{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T03:55:13Z","timestamp":1771559713046,"version":"3.50.1"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62232014"],"award-info":[{"award-number":["62232014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372368"],"award-info":[{"award-number":["62372368"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272377"],"award-info":[{"award-number":["62272377"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62293501"],"award-info":[{"award-number":["62293501"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62293502"],"award-info":[{"award-number":["62293502"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032010"],"award-info":[{"award-number":["62032010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372367"],"award-info":[{"award-number":["62372367"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"XJTU Research Fund for Al Science","award":["2025YXYC004"],"award-info":[{"award-number":["2025YXYC004"]}]},{"name":"DSO National Laboratories under the AI Singapore Programme AISG","award":["AISG4-GC-2023-008-1B"],"award-info":[{"award-number":["AISG4-GC-2023-008-1B"]}]},{"name":"Cyber Security Agency under the National Cybersecurity R&#x0026;D Programme","award":["NCRP25-P04-TAICeN"],"award-info":[{"award-number":["NCRP25-P04-TAICeN"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/tse.2025.3620670","type":"journal-article","created":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T17:40:01Z","timestamp":1760463601000},"page":"338-359","source":"Crossref","is-referenced-by-count":1,"title":["Software Architecture Recovery Augmented With Semantics"],"prefix":"10.1109","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-6337-053X","authenticated-orcid":false,"given":"Wenting","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Software Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9137-4635","authenticated-orcid":false,"given":"Wuxia","family":"Jin","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9366-6076","authenticated-orcid":false,"given":"Yiran","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computing and Data Science, Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9327-0987","authenticated-orcid":false,"given":"Ming","family":"Fan","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3509-3919","authenticated-orcid":false,"given":"Haijun","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2990-1614","authenticated-orcid":false,"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7300-9215","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computing and Data Science, Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7600-0934","authenticated-orcid":false,"given":"Ting","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Software Architecture in Practice.","year":"2012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2014.051219"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606639"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/spe.3364"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2000.891477"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2004.1281402"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24741-8_9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792498"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100123"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616285"},{"key":"ref11","first-page":"993","article-title":"Latent Dirichlet allocation","volume":"3","author":"Blei","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.10"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.53"},{"key":"ref14","first-page":"758","article-title":"Exploring the architectural impact of possible dependencies in python software","volume-title":"Proc. 35th IEEE\/ACM Int. Conf. Autom. Softw. Eng.","author":"Jin","year":"2020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3171288"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3342483"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.5106094","article-title":"Fusing functional information with dependence and directory for architecture recovering precisely","volume-title":"SSRN Electron. J.","author":"Zhang"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC57359.2022.00049"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3639476.3639776"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3695988"},{"key":"ref21","article-title":"Analyzing the performance of large language models on code summarization","author":"Haldar","year":"2024"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302622"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/icse55347.2025.00034"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2816707.2816717"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3295739"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2671865"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3640325"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SANER50967.2021.00012"},{"key":"ref33","article-title":"Enre-py"},{"key":"ref34","article-title":"Multilang-depends"},{"key":"ref35","article-title":"Understand"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510124"},{"key":"ref37","article-title":"gpt_academic"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/GCAT59970.2023.10353319"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-05532-5"},{"key":"ref40","volume-title":"Fundamentals of Software Architecture: An Engineering Approach.","author":"Richards","year":"2020"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3318603"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066111"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2004.1311061"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.29"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/BF01908075"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952605"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSP.2019.00018"},{"key":"ref48","article-title":"ChatGPT: Optimizing language models for dialogue","year":"2022"},{"key":"ref49","article-title":"DeepSeek-V2: A strong, economical, and efficient mixture-of-experts language model","author":"DeepSeek","year":"2024"},{"key":"ref50","article-title":"The Llama 3 herd of models","year":"2024"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"key":"ref52","article-title":"The architecture of open source applications: Elegance, evolution, and a few fearless hacks","volume-title":"J. Entertainment Law Pract.","volume":"1","author":"Brown","year":"2011"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2004.1310696"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317469"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/581380.581382"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-023-00384-y"},{"key":"ref57","article-title":"HumanEval-V: Evaluating visual understanding and reasoning abilities of large multimodal models through coding tasks","author":"Zhang","year":"2024"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.emnlp-demo.46"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA59870.2024.00016"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA-C63560.2024.00059"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/11346545\/11203255.pdf?arnumber=11203255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T20:58:40Z","timestamp":1768337920000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11203255\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":57,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tse.2025.3620670","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}