{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:28Z","timestamp":1763507728278,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T00:00:00Z","timestamp":1543795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. National Science Foundation","award":["OAC-1839909"],"award-info":[{"award-number":["OAC-1839909"]}]},{"name":"WV HEPC","award":["HEPC.dsr.18.5"],"award-info":[{"award-number":["HEPC.dsr.18.5"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,3]]},"DOI":"10.1145\/3274694.3274742","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T13:07:01Z","timestamp":1543928821000},"page":"542-552","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["ICSD"],"prefix":"10.1145","author":[{"given":"Yanfang","family":"Ye","sequence":"first","affiliation":[{"name":"Department of Computer Science and Electrical Engineering, West Virginia University, WV, USA"}]},{"given":"Shifu","family":"Hou","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electrical Engineering, West Virginia University, WV, USA"}]},{"given":"Lingwei","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electrical Engineering, West Virginia University, WV, USA"}]},{"given":"Xin","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electrical Engineering, West Virginia University, WV, USA"}]},{"given":"Liang","family":"Zhao","sequence":"additional","affiliation":[{"name":"Department of Information Science and Technology, George Mason University, VA, USA"}]},{"given":"Shouhuai","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Texas at San Antonio, TX, USA"}]},{"given":"Jiabin","family":"Wang","sequence":"additional","affiliation":[{"name":"Tencent Security Lab, Tencent, Guangdong, China"}]},{"given":"Qi","family":"Xiong","sequence":"additional","affiliation":[{"name":"Tencent Security Lab, Tencent, Guangdong, China"}]}],"member":"320","published-online":{"date-parts":[[2018,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.25"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-017-0091-8"},{"key":"e_1_3_2_1_3_1","unstructured":"AttackFlow. 2017. Watch Out For Insecure StackOverflow Answers. In https:\/\/www.attackflow.com\/Blog\/StackOverflow.  AttackFlow. 2017. Watch Out For Insecure StackOverflow Answers. In https:\/\/www.attackflow.com\/Blog\/StackOverflow."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of Neuro-N\u0131mes 91","author":"Bottou L\u00e9on","year":"1991","unstructured":"L\u00e9on Bottou . 1991 . Stochastic gradient learning in neural networks . Proceedings of Neuro-N\u0131mes 91 , EC2 (1991). L\u00e9on Bottou. 1991. Stochastic gradient learning in neural networks. Proceedings of Neuro-N\u0131mes 91, EC2 (1991)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/3163583.3163673"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.169"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2685553.2698999"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134636"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508284"},{"key":"e_1_3_2_1_10_1","volume-title":"StackInTheFlow: StackOverflow Search Engine. In VCU Capstone Design Expo Posters.","author":"Coogle John","year":"2017","unstructured":"John Coogle , Jeet Gajjar , and Chase Greco . 2017 . StackInTheFlow: StackOverflow Search Engine. In VCU Capstone Design Expo Posters. John Coogle, Jeet Gajjar, and Chase Greco. 2017. StackInTheFlow: StackOverflow Search Engine. In VCU Capstone Design Expo Posters."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Daniel Czyczyn-Egird and Rafal Wojszczyk. 2016. Determining the Popularity of Design Patterns Used by Programmers Based on the Analysis of Questions and Answers on Stackoverflow.com Social Network. In Communications in Computer and Information Science (CCIS). 421--433.  Daniel Czyczyn-Egird and Rafal Wojszczyk. 2016. Determining the Popularity of Design Patterns Used by Programmers Based on the Analysis of Questions and Answers on Stackoverflow.com Social Network. In Communications in Computer and Information Science (CCIS). 421--433.","DOI":"10.1007\/978-3-319-39207-3_36"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2212877.2212883"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098036"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219862"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Yujie Fan Yiming Zhang Yanfang Ye and Xin Li. 2018. Automatic Opioid User Detection from Twitter: Transductive Ensemble Built on Different Meta-graph Based Similarities over Heterogeneous Information Network.. In IJCAI. 