{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:14:42Z","timestamp":1725668082781},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,18]]},"DOI":"10.1109\/ijcnn54540.2023.10191527","type":"proceedings-article","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T17:30:03Z","timestamp":1690997403000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["The Application of Generating API Call Sequence Code for Android Driven by Neural Network"],"prefix":"10.1109","author":[{"given":"Jingbo","family":"Yang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering Beihang University,Beijing,China"}]},{"given":"Wenjun","family":"Wu","sequence":"additional","affiliation":[{"name":"Institute of Artificial Intelligence, Beihang University,Beijing,China"}]},{"given":"Jian","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering Beihang University,Beijing,China"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Neural sketch learning for conditional program generation","author":"murali","year":"0","journal-title":"Proc of the Int'l Conf on Learning Representations"},{"year":"2017","author":"smith","journal-title":"JavaParser Visited Analyse transform and generate your Java code base","key":"ref24"},{"year":"2020","author":"sun","journal-title":"A Tree-Based Transformer Architecture for Code Generation The Thirty-Fourth AAAI Conference on Artificial Intelligence","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/2970276.2970341"},{"key":"ref15","article-title":"Automatic Detection of Java Cryptographic API Misuses: Are We There Yet","author":"zhang","year":"2021","journal-title":"Transactions on Software Engineering"},{"key":"ref14","article-title":"Investigating next steps in static API-misuse detection","author":"amann","year":"2019","journal-title":"2019 IEEE\/ ACM 16th International Conference on Mining Software Repositories"},{"key":"ref20","first-page":"33","article-title":"Language to Logical Form with Neural Attention","author":"li","year":"2016","journal-title":"Proceedings of the 54th Annual Meeting of the Association for Com-putational Linguistics"},{"key":"ref11","first-page":"4574","article-title":"Latent attention for if-then program synthesis","author":"liu","year":"2016","journal-title":"Proc of the Advances in Neural Information Processing Systems"},{"key":"ref22","first-page":"311","article-title":"BLEU: A method for automatic evaluation of machine translation","author":"papineni k","year":"2002","journal-title":"Proceedings of the 40th An-nual Meeting on Association for Computational Linguistics"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/VLHCC.2006.32"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.18653\/v1\/D18-1110"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/3106237.3106290"},{"key":"ref1","first-page":"1206","article-title":"Program generation and code completion techniques based on deep learning: Literature review","author":"hu","year":"2019","journal-title":"Ruan Jian Xue Bao\/Journal of Software"},{"year":"0","journal-title":"Gitee","key":"ref17"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/2508859.2516693"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1162\/089120104773633402"},{"year":"0","journal-title":"Github","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.jss.2018.04.060"},{"key":"ref7","first-page":"858","article-title":"Graph-based statistical language model for code","author":"nguyen","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ICSE.2012.6227205"},{"key":"ref4","article-title":"Context-based intelligent recommendation for code reuse","author":"peng","year":"2021","journal-title":"Big Data Research"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/2950290.2950334"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/s11432-018-9821-9"},{"key":"ref5","article-title":"Attention is all you need","author":"ashish","year":"2017","journal-title":"Advances in neural information processing systems"}],"event":{"name":"2023 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2023,6,18]]},"location":"Gold Coast, Australia","end":{"date-parts":[[2023,6,23]]}},"container-title":["2023 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10190990\/10190992\/10191527.pdf?arnumber=10191527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T17:41:37Z","timestamp":1692639697000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10191527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,18]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ijcnn54540.2023.10191527","relation":{},"subject":[],"published":{"date-parts":[[2023,6,18]]}}}