{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:47:35Z","timestamp":1776782855446,"version":"3.51.2"},"reference-count":196,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2022,3,4]],"date-time":"2022-03-04T00:00:00Z","timestamp":1646352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CCF-1927679, CCF-1955853, CCF-2007246, and CCF-1815186"],"award-info":[{"award-number":["CCF-1927679, CCF-1955853, CCF-2007246, and CCF-1815186"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2022,4,30]]},"abstract":"<jats:p>\n            An increasingly popular set of techniques adopted by software engineering (SE) researchers to automate development tasks are those rooted in the concept of Deep Learning (DL). The popularity of such techniques largely stems from their automated feature engineering capabilities, which aid in modeling software artifacts. However, due to the rapid pace at which DL techniques have been adopted, it is difficult to distill the current successes, failures, and opportunities of the current research landscape. In an effort to bring clarity to this cross-cutting area of work, from its modern inception to the present, this article presents a systematic literature review of research at the intersection of SE &amp; DL. The review canvasses work appearing in the most prominent SE and DL conferences and journals and spans 128 papers across 23\u00a0unique SE tasks. We center our analysis around the\n            <jats:italic>components of learning<\/jats:italic>\n            , a set of principles that governs the application of machine learning techniques (ML) to a given problem domain, discussing several aspects of the surveyed work at a granular level. The end result of our analysis is a\n            <jats:italic>research roadmap<\/jats:italic>\n            that both delineates the foundations of DL techniques applied to SE research and highlights likely areas of fertile exploration for the future.\n          <\/jats:p>","DOI":"10.1145\/3485275","type":"journal-article","created":{"date-parts":[[2022,3,4]],"date-time":"2022-03-04T09:54:21Z","timestamp":1646387661000},"page":"1-58","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":123,"title":["A Systematic Literature Review on the Use of Deep Learning in Software Engineering Research"],"prefix":"10.1145","volume":"31","author":[{"given":"Cody","family":"Watson","sequence":"first","affiliation":[{"name":"Washington &amp; Lee University, Lexington, Virginia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nathan","family":"Cooper","sequence":"additional","affiliation":[{"name":"William &amp; Mary, Williamsburg, Virginia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David Nader","family":"Palacio","sequence":"additional","affiliation":[{"name":"William &amp; Mary, Williamsburg, Virginia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9683-5616","authenticated-orcid":false,"given":"Kevin","family":"Moran","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, Virginia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Denys","family":"Poshyvanyk","sequence":"additional","affiliation":[{"name":"William &amp; Mary, Williamsburg, Virginia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,3,4]]},"reference":[{"key":"e_1_3_3_2_2","unstructured":"Alison Farr. 2016. Welcome to core. Welcome to Core . The Computing Research and Education Association of Australasia. https:\/\/www.core.edu.au\/home."},{"key":"e_1_3_3_3_2","unstructured":"Pornsiri Muenchaisri. Literature Reviews on Applying Artificial Intelligence\/Machine Learning to Software Engineering Research Problems: Preliminary. SEED@APSEC."},{"key":"e_1_3_3_4_2","unstructured":"Artifact Review and Badging \u2013 Version 2.0. Artifact Review and Badging \u2013 Version 2.0 Association for Computing Machinery 4 Nov. 2021 https:\/\/www.acm.org\/publications\/policies\/artifact-review-badging."},{"key":"e_1_3_3_5_2","unstructured":"Mierswa Ingo and Ralf Klinkenberg. \u201cBest Data Science & Machine Learning Platform.\u201d RapidMiner RapidMiner Inc. 9 Nov. 2021 https:\/\/rapidminer.com\/."