{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T17:57:16Z","timestamp":1773079036050,"version":"3.50.1"},"reference-count":71,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2024,3,3]]},"DOI":"10.1080\/08874417.2023.2203088","type":"journal-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T20:54:14Z","timestamp":1682542454000},"page":"314-328","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":7,"title":["Deep Learning-Based Code Refactoring: A Review of Current Knowledge"],"prefix":"10.1080","volume":"64","author":[{"given":"Purnima","family":"Naik","sequence":"first","affiliation":[{"name":"Oakland University, Rochester, Michigan, USA"}]},{"given":"Salomi","family":"Nelaballi","sequence":"additional","affiliation":[{"name":"Oakland University, Rochester, Michigan, USA"}]},{"given":"Venkata Sai","family":"Pusuluri","sequence":"additional","affiliation":[{"name":"Oakland University, Rochester, Michigan, USA"}]},{"given":"Dae-Kyoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Oakland University, Rochester, Michigan, USA"}]}],"member":"301","published-online":{"date-parts":[[2023,4,26]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2872711"},{"key":"e_1_3_2_3_1","volume-title":"Refactoring: improving the design of existing code","author":"Fowler M","year":"2018","unstructured":"Fowler M. Refactoring: improving the design of existing code. Boston (Massachusetts): Addison-Wesley Professional; 2018."},{"key":"e_1_3_2_4_1","volume-title":"Proceedings of the 46th Euromicro Conference on Software Engineering and Advanced Applications","author":"Zabard E","year":"2020","unstructured":"Zabard E, Gonzalez-Huerta J, \u0160mite D. Refactoring, bug fixing, and new development effect on technical debt: an industrial case study. Proceedings of the 46th Euromicro Conference on Software Engineering and Advanced Applications; 2020; Kranj, Slovenia."},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473924"},{"key":"e_1_3_2_6_1","unstructured":"Abid C Alizadeh V Kessentini M Ferreira T Dig D. 30 years of software refactoring research: a systematic literature review. 2020. https:\/\/arxiv.org\/abs\/20307.02194."},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110610"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-021-09566-x"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1737"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006709801370146"},{"key":"e_1_3_2_11_1","first-page":"1811","article-title":"Deep learning based code smell detection","volume":"47","author":"Liu H","year":"2019","unstructured":"Liu H, Jin J, Xu Z, Zou Y, Bu Y, Zhang L. Deep learning based code smell detection. IEEE Trans Softw Eng. 2019;47:1811\u201337.","journal-title":"IEEE Trans Softw Eng"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.11.009"},{"key":"e_1_3_2_13_1","volume-title":"Deep learning","author":"Goodfellow I","year":"2016","unstructured":"Goodfellow I, Bengio Y, Courville A. Deep learning. Cambridge (Massachusetts): MIT Press; 2016."},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/11171.001.0001"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198538493.001.0001"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94463-0"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11479-4"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2010-343"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2017.8053243"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054857"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265817"},{"key":"e_1_3_2_23_1","unstructured":"Lewis J Fowler M. Microservices. 2014. www.martinfowler.com\/articles\/microservices.html."},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.11"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.61"},{"key":"e_1_3_2_26_1","volume-title":"\u201cGuidelines for performing systematic literature reviews in software engineering,\u201d school of computer science and mathematics","author":"Kitchenham B","year":"2007","unstructured":"Kitchenham B, Charters S. \u201cGuidelines for performing systematic literature reviews in software engineering,\u201d school of computer science and mathematics. Keele (UK): Keele University. EBSE-2007-01; 2007 July."},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.106893"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3021736"},{"key":"e_1_3_2_30_1","first-page":"129","volume-title":"Proceedings of SAI Intelligent Systems Conference","author":"Szalontai B","year":"2021","unstructured":"Szalontai B, Vad\u00e1sz A, Borsi ZR, V\u00e1rkonyi TA, Pint\u00e9r B, Gregorics T. Detecting and fixing nonidiomatic snippets in python source code with deep learning. Proceedings of SAI Intelligent Systems Conference; 2021; Virtual. p. 129\u201347."