{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T19:09:18Z","timestamp":1773774558669,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,3]],"date-time":"2018-09-03T00:00:00Z","timestamp":1535932800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61690205, 61472034,61772071"],"award-info":[{"award-number":["61690205, 61472034,61772071"]}]},{"name":"National Key Research and Development Program of China","award":["2016YFB1000801"],"award-info":[{"award-number":["2016YFB1000801"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,3]]},"DOI":"10.1145\/3238147.3238166","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T20:04:36Z","timestamp":1534795476000},"page":"385-396","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":74,"title":["Deep learning based feature envy detection"],"prefix":"10.1145","author":[{"given":"Hui","family":"Liu","sequence":"first","affiliation":[{"name":"Beijing Institute of Technology, China"}]},{"given":"Zhifeng","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, China"}]},{"given":"Yanzhen","family":"Zou","sequence":"additional","affiliation":[{"name":"Peking University, China"}]}],"member":"320","published-online":{"date-parts":[[2018,9,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/www.areca-backup.org\/","year":"2018","unstructured":"2018. Areca. http:\/\/www.areca-backup.org\/ . 2018 . Freeplane . https:\/\/www.freeplane.org\/. 2018. jEdit. http:\/\/www.jedit.org\/. 2018. JExcelAPI. http:\/\/jexcelapi.sourceforge.net\/. 2018. JSmooth. http:\/\/jsmooth.sourceforge.net\/. 2018. JUnit. https:\/\/junit.org\/. 2018. Neuroph. http:\/\/neuroph.sourceforge.net\/. 2018. PMD. https:\/\/pmd.github.io\/. 2018. XDM. http:\/\/xdman.sourceforge.net\/. 2018. Areca. http:\/\/www.areca-backup.org\/. 2018. Freeplane. https:\/\/www.freeplane.org\/. 2018. jEdit. http:\/\/www.jedit.org\/. 2018. JExcelAPI. http:\/\/jexcelapi.sourceforge.net\/. 2018. JSmooth. http:\/\/jsmooth.sourceforge.net\/. 2018. JUnit. https:\/\/junit.org\/. 2018. Neuroph. http:\/\/neuroph.sourceforge.net\/. 2018. PMD. https:\/\/pmd.github.io\/. 2018. XDM. http:\/\/xdman.sourceforge.net\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381819"},{"key":"e_1_3_2_1_3_1","volume-title":"Comparing and experimenting machine learning techniques for code smell detection. Empirical Software Engineering 21, 3 (01","author":"Fontana Francesca Arcelli","year":"2016","unstructured":"Francesca Arcelli Fontana , Mika V. M\u00e4ntyl\u00e4 , Marco Zanoni , and Alessandro Marino . 2016. Comparing and experimenting machine learning techniques for code smell detection. Empirical Software Engineering 21, 3 (01 Jun 2016 ), 1143\u2013 1191. Francesca Arcelli Fontana, Mika V. M\u00e4ntyl\u00e4, Marco Zanoni, and Alessandro Marino. 2016. Comparing and experimenting machine learning techniques for code smell detection. Empirical Software Engineering 21, 3 (01 Jun 2016), 1143\u2013 1191."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2312942"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.60"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2792681"},{"key":"e_1_3_2_1_7_1","volume-title":"Identifying Refactoring Opportunities in Object-Oriented Code: A Systematic Literature Review. Information and Software Technology 0","author":"Dallal Jehad Al","year":"2014","unstructured":"Jehad Al Dallal . 2014. Identifying Refactoring Opportunities in Object-Oriented Code: A Systematic Literature Review. Information and Software Technology 0 ( 2014 ), \u2013. Jehad Al Dallal. 2014. Identifying Refactoring Opportunities in Object-Oriented Code: A Systematic Literature Review. Information and Software Technology 0 (2014), \u2013."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2938006.2938019"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.04.014"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.56"},{"key":"e_1_3_2_1_11_1","volume-title":"Refactoring: Improving the Design of Existing Code","author":"Fowler Martin","year":"1999","unstructured":"Martin Fowler , Kent Beck , John Brant , William Opdyke , and Don Roberts . 