},{"key":"e_1_3_3_6_2","volume-title":"Learning from Data: A Short Course","author":"Abu-Mostafa Yaser S.","year":"2012","unstructured":"Yaser S. Abu-Mostafa, Malik Magdon-Ismail, and Hsuan-Tien Lin. 2012. Learning from Data: A Short Course. AMLbook.com."},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-09942-y"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.23956\/ijermt.v6i6.286"},{"key":"e_1_3_3_9_2","article-title":"The adverse effects of code duplication in machine learning models of code","volume":"1812","author":"Allamanis Miltiadis","year":"2018","unstructured":"Miltiadis Allamanis. 2018. The adverse effects of code duplication in machine learning models of code. CoRR abs\/1812.06469 (2018).","journal-title":"CoRR"},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786849"},{"key":"e_1_3_3_11_2","volume-title":"Proceedings of the 6th International Conference on Learning Representations","author":"Allamanis Miltiadis","year":"2018","unstructured":"Miltiadis Allamanis, Marc Brockschmidt, and Mahmoud Khademi. 2018. Learning to represent programs with graphs. In Proceedings of the 6th International Conference on Learning Representations. OpenReview.net. Retrieved from https:\/\/openreview.net\/forum?id=BJOFETxR-."},{"key":"e_1_3_3_12_2","first-page":"2091","volume-title":"Proceedings of the 33rd International Conference on Machine Learning (JMLR Workshop and Conference Proceedings)","volume":"48","author":"Allamanis Miltiadis","year":"2016","unstructured":"Miltiadis Allamanis, Hao Peng, and Charles Sutton. 2016. A convolutional attention network for extreme summarization of source code. In Proceedings of the 33rd International Conference on Machine Learning (JMLR Workshop and Conference Proceedings), Maria-Florina Balcan and Kilian Q. Weinberger (Eds.), Vol. 48. JMLR.org, 2091\u20132100. Retrieved from http:\/\/proceedings.mlr.press\/v48\/allamanis16.html."},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2020.07.010"},{"key":"e_1_3_3_14_2","volume-title":"Proceedings of the 6th International Conference on Learning Representations","author":"Arabshahi Forough","year":"2018","unstructured":"Forough Arabshahi, Sameer Singh, and Animashree Anandkumar. 2018. Combining symbolic expressions and black-box function evaluations in neural programs. In Proceedings of the 6th International Conference on Learning Representations. OpenReview.net. Retrieved from https:\/\/openreview.net\/forum?id=Hksj2WWAW."},{"key":"e_1_3_3_15_2","volume-title":"Proceedings of the 5th International Conference on Learning Representations","author":"Balog Matej","year":"2017","unstructured":"Matej Balog, Alexander L. Gaunt, Marc Brockschmidt, Sebastian Nowozin, and Daniel Tarlow. 2017. DeepCoder: Learning to write programs. In Proceedings of the 5th International Conference on Learning Representations. OpenReview.net. Retrieved from https:\/\/openreview.net\/forum?id=ByldLrqlx."},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3360594"},{"key":"e_1_3_3_17_2","first-page":"3589","volume-title":"Proceedings of the Annual Conference on Neural Information Processing Systems","author":"Ben-Nun Tal","year":"2018","unstructured":"Tal Ben-Nun, Alice Shoshana Jakobovits, and Torsten Hoefler. 2018. Neural code comprehension: A learnable representation of code semantics. In Proceedings of the Annual Conference on Neural Information Processing Systems, Samy Bengio, Hanna M. Wallach, Hugo Larochelle, Kristen Grauman, Nicol\u00f2 Cesa-Bianchi, and Roman Garnett (Eds.). 3589\u20133601. Retrieved from https:\/\/proceedings.neurips.cc\/paper\/2018\/hash\/17c3433fecc21b57000debdf7ad5c930-Abstract.html."},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180219"},{"key":"e_1_3_3_19_2","first-page":"758","volume-title":"Proceedings of the Workshops of the the 32nd AAAI Conference on Artificial Intelligence (AAAI Workshops\u201918)","author":"Bui Nghi D. Q.","year":"2018","unstructured":"Nghi D. Q. Bui, Lingxiao Jiang, and Yijun Yu. 2018. Cross-language learning for program classification using bilateral tree-based convolutional neural networks. In Proceedings of the Workshops of the the 32nd AAAI Conference on Artificial Intelligence (AAAI Workshops\u201918). AAAI Press, 758\u2013761. Retrieved from https:\/\/aaai.org\/ocs\/index.php\/WS\/AAAIW18\/paper\/view\/17338."