","year":"2019","unstructured":"Malik R S, Patra J, Pradel M. NL2Type: inferring JavaScript function types from natural language information. In: Proceedings of IEEE\/ACM 41st International Conference on Software Engineering (ICSE), 2019"},{"key":"4127_CR383","volume-title":"Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"K Jesse","year":"2021","unstructured":"Jesse K, Devanbu P T, Ahmed T. Learning type annotation: is big data enough? In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021"},{"key":"4127_CR384","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.neunet.2023.06.028","volume":"166","author":"D Yu","year":"2023","unstructured":"Yu D, Yang B, Liu D, et al. A survey on neural-symbolic learning systems. Neural Netws, 2023, 166: 105\u2013126","journal-title":"Neural Netws"},{"key":"4127_CR385","doi-asserted-by":"publisher","unstructured":"Wang W, Yang Y, Wu F. Towards data-and knowledge-driven AI: a survey on neuro-symbolic computing. IEEE Trans Pattern Anal Mach Intell, 2024. doi: https:\/\/doi.org\/10.1109\/TPAMI.2024.3483273","DOI":"10.1109\/TPAMI.2024.3483273"},{"key":"4127_CR386","first-page":"803","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP)","author":"D She","year":"2019","unstructured":"She D, Pei K, Epstein D, et al. NEUZZ: efficient fuzzing with neural program smoothing. In: Proceedings of the IEEE Symposium on Security and Privacy (SP), 2019. 803\u2013817"},{"key":"4127_CR387","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1145\/3368089.3409723","volume-title":"Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"D She","year":"2020","unstructured":"She D, Krishna R, Yan L, et al. MTFuzz: fuzzing with a multi-task neural network. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020. 737\u2013749"},{"key":"4127_CR388","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1145\/3510003.3510089","volume-title":"Proceedings of the 44th International Conference on Software Engineering","author":"M Wu","year":"2022","unstructured":"Wu M, Jiang L, Xiang J, et al. Evaluating and improving neural program-smoothing-based fuzzing. In: Proceedings of the 44th International Conference on Software Engineering, 2022. 847\u2013858"},{"key":"4127_CR389","volume-title":"Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"M I Nicolae","year":"2023","unstructured":"Nicolae M I, Eisele M, Zeller A. Revisiting neural program smoothing for fuzzing. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023"},{"key":"4127_CR390","volume-title":"The Future of Software Engineering. Berlin: Springer","author":"A Zeller","year":"2011","unstructured":"Zeller A. Mining specifications: a roadmap. In: The Future of Software Engineering. Berlin: Springer, 2011"},{"key":"4127_CR391","volume-title":"Proceedings of USENIX Annual Technical Conference","author":"K Serebryany","year":"2012","unstructured":"Serebryany K, Bruening D, Potapenko A, et al. AddressSanitizer: a fast address sanity checker. In: Proceedings of USENIX Annual Technical Conference, 2012"},{"key":"4127_CR392","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/1791194.1791203","volume-title":"Proceedings of the Workshop on Binary Instrumentation and Applications","author":"K Serebryany","year":"2009","unstructured":"Serebryany K, Iskhodzhanov T. ThreadSanitizer: data race detection in practice. In: Proceedings of the Workshop on Binary Instrumentation and Applications, 2009. 62\u201371"},{"key":"4127_CR393","volume-title":"Software Abstractions: Logic, Language, and Analysis","author":"D Jackson","year":"2012","unstructured":"Jackson D. Software Abstractions: Logic, Language, and Analysis. Cambridge: The MIT Press, 2012"},{"key":"4127_CR394","volume-title":"Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","author":"C Lemieux","year":"2023","unstructured":"Lemieux C, Inala J P, Lahiri S K, et al. CODAMOSA: escaping coverage plateaus in test generation with pre-trained large language models. In: Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE), 2023"},{"key":"4127_CR395","volume-title":"Efficient mutation testing via pre-trained language models","author":"A Khanfir","year":"2023","unstructured":"Khanfir A, Degiovanni R, Papadakis M, et al. Efficient mutation testing via pre-trained language models. 2023. ArXiv:2301.03543v1"},{"key":"4127_CR396","volume-title":"Experience report: deep learning-based system log analysis for anomaly detection","author":"Z Chen","year":"2021","unstructured":"Chen Z, Liu J, Gu W, et al. Experience report: deep learning-based system log analysis for anomaly detection. 2021. ArXiv:2107.05908"},{"key":"4127_CR397","volume-title":"Software testing with large language model: survey, landscape, and vision","author":"J Wang","year":"2023","unstructured":"Wang J, Huang Y, Chen C, et al. Software testing with large language model: survey, landscape, and vision. 2023. ArXiv:2307.07221"},{"key":"4127_CR398","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1109\/TR.2019.2892517","volume":"68","author":"V H S Durelli","year":"2019","unstructured":"Durelli V H S, Durelli R S, Borges S S, et al. Machine learning applied to software testing: a systematic mapping study. IEEE Trans Rel, 2019, 68: 1189\u20131212","journal-title":"IEEE Trans Rel"},{"key":"4127_CR399","volume-title":"Unit test case generation with transformers and focal context","author":"M Tufano","year":"2020","unstructured":"Tufano M, Drain D, Svyatkovskiy A, et al. Unit test case generation with transformers and focal context. 2020. ArXiv:2009.05617v2"},{"key":"4127_CR400","volume-title":"Proceedings of IEEE\/ACM 42nd International Conference on Software Engineering (ICSE)","author":"C Watson","year":"2020","unstructured":"Watson C, Tufano M, Moran K, et al. On learning meaningful assert statements for unit test cases. In: Proceedings of IEEE\/ACM 42nd International Conference on Software Engineering (ICSE), 2020"},{"key":"4127_CR401","doi-asserted-by":"publisher","DOI":"10.1145\/3524481.3527220","volume-title":"Generating accurate assert statements for unit test cases using pretrained transformers","author":"M Tufano","year":"2022","unstructured":"Tufano M, Drain D, Svyatkovskiy A, et al. Generating accurate assert statements for unit test cases using pretrained transformers. 2022. ArXiv:2009.05634"},{"key":"4127_CR402","volume-title":"Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering","author":"A Blasi","year":"2022","unstructured":"Blasi A, Gorla A, Ernst M D, et al. Call Me Maybe: using NLP to automatically generate unit test cases respecting temporal constraints. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, 2022"},{"key":"4127_CR403","volume-title":"TOGA: a neural method for test Oracle generation","author":"E Dinella","year":"2022","unstructured":"Dinella E, Ryan G, Mytkowicz T, et al. TOGA: a neural method for test Oracle generation. 2022. ArXiv:2109.09262"},{"key":"4127_CR404","volume-title":"ChatUniTest: a ChatGPT-based automated unit test generation tool","author":"Z Xie","year":"2023","unstructured":"Xie Z, Chen Y, Zhi C, et al. ChatUniTest: a ChatGPT-based automated unit test generation tool. 2023. ArXiv:2305.04764"},{"key":"4127_CR405","volume-title":"A3Test: assertion-augmented automated test case generation","author":"S Alagarsamy","year":"2023","unstructured":"Alagarsamy S, Tantithamthavorn C, Aleti A. A3Test: assertion-augmented automated test case generation. 2023. ArXiv:2302.10352"},{"key":"4127_CR406","volume-title":"Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering","author":"P Feldmeier","year":"2022","unstructured":"Feldmeier P, Fraser G. Neuroevolution-based generation of tests and oracles for games. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, 2022"},{"key":"4127_CR407","volume-title":"Adaptive test generation using a large language model","author":"M Sch\u00e4fer","year":"2023","unstructured":"Sch\u00e4fer M, Nadi S, Eghbali A, et al. Adaptive test generation using a large language model. 2023. ArXiv:2302.06527"},{"key":"4127_CR408","volume-title":"Exploring the effectiveness of large language models in generating unit tests","author":"M L Siddiq","year":"2023","unstructured":"Siddiq M L, Santos J, Tanvir R H, et al. Exploring the effectiveness of large language models in generating unit tests. 2023. ArXiv:2305.00418v1"},{"key":"4127_CR409","volume-title":"Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"S B Hossain","year":"2023","unstructured":"Hossain S B, Filieri A, Dwyer M B, et al. Neural-based test oracle generation: a large-scale evaluation and lessons learned. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023"},{"key":"4127_CR410","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598080","volume-title":"Towards more realistic evaluation for neural test oracle generation","author":"Z Liu","year":"2023","unstructured":"Liu Z, Liu K, Xia X, et al. Towards more realistic evaluation for neural test oracle generation. 2023. ArXiv:2305.17047"},{"key":"4127_CR411","volume-title":"No more manual tests? Evaluating and improving ChatGPT for unit test generation","author":"Z Yuan","year":"2023","unstructured":"Yuan Z, Lou Y, Liu M, et al. No more manual tests? Evaluating and improving ChatGPT for unit test generation. 2023. ArXiv:2305.04207"},{"key":"4127_CR412","volume-title":"Proceedings of the 8th International Symposium on Software Reliability Engineering","author":"W E Wong","year":"1997","unstructured":"Wong W E, Horgan J R, London S, et al. A study of effective regression testing in practice. In: Proceedings of the 8th International Symposium on Software Reliability Engineering, 1997"},{"key":"4127_CR413","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1002\/stv.430","volume":"22","author":"S Yoo","year":"2012","unstructured":"Yoo S, Harman M. Regression testing minimization, selection and prioritization: a survey. Softw Test Verif Reliab, 2012, 22: 67\u2013120","journal-title":"Softw Test Verif Reliab"},{"key":"4127_CR414","doi-asserted-by":"publisher","first-page":"2312","DOI":"10.1109\/TSE.2019.2946563","volume":"47","author":"V J M Manes","year":"2021","unstructured":"Manes V J M, Han H S, Han C, et al. The art, science, and engineering of fuzzing: a survey. IEEE Trans Software Eng, 2021, 47: 2312\u20132331","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR415","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3512345","volume":"54","author":"X Zhu","year":"2022","unstructured":"Zhu X, Wen S, Camtepe S, et al. Fuzzing: a survey for roadmap. ACM Comput Surv, 2022, 54: 1\u201336","journal-title":"ACM Comput Surv"},{"key":"4127_CR416","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/s42400-018-0002-y","volume":"1","author":"J Li","year":"2018","unstructured":"Li J, Zhao B, Zhang C. Fuzzing: a survey. Cybersecurity, 2018, 1: 6","journal-title":"Cybersecurity"},{"key":"4127_CR417","volume-title":"Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","author":"M Lee","year":"2023","unstructured":"Lee M, Cha S, Oh H. Learning seed-adaptive mutation strategies for greybox fuzzing. In: Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE), 2023"},{"key":"4127_CR418","volume-title":"Proceedings of Network and Distributed Systems Security (NDSS) Symposium","author":"J Wang","year":"2021","unstructured":"Wang J, Song C, Yin H. Reinforcement learning-based hierarchical seed scheduling for greybox fuzzing. In: Proceedings of Network and Distributed Systems Security (NDSS) Symposium, 2021"},{"key":"4127_CR419","doi-asserted-by":"publisher","first-page":"36340","DOI":"10.1109\/ACCESS.2019.2903291","volume":"7","author":"Y Wang","year":"2019","unstructured":"Wang Y, Wu Z, Wei Q, et al. NeuFuzz: efficient fuzzing with deep neural network. IEEE Access, 2019, 7: 36340\u201336352","journal-title":"IEEE Access"},{"key":"4127_CR420","volume-title":"Large language models are zero-shot fuzzers: fuzzing deep-learning libraries via large language models","author":"Y Deng","year":"2023","unstructured":"Deng Y, Xia C S, Peng H, et al. Large language models are zero-shot fuzzers: fuzzing deep-learning libraries via large language models. 2023. ArXiv:2212.14834"},{"key":"4127_CR421","volume-title":"Large language models are edge-case fuzzers: testing deep learning libraries via FuzzGPT","author":"Y Deng","year":"2023","unstructured":"Deng Y, Xia C S, Yang C, et al. Large language models are edge-case fuzzers: testing deep learning libraries via FuzzGPT. 2023. ArXiv:2304.02014"},{"key":"4127_CR422","volume-title":"White-box compiler fuzzing empowered by large language models","author":"C Yang","year":"2023","unstructured":"Yang C, Deng Y, Lu R, et al. White-box compiler fuzzing empowered by large language models. 2023. ArXiv:2310.15991"},{"key":"4127_CR423","volume-title":"Universal fuzzing via large language models","author":"C S Xia","year":"2023","unstructured":"Xia C S, Paltenghi M, Tian J L, et al. Universal fuzzing via large language models. 2023. ArXiv:2308.04748v1"},{"key":"4127_CR424","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1145\/3453483.3454054","volume-title":"Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation","author":"G Ye","year":"2021","unstructured":"Ye G, Tang Z, Tan S H, et al. Automated conformance testing for JavaScript engines via deep compiler fuzzing. In: Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2021. 435\u2013450"},{"key":"4127_CR425","volume-title":"Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis","author":"C Cummins","year":"2018","unstructured":"Cummins C, Petoumenos P, Murray A, et al. Compiler fuzzing through deep learning. In: Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018"},{"key":"4127_CR426","volume-title":"Proceedings of the 4th Information Communication Technologies Conference (ICTC)","author":"M Lin","year":"2023","unstructured":"Lin M, Zeng Y, Li Y. RegFuzz: a linear regression-based approach for seed scheduling in directed fuzzing. In: Proceedings of the 4th Information Communication Technologies Conference (ICTC), 2023"},{"key":"4127_CR427","volume-title":"Proceedings of Network and Distributed System Security (NDSS) Symposium","author":"R Meng","year":"2024","unstructured":"Meng R, Mirchev M, B\u00f6hme M, et al. Large language model guided protocol fuzzing. In: Proceedings of Network and Distributed System Security (NDSS) Symposium, 2024"},{"key":"4127_CR428","volume-title":"Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering","author":"J Su","year":"2022","unstructured":"Su J, Dai H N, Zhao L, et al. Effectively generating vulnerable transaction sequences in smart contracts with reinforcement learning-guided fuzzing. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, 2022"},{"key":"4127_CR429","volume-title":"Proceedings of IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)","author":"W Luo","year":"2021","unstructured":"Luo W, Chai D, Ruan X, et al. Graph-based fuzz testing for deep learning inference engines. In: Proceedings of IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), 2021"},{"key":"4127_CR430","volume-title":"Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"Y Chen","year":"2019","unstructured":"Chen Y, Poskitt C M, Sun J, et al. Learning-guided network fuzzing for testing cyber-physical system defences. In: Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2019"},{"key":"4127_CR431","volume-title":"Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","author":"L Jiang","year":"2023","unstructured":"Jiang L, Yuan H, Wu M, et al. Evaluating and improving hybrid fuzzing. In: Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE), 2023"},{"key":"4127_CR432","first-page":"531","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"J He","year":"2019","unstructured":"He J, Balunovi\u0107 M, Ambroladze N, et al. Learning to fuzz from symbolic execution with application to smart contracts. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2019. 531\u2013548"},{"key":"4127_CR433","volume-title":"Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","author":"H Jia","year":"2023","unstructured":"Jia H, Wen M, Xie Z, et al. Detecting JVM JIT compiler bugs via exploring two-dimensional input spaces. In: Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE), 2023"},{"key":"4127_CR434","first-page":"423","volume-title":"Proceedings of the 43rd International Conference on Software Engineering","author":"Y Zheng","year":"2021","unstructured":"Zheng Y, Liu Y, Xie X, et al. Automatic web testing using curiosity-driven reinforcement learning. In: Proceedings of the 43rd International Conference on Software Engineering, 2021. 423\u2013435"},{"key":"4127_CR435","volume-title":"Proceedings of the 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"S Zhang","year":"2021","unstructured":"Zhang S, Liu S, Sun J, et al. FIGCPS: effective failure-inducing input generation for cyber-physical systems with deep reinforcement learning. In: Proceedings of the 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2021"},{"key":"4127_CR436","volume-title":"Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","author":"Z Liu","year":"2023","unstructured":"Liu Z, Chen C, Wang J, et al. Fill in the blank: context-aware automated text input generation for mobile GUI testing. In: Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE), 2023"},{"key":"4127_CR437","volume-title":"Proceedings of the 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"F YazdaniBanafsheDaragh","year":"2021","unstructured":"YazdaniBanafsheDaragh F, Malek S. Deep GUI: black-box GUI input generation with deep learning. In: Proceedings of the 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2021"},{"key":"4127_CR438","volume-title":"Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","author":"S Feng","year":"2023","unstructured":"Feng S, Xie M, Chen C. Efficiency matters: speeding up automated testing with GUI rendering inference. In: Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE), 2023"},{"key":"4127_CR439","volume-title":"Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","author":"D Ran","year":"2023","unstructured":"Ran D, Wang H, Wang W, et al. Badge: prioritizing UI events with hierarchical multi-armed bandits for automated UI testing. In: Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE), 2023"},{"key":"4127_CR440","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1145\/3395363.3397354","volume-title":"Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis","author":"M Pan","year":"2020","unstructured":"Pan M, Huang A, Wang G, et al. Reinforcement learning based curiosity-driven testing of Android applications. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020. 153\u2013164"},{"key":"4127_CR441","volume-title":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"Y Zhao","year":"2022","unstructured":"Zhao Y, Talebipour S, Baral K, et al. Avgust: automating usage-based test generation from videos of app executions. In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022"},{"key":"4127_CR442","volume-title":"Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","author":"X Wang","year":"2023","unstructured":"Wang X, Zhao L. APICAD: augmenting API misuse detection through specifications from code and documents. In: Proceedings of IEEE\/ACM 45th International Conference on Software Engineering (ICSE), 2023"},{"key":"4127_CR443","volume-title":"Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","author":"M Kim","year":"2023","unstructured":"Kim M, Corradini D, Sinha S, et al. Enhancing REST API testing with NLP techniques. In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023"},{"key":"4127_CR444","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00218","volume-title":"Adaptive REST API testing with reinforcement learning","author":"M Kim","year":"2023","unstructured":"Kim M, Sinha S, Orso A. Adaptive REST API testing with reinforcement learning. 2023. ArXiv:2309.04583"},{"key":"4127_CR445","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3491210","volume":"55","author":"T N Alyahya","year":"2023","unstructured":"Alyahya T N, Menai M E B, Mathkour H. On the structure of the boolean satisfiability problem: a survey. ACM Comput Surv, 2023, 55: 1\u201334","journal-title":"ACM Comput Surv"},{"key":"4127_CR446","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1007\/s11633-022-1396-2","volume":"20","author":"W Guo","year":"2023","unstructured":"Guo W, Zhen H L, Li X, et al. Machine learning methods in solving the Boolean satisfiability problem. Mach Intell Res, 2023, 20: 640\u2013655","journal-title":"Mach Intell Res"},{"key":"4127_CR447","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.1145\/2568225.2568293","volume-title":"Proceedings of the 36th International Conference on Software Engineering","author":"T Avgerinos","year":"2014","unstructured":"Avgerinos T, Rebert A, Cha S K, et al. Enhancing symbolic execution with veritesting. In: Proceedings of the 36th International Conference on Software Engineering, 2014. 1083\u20131094"},{"key":"4127_CR448","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3182657","volume":"51","author":"R Baldoni","year":"2019","unstructured":"Baldoni R, Coppa E, D\u2019elia D C, et al. A survey of symbolic execution techniques. ACM Comput Surv, 2019, 51: 1\u201339","journal-title":"ACM Comput Surv"},{"key":"4127_CR449","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"J He","year":"2021","unstructured":"He J, Sivanrupan G, Tsankov P, et al. Learning to explore paths for symbolic execution. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2021"},{"key":"4127_CR450","volume-title":"Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"S Cha","year":"2019","unstructured":"Cha S, Oh H. Concolic testing with adaptively changing search heuristics. In: Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019"},{"key":"4127_CR451","volume-title":"Proceedings of IEEE\/ACM 40th International Conference on Software Engineering (ICSE)","author":"S Cha","year":"2018","unstructured":"Cha S, Hong S, Lee J, et al. Automatically generating search heuristics for concolic testing. In: Proceedings of IEEE\/ACM 40th International Conference on Software Engineering (ICSE), 2018"},{"key":"4127_CR452","volume-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"T Zhang","year":"2020","unstructured":"Zhang T, Zhang Y, Chen Z, et al. Efficient multiplex symbolic execution with adaptive search strategy. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2020"},{"key":"4127_CR453","volume-title":"Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"S Cha","year":"2020","unstructured":"Cha S, Oh H. Making symbolic execution promising by learning aggressive state-pruning strategy. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020"},{"key":"4127_CR454","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1145\/3460319.3464815","volume-title":"Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis","author":"Z Chen","year":"2021","unstructured":"Chen Z, Chen Z, Shuai Z, et al. Synthesize solving strategy for symbolic execution. In: Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021. 348\u2013360"},{"key":"4127_CR455","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1145\/3460319.3464813","volume-title":"Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis","author":"S Luo","year":"2021","unstructured":"Luo S, Xu H, Bi Y, et al. Boosting symbolic execution via constraint solving time prediction (experience paper). In: Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021. 336\u2013347"},{"key":"4127_CR456","volume-title":"Proceedings of IEEE\/ACM 44th International Conference on Software Engineering (ICSE)","author":"S Cha","year":"2022","unstructured":"Cha S, Lee M, Lee S, et al. SYMTUNER: maximizing the power of symbolic execution by adaptively tuning external parameters. In: Proceedings of IEEE\/ACM 44th International Conference on Software Engineering (ICSE), 2022"},{"key":"4127_CR457","volume-title":"Proceedings of the 32nd European Conference on Object-Oriented Programming","author":"J Chen","year":"2018","unstructured":"Chen J, Hu W, Zhang L, et al. Learning to accelerate symbolic execution via code transformation. In: Proceedings of the 32nd European Conference on Object-Oriented Programming, 2018"},{"key":"4127_CR458","volume-title":"The Coq proof assistant","author":"Development team T C","year":"1984","unstructured":"Development team T C. The Coq proof assistant. 1984. https:\/\/coq.inria.fr\/coq-84"},{"key":"4127_CR459","volume-title":"Isabelle","author":"Development team T I","year":"1986","unstructured":"Development team T I. Isabelle. 1986. https:\/\/isabelle.in.tum.de\/index.html"},{"key":"4127_CR460","doi-asserted-by":"publisher","DOI":"10.1016\/0743-1066(86)90015-4","volume-title":"Natural deduction as higher-order resolution","author":"L C Paulson","year":"1986","unstructured":"Paulson L C. Natural deduction as higher-order resolution. 1986. ArXiv:cs\/9301104"},{"key":"4127_CR461","volume-title":"HyperTree proof search for neural theorem proving","author":"G Lample","year":"2022","unstructured":"Lample G, Lachaux M A, Lavril T, et al. HyperTree proof search for neural theorem proving. 2022. ArXiv:2205.11491"},{"key":"4127_CR462","volume-title":"Proceedings of Advances in Neural Information Processing Systems","author":"Y Wu","year":"2022","unstructured":"Wu Y, Jiang A Q, Li W, et al. Autoformalization with large language models. In: Proceedings of Advances in Neural Information Processing Systems, 2022"},{"key":"4127_CR463","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1145\/3510003.3510138","volume-title":"Proceedings of the 44th International Conference on Software Engineering","author":"E First","year":"2022","unstructured":"First E, Brun Y. Diversity-driven automated formal verification. In: Proceedings of the 44th International Conference on Software Engineering, 2022. 749\u2013761"},{"key":"4127_CR464","volume-title":"LeanDojo: theorem proving with retrieval-augmented language models","author":"K Yang","year":"2023","unstructured":"Yang K, Swope A M, Gu A, et al. LeanDojo: theorem proving with retrieval-augmented language models. 2023. ArXiv:2306.15626"},{"key":"4127_CR465","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.614","volume-title":"Ranking LLM-generated loop invariants for program verification","author":"S Chakraborty","year":"2023","unstructured":"Chakraborty S, Lahiri S K, Fakhoury S, et al. Ranking LLM-generated loop invariants for program verification. 2023. ArXiv:2310.09342"},{"key":"4127_CR466","volume-title":"Proceedings of the AAAI Fall Symposium Series","author":"S Zimmeck","year":"2016","unstructured":"Zimmeck S, Wang Z, Zou L, et al. Automated analysis of privacy requirements for mobile apps. In: Proceedings of the AAAI Fall Symposium Series, 2016"},{"key":"4127_CR467","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.1007\/s10489-018-1327-7","volume":"49","author":"A Mahanipour","year":"2019","unstructured":"Mahanipour A, Nezamabadi-pour H. GSP: an automatic programming technique with gravitational search algorithm. Appl Intell, 2019, 49: 1502\u20131516","journal-title":"Appl Intell"},{"key":"4127_CR468","first-page":"26","volume-title":"Proceedings of Advances in Neural Information Processing Systems","author":"T Mikolov","year":"2013","unstructured":"Mikolov T, Sutskever I, Chen K, et al. Distributed representations of words and phrases and their compositionality. In: Proceedings of Advances in Neural Information Processing Systems, 2013. 26"},{"key":"4127_CR469","doi-asserted-by":"publisher","first-page":"2154","DOI":"10.1145\/3442381.3450022","volume-title":"Proceedings of the Web Conference 2021","author":"S Liu","year":"2021","unstructured":"Liu S, Zhao B, Guo R, et al. Have you been properly notified? Automatic compliance analysis of privacy policy text with GDPR article 13. In: Proceedings of the Web Conference 2021, 2021. 2154\u20132164"},{"key":"4127_CR470","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/1806672.1806687","volume-title":"Proceedings of the 9th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering","author":"C Rubio-Gonz\u00e1lez","year":"2010","unstructured":"Rubio-Gonz\u00e1lez C, Liblit B. Expect the unexpected: error code mismatches between documentation and the real world. In: Proceedings of the 9th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, 2010. 73\u201380"},{"key":"4127_CR471","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1145\/1294261.1294276","volume-title":"Proceedings of the 21st ACM SIGOPS Symposium on Operating Systems Principles","author":"L Tan","year":"2007","unstructured":"Tan L, Yuan D, Krishna G, et al. \/*icomment: bugs or bad comments?*\/. In: Proceedings of the 21st ACM SIGOPS Symposium on Operating Systems Principles, 2007. 145\u2013158"},{"key":"4127_CR472","first-page":"260","volume-title":"Proceedings of the IEEE 5th International Conference on Software Testing, Verification and Validation","author":"S H Tan","year":"2012","unstructured":"Tan S H, Marinov D, Tan L, et al. @tComment: testing Javadoc comments to detect comment-code inconsistencies. In: Proceedings of the IEEE 5th International Conference on Software Testing, Verification and Validation, 2012. 260\u2013269"},{"key":"4127_CR473","first-page":"53","volume-title":"Proceedings of the IEEE\/ACM 27th International Conference on Program Comprehension (ICPC)","author":"F Wen","year":"2019","unstructured":"Wen F, Nagy C, Bavota G, et al. A large-scale empirical study on code-comment inconsistencies. In: Proceedings of the IEEE\/ACM 27th International Conference on Program Comprehension (ICPC), 2019. 53\u201364"},{"key":"4127_CR474","first-page":"378","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"R Pandita","year":"2016","unstructured":"Pandita R, Taneja K, Williams L, et al. ICON: inferring temporal constraints from natural language API descriptions. In: Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME), 2016. 378\u2013388"},{"key":"4127_CR475","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/3324884.3416551","volume-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering","author":"X Ren","year":"2020","unstructured":"Ren X, Ye X, Xing Z, et al. API-misuse detection driven by fine-grained API-constraint knowledge graph. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, 2020. 461\u2013472"},{"key":"4127_CR476","first-page":"1837","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"T Lv","year":"2020","unstructured":"Lv T, Li R, Yang Y, et al. RTFM! automatic assumption discovery and verification derivation from library document for API misuse detection. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2020. 1837\u20131852"},{"key":"4127_CR477","first-page":"363","volume-title":"Proceedings of Usenix Security Symposium","author":"I Yun","year":"2016","unstructured":"Yun I, Min C, Si X, et al. APISan: sanitizing API usages through semantic cross-checking. In: Proceedings of Usenix Security Symposium, 2016. 363\u2013378"},{"key":"4127_CR478","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1145\/2970276.2970354","volume-title":"Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering","author":"Y Kang","year":"2016","unstructured":"Kang Y, Ray B, Jana S. APEx: automated inference of error specifications for C APIs. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering, 2016. 472\u2013482"},{"key":"4127_CR479","first-page":"1174","volume-title":"Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"C Li","year":"2019","unstructured":"Li C, Zhou M, Gu Z, et al. Ares: inferring error specifications through static analysis. In: Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2019. 