{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T15:33:23Z","timestamp":1767108803194,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1566526"],"award-info":[{"award-number":["1566526"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,15]]},"DOI":"10.1145\/3270101.3270110","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:23:10Z","timestamp":1539696190000},"page":"74-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymization"],"prefix":"10.1145","author":[{"given":"Ningfei","family":"Wang","sequence":"first","affiliation":[{"name":"Lehigh University, Bethlehem, PA, USA"}]},{"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University &amp; Alibaba-ZJU Joint Research Institute of Frontier Technologies, Hangzhou, China"}]},{"given":"Ting","family":"Wang","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Google Code Jam. https:\/\/code.google.com\/codejam\/ Google Code Jam link.  2017. Google Code Jam. https:\/\/code.google.com\/codejam\/ Google Code Jam link."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. Google Code Jam contest 3264486. https:\/\/code.google.com\/codejam\/ contest\/3264486\/dashboard Google Code Jam link.  2017. Google Code Jam contest 3264486. https:\/\/code.google.com\/codejam\/ contest\/3264486\/dashboard Google Code Jam link."},{"key":"e_1_3_2_1_3_1","unstructured":"2018. Abstract Syntax Trees. https:\/\/docs.python.org\/2\/library\/ast.html Python AST module.  2018. Abstract Syntax Trees. https:\/\/docs.python.org\/2\/library\/ast.html Python AST module."},{"key":"e_1_3_2_1_4_1","unstructured":"2018. Anaconda. https:\/\/www.anaconda.com\/ Anaconda.  2018. Anaconda. https:\/\/www.anaconda.com\/ Anaconda."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. Disassembler for Python bytecode. https:\/\/docs.python.org\/3\/library\/dis. html Python dis module.  2018. Disassembler for Python bytecode. https:\/\/docs.python.org\/3\/library\/dis. html Python dis module."},{"key":"e_1_3_2_1_6_1","unstructured":"2018. memory profile. https:\/\/pypi.org\/project\/memory_profiler\/ Python memory profile.  2018. memory profile. https:\/\/pypi.org\/project\/memory_profiler\/ Python memory profile."},{"key":"e_1_3_2_1_7_1","unstructured":"2018. Python cProfile. https:\/\/docs.python.org\/2\/library\/profile.html Python cProfile.  2018. Python cProfile. https:\/\/docs.python.org\/2\/library\/profile.html Python cProfile."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.34"},{"volume-title":"Source Code Authorship Attribution Using Long Short-Term Memory Based Networks. In European Symposium on Research in Computer Security. Springer, 65--82","year":"2017","author":"Alsulami Bander","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006642503790385"},{"volume-title":"Software Engineering? ESEC\/FSE?99","author":"Ball Thomas","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2806316"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2382029.2382071"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382448.2382450"},{"volume-title":"Information and Telecommunication Systems (CITS), 2013 International Conference on. IEEE, 1--6.","year":"2013","author":"Brocardo Marcelo Luiz","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Jane Bromley Isabelle Guyon Yann LeCun Eduard S\u00e4ckinger and Roopak Shah. 1994. Signature verification using a\" siamese\" time delay neural network. In Advances in Neural Information Processing Systems. 737--744.   Jane Bromley Isabelle Guyon Yann LeCun Eduard S\u00e4ckinger and Roopak Shah. 1994. Signature verification using a\" siamese\" time delay neural network. In Advances in Neural Information Processing Systems. 737--744.","DOI":"10.1142\/9789812797926_0003"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831160"},{"key":"e_1_3_2_1_18_1","unstructured":"Aylin Caliskan-Islam Fabian Yamaguchi Edwin Dauber Richard Harang Konrad Rieck Rachel Greenstadt and Arvind Narayanan. 2015. When coding style survives compilation: De-anonymizing programmers from executable binaries. arXiv preprint arXiv:1512.08546 (2015).  Aylin Caliskan-Islam Fabian Yamaguchi Edwin Dauber Richard Harang Konrad Rieck Rachel Greenstadt and Arvind Narayanan. 2015. When coding style survives compilation: De-anonymizing programmers from executable binaries. arXiv preprint arXiv:1512.08546 (2015)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00593-0_30"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00049-9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1295109.1295123"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2390665.2390708"},{"volume-title":"Building the Information Society","author":"Ferdinand Christian","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.03.004"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34224-9_59"},{"key":"e_1_3_2_1_26_1","unstructured":"Andrew Gray Stephen MacDonell and Philip Sallis. 1997. Software forensics: Extending authorship analysis techniques to computer programs. (1997).  Andrew Gray Stephen MacDonell and Philip Sallis. 1997. Software forensics: Extending authorship analysis techniques to computer programs. (1997)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523677"},{"key":"e_1_3_2_1_28_1","volume-title":"ICML Deep Learning Workshop","volume":"2","author":"Koch Gregory","year":"2015"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2007.17"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SACI.2014.6840038"},{"key":"e_1_3_2_1_31_1","unstructured":"Andy Liaw Matthew Wiener et al. 2002. Classification and regression by randomForest. R news 2 3 (2002) 18--22.  Andy Liaw Matthew Wiener et al. 2002. Classification and regression by randomForest. R news 2 3 (2002) 18--22."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_16"},{"key":"e_1_3_2_1_33_1","unstructured":"Anders Moller and Michael I Schwartzbach. 2012. Static program analysis.  Anders Moller and Michael I Schwartzbach. 2012. Static program analysis."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083143"},{"key":"e_1_3_2_1_35_1","unstructured":"Brian N Pellin. 2000. Using classification techniques to determine source code authorship. White Paper: Department of Computer Science University of Wisconsin (2000).  Brian N Pellin. 2000. Using classification techniques to determine source code authorship. White Paper: Department of Computer Science University of Wisconsin (2000)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041225.2041239"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90055-A"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2188286.2188326"},{"volume-title":"Proceedings of SSV","year":"2010","author":"Vorobyov Kostyantyn","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","unstructured":"Ke Wang Rishabh Singh and Zhendong Su. 2017. Dynamic Neural Program Embedding for Program Repair. CoRR abs\/1711.07163 (2017). arXiv:1711.07163 http:\/\/arxiv.org\/abs\/1711.07163  Ke Wang Rishabh Singh and Zhendong Su. 2017. Dynamic Neural Program Embedding for Program Repair. CoRR abs\/1711.07163 (2017). arXiv:1711.07163 http:\/\/arxiv.org\/abs\/1711.07163"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.09.001"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3270101.3270110","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3270101.3270110","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3270101.3270110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:26Z","timestamp":1750208546000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3270101.3270110"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":41,"alternative-id":["10.1145\/3270101.3270110","10.1145\/3270101"],"URL":"https:\/\/doi.org\/10.1145\/3270101.3270110","relation":{},"subject":[],"published":{"date-parts":[[2018,1,15]]},"assertion":[{"value":"2018-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}