1999 . Refactoring: Improving the Design of Existing Code . Addison Wesley Professional . Martin Fowler, Kent Beck, John Brant, William Opdyke, and Don Roberts. 1999. Refactoring: Improving the Design of Existing Code. Addison Wesley Professional."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/152388.152389"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950334"},{"key":"e_1_3_2_1_14_1","volume-title":"2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 5335\u20135339","author":"Hwang K.","unstructured":"K. Hwang and W. Sung . 2016. Character-level incremental speech recognition with recurrent neural networks . In 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 5335\u20135339 . K. Hwang and W. Sung. 2016. Character-level incremental speech recognition with recurrent neural networks. In 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 5335\u20135339."},{"key":"e_1_3_2_1_15_1","unstructured":"ICASSP.2016.7472696  ICASSP.2016.7472696"},{"key":"e_1_3_2_1_16_1","volume-title":"Retrieved","year":"2018","unstructured":"Keras. 2018 . Flatten Layer . Retrieved July 21, 2018 from https:\/\/github.com\/ keras-team\/keras\/blob\/master\/keras\/layers\/core.py#L467 Keras. 2018. Flatten Layer. Retrieved July 21, 2018 from https:\/\/github.com\/ keras-team\/keras\/blob\/master\/keras\/layers\/core.py#L467"},{"key":"e_1_3_2_1_17_1","volume-title":"Keras: The Python Deep Learning Library. https:\/\/github.com\/ keras-team\/keras\/blob\/master\/keras\/models.py","year":"2018","unstructured":"Keras. 2018 . Keras: The Python Deep Learning Library. https:\/\/github.com\/ keras-team\/keras\/blob\/master\/keras\/models.py Keras. 2018. Keras: The Python Deep Learning Library. https:\/\/github.com\/ keras-team\/keras\/blob\/master\/keras\/models.py"},{"key":"e_1_3_2_1_18_1","volume-title":"Retrieved","year":"2018","unstructured":"Keras. 2018 . Merge Layer . Retrieved July 21, 2018 from https:\/\/github.com\/ keras-team\/keras\/blob\/master\/keras\/layers\/merge.py Keras. 2018. Merge Layer. Retrieved July 21, 2018 from https:\/\/github.com\/ keras-team\/keras\/blob\/master\/keras\/layers\/merge.py"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2009.47"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.11.921"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.02.059"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.4"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2503740"},{"key":"e_1_3_2_1_24_1","volume-title":"2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER)","volume":"1","author":"Liu H.","unstructured":"H. Liu , Y. Wu , W. Liu , Q. Liu , and C. Li . 2016. Domino Effect: Move More Methods Once a Method is Moved . In 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER) , Vol. 1 . 1\u201312. H. Liu, Y. Wu, W. Liu, Q. Liu, and C. Li. 2016. Domino Effect: Move More Methods Once a Method is Moved. In 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), Vol. 1. 1\u201312."},{"key":"e_1_3_2_1_25_1","volume-title":"Retrieved","author":"Liu Hui","year":"2018","unstructured":"Hui Liu , Zhifeng Xu , and Yanzhen Zou . 2018 . Replace CNN with Dense Layers . Retrieved July 21, 2018 from https:\/\/github.com\/liuhuigmail\/FeatureEnvy\/tree\/ master\/Algorithm\/DenseVScnn Hui Liu, Zhifeng Xu, and Yanzhen Zou. 2018. Replace CNN with Dense Layers. Retrieved July 21, 2018 from https:\/\/github.com\/liuhuigmail\/FeatureEnvy\/tree\/ master\/Algorithm\/DenseVScnn"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.56"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351723"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-006-9002-8"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1077863.1077865"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265817"},{"key":"e_1_3_2_1_31_1","volume-title":"Efficient Estimation of Word Representations in Vector Space. CoRR abs\/1301.3781","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Kai Chen , Greg Corrado , and Jeffrey Dean . 2013. Efficient Estimation of Word Representations in Vector Space. CoRR abs\/1301.3781 ( 2013 ). Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space. CoRR abs\/1301.3781 (2013)."