1174\u20131177"},{"key":"4127_CR480","volume-title":"Fuzzing for Software Security Testing and Quality Assurance","author":"A Takanen","year":"2018","unstructured":"Takanen A, Demott J D, Miller C, et al. Fuzzing for Software Security Testing and Quality Assurance. Norwood: Artech House, Inc. 2018"},{"key":"4127_CR481","first-page":"2139","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"W You","year":"2017","unstructured":"You W, Zong P, Chen K, et al. SemFuzz: semantics-based automatic generation of proof-of-concept exploits. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2017. 2139\u20132154"},{"key":"4127_CR482","first-page":"50","volume-title":"Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"P Godefroid","year":"2017","unstructured":"Godefroid P, Peleg H, Singh R. Learn&Fuzz: machine learning for input fuzzing. In: Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2017. 50\u201359"},{"key":"4127_CR483","first-page":"1044","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","author":"X Liu","year":"2019","unstructured":"Liu X, Li X, Prajapati R, et al. DeepFuzz: automatic generation of syntax valid C programs for fuzz testing. In: Proceedings of the AAAI Conference on Artificial Intelligence, 2019. 1044\u20131051"},{"key":"4127_CR484","first-page":"2613","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium","author":"S Lee","year":"2020","unstructured":"Lee S, Han H, Cha S K, et al. Montage: a neural network language model-guided JavaScript engine fuzzer. In: Proceedings of the 29th USENIX Conference on Security Symposium, 2020. 2613\u20132630"},{"key":"4127_CR485","first-page":"711","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP)","author":"P Chen","year":"2018","unstructured":"Chen P, Chen H. Angora: efficient fuzzing by principled search. In: Proceedings of the IEEE Symposium on Security and Privacy (SP), 2018. 711\u2013725"},{"key":"4127_CR486","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0893-6080(89)90003-8","volume":"2","author":"K I Funahashi","year":"1989","unstructured":"Funahashi K I. On the approximate realization of continuous mappings by neural networks. Neural Netws, 1989, 2: 183\u2013192","journal-title":"Neural Netws"},{"key":"4127_CR487","first-page":"787","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP)","author":"S Nagy","year":"2019","unstructured":"Nagy S, Hicks M. Full-speed fuzzing: reducing fuzzing overhead through coverage-guided tracing. In: Proceedings of the IEEE Symposium on Security and Privacy (SP), 2019. 787\u2013802"},{"key":"4127_CR488","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1145\/3324884.3416572","volume-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering","author":"C Zhou","year":"2020","unstructured":"Zhou C, Wang M, Liang J, et al. Zeror: speed up fuzzing with coverage-sensitive tracing and scheduling. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, 2020. 858\u2013870"},{"key":"4127_CR489","first-page":"2255","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium","author":"P Zong","year":"2020","unstructured":"Zong P, Lv T, Wang D, et al. FuzzGuard: filtering out unreachable inputs in directed grey-box fuzzing through deep learning. In: Proceedings of the 29th USENIX Conference on Security Symposium, 2020. 2255\u20132269"},{"key":"4127_CR490","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1145\/3418295","volume":"64","author":"R Jung","year":"2021","unstructured":"Jung R, Jourdan J H, Krebbers R, et al. Safe systems programming in Rust. Commun ACM, 2021, 64: 144\u2013152","journal-title":"Commun ACM"},{"key":"4127_CR491","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/TSE.2016.2521368","volume":"42","author":"W E Wong","year":"2016","unstructured":"Wong W E, Gao R, Li Y, et al. A survey on software fault localization. IEEE Trans Software Eng, 2016, 42: 707\u2013740","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR492","doi-asserted-by":"publisher","first-page":"106312","DOI":"10.1016\/j.infsof.2020.106312","volume":"124","author":"A Zakari","year":"2020","unstructured":"Zakari A, Lee S P, Abreu R, et al. Multiple fault localization of software programs: a systematic literature review. Inf Software Tech, 2020, 124: 106312","journal-title":"Inf Software Tech"},{"key":"4127_CR493","doi-asserted-by":"publisher","first-page":"808","DOI":"10.1145\/2884781.2884834","volume-title":"Proceedings of the 38th International Conference on Software Engineering","author":"X Xie","year":"2016","unstructured":"Xie X, Liu Z, Song S, et al. Revisit of automatic debugging via human focus-tracking analysis. In: Proceedings of the 38th International Conference on Software Engineering, 2016. 808\u2013819"},{"key":"4127_CR494","first-page":"143","volume-title":"Proceedings of the 6th International Symposium on Software Reliability Engineering","author":"H Agrawal","year":"1995","unstructured":"Agrawal H, Horgan J, London S, et al. Fault localization using execution slices and dataflow tests. In: Proceedings of the 6th International Symposium on Software Reliability Engineering, 1995. 143\u2013151"},{"key":"4127_CR495","first-page":"181","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution","author":"C P Wong","year":"2014","unstructured":"Wong C P, Xiong Y, Zhang H, et al. Boosting bug-report-oriented fault localization with segmentation and stack-trace analysis. In: Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2014. 181\u2013190"},{"key":"4127_CR496","first-page":"272","volume-title":"Proceedings of the 28th International Conference on Software Engineering, New York","author":"X Zhang","year":"2006","unstructured":"Zhang X, Gupta N, Gupta R. Locating faults through automated predicate switching. In: Proceedings of the 28th International Conference on Software Engineering, New York, 2006. 272\u2013281"},{"key":"4127_CR497","first-page":"467","volume-title":"Proceedings of the 24th International Conference on Software Engineering","author":"J A Jones","year":"2002","unstructured":"Jones J A, Harrold M J, Stasko J. Visualization of test information to assist fault localization. In: Proceedings of the 24th International Conference on Software Engineering, 2002. 467\u2013477"},{"key":"4127_CR498","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1064978.1065014","volume":"40","author":"B Liblit","year":"2005","unstructured":"Liblit B, Naik M, Zheng A X, et al. Scalable statistical bug isolation. ACM SIGPLAN Not, 2005, 40: 15\u201326","journal-title":"ACM SIGPLAN Not"},{"key":"4127_CR499","doi-asserted-by":"publisher","first-page":"1780","DOI":"10.1016\/j.jss.2009.06.035","volume":"82","author":"R Abreu","year":"2009","unstructured":"Abreu R, Zoeteweij P, Golsteijn R, et al. A practical evaluation of spectrum-based fault localization. J Syst Software, 2009, 82: 1780\u20131792","journal-title":"J Syst Software"},{"key":"4127_CR500","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2522920.2522924","volume":"22","author":"X Y Xie","year":"2013","unstructured":"Xie X Y, Chen T Y, Kuo F-C, et al. A theoretical analysis of the risk evaluation formulas for spectrum-based fault localization. ACM Trans Softw Eng Methodol, 2013, 22: 1\u201340","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"4127_CR501","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1109\/TSE.2019.2892102","volume":"47","author":"D Zou","year":"2019","unstructured":"Zou D, Liang J, Xiong Y, et al. An empirical study of fault localization families and their combinations. IEEE Trans Software Eng, 2019, 47: 332\u2013347","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR502","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1145\/3524610.3527902","volume-title":"Proceedings of the 30th IEEE\/ACM International Conference on Program Comprehension","author":"R Widyasari","year":"2022","unstructured":"Widyasari R, Prana G A A, Haryono S A, et al. XAI4FL: enhancing spectrum-based fault localization with explainable artificial intelligence. In: Proceedings of the 30th IEEE\/ACM International Conference on Program Comprehension, 2022. 499\u2013510"},{"key":"4127_CR503","first-page":"153","volume-title":"Proceedings of the IEEE 7th International Conference on Software Testing, Verification and Validation","author":"S Moon","year":"2014","unstructured":"Moon S, Kim Y, Kim M, et al. Ask the mutants: mutating faulty programs for fault localization. In: Proceedings of the IEEE 7th International Conference on Software Testing, Verification and Validation, 2014. 153\u2013162"},{"key":"4127_CR504","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1002\/stvr.1509","volume":"25","author":"M Papadakis","year":"2015","unstructured":"Papadakis M, Traon Y L. Metallaxis-FL: mutation-based fault localization. Software Testing Verif Rel, 2015, 25: 605\u2013628","journal-title":"Software Testing Verif Rel"},{"key":"4127_CR505","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1142\/S021819400900426X","volume":"19","author":"W E Wong","year":"2009","unstructured":"Wong W E, Qi Y U. Bp neural network-based effective fault localization. Int J Soft Eng Knowl Eng, 2009, 19: 573\u2013597","journal-title":"Int J Soft Eng Knowl Eng"},{"key":"4127_CR506","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/TR.2011.2172031","volume":"61","author":"W E Wong","year":"2012","unstructured":"Wong W E, Debroy V, Golden R, et al. Effective software fault localization using an RBF neural network. IEEE Trans Rel, 2012, 61: 149\u2013169","journal-title":"IEEE Trans Rel"},{"key":"4127_CR507","first-page":"1","volume":"2016","author":"W Zheng","year":"2016","unstructured":"Zheng W, Hu D, Wang J. Fault localization analysis based on deep neural network. Math Problems Eng, 2016, 2016: 1\u201311","journal-title":"Math Problems Eng"},{"key":"4127_CR508","doi-asserted-by":"publisher","first-page":"3027","DOI":"10.1587\/transinf.2017EDL8143","volume":"E100.D","author":"Z Zhang","year":"2017","unstructured":"Zhang Z, Lei Y, Tan Q, et al. Deep learning-based fault localization with contextual information. IEICE Trans Inf Syst, 2017, E100.D: 3027\u20133031","journal-title":"IEICE Trans Inf Syst"},{"key":"4127_CR509","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/3293882.3330574","volume-title":"Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis","author":"X Li","year":"2019","unstructured":"Li X, Li W, Zhang Y, et al. DeepFL: integrating multiple fault diagnosis dimensions for deep fault localization. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019. 169\u2013180"},{"key":"4127_CR510","volume-title":"Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER)","author":"Z Zhang","year":"2019","unstructured":"Zhang Z, Lei Y, Mao X G, et al. CNN-FL: an effective approach for localizing faults using convolutional neural networks. In: Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2019"},{"key":"4127_CR511","first-page":"661","volume-title":"Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)","author":"Y Li","year":"2021","unstructured":"Li Y, Wang S, Nguyen T. Fault localization with code coverage representation learning. In: Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), 2021. 661\u2013673"},{"key":"4127_CR512","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1145\/3468264.3468580","volume-title":"Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"Y Lou","year":"2021","unstructured":"Lou Y, Zhu Q, Dong J, et al. Boosting coverage-based fault localization via graph-based representation learning. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021. 664\u2013676"},{"key":"4127_CR513","first-page":"672","volume-title":"Proceedings of the IEEE 21st International Conference on Software Quality, Reliability and Security (QRS)","author":"J Qian","year":"2021","unstructured":"Qian J, Ju X, Chen X, et al. AGFL: a graph convolutional neural network-based method for fault localization. In: Proceedings of the IEEE 21st International Conference on Software Quality, Reliability and Security (QRS), 2021. 672\u2013680"},{"key":"4127_CR514","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/s10515-023-00383-z","volume":"30","author":"J Qian","year":"2023","unstructured":"Qian J, Ju X, Chen X. GNet4FL: effective fault localization via graph convolutional neural network. Autom Softw Eng, 2023, 30: 16","journal-title":"Autom Softw Eng"},{"key":"4127_CR515","doi-asserted-by":"publisher","first-page":"3939","DOI":"10.1109\/TSE.2023.3279125","volume":"49","author":"Z Zhang","year":"2023","unstructured":"Zhang Z, Lei Y, Mao X, et al. Context-aware neural fault localization. IEEE Trans Software Eng, 2023, 49: 3939\u20133954","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR516","first-page":"659","volume-title":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, New York","author":"Y Li","year":"2022","unstructured":"Li Y, Wang S, Nguyen T N. Fault localization to detect co-change fixing locations. In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, New York, 2022. 659\u2013671"},{"key":"4127_CR517","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1109\/TR.2019.2956120","volume":"69","author":"A Dutta","year":"2020","unstructured":"Dutta A, Manral R, Mitra P, et al. Hierarchically localizing software faults using DNN. IEEE Trans Rel, 2020, 69: 1267\u20131292","journal-title":"IEEE Trans Rel"},{"key":"4127_CR518","first-page":"482","volume-title":"Proceedings of the 30th IEEE\/ACM International Conference on Program Comprehension, New York","author":"J Yu","year":"2022","unstructured":"Yu J, Lei Y, Xie H, et al. Context-based cluster fault localization. In: Proceedings of the 30th IEEE\/ACM International Conference on Program Comprehension, New York, 2022. 482\u2013493"},{"key":"4127_CR519","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/3545258.3545266","volume-title":"Proceedings of the 13th Asia-Pacific Symposium on Internetware","author":"Z Li","year":"2022","unstructured":"Li Z, Tang E, Chen X, et al. Graph neural network based two-phase fault localization approach. In: Proceedings of the 13th Asia-Pacific Symposium on Internetware, 2022. 85\u201395"},{"key":"4127_CR520","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1007\/s11219-023-09625-5","volume":"31","author":"L Yousofvand","year":"2023","unstructured":"Yousofvand L, Soleimani S, Rafe V. Automatic bug localization using a combination of deep learning and model transformation through node classification. Software Qual J, 2023, 31: 1045\u20131063","journal-title":"Software Qual J"},{"key":"4127_CR521","first-page":"245","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"S Wu","year":"2023","unstructured":"Wu S, Li Z, Liu Y, et al. GMBFL: optimizing mutation-based fault localization via graph representation. In: Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME), 2023. 245\u2013257"},{"key":"4127_CR522","first-page":"1214","volume-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"J Cao","year":"2020","unstructured":"Cao J, Yang S, Jiang W, et al. BugPecker: locating faulty methods with deep learning on revision graphs. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2020. 1214\u20131218"},{"key":"4127_CR523","doi-asserted-by":"publisher","first-page":"946","DOI":"10.1145\/3510003.3510042","volume-title":"Proceedings of the 44th International Conference on Software Engineering, New York","author":"A Ciborowska","year":"2022","unstructured":"Ciborowska A, Damevski K. Fast changeset-based bug localization with BERT. In: Proceedings of the 44th International Conference on Software Engineering, New York, 2022. 