},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667995"},{"key":"e_1_3_3_21_2","volume-title":"Proceedings of the 6th International Conference on Learning Representations","author":"Bunel Rudy","year":"2018","unstructured":"Rudy Bunel, Matthew J. Hausknecht, Jacob Devlin, Rishabh Singh, and Pushmeet Kohli. 2018. Leveraging grammar and reinforcement learning for neural program synthesis. In Proceedings of the 6th International Conference on Learning Representations. OpenReview.net. Retrieved from https:\/\/openreview.net\/forum?id=H1Xw62kRZ."},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668039"},{"key":"e_1_3_3_23_2","volume-title":"Proceedings of the 5th International Conference on Learning Representations","author":"Cai Jonathon","year":"2017","unstructured":"Jonathon Cai, Richard Shin, and Dawn Song. 2017. Making neural programming architectures generalize via recursion. In Proceedings of the 5th International Conference on Learning Representations. OpenReview.net. Retrieved from https:\/\/openreview.net\/forum?id=BkbY4psgg."},{"key":"e_1_3_3_24_2","article-title":"Deep learning for anomaly detection: A survey","volume":"1901","author":"Chalapathy Raghavendra","year":"2019","unstructured":"Raghavendra Chalapathy and Sanjay Chawla. 2019. Deep learning for anomaly detection: A survey. CoRR abs\/1901.03407 (2019).","journal-title":"CoRR"},{"key":"e_1_3_3_25_2","volume-title":"Constructing Grounded Theory","author":"Charmaz K.","year":"2006","unstructured":"K. Charmaz. 2006. Constructing Grounded Theory. SAGE Publications Inc."},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00014"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180240"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2896123"},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970317"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240471"},{"key":"e_1_3_3_31_2","volume-title":"Proceedings of the 6th International Conference on Learning Representations","author":"Chen Xinyun","year":"2018","unstructured":"Xinyun Chen, Chang Liu, and Dawn Song. 2018. Towards synthesizing complex programs from input-output examples. In Proceedings of the 6th International Conference on Learning Representations. OpenReview.net. Retrieved from https:\/\/openreview.net\/forum?id=Skp1ESxRZ."},{"key":"e_1_3_3_32_2","first-page":"2547","volume-title":"Proceedings of the International Conference on Advances in Neural Information Processing Systems","author":"Chen Xinyun","year":"2018","unstructured":"Xinyun Chen, Chang Liu, and Dawn Song. 2018. Tree-to-tree neural networks for program translation. In Proceedings of the International Conference on Advances in Neural Information Processing Systems, S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and R. Garnett (Eds.). Curran Associates, Inc., 2547\u20132557. Retrieved from http:\/\/papers.nips.cc\/paper\/7521-tree-to-tree-neural-networks-for-program-translation.pdf."},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9496-7"},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2693989"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2792473"},{"key":"e_1_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332513"},{"key":"e_1_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213848"},{"key":"e_1_3_3_38_2","first-page":"1475","volume-title":"Proceedings of the 36th International Conference on Machine Learning","volume":"97","author":"Cvitkovic Milan","year":"2019","unstructured":"Milan Cvitkovic, Badal Singh, and Animashree Anandkumar. 2019. Open vocabulary learning on source code with a graph-structured cache. In Proceedings of the 36th International Conference on Machine Learning, Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.), Vol. 97. PMLR, 1475\u20131485. Retrieved from http:\/\/proceedings.mlr.press\/v97\/cvitkovic19b.html."