{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:28:41Z","timestamp":1750746521411,"version":"3.28.0"},"reference-count":65,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/saner48275.2020.9054826","type":"proceedings-article","created":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T03:47:32Z","timestamp":1585885652000},"page":"480-491","source":"Crossref","is-referenced-by-count":7,"title":["Deep Learning Based Identification of Suspicious Return Statements"],"prefix":"10.1109","author":[{"given":"Guangjie","family":"Li","sequence":"first","affiliation":[]},{"given":"Hui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jiahao","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Qasim","family":"Umer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2012.28"},{"journal-title":"Moving Fast with Software Verification","year":"2015","author":"calcagno","key":"ref38"},{"journal-title":"Keras","year":"2019","key":"ref33"},{"journal-title":"one-hot","year":"2018","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2875125"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2936376"},{"year":"0","key":"ref37"},{"volume":"abs 1605 2688","journal-title":"Theano A Python framework for fast computation of mathematical expressions","year":"2016","key":"ref36"},{"journal-title":"Theano Development Team","year":"2019","key":"ref35"},{"journal-title":"Google","year":"2019","key":"ref34"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970326"},{"key":"ref62","first-page":"1188","article-title":"Distributed representations of sentences and documents","author":"le","year":"2014","journal-title":"Proceedings of the 31th International Conference on Machine Learning ICML 2014"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00086"},{"key":"ref63","volume":"abs 1810 4805","author":"devlin","year":"2018","journal-title":"BERT Pre-training of deep bidirectional transformers for language understanding"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677009"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref27","first-page":"858","article-title":"Graph-based statistical language model for code","author":"nguyen","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.01.021"},{"key":"ref29","first-page":"649","article-title":"An analysis and survey of the development of mutation testing","volume":"37","author":"yue","year":"2010","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1251535.1251544"},{"key":"ref1","first-page":"33","article-title":"An exploratory study of identifier re-namings","author":"eshkevari","year":"0","journal-title":"Proceedings of the 8th Working Conference on Mining Software Repositories"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.497"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2936376"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238166"},{"key":"ref24","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"2013","journal-title":"Computer Science"},{"key":"ref23","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","volume":"2","author":"mikolov","year":"2013","journal-title":"Proceedings of the 26th International Conference on Neural Information Processing Systems -"},{"key":"ref26","first-page":"73","article-title":"A comparison of string distance metrics for name-matching tasks","author":"cohen","year":"0","journal-title":"Proceedings of IJCAI-03 Workshop on Information Integration on the Web (IIWeb-03)"},{"journal-title":"Github","year":"0","key":"ref25"},{"key":"ref50","first-page":"269","volume":"11","author":"tu","year":"2014","journal-title":"On the localness of software"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2902362"},{"key":"ref59","volume":"abs 1409 5718","author":"mou","year":"2014","journal-title":"TBCNN A tree-based convolutional neural network for programming language processing"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786849"},{"key":"ref57","volume":"abs 1602 3001","author":"allamanis","year":"2016","journal-title":"A convolutional attention network for extreme summarization of source code"},{"key":"ref56","article-title":"Dynamic neural program embedding for program repair","volume":"abs 1711 7163","author":"wang","year":"2017","journal-title":"CoRR"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.38"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106290"},{"key":"ref53","first-page":"282","article-title":"Conditional random fields: Probabilistic models for segmenting and labeling sequence data","author":"lafferty","year":"2001","journal-title":"Proceedings of ICML-2001 18th International Conference on Machine Learning"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635883"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03013-0_14"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2017.27"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001448"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2012.28"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1145\/1052883.1052895","article-title":"Finding bugs is easy","volume":"39","author":"hovemeyer","year":"2004","journal-title":"SIGPLAN Not"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503275"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227127"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884870"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3276517"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884841"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635901"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786849"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.94"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227137"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3133928"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106284"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081755"},{"journal-title":"Memory networks","year":"2014","author":"weston","key":"ref48"},{"journal-title":"End-to-end prediction of buffer overruns from raw source code via neural memory networks","year":"2017","author":"choi","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.86"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884841"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884829"}],"event":{"name":"2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)","start":{"date-parts":[[2020,2,18]]},"location":"London, ON, Canada","end":{"date-parts":[[2020,2,21]]}},"container-title":["2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040394\/9054788\/09054826.pdf?arnumber=9054826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:54:59Z","timestamp":1656438899000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9054826\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/saner48275.2020.9054826","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}