946\u2013957"},{"key":"4127_CR524","doi-asserted-by":"publisher","first-page":"106486","DOI":"10.1016\/j.infsof.2020.106486","volume":"131","author":"Z Zhang","year":"2021","unstructured":"Zhang Z, Lei Y, Mao X, et al. A study of effectiveness of deep learning in locating real faults. Inf Software Tech, 2021, 131: 106486","journal-title":"Inf Software Tech"},{"key":"4127_CR525","doi-asserted-by":"publisher","first-page":"162101","DOI":"10.1007\/s11432-019-2720-1","volume":"63","author":"H Zhong","year":"2020","unstructured":"Zhong H, Mei H. Learning a graph-based classifier for fault localization. Sci China Inf Sci, 2020, 63: 162101","journal-title":"Sci China Inf Sci"},{"key":"4127_CR526","doi-asserted-by":"publisher","first-page":"e2312","DOI":"10.1002\/smr.2312","volume":"33","author":"Z Zhang","year":"2021","unstructured":"Zhang Z, Lei Y, Mao X, et al. Improving deep-learning-based fault localization with resampling. J Software Evolu Process, 2021, 33: e2312","journal-title":"J Software Evolu Process"},{"key":"4127_CR527","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/3510003.3510136","volume-title":"Proceedings of the 44th International Conference on Software Engineering, New York","author":"H Xie","year":"2022","unstructured":"Xie H, Lei Y, Yan M, et al. A universal data augmentation approach for fault localization. In: Proceedings of the 44th International Conference on Software Engineering, New York, 2022. 48\u201360"},{"key":"4127_CR528","doi-asserted-by":"publisher","first-page":"107148","DOI":"10.1016\/j.infsof.2023.107148","volume":"157","author":"J Hu","year":"2023","unstructured":"Hu J, Xie H, Lei Y, et al. A light-weight data augmentation method for fault localization. Inf Software Tech, 2023, 157: 107148","journal-title":"Inf Software Tech"},{"key":"4127_CR529","first-page":"289","volume-title":"Proceedings of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)","author":"Y Lei","year":"2022","unstructured":"Lei Y, Liu C, Xie H, et al. BCL-FL: a data augmentation approach with between-class learning for fault localization. In: Proceedings of the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2022. 289\u2013300"},{"key":"4127_CR530","volume-title":"Proceedings of the 31st IEEE\/ACM International Conference on Program Comprehension","author":"Y Lei","year":"2023","unstructured":"Lei Y, Wen T, Xie H, et al. Mitigating the effect of class imbalance in fault localization using context-aware generative adversarial network. In: Proceedings of the 31st IEEE\/ACM International Conference on Program Comprehension, 2023"},{"key":"4127_CR531","first-page":"1","volume":"32","author":"Z Zhang","year":"2023","unstructured":"Zhang Z, Lei Y, Su T, et al. Influential global and local contexts guided trace representation for fault localization. ACM Trans Softw Eng Methodol, 2023, 32: 1\u201327","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"4127_CR532","first-page":"1","volume-title":"Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering","author":"Z Tian","year":"2022","unstructured":"Tian Z, Chen J, Zhu Q, et al. Learning to construct better mutation faults. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, 2022. 1\u201313"},{"key":"4127_CR533","first-page":"199","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"Z Zhang","year":"2022","unstructured":"Zhang Z, Lei Y, Mao X, et al. Improving fault localization using model-domain synthesized failing test generation. In: Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME), 2022. 199\u2013210"},{"key":"4127_CR534","first-page":"437","volume-title":"Proceedings of the International Symposium on Software Testing and Analysis","author":"R Just","year":"2014","unstructured":"Just R, Jalali D, Ernst M D. Defects4J: a database of existing faults to enable controlled testing studies for Java programs. In: Proceedings of the International Symposium on Software Testing and Analysis, 2014. 437\u2013440"},{"key":"4127_CR535","first-page":"468","volume-title":"Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER)","author":"F Madeiral","year":"2019","unstructured":"Madeiral F, Urli S, Maia M, et al. BEARS: an extensible Java bug benchmark for automatic program repair studies. In: Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2019. 468\u2013478"},{"key":"4127_CR536","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s10664-005-3861-2","volume":"10","author":"H Do","year":"2005","unstructured":"Do H, Elbaum S, Rothermel G. Supporting controlled experimentation with testing techniques: an infrastructure and its potential impact. Empir Software Eng, 2005, 10: 405\u2013435","journal-title":"Empir Software Eng"},{"key":"4127_CR537","doi-asserted-by":"publisher","first-page":"1236","DOI":"10.1109\/TSE.2015.2454513","volume":"41","author":"C L Goues","year":"2015","unstructured":"Goues C L, Holtschulte N, Smith E K, et al. The ManyBugs and IntroClass benchmarks for automated repair of C programs. IEEE Trans Software Eng, 2015, 41: 1236\u20131256","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR538","volume-title":"Proceedings of the 4th International Workshop on Mining Software Repositories","author":"C Wei\u00df","year":"2007","unstructured":"Wei\u00df C, Premraj R, Zimmermann T, et al. How long will it take to fix this bug? In: Proceedings of the 4th International Workshop on Mining Software Repositories, 2007"},{"key":"4127_CR539","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TSE.2017.2755013","volume":"45","author":"L Gazzola","year":"2019","unstructured":"Gazzola L, Micucci D, Mariani L. Automatic software repair: a survey. IEEE Trans Software Eng, 2019, 45: 34\u201367","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR540","first-page":"771","volume":"27","author":"J Xuan","year":"2016","unstructured":"Xuan J, Ren Z, Wang Z, et al. Progress on approaches to automatic program repair (in Chinese). J Software, 2016, 27: 771\u2013784","journal-title":"J Software"},{"key":"4127_CR541","series-title":"Research Report hal-01956501, HAL Archives Ouvertes","volume-title":"The Living Review on Automated Program Repair","author":"M Monperrus","year":"2018","unstructured":"Monperrus M. The Living Review on Automated Program Repair. Research Report hal-01956501, HAL Archives Ouvertes, 2018. Version: 5"},{"key":"4127_CR542","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3340544","volume":"28","author":"M Tufano","year":"2019","unstructured":"Tufano M, Watson C, Bavota G, et al. An empirical study on learning bug-fixing patches in the wild via neural machine translation. ACM Trans Softw Eng Methodol, 2019, 28: 1\u201329","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"4127_CR543","first-page":"67","volume-title":"Proceedings of the 15th International Workshop on Formal Methods for Industrial Critical Systems","author":"C Kern","year":"2010","unstructured":"Kern C, Esparza J. Automatic error correction of Java programs. In: Proceedings of the 15th International Workshop on Formal Methods for Industrial Critical Systems, 2010. 67\u201381"},{"key":"4127_CR544","first-page":"752","volume-title":"Proceedings of the 11th Joint Meeting on Foundations of Software Engineering","author":"Y Tian","year":"2017","unstructured":"Tian Y, Ray B. Automatically diagnosing and repairing error handling bugs in C. In: Proceedings of the 11th Joint Meeting on Foundations of Software Engineering, 2017. 752\u2013762"},{"key":"4127_CR545","first-page":"161","volume-title":"Proceedings of the 27th IEEE International Conference on Software Analysis, Evolution and Reengineering","author":"A Carvalho","year":"2020","unstructured":"Carvalho A, Luz W P, Marcilio D, et al. C-3PR: a bot for fixing static analysis violations via pull requests. In: Proceedings of the 27th IEEE International Conference on Software Analysis, Evolution and Reengineering, 2020. 161\u2013171"},{"key":"4127_CR546","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1137\/0201022","volume":"1","author":"A V Aho","year":"1972","unstructured":"Aho A V, Peterson T G. A minimum distance error-correcting parser for context-free languages. SIAM J Comput, 1972, 1: 305\u2013312","journal-title":"SIAM J Comput"},{"key":"4127_CR547","first-page":"52","volume-title":"Proceedings of Conference Record of the ACM Symposium on Principles of Programming Languages, Boston","author":"S L Graham","year":"1973","unstructured":"Graham S L, Rhodes S P. Practical syntactic error recovery. In: Proceedings of Conference Record of the ACM Symposium on Principles of Programming Languages, Boston, 1973. 52\u201358"},{"key":"4127_CR548","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1145\/357139.357145","volume":"3","author":"S O Anderson","year":"1981","unstructured":"Anderson S O, Backhouse R C. Locally least-cost error recovery in Earley\u2019s algorithm. ACM Trans Program Lang Syst, 1981, 3: 318\u2013347","journal-title":"ACM Trans Program Lang Syst"},{"key":"4127_CR549","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/22719.22720","volume":"9","author":"M G Burke","year":"1987","unstructured":"Burke M G, Fisher G A. A practical method for LR and LL syntactic error diagnosis and recovery. ACM Trans Program Lang Syst, 1987, 9: 164\u2013197","journal-title":"ACM Trans Program Lang Syst"},{"key":"4127_CR550","first-page":"1345","volume-title":"Proceedings of the 31st AAAI Conference on Artificial Intelligence, San Francisco","author":"R Gupta","year":"2017","unstructured":"Gupta R, Pal S, Kanade A, et al. DeepFix: fixing common C language errors by deep learning. In: Proceedings of the 31st AAAI Conference on Artificial Intelligence, San Francisco, 2017. 1345\u20131351"},{"key":"4127_CR551","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/3180155.3180219","volume-title":"Proceedings of the 40th International Conference on Software Engineering, Gothenburg","author":"S Bhatia","year":"2018","unstructured":"Bhatia S, Kohli P, Singh R. Neuro-symbolic program corrector for introductory programming assignments. In: Proceedings of the 40th International Conference on Software Engineering, Gothenburg, 2018. 60\u201370"},{"key":"4127_CR552","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/3183377.3183383","volume-title":"Proceedings of the 40th International Conference on Software Engineering: Software Engineering Education and Training","author":"U Z Ahmed","year":"2018","unstructured":"Ahmed U Z, Kumar P, Karkare A, et al. Compilation error repair: for the student programs, from the student programs. In: Proceedings of the 40th International Conference on Software Engineering: Software Engineering Education and Training, 2018. 78\u201387"},{"key":"4127_CR553","first-page":"311","volume-title":"Proceedings of the 25th International Conference on Software Analysis, Evolution and Reengineering","author":"E A Santos","year":"2018","unstructured":"Santos E A, Campbell J C, Patel D, et al. Syntax and sensibility: using language models to detect and correct syntax errors. In: Proceedings of the 25th International Conference on Software Analysis, Evolution and Reengineering, 2018. 311\u2013322"},{"key":"4127_CR554","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1145\/2538862.2538924","volume-title":"Proceedings of the 45th ACM Technical Symposium on Computer Science Education, Atlanta","author":"N C C Brown","year":"2014","unstructured":"Brown N C C, K\u00f6lling M, McCall D, et al. Blackbox: a large scale repository of novice programmers\u2019 activity. In: Proceedings of the 45th ACM Technical Symposium on Computer Science Education, Atlanta, 2014. 223\u2013228"},{"key":"4127_CR555","first-page":"925","volume-title":"Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Tallinn","author":"A Mesbah","year":"2019","unstructured":"Mesbah A, Rice A, Johnston E, et al. DeepDelta: learning to repair compilation errors. In: Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Tallinn, 2019. 925\u2013936"},{"key":"4127_CR556","first-page":"930","volume-title":"Proceedings of the 33rd AAAI Conference on Artificial Intelligence, the 31st Innovative Applications of Artificial Intelligence Conference, and the 9th AAAI Symposium on Educational Advances in Artificial Intelligence","author":"R Gupta","year":"2019","unstructured":"Gupta R, Kanade A, Shevade S K. Deep reinforcement learning for syntactic error repair in student programs. In: Proceedings of the 33rd AAAI Conference on Artificial Intelligence, the 31st Innovative Applications of Artificial Intelligence Conference, and the 9th AAAI Symposium on Educational Advances in Artificial Intelligence, 2019. 930\u2013937"},{"key":"4127_CR557","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3387904.3389252","volume-title":"Proceedings of the 28th International Conference on Program Comprehension, Seoul","author":"L Wu","year":"2020","unstructured":"Wu L, Li F, Wu Y, et al. GGF: a graph-based method for programming language syntax error correction. In: Proceedings of the 28th International Conference on Program Comprehension, Seoul, 2020. 139\u2013148"},{"key":"4127_CR558","first-page":"10799","volume-title":"Proceedings of the 37th International Conference on Machine Learning","author":"M Yasunaga","year":"2020","unstructured":"Yasunaga M, Liang P. Graph-based, self-supervised program repair from diagnostic feedback. In: Proceedings of the 37th International Conference on Machine Learning, 2020. 10799\u201310808"},{"key":"4127_CR559","first-page":"119","volume-title":"Proceedings of Machine Learning and Principles and Practice of Knowledge Discovery in Databases","author":"H Hajipour","year":"2021","unstructured":"Hajipour H, Bhattacharyya A, Staicu C, et al. SampleFix: learning to generate functionally diverse fixes. In: Proceedings of Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2021. 119\u2013133"},{"key":"4127_CR560","first-page":"11941","volume-title":"Proceedings of the 38th International Conference on Machine Learning","author":"M Yasunaga","year":"2021","unstructured":"Yasunaga M, Liang P. Break-it-fix-it: unsupervised learning for program repair. In: Proceedings of the 38th International Conference on Machine Learning, 2021. 11941\u201311952"},{"key":"4127_CR561","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s10664-021-09942-y","volume":"26","author":"T Ahmed","year":"2021","unstructured":"Ahmed T, Devanbu P, Hellendoorn V J. Learning lenient parsing & typing via indirect supervision. Empir Software Eng, 2021, 26: 29","journal-title":"Empir Software Eng"},{"key":"4127_CR562","doi-asserted-by":"publisher","first-page":"1180","DOI":"10.1145\/3563330","volume":"6","author":"G Sakkas","year":"2022","unstructured":"Sakkas G, Endres M, Guo P J, et al. Seq2Parse: neurosymbolic parse error repair. Proc ACM Program Lang, 2022, 6: 1180\u20131206","journal-title":"Proc ACM Program Lang"},{"key":"4127_CR563","first-page":"1","volume-title":"Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, Rochester","author":"X Li","year":"2022","unstructured":"Li X, Liu S, Feng R, et al. TransRepair: context-aware program repair for compilation errors. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, Rochester, 2022. 1\u201313"},{"key":"4127_CR564","doi-asserted-by":"publisher","first-page":"2169","DOI":"10.1109\/TSE.2022.3212635","volume":"49","author":"T Ahmed","year":"2023","unstructured":"Ahmed T, Ledesma N R, Devanbu P. SynShine: improved fixing of syntax errors. IEEE Trans Software Eng, 2023, 49: 2169\u20132181","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR565","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-3-030-84186-7_31","volume-title":"Proceedings of the 20th China National Conference on Chinese Computational Linguistics, Hohhot","author":"Z Liu","year":"2021","unstructured":"Liu Z, Lin W, Shi Y, et al. A robustly optimized BERT pre-training approach with post-training. In: Proceedings of the 20th China National Conference on Chinese Computational Linguistics, Hohhot, 2021. 