{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T00:49:18Z","timestamp":1772930958369,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T00:00:00Z","timestamp":1593216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation of China","award":["61802374"],"award-info":[{"award-number":["61802374"]}]},{"name":"National Key Research and Development Program of China","award":["2018YFB1403400"],"award-info":[{"award-number":["2018YFB1403400"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,27]]},"DOI":"10.1145\/3377811.3380356","type":"proceedings-article","created":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T18:25:38Z","timestamp":1601576738000},"page":"641-653","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Detection of hidden feature requests from massive chat messages via deep siamese network"],"prefix":"10.1145","author":[{"given":"Lin","family":"Shi","sequence":"first","affiliation":[{"name":"Institute of Software Chinese Academy of Sciences, Beijing, China"}]},{"given":"Mingzhe","family":"Xing","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Mingyang","family":"Li","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yawen","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Shoubin","family":"Li","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Qing","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. echelog. https:\/\/echelog.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Explosion AI. 2019. Spacy. https:\/\/spacy.io\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Rationale in Development Chat Messages: an Exploratory Study. Mining Software Repositories","author":"Alkadhi Rana","year":"2017","unstructured":"Rana Alkadhi, Teodora Lata, Emitza Guzmany, and Bernd Bruegge. 2017. Rationale in Development Chat Messages: an Exploratory Study. Mining Software Repositories (2017), 436--446."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330223"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463788.1463819"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00058"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2188385.2188395"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Jane Bromley Isabelle Guyon Yann LeCun Eduard S\u00e4ckinger and Roopak Shah. 1994. Signature verification using a\" siamese\" time delay neural network. In Advances in neural information processing systems. 737--744.","DOI":"10.1142\/9789812797926_0003"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00075"},{"key":"e_1_3_2_1_10_1","volume-title":"International Conference on Learning Representations.","author":"Chen Wei-Yu","year":"2019","unstructured":"Wei-Yu Chen, Yen-Cheng Liu, Zsolt Kira, Yu-Chiang Wang, and Jia-Bin Huang. 2019. A Closer Look at Few-shot Classification. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Shaiful Alam Chowdhury and Abram Hindle. 2015. Mining StackOverflow to filter out off-topic IRC discussion. (2015) 422--425.","DOI":"10.1109\/MSR.2015.54"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1562764.1562784"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. 499--510","author":"Sorbo Andrea Di","unstructured":"Andrea Di Sorbo, Sebastiano Panichella, Carol V. Alexandru, Junji Shimagaki, Corrado A. Visaggio, Gerardo Canfora, and Harald C. Gall. 2016. What Would Users Change in My App? Summarizing App Reviews for Recommending Software Changes. In Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. 499--510."},{"key":"e_1_3_2_1_14_1","unstructured":"Facebook. 2019. FastText. https:\/\/fasttext.cc\/."},{"key":"e_1_3_2_1_15_1","unstructured":"Facebook. 2019. PyTorch. https:\/\/pytorch.org\/."},{"key":"e_1_3_2_1_16_1","unstructured":"Allen Institute for Artificial Intelligence. 2019. AllenNLP. https:\/\/allennlp.org\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Google. 2019. AngularJS. https:\/\/angularjs.org\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Google. 2019. Chromium. https:\/\/www.chromium.org\/."},{"key":"e_1_3_2_1_19_1","unstructured":"Google. 2019. Scikit-Learn. https:\/\/scikit-learn.org\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.33"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486840"},{"key":"e_1_3_2_1_23_1","volume-title":"Long short-term memory. Neural computation 9, 8","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the sixth new zealand computer science research student conference (NZCSRSC2008)","volume":"4","author":"Huang Anna","year":"2008","unstructured":"Anna Huang. 2008. Similarity measures for text document clustering. In Proceedings of the sixth new zealand computer science research student conference (NZCSRSC2008), Christchurch, New Zealand, Vol. 4. 9--56."},{"key":"e_1_3_2_1_25_1","first-page":"1","article-title":"Automating Intention Mining","volume":"99","author":"Huang Qiao","year":"2018","unstructured":"Qiao Huang, Xin Xia, David Lo, and Gail C. Murphy. 