{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:17:08Z","timestamp":1740133028215,"version":"3.37.3"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62262031","62367003"],"award-info":[{"award-number":["62262031","62367003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Social Science Foundation Major Bidding","award":["20&ZD068"],"award-info":[{"award-number":["20&ZD068"]}]},{"name":"Key Scientific and Technological Research Projects of Jiangxi Provincial Department of Education","award":["GJJ2200303","GJJ2200304"],"award-info":[{"award-number":["GJJ2200303","GJJ2200304"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tkde.2024.3436883","type":"journal-article","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T10:54:59Z","timestamp":1731495299000},"page":"9220-9234","source":"Crossref","is-referenced-by-count":0,"title":["SE Factual Knowledge in Frozen Giant Code Model: A Study on FQN and Its Retrieval"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8877-4267","authenticated-orcid":false,"given":"Qing","family":"Huang","sequence":"first","affiliation":[{"name":"School of Computer Information Engineering and Language Intelligence Research Center, Jiangxi Normal University, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0865-0444","authenticated-orcid":false,"given":"Dianshu","family":"Liao","sequence":"additional","affiliation":[{"name":"School of Computer Information Engineering, Jiangxi Normal University, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7663-1421","authenticated-orcid":false,"given":"Zhenchang","family":"Xing","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Eveleigh, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6497-9380","authenticated-orcid":false,"given":"Zhiqiang","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9466-1672","authenticated-orcid":false,"given":"Qinghua","family":"Lu","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Eveleigh, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2273-1862","authenticated-orcid":false,"given":"Xiwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Eveleigh, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8718-1716","authenticated-orcid":false,"given":"Jiaxing","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Computer Information Engineering, Jiangxi Normal University, Nanchang, China"}]}],"member":"263","reference":[{"article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","year":"2019","author":"Devlin","key":"ref1"},{"article-title":"Language models are few-shot learners","year":"2020","author":"Brown","key":"ref2"},{"key":"ref3","first-page":"837","article-title":"On the naturalness of software","volume-title":"Proc. 34th Int. Conf. Softw. Eng.","author":"Devanbu"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3212695"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"year":"2022","key":"ref7","article-title":"github copilot, your AI pair programmer"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510050"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510062"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549113"},{"key":"ref11","first-page":"461","article-title":"API-misuse detection driven by fine-grained API-constraint knowledge graph","volume-title":"Proc. 35th IEEE\/ACM Int. Conf. Automated Softw. Eng.","author":"Ren"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3421472"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180260"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00010"},{"article-title":"Dcom: A deep column mapper for semantic data type detection","year":"2021","author":"Maji","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321663"},{"key":"ref17","first-page":"465","article-title":"Evaluating how developers use general-purpose web-search for code retrieval","volume-title":"Proc. 15th Int. Conf. Mining Softw. Repositories","author":"Rahman"},{"key":"ref18","first-page":"281","article-title":"Prevalence of confusing code in software projects: Atoms of confusion in the wild","volume-title":"Proc. 15th Int. Conf. Mining Softw. Repositories","author":"Gopstein"},{"key":"ref19","first-page":"476","article-title":"Learning to mine aligned code and natural language pairs from stack overflow","volume-title":"Proc. IEEE\/ACM 15th Int. Conf. Mining Softw. Repositories","author":"Yin"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568313"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00032"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2812599"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1449764.1449790"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556912"},{"article-title":"Codexglue: A machine learning benchmark dataset for code understanding and generation","year":"2021","author":"Lu","key":"ref25"},{"article-title":"Emergent abilities of large language models","year":"2022","author":"Wei","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1250"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.eacl-main.153"},{"article-title":"Data distributional properties drive emergent in-context learning in transformers","year":"2022","author":"Chan","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70747"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3470133"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09764-z"},{"year":"2024","key":"ref33","article-title":"GPT-4"},{"article-title":"Evaluating large language models trained on code","year":"2021","author":"Chen","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3560815"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3632742"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-017-9563-5"},{"article-title":"Unsupervised translation of programming languages","year":"2020","author":"Lachaux","key":"ref38"},{"key":"ref39","first-page":"1155","article-title":"Spoon: A. library for implementing analyses and transformations of java source code","volume":"46","author":"Pawlak","year":"2015","journal-title":"Software: Pract. Experience"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884862"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180230"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510061"},{"article-title":"Prompt-learning for fine-grained entity typing","year":"2021","author":"Ding","key":"ref43"},{"key":"ref44","first-page":"12697","article-title":"Calibrate before use: Improving few-shot performance of language models","volume-title":"Int. Conf. Mach. Learn.","author":"Zhao"},{"article-title":"Measuring causal effects of data statistics on language model\u2019s \u2018factual\u2019 predictions","year":"2022","author":"Elazar","key":"ref45"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510061"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3397481.3450656"},{"article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","year":"2018","author":"Devlin","key":"ref48"},{"issue":"140","key":"ref49","first-page":"1","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer.","volume":"21","author":"Raffel","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.437"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00324"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-95289-0_11"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833571"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519665"},{"key":"ref56","first-page":"2633","article-title":"Extracting training data from large language models","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Carlini"},{"article-title":"An empirical cybersecurity evaluation of github copilot\u2019s code contributions","year":"2021","author":"Pearce","key":"ref57"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502030"},{"article-title":"Wordcraft: A human-ai collaborative editor for story writing","year":"2021","author":"Coenen","key":"ref59"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517582"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/69\/10750897\/10750898.pdf?arnumber=10750898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T15:22:07Z","timestamp":1732720927000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10750898\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":60,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2024.3436883","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"type":"print","value":"1041-4347"},{"type":"electronic","value":"1558-2191"},{"type":"electronic","value":"2326-3865"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}