471\u2013484"},{"key":"4127_CR566","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1360\/N112019-00018","volume":"49","author":"Y F Gu","year":"2019","unstructured":"Gu Y F, Ma P, Jia X Y, et al. Progress on software crash research (in Chinese). Sci Sin Inform, 2019, 49: 1383\u20131398","journal-title":"Sci Sin Inform"},{"key":"4127_CR567","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/TSE.2011.104","volume":"38","author":"C L Goues","year":"2012","unstructured":"Goues C L, Nguyen T V, Forrest S, et al. GenProg: a generic method for automatic software repair. IEEE Trans Software Eng, 2012, 38: 54\u201372","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR568","first-page":"354","volume-title":"Proceedings of the 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Athens","author":"C Wong","year":"2021","unstructured":"Wong C, Santiesteban P, K\u00e4stner C, et al. VarFix: balancing edit expressiveness and search effectiveness in automated program repair. In: Proceedings of the 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Athens, 2021. 354\u2013366"},{"key":"4127_CR569","first-page":"772","volume-title":"Proceedings of the 35th International Conference on Software Engineering, San Francisco","author":"H D T Nguyen","year":"2013","unstructured":"Nguyen H D T, Qi D, Roychoudhury A, et al. SemFix: program repair via semantic analysis. In: Proceedings of the 35th International Conference on Software Engineering, San Francisco, 2013. 772\u2013781"},{"key":"4127_CR570","first-page":"691","volume-title":"Proceedings of the 38th International Conference on Software Engineering, Austin","author":"S Mechtaev","year":"2016","unstructured":"Mechtaev S, Yi J, Roychoudhury A. Angelix: scalable multiline program patch synthesis via symbolic analysis. In: Proceedings of the 38th International Conference on Software Engineering, Austin, 2016. 691\u2013701"},{"key":"4127_CR571","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TSE.2016.2560811","volume":"43","author":"J Xuan","year":"2017","unstructured":"Xuan J, Martinez M, DeMarco F, et al. Nopol: automatic repair of conditional statement bugs in Java programs. IEEE Trans Software Eng, 2017, 43: 34\u201355","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR572","first-page":"471","volume-title":"Proceedings of the 37th IEEE\/ACM International Conference on Software Engineering, Florence","author":"S H Tan","year":"2015","unstructured":"Tan S H, Roychoudhury A. relifix: automated repair of software regressions. In: Proceedings of the 37th IEEE\/ACM International Conference on Software Engineering, Florence, 2015. 471\u2013482"},{"key":"4127_CR573","first-page":"13","volume-title":"Proceedings of the 41st International Conference on Software Engineering, Montreal","author":"S Saha","year":"2019","unstructured":"Saha S, Saha R K, Prasad M R. Harnessing evolution for multi-hunk program repair. In: Proceedings of the 41st International Conference on Software Engineering, Montreal, 2019. 13\u201324"},{"key":"4127_CR574","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/3293882.3330577","volume-title":"Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, Beijing","author":"K Liu","year":"2019","unstructured":"Liu K, Koyuncu A, Kim D, et al. TBar: revisiting template-based automated program repair. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, Beijing, 2019. 31\u201342"},{"key":"4127_CR575","first-page":"479","volume-title":"Proceedings of the 26th IEEE International Conference on Software Analysis, Evolution and Reengineering, Hangzhou","author":"M White","year":"2019","unstructured":"White M, Tufano M, Martinez M, et al. Sorting and transforming program repair ingredients via deep learning code similarities. In: Proceedings of the 26th IEEE International Conference on Software Analysis, Evolution and Reengineering, Hangzhou, 2019. 479\u2013490"},{"key":"4127_CR576","first-page":"1943","volume":"47","author":"Z Chen","year":"2021","unstructured":"Chen Z, Kommrusch S J, Tufano M, et al. SequenceR: sequence-to-sequence learning for end-to-end program repair. IEEE Trans Software Eng, 2021, 47: 1943\u20131959","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR577","first-page":"1161","volume-title":"Proceedings of the 43rd IEEE\/ACM International Conference on Software Engineering, Madrid","author":"N Jiang","year":"2021","unstructured":"Jiang N, Lutellier T, Tan L. CURE: code-aware neural machine translation for automatic program repair. In: Proceedings of the 43rd IEEE\/ACM International Conference on Software Engineering, Madrid, 2021. 1161\u20131173"},{"key":"4127_CR578","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1145\/2837614.2837617","volume-title":"Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","author":"F Long","year":"2016","unstructured":"Long F, Rinard M C. Automatic patch generation by learning correct code. In: Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016. 298\u2013312"},{"key":"4127_CR579","first-page":"3","volume-title":"Proceedings of the 34th International Conference on Software Engineering","author":"C L Goues","year":"2012","unstructured":"Goues C L, Dewey-Vogt M, Forrest S, et al. A systematic study of automated program repair: fixing 55 out of 105 bugs for $8 each. In: Proceedings of the 34th International Conference on Software Engineering, 2012. 3\u201313"},{"key":"4127_CR580","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1145\/3238147.3240732","volume-title":"Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, Montpellier","author":"M Tufano","year":"2018","unstructured":"Tufano M, Watson C, Bavota G, et al. An empirical investigation into learning bug-fixing patches in the wild via neural machine translation. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, Montpellier, 2018. 832\u2013837"},{"key":"4127_CR581","first-page":"360","volume-title":"Proceedings of the IEEE World Congress on Services, Milan","author":"Z Sun","year":"2019","unstructured":"Sun Z, Xin C, Sun Y. An automatic semantic code repair service based on deep learning for programs with single error. In: Proceedings of the IEEE World Congress on Services, Milan, 2019. 360\u2013361"},{"key":"4127_CR582","first-page":"275","volume-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, Melbourne","author":"Y Ding","year":"2020","unstructured":"Ding Y, Ray B, Devanbu P T, et al. Patching as translation: the data and the metaphor. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, Melbourne, 2020. 275\u2013286"},{"key":"4127_CR583","doi-asserted-by":"publisher","first-page":"1634","DOI":"10.1145\/3341105.3374005","volume-title":"Proceedings of the 35th ACM\/SIGAPP Symposium on Applied Computing","author":"G Yang","year":"2020","unstructured":"Yang G, Min K, Lee B. Applying deep learning algorithm to automatic bug localization and repair. In: Proceedings of the 35th ACM\/SIGAPP Symposium on Applied Computing, 2020. 1634\u20131641"},{"key":"4127_CR584","first-page":"2852","volume-title":"Proceedings of the 31st AAAI Conference on Artificial Intelligence, San Francisco","author":"L Yu","year":"2017","unstructured":"Yu L, Zhang W, Wang J, et al. SeqGAN: sequence generative adversarial nets with policy gradient. In: Proceedings of the 31st AAAI Conference on Artificial Intelligence, San Francisco, 2017. 2852\u20132858"},{"key":"4127_CR585","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/3395363.3397369","volume-title":"Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis","author":"T Lutellier","year":"2020","unstructured":"Lutellier T, Pham H V, Pang L, et al. CoCoNuT: combining context-aware neural translation models using ensemble for program repair. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020. 101\u2013114"},{"key":"4127_CR586","doi-asserted-by":"publisher","first-page":"1936","DOI":"10.1007\/s10664-016-9470-4","volume":"22","author":"M Martinez","year":"2017","unstructured":"Martinez M, Durieux T, Sommerard R, et al. Automatic repair of real bugs in Java: a large-scale experiment on the defects4j dataset. Empir Software Eng, 2017, 22: 1936\u20131964","journal-title":"Empir Software Eng"},{"key":"4127_CR587","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/3196398.3196473","volume-title":"Proceedings of the 15th International Conference on Mining Software Repositories, Gothenburg","author":"R K Saha","year":"2018","unstructured":"Saha R K, Lyu Y, Lam W, et al. Bugs.jar: a large-scale, diverse dataset of real-world Java bugs. In: Proceedings of the 15th International Conference on Mining Software Repositories, Gothenburg, 2018. 10\u201313"},{"key":"4127_CR588","first-page":"981","volume-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, Melbourne","author":"H Tian","year":"2020","unstructured":"Tian H, Liu K, Kabor\u00e9 A K, et al. Evaluating representation learning of code changes for predicting patch correctness in program repair. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, Melbourne, 2020. 981\u2013992"},{"key":"4127_CR589","volume-title":"Proceedings of the 8th International Conference on Learning Representations, Addis Ababa","author":"E Dinella","year":"2020","unstructured":"Dinella E, Dai H, Li Z, et al. Hoppity: learning graph transformations to detect and fix bugs in programs. In: Proceedings of the 8th International Conference on Learning Representations, Addis Ababa, 2020"},{"key":"4127_CR590","first-page":"1300","volume-title":"Proceedings of Findings of the Association for Computational Linguistics","author":"Y Tang","year":"2021","unstructured":"Tang Y, Zhou L, Blanco A, et al. Grammar-based patches generation for automated program repair. In: Proceedings of Findings of the Association for Computational Linguistics, 2021. 1300\u20131305"},{"key":"4127_CR591","doi-asserted-by":"publisher","first-page":"590215","DOI":"10.3389\/frai.2021.590215","volume":"4","author":"S Huang","year":"2021","unstructured":"Huang S, Zhou X, Chin S. Application of Seq2Seq models on code correction. Front Artif Intell, 2021, 4: 590215","journal-title":"Front Artif Intell"},{"key":"4127_CR592","doi-asserted-by":"publisher","first-page":"247","DOI":"10.3390\/sym13020247","volume":"13","author":"M M Rahman","year":"2021","unstructured":"Rahman M M, Watanobe Y, Nakamura K. A bidirectional LSTM language model for code evaluation and repair. Symmetry, 2021, 13: 247","journal-title":"Symmetry"},{"key":"4127_CR593","first-page":"780","volume-title":"Proceedings of the 38th International Conference on Machine Learning","author":"B Berabi","year":"2021","unstructured":"Berabi B, He J, Raychev V, et al. TFix: learning to fix coding errors with a text-to-text transformer. In: Proceedings of the 38th International Conference on Machine Learning, 2021. 780\u2013791"},{"key":"4127_CR594","first-page":"819","volume-title":"Proceedings of the 21st IEEE International Conference on Software Quality, Reliability and Security, Hainan","author":"B Tang","year":"2021","unstructured":"Tang B, Li B, Bo L, et al. GrasP: graph-to-sequence learning for automated program repair. In: Proceedings of the 21st IEEE International Conference on Software Quality, Reliability and Security, Hainan, 2021. 819\u2013828"},{"key":"4127_CR595","first-page":"129","volume-title":"Proceedings of Intelligent Systems and Applications, Amsterdam","author":"B Szalontai","year":"2021","unstructured":"Szalontai B, Vad\u00e1sz A, Borsi Z R, et al. Detecting and fixing nonidiomatic snippets in Python source code with deep learning. In: Proceedings of Intelligent Systems and Applications, Amsterdam, 2021. 129\u2013147"},{"key":"4127_CR596","first-page":"511","volume-title":"Proceedings of IEEE\/ACM 44th International Conference on Software Engineering, Pittsburgh","author":"Y Li","year":"2022","unstructured":"Li Y, Wang S, Nguyen T N. DEAR: a novel deep learning-based approach for automated program repair. In: Proceedings of IEEE\/ACM 44th International Conference on Software Engineering, Pittsburgh, 2022. 511\u2013523"},{"key":"4127_CR597","first-page":"266","volume-title":"Proceedings of IEEE\/ACM International Symposium on Code Generation and Optimization, Seoul","author":"X Xu","year":"2022","unstructured":"Xu X, Wang X, Xue J. M3V: multi-modal multi-view context embedding for repair operator prediction. In: Proceedings of IEEE\/ACM International Symposium on Code Generation and Optimization, Seoul, 2022. 266\u2013277"},{"key":"4127_CR598","first-page":"1169","volume-title":"Proceedings of IEEE\/ACM 44th International Conference on Software Engineering, Pittsburgh","author":"X Meng","year":"2022","unstructured":"Meng X, Wang X, Zhang H, et al. Improving fault localization and program repair with deep semantic features and transferred knowledge. In: Proceedings of IEEE\/ACM 44th International Conference on Software Engineering, Pittsburgh, 2022. 1169\u20131180"},{"key":"4127_CR599","first-page":"419","volume-title":"Proceedings of IEEE International Conference on Software Maintenance and Evolution, Limassol","author":"M Kim","year":"2022","unstructured":"Kim M, Kim Y, Heo J, et al. Impact of defect instances for successful deep learning-based automatic program repair. In: Proceedings of IEEE International Conference on Software Maintenance and Evolution, Limassol, 2022. 419\u2013423"},{"key":"4127_CR600","first-page":"561","volume-title":"Proceedings of IEEE\/ACM 44th International Conference on Software Engineering, Pittsburgh","author":"M Wardat","year":"2022","unstructured":"Wardat M, Cruz B D, Le W, et al. DeepDiagnosis: automatically diagnosing faults and recommending actionable fixes in deep learning programs. In: Proceedings of IEEE\/ACM 44th International Conference on Software Engineering, Pittsburgh, 2022. 561\u2013572"},{"key":"4127_CR601","doi-asserted-by":"publisher","first-page":"2250210","DOI":"10.1142\/S0218126622502103","volume":"31","author":"J Yao","year":"2022","unstructured":"Yao J, Rao B, Xing W, et al. Bug-Transformer: automated program repair using attention-based deep neural network. J Circuit Syst Comp, 2022, 31: 2250210","journal-title":"J Circuit Syst Comp"},{"key":"4127_CR602","doi-asserted-by":"publisher","first-page":"107043","DOI":"10.1016\/j.infsof.2022.107043","volume":"152","author":"D Yan","year":"2022","unstructured":"Yan D, Liu K, Niu Y, et al. Crex: predicting patch correctness in automated repair of C programs through transfer learning of execution semantics. Inf Software Tech, 2022, 152: 107043","journal-title":"Inf Software Tech"},{"key":"4127_CR603","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1109\/TSE.2022.3231621","volume":"49","author":"K Pei","year":"2023","unstructured":"Pei K, Xuan Z, Yang J, et al. Learning approximate execution semantics from traces for binary function similarity. IEEE Trans Software Eng, 2023, 49: 2776\u20132790","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR604","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1109\/TSE.2020.3020502","volume":"48","author":"S Chakraborty","year":"2022","unstructured":"Chakraborty S, Ding Y, Allamanis M, et al. CODIT: code editing with tree-based neural models. IEEE Trans Software Eng, 2022, 48: 1385\u20131399","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR605","doi-asserted-by":"publisher","first-page":"1506","DOI":"10.1145\/3510003.3510222","volume-title":"Proceedings of the 44th International Conference on Software Engineering, Pittsburgh","author":"H Ye","year":"2022","unstructured":"Ye H, Martinez M, Monperrus M. Neural program repair with execution-based backpropagation. In: Proceedings of the 44th International Conference on Software Engineering, Pittsburgh, 2022. 1506\u20131518"},{"key":"4127_CR606","doi-asserted-by":"publisher","first-page":"2920","DOI":"10.1109\/TSE.2021.3071750","volume":"48","author":"H Ye","year":"2022","unstructured":"Ye H, Gu J, Martinez M, et al. Automated classification of overfitting patches with statically extracted code features. IEEE Trans Software Eng, 2022, 48: 2920\u20132938","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR607","first-page":"1","volume-title":"Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, Rochester","author":"H Ye","year":"2022","unstructured":"Ye H, Martinez M, Luo X, et al. SelfAPR: self-supervised program repair with test execution diagnostics. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, Rochester, 2022. 1\u201313"},{"key":"4127_CR608","first-page":"959","volume-title":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Singapore","author":"C S Xia","year":"2022","unstructured":"Xia C S, Zhang L. Less training, more repairing please: revisiting automated program repair via zero-shot learning. In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Singapore, 2022. 959\u2013971"},{"key":"4127_CR609","first-page":"1441","volume-title":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Singapore","author":"M Kim","year":"2022","unstructured":"Kim M, Kim Y, Jeong H, et al. An empirical study of deep transfer learning-based program repair for Kotlin projects. In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Singapore, 2022. 1441\u20131452"},{"key":"4127_CR610","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3511096","volume":"31","author":"H Tian","year":"2022","unstructured":"Tian H, Li Y, Pian W, et al. Predicting patch correctness based on the similarity of failing test cases. ACM Trans Softw Eng Methodol, 2022, 31: 1\u201330","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"4127_CR611","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1145\/3533767.3534219","volume-title":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","author":"W Yuan","year":"2022","unstructured":"Yuan W, Zhang Q, He T, et al. CIRCLE: continual repair across programming languages. In: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, 2022. 678\u2013690"},{"key":"4127_CR612","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1109\/TSE.2022.3164662","volume":"49","author":"L Chen","year":"2023","unstructured":"Chen L, Pei Y, Pan M, et al. Program repair with repeated learning. IEEE Trans Software Eng, 2023, 49: 831\u2013848","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR613","first-page":"503","volume-title":"Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Lake Buena Vista","author":"A Stocco","year":"2018","unstructured":"Stocco A, Yandrapally R, Mesbah A. Visual web test repair. In: Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Lake Buena Vista, 2018. 503\u2013514"},{"key":"4127_CR614","first-page":"910","volume":"48","author":"M Pan","year":"2022","unstructured":"Pan M, Xu T, Pei Y, et al. GUI-guided test script repair for mobile apps. IEEE Trans Software Eng, 2022, 48: 910\u2013929","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR615","first-page":"200","volume-title":"Proceedings of IEEE\/ACM 44th International Conference on Software Engineering, Pittsburgh","author":"Z Ren","year":"2022","unstructured":"Ren Z, Sun S, Xuan J, et al. Automated patching for unreproducible builds. In: Proceedings of IEEE\/ACM 44th International Conference on Software Engineering, Pittsburgh, 2022. 200\u2013211"},{"key":"4127_CR616","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1145\/3180155.3180181","volume-title":"Proceedings of the 40th International Conference on Software Engineering, Gothenburg","author":"F Hassan","year":"2018","unstructured":"Hassan F, Wang X. HireBuild: an automatic approach to history-driven repair of build scripts. In: Proceedings of the 40th International Conference on Software Engineering, Gothenburg, 2018. 1078\u20131089"},{"key":"4127_CR617","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/3293882.3330578","volume-title":"Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis","author":"Y Lou","year":"2019","unstructured":"Lou Y, Chen J, Zhang L, et al. History-driven build failure fixing: how far are we? In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019. 43\u201354"},{"key":"4127_CR618","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s10664-021-10107-0","volume":"27","author":"B Loriot","year":"2022","unstructured":"Loriot B, Madeiral F, Monperrus M. Styler: learning formatting conventions to repair Checkstyle violations. Empir Software Eng, 2022, 27: 149","journal-title":"Empir Software Eng"},{"key":"4127_CR619","first-page":"229","volume-title":"Proceedings of the 22nd European Symposium on Research in Computer Security, Oslo","author":"S Ma","year":"2017","unstructured":"Ma S, Thung F, Lo D, et al. VuRLE: automatic vulnerability detection and repair by learning from examples. In: Proceedings of the 22nd European Symposium on Research in Computer Security, Oslo, 2017. 229\u2013246"},{"key":"4127_CR620","first-page":"7944","volume-title":"Proceedings of Advances in Neural Information Processing Systems","author":"J Harer","year":"2018","unstructured":"Harer J, Ozdemir O, Lazovich T, et al. Learning to repair software vulnerabilities with generative adversarial networks. In: Proceedings of Advances in Neural Information Processing Systems, 2018. 7944\u20137954"},{"key":"4127_CR621","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s10664-022-10216-4","volume":"27","author":"Z Zhou","year":"2022","unstructured":"Zhou Z, Bo L, Wu X, et al. SPVF: security property assisted vulnerability fixing via attention-based models. Empir Software Eng, 2022, 27: 171","journal-title":"Empir Software Eng"},{"key":"4127_CR622","first-page":"111","volume-title":"Proceedings of the 52nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks","author":"K Huang","year":"2022","unstructured":"Huang K, Yang S, Sun H, et al. Repairing security vulnerabilities using pre-trained programming language models. In: Proceedings of the 52nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, 2022. 111\u2013116"},{"key":"4127_CR623","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1109\/TSE.2022.3147265","volume":"49","author":"Z Chen","year":"2023","unstructured":"Chen Z, Kommrusch S, Monperrus M. Neural transfer learning for repairing security vulnerabilities in C code. IEEE Trans Software Eng, 2023, 49: 147\u2013165","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR624","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1109\/TSE.2022.3156637","volume":"49","author":"J Chi","year":"2023","unstructured":"Chi J, Qu Y, Liu T, et al. SeqTrans: automatic vulnerability fix via sequence to sequence learning. IEEE Trans Software Eng, 2023, 49: 564\u2013585","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR625","volume-title":"Prutor: a system for tutoring CS1 and collecting student programs for analysis","author":"R Das","year":"2016","unstructured":"Das R, Ahmed U Z, Karkare A, et al. Prutor: a system for tutoring CS1 and collecting student programs for analysis. 2016. ArXiv:1608.03828"},{"key":"4127_CR626","first-page":"196","volume-title":"Proceedings of the ACM Conference on International Computing Education Research, New York","author":"N C C Brown","year":"2018","unstructured":"Brown N C C, Altadmri A, Sentance S, et al. Blackbox, five years on: an evaluation of a large-scale programming data collection project. In: Proceedings of the ACM Conference on International Computing Education Research, New York, 2018. 196\u2013204"},{"key":"4127_CR627","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/3180155.3182533","volume-title":"Proceedings of the 40th International Conference on Software Engineering, Gothenburg","author":"M Motwani","year":"2018","unstructured":"Motwani M, Sankaranarayanan S, Just R, et al. Do automated program repair techniques repair hard and important bugs? In: Proceedings of the 40th International Conference on Software Engineering, Gothenburg, 2018. 25"},{"key":"4127_CR628","volume-title":"Proceedings of the 43rd International Conference on Software Engineering (ICSE\u201921)","author":"Y Jiang","year":"2021","unstructured":"Jiang Y, Liu H, Niu N, et al. Extracting concise bug-fixing patches from human-written patches in version control systems. In: Proceedings of the 43rd International Conference on Software Engineering (ICSE\u201921), 2021"},{"key":"4127_CR629","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1109\/TSE.2022.3177713","volume":"49","author":"Y Jiang","year":"2023","unstructured":"Jiang Y, Liu H, Luo X, et al. BugBuilder: an automated approach to building bug repository. IEEE Trans Software Eng, 2023, 49: 1443\u20131463","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR630","first-page":"464","volume-title":"Proceedings of the IEEE\/ACM 19th International Conference on Mining Software Repositories (MSR)","author":"Q C Bui","year":"2022","unstructured":"Bui Q C, Scandariato R, Ferreyra N E D. Vul4J: a dataset of reproducible Java vulnerabilities geared towards the study of program repair techniques. In: Proceedings of the IEEE\/ACM 19th International Conference on Mining Software Repositories (MSR), 2022. 464\u2013468"},{"key":"4127_CR631","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1145\/3468264.3473122","volume-title":"Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"G Nikitopoulos","year":"2021","unstructured":"Nikitopoulos G, Dritsa K, Louridas P, et al. CrossVul: a cross-language vulnerability dataset with commit data. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021. 1565\u20131569"},{"key":"4127_CR632","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1109\/TSE.2018.2870414","volume":"46","author":"W Zou","year":"2018","unstructured":"Zou W, Lo D, Chen Z, et al. How practitioners perceive automated bug report management techniques. IEEE Trans Software Eng, 2018, 46: 836\u2013862","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR633","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1145\/1453101.1453146","volume-title":"Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering","author":"N Bettenburg","year":"2008","unstructured":"Bettenburg N, Just S, Schr\u00f6ter A, et al. What makes a good bug report? In: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008. 308\u2013318"},{"key":"4127_CR634","first-page":"967","volume":"15","author":"D G Lee","year":"2019","unstructured":"Lee D G, Seo Y S. Systematic review of bug report processing techniques to improve software management performance. J Inf Process Syst, 2019, 15: 967\u2013985","journal-title":"J Inf Process Syst"},{"key":"4127_CR635","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1145\/1134285.1134457","volume-title":"Proceedings of the 28th International Conference on Software Engineering","author":"J Anvik","year":"2006","unstructured":"Anvik J. Automating bug report assignment. In: Proceedings of the 28th International Conference on Software Engineering, 2006. 937\u2013940"},{"key":"4127_CR636","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TR.2018.2873427","volume":"68","author":"H Jiang","year":"2018","unstructured":"Jiang H, Li X, Ren Z, et al. Toward better summarizing bug reports with crowdsourcing elicited attributes. IEEE Trans Rel, 2018, 68: 2\u201322","journal-title":"IEEE Trans Rel"},{"key":"4127_CR637","doi-asserted-by":"publisher","first-page":"110567","DOI":"10.1016\/j.jss.2020.110567","volume":"165","author":"Y Tan","year":"2020","unstructured":"Tan Y, Xu S, Wang Z, et al. Bug severity prediction using question-and-answer pairs from Stack Overflow. J Syst Software, 2020, 165: 110567","journal-title":"J Syst Software"},{"key":"4127_CR638","first-page":"1","volume":"32","author":"T Zhang","year":"2023","unstructured":"Zhang T, Han D, Vinayakarao V, et al. Duplicate bug report detection: how far are we? ACM Trans Softw Eng Methodol, 2023, 32: 1\u201332","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"4127_CR639","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1145\/3196321.3196326","volume-title":"Proceedings of the 26th Conference on Program Comprehension","author":"X Li","year":"2018","unstructured":"Li X, Jiang H, Liu D, et al. Unsupervised deep bug report summarization. In: Proceedings of the 26th Conference on Program Comprehension, 2018. 144\u2013155"},{"key":"4127_CR640","doi-asserted-by":"publisher","first-page":"7307","DOI":"10.1007\/s00500-021-05689-2","volume":"25","author":"F Fang","year":"2021","unstructured":"Fang F, Wu J, Li Y, et al. On the classification of bug reports to improve bug localization. Soft Comput, 2021, 25: 7307\u20137323","journal-title":"Soft Comput"},{"key":"4127_CR641","doi-asserted-by":"publisher","first-page":"111617","DOI":"10.1016\/j.jss.2023.111617","volume":"198","author":"C Zhou","year":"2023","unstructured":"Zhou C, Li B, Sun X, et al. Leveraging multi-level embeddings for knowledge-aware bug report reformulation. J Syst Software, 2023, 198: 111617","journal-title":"J Syst Software"},{"key":"4127_CR642","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/3387904.3389263","volume-title":"Proceedings of the 28th International Conference on Program Comprehension","author":"J He","year":"2020","unstructured":"He J, Xu L, Yan M, et al. Duplicate bug report detection using dual-channel convolutional neural networks. In: Proceedings of the 28th International Conference on Program Comprehension, 2020. 117\u2013127"},{"key":"4127_CR643","first-page":"195","volume-title":"Proceedings of the IEEE 31st International Symposium on Software Reliability Engineering (ISSRE)","author":"G Xiao","year":"2020","unstructured":"Xiao G, Du X, Sui Y, et al. HINDBR: heterogeneous information network based duplicate bug report prediction. In: Proceedings of the IEEE 31st International Symposium on Software Reliability Engineering (ISSRE), 2020. 195\u2013206"},{"key":"4127_CR644","first-page":"416","volume-title":"Proceedings of the 25th Asia-Pacific Software Engineering Conference (APSEC)","author":"Q Xie","year":"2018","unstructured":"Xie Q, Wen Z, Zhu J, et al. Detecting duplicate bug reports with convolutional neural networks. In: Proceedings of the 25th Asia-Pacific Software Engineering Conference (APSEC), 2018. 416\u2013425"},{"key":"4127_CR645","first-page":"115","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"J Deshmukh","year":"2017","unstructured":"Deshmukh J, Annervaz K, Podder S, et al. Towards accurate duplicate bug retrieval using deep learning techniques. In: Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME), 2017. 115\u2013124"},{"key":"4127_CR646","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1145\/3183440.3195092","volume-title":"Proceedings of the 40th International Conference on Software Engineering: Companion Proceedings","author":"A Budhiraja","year":"2018","unstructured":"Budhiraja A, Dutta K, Reddy R, et al. DWEN: deep word embedding network for duplicate bug report detection in software repositories. In: Proceedings of the 40th International Conference on Software Engineering: Companion Proceedings, 2018. 193\u2013194"},{"key":"4127_CR647","first-page":"535","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"H Isotani","year":"2021","unstructured":"Isotani H, Washizaki H, Fukazawa Y, et al. Duplicate bug report detection by using sentence embedding and fine-tuning. In: Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME), 2021. 535\u2013544"},{"key":"4127_CR648","doi-asserted-by":"publisher","first-page":"111607","DOI":"10.1016\/j.jss.2023.111607","volume":"198","author":"Y Jiang","year":"2023","unstructured":"Jiang Y, Su X, Treude C, et al. Does deep learning improve the performance of duplicate bug report detection? An empirical study. J Syst Software, 2023, 198: 111607","journal-title":"J Syst Software"},{"key":"4127_CR649","first-page":"288","volume-title":"Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification (ICST)","author":"U Koc","year":"2019","unstructured":"Koc U, Wei S, Foster J S, et al. An empirical assessment of machine learning approaches for triaging reports of a Java static analysis tool. In: Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification (ICST), 2019. 