2018. Automating Intention Mining. IEEE Transactions on Software Engineering PP, 99 (2018), 1--1.","journal-title":"IEEE Transactions on Software Engineering PP"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Nishant Jha and Anas Mahmoud. 2017. Mining User Requirements from Application Store Reviews Using Frame Semantics. (2017) 273--287.","DOI":"10.1007\/978-3-319-54045-0_20"},{"key":"e_1_3_2_1_28_1","volume-title":"zip: Compressing text classification models. arXiv preprint arXiv:1612.03651","author":"Joulin Armand","year":"2016","unstructured":"Armand Joulin, Edouard Grave, Piotr Bojanowski, Matthijs Douze, H\u00e9rve J\u00e9gou, and Tomas Mikolov. 2016. Fasttext. zip: Compressing text classification models. arXiv preprint arXiv:1612.03651 (2016)."},{"key":"e_1_3_2_1_29_1","volume-title":"Lightgbm: A highly efficient gradient boosting decision tree. In Advances in Neural Information Processing Systems. 3146--3154.","author":"Ke Guolin","year":"2017","unstructured":"Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. Lightgbm: A highly efficient gradient boosting decision tree. In Advances in Neural Information Processing Systems. 3146--3154."},{"key":"e_1_3_2_1_30_1","volume-title":"Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882","author":"Kim Yoon","year":"2014","unstructured":"Yoon Kim. 2014. Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882 (2014)."},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, IJCAI 95","author":"Kohavi Ron","year":"1995","unstructured":"Ron Kohavi. 1995. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection. In Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, IJCAI 95, Montr\u00e9al Qu\u00e9bec, Canada, August 20--25 1995, 2 Volumes. 1137--1145."},{"key":"e_1_3_2_1_32_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers).","author":"Kummerfeld Jonathan K.","unstructured":"Jonathan K. Kummerfeld, Sai R. Gouravajhala, Joseph Peper, Vignesh Athreya, Chulaka Gunasekara, Jatin Ganhotra, Siva Sankalp Patel, Lazaros Polymenakos, and Walter S. Lasecki. 2019. A Large-Scale Corpus for Conversation Disentanglement. In Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)."},{"key":"e_1_3_2_1_34_1","volume-title":"Matthew Wiener, et al","author":"Liaw Andy","year":"2002","unstructured":"Andy Liaw, Matthew Wiener, et al. 2002. Classification and regression by randomForest. R news 2, 3 (2002), 18--22."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818052.2869117"},{"key":"e_1_3_2_1_36_1","first-page":"73","article-title":"Data mining for direct marketing: Problems and solutions","volume":"98","author":"Ling Charles X","year":"1998","unstructured":"Charles X Ling and Chenghui Li. 1998. Data mining for direct marketing: Problems and solutions.. In Kdd, Vol. 98. 73--79.","journal-title":"Kdd"},{"key":"e_1_3_2_1_37_1","volume-title":"Feature request, or Simply Praise? on Automatically Classifying App Reviews. In 2015 IEEE 23rd international requirements engineering conference (RE)","author":"Maalej Walid","unstructured":"Walid Maalej and Hadeer Nabil. 2015. Bug report, Feature request, or Simply Praise? on Automatically Classifying App Reviews. In 2015 IEEE 23rd international requirements engineering conference (RE). IEEE, 116--125."},{"key":"e_1_3_2_1_38_1","volume-title":"AAAI-98 workshop on learning for text categorization","volume":"752","author":"McCallum Andrew","year":"1998","unstructured":"Andrew McCallum, Kamal Nigam, et al. 1998. A comparison of event models for naive bayes text classification. In AAAI-98 workshop on learning for text categorization, Vol. 752. Citeseer, 41--48."},{"key":"e_1_3_2_1_39_1","unstructured":"Collin Mcmillan Collin Mcmillan Collin Mcmillan and Collin Mcmillan. 2017. Detecting User Story Information in Developer-client Conversations to Generate Extractive Summaries. In Ieee\/acm International Conference on Software Engineering. 49--59."},{"key":"e_1_3_2_1_40_1","volume-title":"Software Feature Request Detection in Issue Tracking Systems. In Requirements Engineering Conference (RE)","author":"Merten Thorsten","year":"2016","unstructured":"Thorsten Merten, Mat\u00fa\u0161 Falis, Paul H\u00fcbner, Thomas Quirchmayr, Simone B\u00fcrsner, and Barbara Paech. 2016. Software Feature Request Detection in Issue Tracking Systems. In Requirements Engineering Conference (RE), 2016 IEEE 24th International. IEEE, 166--175."},{"key":"e_1_3_2_1_41_1","volume-title":"REFSQ Workshops. 114--125","author":"Merten Thorsten","year":"2015","unstructured":"Thorsten Merten, Bastian Mager, Paul H\u00fcbner, Thomas Quirchmayr, Barbara Paech, and Simone B\u00fcrsner. 2015. Requirements Communication in Issue Tracking Systems in Four Open-Source Projects.. In REFSQ Workshops. 114--125."