3357--3363.  Yujie Fan Yiming Zhang Yanfang Ye and Xin Li. 2018. Automatic Opioid User Detection from Twitter: Transductive Ensemble Built on Different Meta-graph Based Similarities over Heterogeneous Information Network.. In IJCAI. 3357--3363.","DOI":"10.24963\/ijcai.2018\/466"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132857"},{"key":"e_1_3_2_1_17_1","volume-title":"The Impact of Copy and Paste on Android Application Security. In IEEE Symposium on Security and Privacy (SP). 121--136","author":"Fischer Felix","year":"2017","unstructured":"Felix Fischer , Konstantin Bottinger , Huang Xiao , Christian Stransky , Yasemin Acar , Michael Backes , and Sascha Fahl . 2017 . Stack Overflow Considered Harmful? The Impact of Copy and Paste on Android Application Security. In IEEE Symposium on Security and Privacy (SP). 121--136 . Felix Fischer, Konstantin Bottinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, and Sascha Fahl. 2017. Stack Overflow Considered Harmful? The Impact of Copy and Paste on Android Application Security. In IEEE Symposium on Security and Privacy (SP). 121--136."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132953"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1198\/016214502388618906"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIW.2016.040"},{"key":"e_1_3_2_1_22_1","volume-title":"DroidDelver: An Android Malware Detection System Using Deep Belief Network Based on API Call Blocks. In International Conference on Web-Age Information Management (WAIM). 54--66","author":"Hou Shifu","year":"2016","unstructured":"Shifu Hou , Aaron Saas , Yanfang Ye , and Lifei Chen . 2016 . DroidDelver: An Android Malware Detection System Using Deep Belief Network Based on API Call Blocks. In International Conference on Web-Age Information Management (WAIM). 54--66 . Shifu Hou, Aaron Saas, Yanfang Ye, and Lifei Chen. 2016. DroidDelver: An Android Malware Detection System Using Deep Belief Network Based on API Call Blocks. In International Conference on Web-Age Information Management (WAIM). 54--66."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098026"},{"key":"e_1_3_2_1_24_1","unstructured":"IDC. 2018. International Data Corporation (IDC). In http:\/\/www.idc.com.  IDC. 2018. International Data Corporation (IDC). In http:\/\/www.idc.com."},{"key":"e_1_3_2_1_25_1","volume-title":"The angle between complementary subspaces. Amer. Math. Monthly","author":"Ipsen Ilse CF","year":"1995","unstructured":"Ilse CF Ipsen and Carl D Meyer . 1995. The angle between complementary subspaces. Amer. Math. Monthly ( 1995 ), 904--911. Ilse CF Ipsen and Carl D Meyer. 1995. The angle between complementary subspaces. Amer. Math. Monthly (1995), 904--911."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"David Kavaler Sasha Sirovica Vincent Hellendoorn Raul Aranovich and Vladimir Filkov. 2017. Perceived Language Complexity in GitHub Issue Discussions and Their Effect on Issue Resolution. In ASE. 72--83.   David Kavaler Sasha Sirovica Vincent Hellendoorn Raul Aranovich and Vladimir Filkov. 2017. Perceived Language Complexity in GitHub Issue Discussions and Their Effect on Issue Resolution. In ASE. 72--83.","DOI":"10.1109\/ASE.2017.8115620"},{"key":"e_1_3_2_1_27_1","volume-title":"International Conference on Social Informatics. Springer, 245--256","author":"Ka-Wei Lee Roy","year":"2017","unstructured":"Roy Ka-Wei Lee and David Lo . 2017 . GitHub and Stack Overflow: Analyzing developer interests across multiple social collaborative platforms . In International Conference on Social Informatics. Springer, 245--256 . Roy Ka-Wei Lee and David Lo. 2017. GitHub and Stack Overflow: Analyzing developer interests across multiple social collaborative platforms. In International Conference on Social Informatics. Springer, 245--256."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597155"},{"key":"e_1_3_2_1_29_1","volume-title":"Mining Stack Overflow for Program Repair. In IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 118--129","author":"Liu Xuliang","year":"2018","unstructured":"Xuliang Liu and Hao Zhong . 2018 . Mining Stack Overflow for Program Repair. In IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 118--129 . Xuliang Liu and Hao Zhong. 