},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/542"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS54544.2021.00052"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i1.16079"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.12694\/scpe.v22i1.1836"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v18i6.16743"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63820-7_3"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09871-2"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00021"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00019"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3294032.3294079"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238166"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.63"},{"key":"e_1_3_2_43_1","first-page":"2091","volume-title":"Proceedings of the 33rd International Conference on Machine Learning","author":"Allamanis M","year":"2016","unstructured":"Allamanis M, Peng H, Sutton C. A convolutional attention network for extreme summarization of source code. Proceedings of the 33rd International Conference on Machine Learning; 2016; New York, NY. p. 2091\u2013100."},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.05.019"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2427831"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.330112"},{"key":"e_1_3_2_49_1","unstructured":"Kipf TN Welling M. Variational graph autoencoders. 2016. https:\/\/arxiv.org\/abs\/1611.07308."},{"key":"e_1_3_2_50_1","first-page":"1","volume-title":"Proceedings of the 7th International Conference on Learning Representations","author":"Velickovic P","year":"2019","unstructured":"Velickovic P, Fedus W, Hamilton WL, Lio P, Bengio Y, Hjelm RD. Deep graph infomax. Proceedings of the 7th International Conference on Learning Representations; 2019; New Orleans, LA. p. 1\u201317."},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2018.00034"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33702-5_5"},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2014.6912255"},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597797"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.50"},{"key":"e_1_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503704"},{"key":"e_1_3_2_57_1","unstructured":"Bahdanau D Cho K Bengio Y. Neural machine translation by jointly learning to align and translate. 2014. https:\/\/arxiv.org\/abs\/1409.0473."},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.1"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.11.073"},{"key":"e_1_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2016.20"},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2310195"},{"key":"e_1_3_2_62_1","unstructured":"Mikolov T Chen K Corrado G Dean J. Efficient estimation of word representations in vector space. 2013. https:\/\/arxiv.org\/abs\/1301.3781."},{"key":"e_1_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290353"},{"key":"e_1_3_2_64_1","first-page":"4171","volume-title":"Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human LanguageTechnologies","author":"Devlin J","year":"2019","unstructured":"Devlin J, Chang MW, Lee K, Toutanova K. BERT: pretraining of deep bidirectional transformers for language understanding. Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human LanguageTechnologies; 2019; Minneapolis, Minnesota. p. 4171\u201386"},{"key":"e_1_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1136800"},{"key":"e_1_3_2_67_1","unstructured":"Wu Y Schuster M Chen Z Le QV Norouzi M Macherey W Krikun M Cao Y Gao Q Macherey K Klingner J. Google\u2019s neural machine translation system: bridging the gap between human and machine translation. 2016. https:\/\/arxiv.org\/abs\/1609.08144."},{"key":"e_1_3_2_68_1","unstructured":"Gerrit. OVirt Gerrit. [accessed 2022 Oct 27]. https:\/\/gerrit.ovirt.org\/."},{"key":"e_1_3_2_69_1","unstructured":"Dai AM Olah C Le QV. Document embedding with paragraph vectors. 2015. https:\/\/arxiv.org\/abs\/1507.07998."},{"key":"e_1_3_2_70_1","volume-title":"IEEE Trans Reliab","author":"Hua W","year":"2020","unstructured":"Hua W, Sui Y, Wan Y, Liu G, Xu G. FCCA: hybrid code representation for functional clone detection using attention networks. IEEE Trans Reliab; 2020;70:1304\u2013318."},{"key":"e_1_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00111"},{"key":"e_1_3_2_72_1","unstructured":"Narayanan A Chandramohan M Venkatesan R Chen L Liu Y Jaiswal S. Graph2vec: learning distributed representations of graphs. 2017. http:\/\/arxiv.org\/abs\/1707.05005."}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2023.2203088","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T19:10:31Z","timestamp":1709320231000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2023.2203088"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,26]]},"references-count":71,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3,3]]}},"alternative-id":["10.1080\/08874417.2023.2203088"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2023.2203088","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,26]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}