},{"key":"e_1_3_2_1_42_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111--3119."},{"key":"e_1_3_2_1_43_1","volume-title":"Fitsum Meshesha Kifetew, and Anna Perini","author":"Morales-Ramirez Itzel","year":"2017","unstructured":"Itzel Morales-Ramirez, Fitsum Meshesha Kifetew, and Anna Perini. 2017. Analysis of Online Discussions in Support of Requirements Discovery. In Advanced Information Systems Engineering. 159--174."},{"key":"e_1_3_2_1_44_1","volume-title":"Fitsum Meshesha Kifetew, and Anna Perini","author":"Morales-Ramirez Itzel","year":"2018","unstructured":"Itzel Morales-Ramirez, Fitsum Meshesha Kifetew, and Anna Perini. 2018. Speech-acts based analysis for requirements discovery from online discussions. Information Systems (2018)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/3016100.3016291"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332475"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"e_1_3_2_1_48_1","volume-title":"Emitza Guzman, Corrado Aaron Visaggio, Gerardo Canfora, and Harald C Gall.","author":"Panichella Sebastiano","year":"2015","unstructured":"Sebastiano Panichella, Andrea Di Sorbo, Emitza Guzman, Corrado Aaron Visaggio, Gerardo Canfora, and Harald C Gall. 2015. How can i improve my app? Classifying user reviews for software maintenance and evolution. (2015), 281--290."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.03.001"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-017-0063-2"},{"key":"e_1_3_2_1_52_1","volume-title":"Early stopping-but when? In Neural Networks: Tricks of the trade","author":"Prechelt Lutz","unstructured":"Lutz Prechelt. 1998. Early stopping-but when? In Neural Networks: Tricks of the trade. Springer, 55--69."},{"key":"e_1_3_2_1_53_1","unstructured":"Scrapinghub. 2019. Scrapy. https:\/\/scrapy.org\/."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2016.65"},{"key":"e_1_3_2_1_55_1","volume-title":"Understanding feature requests by leveraging fuzzy method and linguistic analysis. automated software engineering","author":"Shi Lin","year":"2017","unstructured":"Lin Shi, Celia Chen, Qing Wang, Shoubin Li, and Barry W Boehm. 2017. Understanding feature requests by leveraging fuzzy method and linguistic analysis. automated software engineering (2017), 440--450."},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the 6th International Working Conference on Mining Software Repositories, MSR 2009 (Co-located with ICSE), Vancouver, BC, Canada, May 16--17, 2009, Proceedings. 107--110","author":"Shihab Emad","unstructured":"Emad Shihab, Zhen Ming Jiang, and Ahmed E. Hassan. 2009. On the use of Internet Relay Chat (IRC) meetings by developers of the GNOME GTK+ project. In Proceedings of the 6th International Working Conference on Mining Software Repositories, MSR 2009 (Co-located with ICSE), Vancouver, BC, Canada, May 16--17, 2009, Proceedings. 107--110."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306333"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.12"},{"key":"e_1_3_2_1_59_1","volume-title":"Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research 15, 1","author":"Srivastava Nitish","year":"2014","unstructured":"Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research 15, 1 (2014), 1929--1958."},{"key":"e_1_3_2_1_60_1","unstructured":"Bootstrap Team. 2019. Bootstrap. https:\/\/getbootstrap.com\/."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-019-0105-z"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884818"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280402"},{"key":"e_1_3_2_1_64_1","volume-title":"Few-shot learning: A survey. arXiv preprint arXiv:1904.05046","author":"Wang Yaqing","year":"2019","unstructured":"Yaqing Wang and Quanming Yao. 2019. Few-shot learning: A survey. arXiv preprint arXiv:1904.05046 (2019)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236031"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25126-9_32"}],"event":{"name":"ICSE '20: 42nd International Conference on Software Engineering","location":"Seoul South Korea","acronym":"ICSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","KIISE Korean Institute of Information Scientists and Engineers","IEEE CS"]},"container-title":["Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377811.3380356","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377811.3380356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:57Z","timestamp":1750202637000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377811.3380356"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,27]]},"references-count":65,"alternative-id":["10.1145\/3377811.3380356","10.1145\/3377811"],"URL":"https:\/\/doi.org\/10.1145\/3377811.3380356","relation":{},"subject":[],"published":{"date-parts":[[2020,6,27]]},"assertion":[{"value":"2020-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}