},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00017"},{"key":"e_1_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2881961"},{"key":"e_1_3_3_41_2","first-page":"980","volume-title":"Proceedings of the 34th International Conference on Machine Learning (ICML\u201917)","author":"Deng Yuntian","year":"2017","unstructured":"Yuntian Deng, Anssi Kanervisto, Jeffrey Ling, and Alexander M. Rush. 2017. Image-to-markup generation with coarse-to-fine attention. In Proceedings of the 34th International Conference on Machine Learning (ICML\u201917). JMLR.org, 980\u2013989."},{"key":"e_1_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.69"},{"key":"e_1_3_3_43_2","first-page":"2080","volume-title":"Proceedings of the Annual Conference on Neural Information Processing Systems","author":"Devlin Jacob","year":"2017","unstructured":"Jacob Devlin, Rudy Bunel, Rishabh Singh, Matthew J. Hausknecht, and Pushmeet Kohli. 2017. Neural program meta-induction. In Proceedings of the Annual Conference on Neural Information Processing Systems, Isabelle Guyon, Ulrike von Luxburg, Samy Bengio, Hanna M. Wallach, Rob Fergus, S. V. N. Vishwanathan, and Roman Garnett (Eds.). 2080\u20132088. Retrieved from https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/3bf55bbad370a8fcad1d09b005e278c2-Abstract.html."},{"key":"e_1_3_3_44_2","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","volume":"1810","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. BERT: Pre-training of deep bidirectional transformers for language understanding. CoRR abs\/1810.04805 (2018).","journal-title":"CoRR"},{"key":"e_1_3_3_45_2","first-page":"990","volume-title":"Proceedings of the 34th International Conference on Machine Learning (Proceedings of Machine Learning Research)","volume":"70","author":"Devlin Jacob","year":"2017","unstructured":"Jacob Devlin, Jonathan Uesato, Surya Bhupatiraju, Rishabh Singh, Abdel-rahman Mohamed, and Pushmeet Kohli. 2017. RobustFill: Neural program learning under noisy I\/O. In Proceedings of the 34th International Conference on Machine Learning (Proceedings of Machine Learning Research), Doina Precup and Yee Whye Teh (Eds.), Vol. 70. PMLR, 990\u2013998. Retrieved from http:\/\/proceedings.mlr.press\/v70\/devlin17a.html."},{"key":"e_1_3_3_46_2","first-page":"37","volume-title":"Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining (KDD\u201998)","author":"Domingos Pedro","year":"1998","unstructured":"Pedro Domingos. 1998. Occam\u2019s two razors: The sharp and the blunt. In Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining (KDD\u201998). AAAI Press, 37\u201343."},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2021068"},{"key":"e_1_3_3_48_2","first-page":"7805","volume-title":"Proceedings of the International Conference on Advances in Neural Information Processing Systems","author":"Ellis Kevin","year":"2018","unstructured":"Kevin Ellis, Lucas Morales, Mathias Sabl\u00e9-Meyer, Armando Solar-Lezama, and Josh Tenenbaum. 2018. Learning libraries of subroutines for neurally guided Bayesian program induction. In Proceedings of the International Conference on Advances in Neural Information Processing Systems, S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and R. Garnett (Eds.). Curran Associates, Inc., 7805\u20137815. Retrieved from http:\/\/papers.nips.cc\/paper\/8006-learning-libraries-of-subroutines-for-neurallyguided-bayesian-program-induction.pdf."},{"key":"e_1_3_3_49_2","first-page":"6059","volume-title":"Proceedings of the International Conference on Advances in Neural Information Processing Systems","author":"Ellis Kevin","year":"2018","unstructured":"Kevin Ellis, Daniel Ritchie, Armando Solar-Lezama, and Josh Tenenbaum. 2018. Learning to infer graphics programs from hand-drawn images. In Proceedings of the International Conference on Advances in Neural Information Processing Systems, S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and R. Garnett (Eds.). Curran Associates, Inc., 6059\u20136068. Retrieved from http:\/\/papers.nips.cc\/paper\/7845-learning-to-infer-graphics-programs-from-hand-drawn-images.pdf."},{"key":"e_1_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330265"},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.79"},{"key":"e_1_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.265101102"},{"key":"e_1_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00085"},{"key":"e_1_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v17i3.1230"},{"key":"e_1_3_3_55_2","unstructured":"Fabio Ferreira Luciana Lourdes Silva and Marco Tulio Valente. 