288\u2013299"},{"key":"4127_CR650","first-page":"64","volume-title":"Proceedings of the 26th International Conference on Artificial Neural Networks and Machine Learning","author":"A C Florea","year":"2017","unstructured":"Florea A C, Anvik J, Andonie R. Parallel implementation of a bug report assignment recommender using deep learning. In: Proceedings of the 26th International Conference on Artificial Neural Networks and Machine Learning, 2017. 64\u201371"},{"key":"4127_CR651","volume-title":"Proceedings of the 11th Joint Meeting on Foundations of Software Engineering","author":"S R Lee","year":"2017","unstructured":"Lee S R, Heo M J, Lee C G, et al. Applying deep learning based automatic bug triager to industrial projects. In: Proceedings of the 11th Joint Meeting on Foundations of Software Engineering, 2017"},{"key":"4127_CR652","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1145\/3297001.3297023","volume-title":"Proceedings of the ACM India Joint International Conference on Data Science and Management of Data","author":"S Mani","year":"2019","unstructured":"Mani S, Sankaran A, Aralikatte R. DeepTriage: exploring the effectiveness of deep learning for bug triaging. In: Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, 2019. 171\u2013179"},{"key":"4127_CR653","doi-asserted-by":"publisher","first-page":"3565","DOI":"10.3390\/app12073565","volume":"12","author":"Y Liu","year":"2022","unstructured":"Liu Y, Qi X, Zhang J, et al. Automatic bug triaging via deep reinforcement learning. Appl Sci, 2022, 12: 3565","journal-title":"Appl Sci"},{"key":"4127_CR654","first-page":"125","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME)","author":"Z Han","year":"2017","unstructured":"Han Z, Li X, Xing Z, et al. Learning to predict severity of software vulnerability using only vulnerability description. In: Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME), 2017. 125\u2013136"},{"key":"4127_CR655","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.infsof.2019.07.009","volume":"115","author":"L A F Gomes","year":"2019","unstructured":"Gomes L A F, Torres R S, C\u00f4rtes M L. Bug report severity level prediction in open source software: a survey and research opportunities. Inf Software Tech, 2019, 115: 58\u201378","journal-title":"Inf Software Tech"},{"key":"4127_CR656","doi-asserted-by":"publisher","first-page":"1032440","DOI":"10.3389\/fcomp.2023.1032440","volume":"5","author":"Y Noyori","year":"2023","unstructured":"Noyori Y, Washizaki H, Fukazawa Y, et al. Deep learning and gradient-based extraction of bug report features related to bug fixing time. Front Comput Sci, 2023, 5: 1032440","journal-title":"Front Comput Sci"},{"key":"4127_CR657","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10664-021-10008-2","volume":"26","author":"H Liu","year":"2021","unstructured":"Liu H, Yu Y, Li S, et al. How to cherry pick the bug report for better summarization? Empir Software Eng, 2021, 26: 119","journal-title":"Empir Software Eng"},{"key":"4127_CR658","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/3387904.3389272","volume-title":"Proceedings of the 28th International Conference on Program Comprehension","author":"H Liu","year":"2020","unstructured":"Liu H, Yu Y, Li S, et al. BugSum: deep context understanding for bug report summarization. In: Proceedings of the 28th International Conference on Program Comprehension, 2020. 94\u2013105"},{"key":"4127_CR659","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/3324884.3416538","volume-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering","author":"S Chen","year":"2020","unstructured":"Chen S, Xie X, Yin B, et al. Stay professional and efficient: automatically generate titles for your bug reports. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, 2020. 385\u2013397"},{"key":"4127_CR660","doi-asserted-by":"publisher","first-page":"111513","DOI":"10.1016\/j.jss.2022.111513","volume":"195","author":"H Lin","year":"2023","unstructured":"Lin H, Chen X, Chen X, et al. TitleGen-FL: quality prediction-based filter for automated issue title generation. J Syst Software, 2023, 195: 111513","journal-title":"J Syst Software"},{"key":"4127_CR661","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.infsof.2018.08.002","volume":"105","author":"Y Xiao","year":"2019","unstructured":"Xiao Y, Keung J, Bennin K E, et al. Improving bug localization with word embedding and enhanced convolutional neural networks. Inf Software Tech, 2019, 105: 17\u201329","journal-title":"Inf Software Tech"},{"key":"4127_CR662","first-page":"338","volume-title":"Proceedings of the 24th Asia-Pacific Software Engineering Conference (APSEC)","author":"Y Xiao","year":"2017","unstructured":"Xiao Y, Keung J, Mi Q, et al. Improving bug localization with an enhanced convolutional neural network. In: Proceedings of the 24th Asia-Pacific Software Engineering Conference (APSEC), 2017. 338\u2013347"},{"key":"4127_CR663","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1109\/TSC.2020.3006214","volume":"15","author":"B Wang","year":"2020","unstructured":"Wang B, Xu L, Yan M, et al. Multi-dimension convolutional neural network for bug localization. IEEE Trans Serv Comput, 2020, 15: 1649\u20131663","journal-title":"IEEE Trans Serv Comput"},{"key":"4127_CR664","first-page":"218","volume-title":"Proceedings of the IEEE\/ACM 25th International Conference on Program Comprehension (ICPC)","author":"A N Lam","year":"2017","unstructured":"Lam A N, Nguyen A T, Nguyen H A, et al. Bug localization with combination of deep learning and information retrieval. In: Proceedings of the IEEE\/ACM 25th International Conference on Program Comprehension (ICPC), 2017. 218\u2013229"},{"key":"4127_CR665","first-page":"180","volume-title":"Proceedings of the IEEE 20th International Conference on Software Quality, Reliability and Security (QRS)","author":"S Cheng","year":"2020","unstructured":"Cheng S, Yan X, Khan A A. A similarity integration method based information retrieval and word embedding in bug localization. In: Proceedings of the IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), 2020. 180\u2013187"},{"key":"4127_CR666","first-page":"476","volume-title":"Proceedings of the 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"A N Lam","year":"2015","unstructured":"Lam A N, Nguyen A T, Nguyen H A, et al. Combining deep learning with information retrieval to localize buggy files for bug reports (N). In: Proceedings of the 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2015. 476\u2013481"},{"key":"4127_CR667","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1145\/3269206.3271811","volume-title":"Proceedings of the 27th ACM International Conference on Information and Knowledge Management","author":"P Loyola","year":"2018","unstructured":"Loyola P, Gajananan K, Satoh F. Bug localization by learning to rank and represent bug inducing changes. In: Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018. 657\u2013665"},{"key":"4127_CR668","volume-title":"Proceedings of the 29th International Joint Conference on Artificial Intelligence","author":"Z Zhu","year":"2020","unstructured":"Zhu Z, Li Y, Tong H H, et al. CooBa: cross-project bug localization via adversarial transfer learning. In: Proceedings of the 29th International Joint Conference on Artificial Intelligence, 2020"},{"key":"4127_CR669","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/s10515-023-00379-9","volume":"30","author":"J Han","year":"2023","unstructured":"Han J, Huang C, Sun S, et al. bjXnet: an improved bug localization model based on code property graph and attention mechanism. Autom Softw Eng, 2023, 30: 12","journal-title":"Autom Softw Eng"},{"key":"4127_CR670","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/s10664-022-10237-z","volume":"27","author":"H Liang","year":"2022","unstructured":"Liang H, Hang D, Li X. Modeling function-level interactions for file-level bug localization. Empir Software Eng, 2022, 27: 186","journal-title":"Empir Software Eng"},{"key":"4127_CR671","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-020-09898-5","volume":"26","author":"M Choetkiertikul","year":"2021","unstructured":"Choetkiertikul M, Dam H K, Tran T, et al. Automatically recommending components for issue reports using deep learning. Empir Software Eng, 2021, 26: 1\u201339","journal-title":"Empir Software Eng"},{"key":"4127_CR672","doi-asserted-by":"publisher","first-page":"1368","DOI":"10.1109\/TSE.2019.2920771","volume":"47","author":"X Huo","year":"2019","unstructured":"Huo X, Thung F, Li M, et al. Deep transfer bug localization. IEEE Trans Software Eng, 2019, 47: 1368\u20131380","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR673","first-page":"970","volume-title":"Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)","author":"M Haering","year":"2021","unstructured":"Haering M, Stanik C, Maalej W. Automatically matching bug reports with related app reviews. In: Proceedings of the IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), 2021. 970\u2013981"},{"key":"4127_CR674","doi-asserted-by":"publisher","first-page":"110406","DOI":"10.1016\/j.jss.2019.110406","volume":"158","author":"H Ruan","year":"2019","unstructured":"Ruan H, Chen B, Peng X, et al. DeepLink: recovering issue-commit links based on deep learning. J Syst Software, 2019, 158: 110406","journal-title":"J Syst Software"},{"key":"4127_CR675","first-page":"434","volume-title":"Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER)","author":"R Xie","year":"2019","unstructured":"Xie R, Chen L, Ye W, et al. DeepLink: a code knowledge graph based deep learning approach for issue-commit link recovery. In: Proceedings of the IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2019. 434\u2013444"},{"key":"4127_CR676","first-page":"1","volume-title":"Proceedings of the 10th Asia-Pacific Symposium on Internetware","author":"S Xi","year":"2018","unstructured":"Xi S, Yao Y, Xiao X, et al. An effective approach for routing the bug reports to the right fixers. In: Proceedings of the 10th Asia-Pacific Symposium on Internetware, 2018. 1\u201310"},{"key":"4127_CR677","first-page":"49","volume-title":"Proceedings of the 11th Joint Meeting on Foundations of Software Engineering, New York","author":"W Fu","year":"2017","unstructured":"Fu W, Menzies T. Easy over hard: a case study on deep learning. In: Proceedings of the 11th Joint Meeting on Foundations of Software Engineering, New York, 2017. 49\u201360"},{"key":"4127_CR678","first-page":"68","volume-title":"Proceedings of IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR)","author":"E Biswas","year":"2019","unstructured":"Biswas E, Vijay-Shanker K, Pollock L. Exploring word embedding techniques to improve sentiment analysis of software engineering texts. In: Proceedings of IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR), 2019. 68\u201378"},{"key":"4127_CR679","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s10515-017-0229-y","volume":"25","author":"Z A Nizamani","year":"2018","unstructured":"Nizamani Z A, Liu H, Chen D M, et al. Automatic approval prediction for software enhancement requests. Autom Softw Eng, 2018, 25: 347\u2013381","journal-title":"Autom Softw Eng"},{"key":"4127_CR680","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TSE.2018.2876006","volume":"46","author":"X Li","year":"2018","unstructured":"Li X, Jiang H, Kamei Y, et al. Bridging semantic gaps between natural languages and APIs with word embedding. IEEE Trans Software Eng, 2018, 46: 1081\u20131097","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR681","volume-title":"Proceedings of the 49th Annual IEEE\/ACM International Symposium on Microarchitecture","author":"M Rhu","year":"2016","unstructured":"Rhu M, Gimelshein N, Clemons J, et al. VDNN: virtualized deep neural networks for scalable, memory-efficient neural network design. In: Proceedings of the 49th Annual IEEE\/ACM International Symposium on Microarchitecture, 2016"},{"key":"4127_CR682","first-page":"41","volume-title":"Proceedings of the 23rd ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, New York","author":"L Wang","year":"2018","unstructured":"Wang L, Ye J, Zhao Y, et al. Superneurons: dynamic GPU memory management for training deep neural networks. In: Proceedings of the 23rd ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, New York, 2018. 41\u201353"},{"key":"4127_CR683","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/TSE.2018.2844788","volume":"46","author":"K Moran","year":"2018","unstructured":"Moran K, Bernal-Cardenas C, Curcio M, et al. Machine learning-based prototyping of graphical user interfaces for mobile apps. IEEE Trans Software Eng, 2018, 46: 196\u2013221","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR684","volume-title":"The Mythical Man-Month: Essays on Software Engineering","author":"F P Brooks","year":"1975","unstructured":"Brooks F P. The Mythical Man-Month: Essays on Software Engineering. Reading: Addison-Wesley, 1975"},{"key":"4127_CR685","first-page":"503","volume-title":"Proceedings of the 24th International Conference on Software Engineering, New York","author":"A Mockus","year":"2002","unstructured":"Mockus A, Herbsleb J D. Expertise browser: a quantitative approach to identifying expertise. In: Proceedings of the 24th International Conference on Software Engineering, New York, 2002. 503\u2013512"},{"key":"4127_CR686","first-page":"361","volume-title":"Proceedings of the 28th International Conference on Software Engineering, New York","author":"J Anvik","year":"2006","unstructured":"Anvik J, Hiew L, Murphy G C. Who should fix this bug? In: Proceedings of the 28th International Conference on Software Engineering, New York, 2006. 361\u2013370"},{"key":"4127_CR687","first-page":"535","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance","author":"D Ma","year":"2009","unstructured":"Ma D, Schuler D, Zimmermann T, et al. Expert recommendation with usage expertise. In: Proceedings of the IEEE International Conference on Software Maintenance, 2009. 535\u2013538"},{"key":"4127_CR688","first-page":"137","volume-title":"Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, New York","author":"M Zhou","year":"2010","unstructured":"Zhou M, Mockus A. Developer fluency: achieving true mastery in software projects. In: Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, New York, 2010. 137\u2013146"},{"key":"4127_CR689","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2512207","volume":"23","author":"T Fritz","year":"2014","unstructured":"Fritz T, Murphy G C, Murphy-Hill E, et al. Degree-of-knowledge: modeling a developer\u2019s knowledge of code. ACM Trans Softw Eng Methodol, 2014, 23: 1\u201342","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"4127_CR690","first-page":"563","volume-title":"Proceedings of the 37th International Conference on Software Engineering","author":"M Joblin","year":"2015","unstructured":"Joblin M, Mauerer W, Apel S, et al. From developer networks to verified communities: a fine-grained approach. In: Proceedings of the 37th International Conference on Software Engineering, 2015. 563\u2013573"},{"key":"4127_CR691","first-page":"250","volume-title":"Proceedings of the 29th IEEE International Conference on Software Maintenance (ICSM)","author":"X Meng","year":"2013","unstructured":"Meng X, Miller B P, Williams W R, et al. Mining software repositories for accurate authorship. In: Proceedings of the 29th IEEE International Conference on Software Maintenance (ICSM), 2013. 