2018. Mining Stack Overflow for Program Repair. In IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER). 118--129."},{"key":"e_1_3_2_1_30_1","unstructured":"Lucintel. 2017. Growth Opportunities in the Global Software Market. In http:\/\/www.lucintel.com\/software-market-2017.aspx.  Lucintel. 2017. Growth Opportunities in the Global Software Market. In http:\/\/www.lucintel.com\/software-market-2017.aspx."},{"key":"e_1_3_2_1_31_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. In arXiv preprint arXiv:1301.3781.  Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. In arXiv preprint arXiv:1301.3781."},{"key":"e_1_3_2_1_32_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In NIPS. 3111--3119.   Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In NIPS. 3111--3119."},{"key":"e_1_3_2_1_33_1","unstructured":"StackOverflow. 2018. Stack Overflow. In https:\/\/stackoverflow.com\/.  StackOverflow. 2018. Stack Overflow. In https:\/\/stackoverflow.com\/."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Sebastian Poeplau Yanick Fratantonio Antonio Bianchi Christopher Kruegel and Giovanni Vigna. 2014. Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications. In NDSS. 23--26.  Sebastian Poeplau Yanick Fratantonio Antonio Bianchi Christopher Kruegel and Giovanni Vigna. 2014. Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications. In NDSS. 23--26.","DOI":"10.14722\/ndss.2014.23328"},{"key":"e_1_3_2_1_36_1","unstructured":"Jingbo Shang Meng Qu Jialu Liu Lance M. Kaplan Jiawei Han and Jian Peng. 2016. Meta-Path Guided Embedding for Similarity Search in Large-Scale Heterogeneous Information Networks. In arXiv:1610.09769.  Jingbo Shang Meng Qu Jialu Liu Lance M. Kaplan Jiawei Han and Jian Peng. 2016. Meta-Path Guided Embedding for Similarity Search in Large-Scale Heterogeneous Information Networks. In arXiv:1610.09769."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2598561"},{"key":"e_1_3_2_1_38_1","unstructured":"StackExchange. 2018. StackExchange Statistics. In https:\/\/stackexchange.com\/sites#traffic.  StackExchange. 2018. StackExchange Statistics. In https:\/\/stackexchange.com\/sites#traffic."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2011.112"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2371211"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.14778\/3402707.3402736"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783307"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741093"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985907"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.35"},{"key":"e_1_3_2_1_46_1","volume-title":"Graph embedding and extensions: A general framework for dimensionality reduction","author":"Yan Shuicheng","year":"2007","unstructured":"Shuicheng Yan , Dong Xu , Benyu Zhang , Hong-Jiang Zhang , Qiang Yang , and Stephen Lin . 2007. Graph embedding and extensions: A general framework for dimensionality reduction . IEEE transactions on pattern analysis and machine intelligence (TPAMI) 29, 1 ( 2007 ), 40--51. Shuicheng Yan, Dong Xu, Benyu Zhang, Hong-Jiang Zhang, Qiang Yang, and Stephen Lin. 2007. Graph embedding and extensions: A general framework for dimensionality reduction. IEEE transactions on pattern analysis and machine intelligence (TPAMI) 29, 1 (2007), 40--51."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3073559"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098063"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00834-4_19"}],"event":{"name":"ACSAC '18: 2018 Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"San Juan PR USA","acronym":"ACSAC '18"},"container-title":["Proceedings of the 34th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274742","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274694.3274742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:56Z","timestamp":1750208276000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274742"}},"subtitle":["An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network"],"short-title":[],"issued":{"date-parts":[[2018,12,3]]},"references-count":49,"alternative-id":["10.1145\/3274694.3274742","10.1145\/3274694"],"URL":"https:\/\/doi.org\/10.1145\/3274694.3274742","relation":{},"subject":[],"published":{"date-parts":[[2018,12,3]]},"assertion":[{"value":"2018-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}