{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:55:08Z","timestamp":1730213708669,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361385","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"0806-0813","source":"Crossref","is-referenced-by-count":0,"title":["Python Open-Source Code Traceability Model Based on Graph Neural Networks"],"prefix":"10.1109","author":[{"given":"Ruizhi","family":"Wang","sequence":"first","affiliation":[{"name":"HangzhouDianzi University,Computer Science and Technology,Hangzhou,China"}]},{"given":"Yanping","family":"Xu","sequence":"additional","affiliation":[{"name":"Cyberspace Security Institution, HangzhouDianzi University,Hangzhou,China"}]},{"given":"Yifan","family":"Wu","sequence":"additional","affiliation":[{"name":"HangzhouDianzi University,Computer Science and Technology,Hangzhou,China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Towards an analysis of software supply chain risk management","volume-title":"Proceedings of the World Congress on Engineering and Computer Science","author":"Du","year":"2013"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102518"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.aiopen.2021.01.001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.41"},{"volume-title":"Pelisse Pmd: copy\/paste detector (cpd)","year":"2017","author":"Dangel","key":"ref5"},{"issue":"6","key":"ref6","first-page":"499","article-title":"Web documents similarity using k-shingle tokens and minhash technique","volume":"13","author":"Manaa","year":"2018","journal-title":"Journal of Engineering and Applied Sciences"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103057"},{"key":"ref8","first-page":"1","volume-title":"Cross-Language Code Similarity and Applications in Clone Detection and Code Search","author":"Mathew","year":"2022"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/sym14122549"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/7809047"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3290967"},{"key":"ref13","first-page":"2","article-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref14","first-page":"926","article-title":"Reasoning with neural tensor networks for knowledge base completion","volume":"26","author":"Socher","year":"2013","journal-title":"Advances In Neural Information Processing Systems"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2015.08.004"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/info11090421"},{"volume-title":"Pyobfuscate: Python source code obfuscator","year":"2023","key":"ref17"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361385.pdf?arnumber=10361385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T21:01:42Z","timestamp":1705093302000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361385\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361385","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}