250\u2013259"},{"key":"4127_CR692","volume-title":"Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"S Baltes","year":"2018","unstructured":"Baltes S, Diehl S. Towards a theory of software development expertise. In: Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018"},{"key":"4127_CR693","first-page":"775","volume-title":"Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"J Ren","year":"2018","unstructured":"Ren J, Yin H, Hu Q, et al. Towards quantifying the development value of code contributions. In: Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018. 775\u2013779"},{"key":"4127_CR694","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/2487788.2487832","volume-title":"Proceedings of the 22nd International Conference on World Wide Web","author":"R Venkataramani","year":"2013","unstructured":"Venkataramani R, Gupta A, Asadullah A, et al. Discovery of technical expertise from open source code repositories. In: Proceedings of the 22nd International Conference on World Wide Web, 2013. 97\u201398"},{"key":"4127_CR695","first-page":"299","volume-title":"Proceedings of Companion of the ACM Conference on Computer Supported Cooperative Work and Social Computing","author":"R Saxena","year":"2017","unstructured":"Saxena R, Pedanekar N. I know what you coded last summer: mining candidate expertise from GitHub repositories. In: Proceedings of Companion of the ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017. 299\u2013302"},{"key":"4127_CR696","first-page":"51","volume-title":"Proceedings of the ACM SIGMOD International Conference on Management of Data","author":"S Liu","year":"2014","unstructured":"Liu S, Wang S, Zhu F, et al. HYDRA: large-scale social identity linkage via heterogeneous behavior modeling. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, 2014. 51\u201362"},{"key":"4127_CR697","first-page":"592","volume-title":"Proceedings of the 28th IEEE International Conference on Software Maintenance (ICSM)","author":"E Kouters","year":"2012","unstructured":"Kouters E, Vasilescu B, Serebrenik A, et al. Who\u2019s who in Gnome: using LSA to merge software repository identities. In: Proceedings of the 28th IEEE International Conference on Software Maintenance (ICSM), 2012. 592\u2013595"},{"key":"4127_CR698","first-page":"56","volume-title":"Proceedings of Software Engineering Conference (APSEC)","author":"W Mo","year":"2015","unstructured":"Mo W, Shen B, Chen Y, et al. TbIL: a tagging-based approach to identity linkage across software communities. In: Proceedings of Software Engineering Conference (APSEC), 2015. 56\u201363"},{"key":"4127_CR699","first-page":"245","volume-title":"Proceedings of the 9th International Conference on Social Informatics","author":"R K Lee","year":"2017","unstructured":"Lee R K, Lo D. GitHub and stack overflow: analyzing developer interests across multiple social collaborative platforms. In: Proceedings of the 9th International Conference on Social Informatics, 2017. 245\u2013256"},{"key":"4127_CR700","first-page":"87","volume-title":"Proceedings of SEKE","author":"W Huang","year":"2016","unstructured":"Huang W, Mo W, Shen B, et al. CPDScorer: modeling and evaluating developer programming ability across software communities. In: Proceedings of SEKE, 2016. 87\u201392"},{"key":"4127_CR701","first-page":"1","volume-title":"Proceedings of the 10th Asia-Pacific Symposium on Internetware, Beijing","author":"J Yan","year":"2018","unstructured":"Yan J, Sun H, Wang X, et al. Profiling developer expertise across software communities with heterogeneous information network analysis. In: Proceedings of the 10th Asia-Pacific Symposium on Internetware, Beijing, 2018. 1\u20139"},{"key":"4127_CR702","doi-asserted-by":"publisher","first-page":"106485","DOI":"10.1016\/j.infsof.2020.106485","volume":"131","author":"J E Montandon","year":"2021","unstructured":"Montandon J E, Valente M T, Silva L L. Mining the technical roles of GitHub users. Inf Software Tech, 2021, 131: 106485","journal-title":"Inf Software Tech"},{"key":"4127_CR703","first-page":"344","volume-title":"Proceedings of IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)","author":"X Song","year":"2022","unstructured":"Song X, Yan J, Huang Y, et al. A collaboration-aware approach to profiling developer expertise with cross-community data. In: Proceedings of IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS), 2022. 344\u2013355"},{"key":"4127_CR704","first-page":"995","volume-title":"Proceedings of IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)","author":"T Dey","year":"2020","unstructured":"Dey T, Karnauch A, Mockus A. Representation of developer expertise in open source software. In: Proceedings of IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), 2020. 995\u20131007"},{"key":"4127_CR705","first-page":"143","volume-title":"Proceedings of IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR)","author":"Y Ma","year":"2019","unstructured":"Ma Y, Bogart C, Amreen S, et al. World of Code: an infrastructure for mining the universe of open source VCS data. In: Proceedings of IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR), 2019. 143\u2013154"},{"key":"4127_CR706","doi-asserted-by":"publisher","first-page":"107218","DOI":"10.1016\/j.infsof.2023.107218","volume":"159","author":"A M Dakhel","year":"2022","unstructured":"Dakhel A M, Desmarais M C, Khomh F. Dev2vec: representing domain expertise of developers in an embedding space. Inf Software Tech, 2022, 159: 107218","journal-title":"Inf Software Tech"},{"key":"4127_CR707","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1049\/iet-sen.2019.0290","volume":"14","author":"F Javeed","year":"2020","unstructured":"Javeed F, Siddique A, Munir A, et al. Discovering software developer\u2019s coding expertise through deep learning. IET softw, 2020, 14: 213\u2013220","journal-title":"IET softw"},{"key":"4127_CR708","first-page":"717","volume-title":"Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"Z Wang","year":"2017","unstructured":"Wang Z, Sun H, Fu Y, et al. Recommending crowdsourced software developers in consideration of skill improvement. In: Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2017. 717\u2013722"},{"key":"4127_CR709","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1007\/s10664-019-09755-0","volume":"25","author":"Z Zhang","year":"2019","unstructured":"Zhang Z, Sun H, Zhang H. Developer recommendation for Topcoder through a meta-learning based policy model. Empir Software Eng, 2019, 25: 859\u2013889","journal-title":"Empir Software Eng"},{"key":"4127_CR710","first-page":"443","volume-title":"Proceedings of CCF Conference on Computer Supported Cooperative Work and Social Computing","author":"X Yu","year":"2019","unstructured":"Yu X, He Y, Fu Y, et al. Cross-domain developer recommendation algorithm based on feature matching. In: Proceedings of CCF Conference on Computer Supported Cooperative Work and Social Computing, 2019. 443\u2013457"},{"key":"4127_CR711","doi-asserted-by":"publisher","first-page":"3131","DOI":"10.1109\/TSE.2021.3081171","volume":"48","author":"J J Wang","year":"2021","unstructured":"Wang J J, Yang Y, Wang S, et al. Context-aware personalized crowdtesting task recommendation. IEEE Trans Software Eng, 2021, 48: 3131\u20133144","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR712","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3487571","volume":"31","author":"J Wang","year":"2022","unstructured":"Wang J, Yang Y, Wang S, et al. Context- and fairness-aware in-process crowdworker recommendation. ACM Trans Softw Eng Methodol, 2022, 31: 1\u201331","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"4127_CR713","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/2897659.2897660","volume-title":"Proceedings of the 3rd International Workshop on CrowdSourcing in Software Engineering","author":"H Ying","year":"2016","unstructured":"Ying H, Chen L, Liang T, et al. EARec: leveraging expertise and authority for pull-request reviewer recommendation in GitHub. In: Proceedings of the 3rd International Workshop on CrowdSourcing in Software Engineering, 2016. 29\u201335"},{"key":"4127_CR714","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.infsof.2016.10.006","volume":"84","author":"J Jiang","year":"2017","unstructured":"Jiang J, Yang Y, He J, et al. Who should comment on this pull request? Analyzing attributes for more accurate commenter recommendation in pull-based development. Inf Software Tech, 2017, 84: 48\u201362","journal-title":"Inf Software Tech"},{"key":"4127_CR715","first-page":"162","volume-title":"Proceedings of IEEE\/ACM 45th International Conference on Software Engineering","author":"J Zhang","year":"2022","unstructured":"Zhang J, Maddila C S, Bairi R, et al. Using large-scale heterogeneous graph representation learning for code review recommendations at Microsoft. In: Proceedings of IEEE\/ACM 45th International Conference on Software Engineering, 2022. 162\u2013172"},{"key":"4127_CR716","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s10515-020-00275-6","volume":"27","author":"S Rebai","year":"2020","unstructured":"Rebai S, Amich A, Molaei S, et al. Multi-objective code reviewer recommendations: balancing expertise, availability and collaborations. Autom Softw Eng, 2020, 27: 301\u2013328","journal-title":"Autom Softw Eng"},{"key":"4127_CR717","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1109\/TSE.2015.2500238","volume":"42","author":"M B Zanjani","year":"2016","unstructured":"Zanjani M B, Kagdi H, Bird C. Automatically recommending peer reviewers in modern code review. IEEE Trans Software Eng, 2016, 42: 530\u2013543","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR718","first-page":"99","volume-title":"Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"C Hannebauer","year":"2016","unstructured":"Hannebauer C, Patalas M, St\u00fcnkel S, et al. Automatically recommending code reviewers based on their expertise: an empirical comparison. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2016. 99\u2013110"},{"key":"4127_CR719","first-page":"1381","volume-title":"Proceedings of IEEE\/ACM 44th International Conference on Software Engineering (ICSE)","author":"G Rong","year":"2022","unstructured":"Rong G, Zhang Y, Yang L, et al. Modeling review history for reviewer recommendation: a hypergraph approach. In: Proceedings of IEEE\/ACM 44th International Conference on Software Engineering (ICSE), 2022. 1381\u20131392"},{"key":"4127_CR720","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TSE.2018.2868367","volume":"46","author":"V Kovalenko","year":"2020","unstructured":"Kovalenko V, Tintarev N, Pasynkov E, et al. Does reviewer recommendation help developers? IEEE Trans Software Eng, 2020, 46: 710\u2013731","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR721","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10664-023-10421-9","volume":"29","author":"M Ahasanuzzaman","year":"2024","unstructured":"Ahasanuzzaman M, Oliva G A, Hassan A E. Using knowledge units of programming languages to recommend reviewers for pull requests: an empirical study. Empir Software Eng, 2024, 29: 33","journal-title":"Empir Software Eng"},{"key":"4127_CR722","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","author":"P W Gon\u00e7alves","year":"2023","unstructured":"Gon\u00e7alves P W, Calikli G, Serebrenik A, et al. Competencies for code review. In: Proceedings of the ACM on Human-Computer Interaction, 2023. 1\u201333"},{"key":"4127_CR723","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1145\/3457913.3457935","volume-title":"Proceedings of the 12th Asia-Pacific Symposium on Internetware","author":"Y Huang","year":"2020","unstructured":"Huang Y, Sun H. Best answerers prediction with topic based GAT in Q&A sites. In: Proceedings of the 12th Asia-Pacific Symposium on Internetware, 2020. 156\u2013164"},{"key":"4127_CR724","volume-title":"Proceedings of the ACM Web Conference","author":"Y Jin","year":"2023","unstructured":"Jin Y, Bai Y, Zhu Y, et al. Code recommendation for open source software developers. In: Proceedings of the ACM Web Conference, 2023"},{"key":"4127_CR725","first-page":"1830","volume-title":"Proceedings of IEEE\/ACM 44th International Conference on Software Engineering (ICSE)","author":"W Xiao","year":"2022","unstructured":"Xiao W, He H, Xu W, et al. Recommending good first issues in GitHub OSS projects. In: Proceedings of IEEE\/ACM 44th International Conference on Software Engineering (ICSE), 2022. 1830\u20131842"},{"key":"4127_CR726","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/3573074.3573088","volume":"48","author":"F Santos","year":"2023","unstructured":"Santos F. Supporting the task-driven skill identification in open source project issue tracking systems. ACM SIGSOFT Softw Eng Notes, 2023, 48: 54\u201358","journal-title":"ACM SIGSOFT Softw Eng Notes"},{"key":"4127_CR727","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.1109\/TSE.2019.2917191","volume":"47","author":"C Costa","year":"2021","unstructured":"Costa C, Figueiredo J, Pimentel J F, et al. Recommending participants for collaborative merge sessions. IEEE Trans Software Eng, 2021, 47: 1198\u20131210","journal-title":"IEEE Trans Software Eng"},{"key":"4127_CR728","first-page":"1","volume-title":"Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)","author":"K Constantino","year":"2022","unstructured":"Constantino K, Figueiredo E. CoopFinder: finding collaborators based on co-changed files. In: Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC), 2022. 1\u20133"},{"key":"4127_CR729","doi-asserted-by":"publisher","first-page":"1438","DOI":"10.1002\/spe.3194","volume":"53","author":"K Constantino","year":"2023","unstructured":"Constantino K, Bel\u00e9m F, Figueiredo E. Dual analysis for helping developers to find collaborators based on co-changed files: an empirical study. Softw Pract Exp, 2023, 53: 1438\u20131464","journal-title":"Softw Pract Exp"},{"key":"4127_CR730","first-page":"379","volume-title":"Proceedings of the 18th Working Conference on Reverse Engineering","author":"D Surian","year":"2011","unstructured":"Surian D, Liu N, Lo D, et al. Recommending people in developers\u2019 collaboration network. In: Proceedings of the 18th Working Conference on Reverse Engineering, 2011. 379\u2013388"},{"key":"4127_CR731","volume-title":"Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering","author":"G Canfora","year":"2012","unstructured":"Canfora G, Penta M D, Oliveto R, et al. Who is going to mentor newcomers in open source projects? In: Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, 2012"},{"key":"4127_CR732","first-page":"808","volume-title":"Proceedings of the 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"L Ye","year":"2018","unstructured":"Ye L, Sun H, Wang X, et al. Personalized teammate recommendation for crowdsourced software developers. In: Proceedings of the 33rd IEEE\/ACM International Conference on Automated Software Engineering (ASE), 2018. 808\u2013813"},{"key":"4127_CR733","volume-title":"Proceedings of IEEE\/ACM 17th International Conference on Mining Software Repositories (MSR)","author":"T Fry","year":"2020","unstructured":"Fry T, Dey T, Karnauch A, et al. A dataset and an approach for identity resolution of 38 million author IDs extracted from 2B Git commits. In: Proceedings of IEEE\/ACM 17th International Conference on Mining Software Repositories (MSR), 2020"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-023-4127-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-023-4127-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-023-4127-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T22:05:24Z","timestamp":1771538724000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-023-4127-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,24]]},"references-count":733,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["4127"],"URL":"https:\/\/doi.org\/10.1007\/s11432-023-4127-5","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,24]]},"assertion":[{"value":"26 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"111102"}}