{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T06:30:00Z","timestamp":1768804200292,"version":"3.49.0"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tse.2023.3256362","type":"journal-article","created":{"date-parts":[[2023,3,13]],"date-time":"2023-03-13T17:49:31Z","timestamp":1678729771000},"page":"1-15","source":"Crossref","is-referenced-by-count":5,"title":["CoSS: leveraging statement semantics for code summarization"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5543-1655","authenticated-orcid":false,"given":"Chaochen","family":"Shi","sequence":"first","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1216-5166","authenticated-orcid":false,"given":"Borui","family":"Cai","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5870-7370","authenticated-orcid":false,"given":"Yao","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3026-7537","authenticated-orcid":false,"given":"Longxiang","family":"Gao","sequence":"additional","affiliation":[{"name":"Qilu University of Technology, Shandong Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2127-1438","authenticated-orcid":false,"given":"Keshav","family":"Sood","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3545-7863","authenticated-orcid":false,"given":"Yong","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, Australia"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.332"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081848"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389268"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597799"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3428301"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME52107.2021.00049"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00087"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2465386"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597149"},{"key":"ref11","article-title":"Learning to represent programs with graphs","author":"allamanis","year":"2017","journal-title":"arXiv 1711 00740"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2015.7335404"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238206"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332514"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1925805.1925815"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134355"},{"key":"ref19","first-page":"61","article-title":"Classification of malware using structured control flow","author":"cesare","year":"2010","journal-title":"Proc 8th Australas Symp Parallel Distrib Comput"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_8"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.28"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070524"},{"key":"ref46","article-title":"CoCoSum: Contextual code summarization with multi-relational graph neural network","author":"wang","year":"2021","journal-title":"arXiv 2107 01933"},{"key":"ref45","article-title":"code2seq: Generating sequences from structured representations of code","author":"alon","year":"2018","journal-title":"arXiv 1808 01400"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389258"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1145\/3324884.3416578","article-title":"Retrieve and Refine: Exemplar-based Neural Comment Generation","author":"wei","year":"2020","journal-title":"IEEE\/ACM Int Conference on Automated Software Engineering (ASE)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"ref41","article-title":"Code structure guided transformer for source code summarization","author":"gao","year":"2021","journal-title":"arXiv 2104 09340"},{"key":"ref44","article-title":"Retrieval-augmented generation for code summarization via hybrid GNN","author":"liu","year":"0","journal-title":"Proc 9th Int Conf Learn Representations"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678552"},{"key":"ref49","article-title":"A survey of transformers","author":"lin","year":"2021","journal-title":"arXiv 2106 04554"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3212695"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1195"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3196321.3196334"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19811-3_29"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227188"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.13"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/585058.585065"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299087"},{"key":"ref35","article-title":"Semantic code search for smart contracts","author":"shi","year":"2021","journal-title":"arXiv 2111 14139"},{"key":"ref34","article-title":"Trans 3: A transformer-based framework for unifying code summarization and code search","author":"wang","year":"2020","journal-title":"arXiv 2003 03238"},{"key":"ref37","first-page":"311","article-title":"BLEU: A method for automatic evaluation of machine translation","author":"papineni","year":"2002","journal-title":"Proc Annual Meeting of the Assoc Computational Linguistics"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB.2019.00008"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.2.270"},{"key":"ref30","article-title":"Fast and accurate deep network learning by exponential linear units (ELUs)","author":"clevert","year":"2015","journal-title":"arXiv 1511 07289"},{"key":"ref33","article-title":"A parallel corpus of Python functions and documentation strings for automated code documentation and code generation","author":"barone","year":"2017","journal-title":"arXiv 1707 02275"},{"key":"ref32","article-title":"CodeSearchNet challenge: Evaluating the state of semantic code search","author":"husain","year":"2019","journal-title":"arXiv 1909 09436"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810335"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-016-1671-1"},{"key":"ref39","first-page":"65","article-title":"METEOR: An automatic metric for MT evaluation with improved correlation with human judgments","author":"banerjee","year":"2005","journal-title":"Proc ACL Workshop Intrinsic Extrinsic Eval Measures Mach Transl Summarization"},{"key":"ref38","first-page":"74","article-title":"ROUGE: A package for automatic evaluation of summaries","author":"lin","year":"2004","journal-title":"Proc Conf Text Summarization Branches Out"},{"key":"ref24","article-title":"Improving neural language models with a continuous cache","author":"grave","year":"2016","journal-title":"arXiv 1612 04426"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970341"},{"key":"ref26","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"2018","journal-title":"arXiv 1810 04805"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2979701"},{"key":"ref20","first-page":"5998","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst Annu Conf Neural Inf Process Syst"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/5.880083"},{"key":"ref21","article-title":"Graph attention networks","author":"veli?kovi?","year":"2017","journal-title":"arXiv 1710 10903"},{"key":"ref28","article-title":"Semi-supervised classification with graph convolutional networks","author":"kipf","year":"2016","journal-title":"arXiv 1609 02907"},{"key":"ref27","first-page":"5753","article-title":"XLNet: Generalized autoregressive pretraining for language understanding","author":"yang","year":"2019","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref29","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"0","journal-title":"Proc 1st Int Conf Learn Representations"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3001918"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.findings-naacl.80"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/4359463\/10068264.pdf?arnumber=10068264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,13]],"date-time":"2023-06-13T21:19:25Z","timestamp":1686691165000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10068264\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":63,"URL":"https:\/\/doi.org\/10.1109\/tse.2023.3256362","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}