},{"key":"e_1_3_2_1_32_1","unstructured":"arXiv: 1301.3781 http:\/\/arxiv.org\/abs\/1301.3781  arXiv: 1301.3781 http:\/\/arxiv.org\/abs\/1301.3781"},{"key":"e_1_3_2_1_33_1","volume-title":"Advances in Neural Information Processing Systems 26","author":"Mikolov Tomas","unstructured":"Tomas Mikolov , Ilya Sutskever , Kai Chen , Greg S Corrado , and Jeff Dean . 2013. Distributed Representations of Words and Phrases and their Compositionality . In Advances in Neural Information Processing Systems 26 , C. J. C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Q. Weinberger (Eds.). Curran Associates, Inc. , 3111\u20133119. Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. 2013. Distributed Representations of Words and Phrases and their Compositionality. In Advances in Neural Information Processing Systems 26, C. J. C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 3111\u20133119."},{"key":"e_1_3_2_1_34_1","volume-title":"2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 612\u2013621","author":"Nucci D. Di","unstructured":"D. Di Nucci , F. Palomba , D. A. Tamburri , A. Serebrenik , and A. De Lucia . 2018. Detecting code smells using machine learning techniques: Are we there yet? . In 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 612\u2013621 . D. Di Nucci, F. Palomba, D. A. Tamburri, A. Serebrenik, and A. De Lucia. 2018. Detecting code smells using machine learning techniques: Are we there yet?. In 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 612\u2013621."},{"key":"e_1_3_2_1_35_1","volume-title":"2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 612\u2013621","author":"Nucci D. Di","unstructured":"D. Di Nucci , F. Palomba , D. A. Tamburri , A. Serebrenik , and A. De Lucia . 2018. Detecting code smells using machine learning techniques: Are we there yet? . In 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 612\u2013621 . D. Di Nucci, F. Palomba, D. A. Tamburri, A. Serebrenik, and A. De Lucia. 2018. Detecting code smells using machine learning techniques: Are we there yet?. In 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 612\u2013621."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2016.2520371"},{"key":"e_1_3_2_1_39_1","first-page":"5","article-title":"Mining Version Histories for Detecting Code Smells. Software Engineering","volume":"41","author":"Palomba F.","year":"2015","unstructured":"F. Palomba , G. Bavota , M. Di Penta , R. Oliveto , D. Poshyvanyk , and A. De Lucia . 2015 . Mining Version Histories for Detecting Code Smells. Software Engineering , IEEE Transactions on 41 , 5 (May 2015), 462\u2013489. 2014.2372760 F. Palomba, G. Bavota, M. Di Penta, R. Oliveto, D. Poshyvanyk, and A. De Lucia. 2015. Mining Version Histories for Detecting Code Smells. Software Engineering, IEEE Transactions on 41, 5 (May 2015), 462\u2013489. 2014.2372760","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9535-z"},{"key":"e_1_3_2_1_41_1","volume-title":"2016 IEEE 24th International Conference on Program Comprehension (ICPC). 1\u201310","author":"Palomba F.","unstructured":"F. Palomba , A. Panichella , A. De Lucia , R. Oliveto , and A. Zaidman . 2016. A textualbased technique for Smell Detection . In 2016 IEEE 24th International Conference on Program Comprehension (ICPC). 1\u201310 . F. Palomba, A. Panichella, A. De Lucia, R. Oliveto, and A. Zaidman. 2016. A textualbased technique for Smell Detection. In 2016 IEEE 24th International Conference on Program Comprehension (ICPC). 1\u201310."},{"key":"e_1_3_2_1_42_1","volume-title":"2016 IEEE 24th International Conference on Program Comprehension (ICPC). 1\u201310","author":"Palomba F.","unstructured":"F. Palomba , A. Panichella , A. De Lucia , R. Oliveto , and A. Zaidman . 2016. A textualbased technique for Smell Detection . In 2016 IEEE 24th International Conference on Program Comprehension (ICPC). 1\u201310 . F. Palomba, A. Panichella, A. De Lucia, R. Oliveto, and A. Zaidman. 2016. A textualbased technique for Smell Detection. In 2016 IEEE 24th International Conference on Program Comprehension (ICPC). 