2019. Software Engineering Meets Deep Learning: A Literature Review. arxiv:1909.11436 [cs.SE]"},{"key":"e_1_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106256"},{"key":"e_1_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240480"},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667994"},{"key":"e_1_3_3_59_2","first-page":"1213","volume-title":"Proceedings of the 34th International Conference on Machine Learning (Proceedings of Machine Learning Research)","volume":"70","author":"Gaunt Alexander L.","year":"2017","unstructured":"Alexander L. Gaunt, Marc Brockschmidt, Nate Kushman, and Daniel Tarlow. 2017. Differentiable programs with neural libraries. In Proceedings of the 34th International Conference on Machine Learning (Proceedings of Machine Learning Research), Doina Precup and Yee Whye Teh (Eds.), Vol. 70. PMLR, International Convention Centre, 1213\u20131222. Retrieved from http:\/\/proceedings.mlr.press\/v70\/gaunt17a.html."},{"key":"e_1_3_3_60_2","doi-asserted-by":"crossref","unstructured":"Leilani H. Gilpin David Bau Ben Z. Yuan Ayesha Bajwa Michael Specter and Lalana Kagal. 2019. Explaining Explanations: An Overview of Interpretability of Machine Learning. arxiv:1806.00069 [cs.AI]","DOI":"10.1109\/DSAA.2018.00018"},{"key":"e_1_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155573"},{"key":"e_1_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.5555\/3086952"},{"key":"e_1_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180167"},{"key":"e_1_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950334"},{"key":"e_1_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668037"},{"key":"e_1_3_3_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.9"},{"key":"e_1_3_3_67_2","article-title":"DLFuzz: Differential fuzzing testing of deep learning systems","volume":"1808","author":"Guo Jianmin","year":"2018","unstructured":"Jianmin Guo, Yu Jiang, Yue Zhao, Quan Chen, and Jiaguang Sun. 2018. DLFuzz: Differential fuzzing testing of deep learning systems. CoRR abs\/1808.09413 (2018).","journal-title":"CoRR"},{"key":"e_1_3_3_68_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.3301930"},{"key":"e_1_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10742"},{"key":"e_1_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00113"},{"key":"e_1_3_3_71_2","doi-asserted-by":"crossref","unstructured":"Jiawei Han Jian Pei and Yiwen Yin. 2000. Mining frequent patterns without candidate generation. ACM SIGMOD Rec. 29 2 (2000) 1\u201312.","DOI":"10.1145\/335191.335372"},{"key":"e_1_3_3_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.52"},{"key":"e_1_3_3_73_2","first-page":"7933","volume-title":"Proceedings of the International Conference on Advances in Neural Information Processing Systems","author":"Harer Jacob","year":"2018","unstructured":"Jacob Harer, Onur Ozdemir, Tomo Lazovich, Christopher Reale, Rebecca Russell, Louis Kim, and Peter Chin. 2018. Learning to repair software vulnerabilities with generative adversarial networks. In Proceedings of the International Conference on Advances in Neural Information Processing Systems, S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and R. Garnett (Eds.). Curran Associates, Inc., 7933\u20137943. Retrieved from http:\/\/papers.nips.cc\/paper\/8018-learning-to-repair-software-vulnerabilities-with-generative-adversarial-networks.pdf."},{"key":"e_1_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236051"},{"key":"e_1_3_3_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106290"},{"key":"e_1_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264832"},{"key":"e_1_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00016"},{"key":"e_1_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/3196321.3196334"},{"key":"e_1_3_3_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2876340"},{"key":"e_1_3_3_80_2","doi-asserted-by":"crossref","unstructured":"Nargiz Humbatova Gunel Jahangirova Gabriele Bavota Vincenzo Riccio Andrea Stocco and Paolo Tonella. 