1\u201310."},{"key":"e_1_3_2_1_43_1","volume-title":"2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 4594\u20134602","author":"Pan Y.","unstructured":"Y. Pan , T. Mei , T. Yao , H. Li , and Y. Rui . 2016. Jointly Modeling Embedding and Translation to Bridge Video and Language . In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 4594\u20134602 . Y. Pan, T. Mei, T. Yao, H. Li, and Y. Rui. 2016. Jointly Modeling Embedding and Translation to Bridge Video and Language. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 4594\u20134602."},{"key":"e_1_3_2_1_44_1","unstructured":"2016.497  2016.497"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"e_1_3_2_1_46_1","unstructured":"10\n   .1109\/TPAMI.2016.2577031  10.1109\/TPAMI.2016.2577031"},{"key":"e_1_3_2_1_47_1","volume-title":"Reverse Engineering (WCRE), 2013 20th Working Conference on. 232\u2013241","author":"Sales V.","unstructured":"V. Sales , R. Terra , L.F. Miranda , and M.T. Valente . 2013. Recommending Move Method refactorings using dependency sets . In Reverse Engineering (WCRE), 2013 20th Working Conference on. 232\u2013241 . V. Sales, R. Terra, L.F. Miranda, and M.T. Valente. 2013. Recommending Move Method refactorings using dependency sets. In Reverse Engineering (WCRE), 2013 20th Working Conference on. 232\u2013241."},{"key":"e_1_3_2_1_48_1","unstructured":"6671298  6671298"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143997.1144315"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.12.034"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/794203.795287"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.11.073"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/949305.949308"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.1"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.23"},{"key":"e_1_3_2_1_56_1","unstructured":"Weka. {n. d.}. http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/.  Weka. {n. d.}. http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/."},{"key":"e_1_3_2_1_57_1","volume-title":"2017 International Joint Conference on Neural Networks (IJCNN). 2865\u20132872","author":"Wu D.","unstructured":"D. Wu , N. Sharma , and M. Blumenstein . 2017. Recent advances in video-based human action recognition using deep learning: A review . In 2017 International Joint Conference on Neural Networks (IJCNN). 2865\u20132872 . D. Wu, N. Sharma, and M. Blumenstein. 2017. Recent advances in video-based human action recognition using deep learning: A review. In 2017 International Joint Conference on Neural Networks (IJCNN). 2865\u20132872."},{"key":"e_1_3_2_1_58_1","unstructured":"IJCNN.2017.7966210  IJCNN.2017.7966210"},{"key":"e_1_3_2_1_59_1","volume-title":"Retrieved","author":"Xu Zhifeng","year":"2018","unstructured":"Zhifeng Xu . 2018 . Source Code . Retrieved July 21, 2018 from https:\/\/github.com\/ liuhuigmail\/FeatureEnvy\/blob\/master\/Algorithm\/train-CNN.py Zhifeng Xu. 2018. Source Code. Retrieved July 21, 2018 from https:\/\/github.com\/ liuhuigmail\/FeatureEnvy\/blob\/master\/Algorithm\/train-CNN.py"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2662206"},{"key":"e_1_3_2_1_61_1","unstructured":"2017.2662206  2017.2662206"}],"event":{"name":"ASE '18: 33rd ACM\/IEEE International Conference on Automated Software Engineering","location":"Montpellier France","acronym":"ASE '18","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","CNRS Centre National De La Rechercue Scientifique","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3238147.3238166","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3238147.3238166","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:35Z","timestamp":1750210775000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3238147.3238166"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,3]]},"references-count":59,"alternative-id":["10.1145\/3238147.3238166","10.1145\/3238147"],"URL":"https:\/\/doi.org\/10.1145\/3238147.3238166","relation":{},"subject":[],"published":{"date-parts":[[2018,9,3]]},"assertion":[{"value":"2018-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}