2019. Taxonomy of Real Faults in Deep Learning Systems. arxiv:1910.11015 [cs.SE]","DOI":"10.1145\/3377811.3380395"},{"key":"e_1_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2920771"},{"key":"e_1_3_3_82_2","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","volume":"1502","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. CoRR abs\/1502.03167 (2015).","journal-title":"CoRR"},{"key":"e_1_3_3_83_2","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155583"},{"key":"e_1_3_3_84_2","volume-title":"Proceedings of the 6th International Conference on Learning Representations","author":"Kalyan Ashwin","year":"2018","unstructured":"Ashwin Kalyan, Abhishek Mohta, Oleksandr Polozov, Dhruv Batra, Prateek Jain, and Sumit Gulwani. 2018. Neural-guided deductive search for real-time program synthesis from examples. In Proceedings of the 6th International Conference on Learning Representations. OpenReview.net. Retrieved from https:\/\/openreview.net\/forum?id=rywDjg-RW."},{"key":"e_1_3_3_85_2","article-title":"Maybe deep neural networks are the best choice for modeling source code","volume":"1903","author":"Karampatsis Rafael-Michael","year":"2019","unstructured":"Rafael-Michael Karampatsis and Charles Sutton. 2019. Maybe deep neural networks are the best choice for modeling source code. CoRR abs\/1903.05734 (2019).","journal-title":"CoRR"},{"key":"e_1_3_3_86_2","first-page":"1073","article-title":"Big code != Big vocabulary: Open-vocabulary models for source code","author":"Karampatsis Rafael-Michael","year":"2020","unstructured":"Rafael-Michael Karampatsis, Hlib Babii, R. Robbes, Charles Sutton, and A. Janes. 2020. Big code != Big vocabulary: Open-vocabulary models for source code. In Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering (ICSE\u201920). 1073\u20131085.","journal-title":"Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering (ICSE\u201920)"},{"key":"e_1_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330222"},{"key":"e_1_3_3_88_2","unstructured":"Pieter-Jan Kindermans Kristof T. Sch\u00fctt Maximilian Alber Klaus-Robert M\u00fcller Dumitru Erhan Been Kim and Sven D\u00e4hne. 2017. Learning How to Explain Neural Networks: PatternNet and PatternAttribution. arxiv:1705.05598 [stat.ML]"},{"key":"e_1_3_3_89_2","unstructured":"Diederik P. Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arxiv:1412.6980 [cs.LG]"},{"key":"e_1_3_3_90_2","unstructured":"B. Kitchenham and S. Charters. 2007. Guidelines for performing Systematic Literature Reviews in Software Engineering (EBSE 2007-001). Keele University and Durham University Joint Report. Retrieved from https:\/\/www.elsevier.com\/__data\/promis_misc\/525444systematicreviewsguide.pdf."},{"key":"e_1_3_3_91_2","first-page":"1097","volume-title":"Proceedings of the International Conference on Advances in Neural Information Processing Systems","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet classification with deep convolutional neural networks. In Proceedings of the International Conference on Advances in Neural Information Processing Systems, F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 1097\u20131105. Retrieved from http:\/\/papers.nips.cc\/paper\/4824-imagenet-classification-with-deep-convolutional-neural-networks.pdf."},{"key":"e_1_3_3_92_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1117-8"},{"key":"e_1_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.73"},{"key":"e_1_3_3_94_2","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264597"},{"key":"e_1_3_3_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213876"},{"key":"e_1_3_3_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00087"},{"key":"e_1_3_3_97_2","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3117776"},{"key":"e_1_3_3_98_2","first-page":"2043","volume-title":"Proceedings of the 34th International Conference on Machine Learning (Proceedings of Machine Learning Research)","volume":"70","author":"Levy Dor","year":"2017","unstructured":"Dor Levy and Lior Wolf. 2017. Learning to align the source code to the compiled object code. In Proceedings of the 34th International Conference on Machine Learning (Proceedings of Machine Learning Research), Doina Precup and Yee Whye Teh (Eds.), Vol. 70. PMLR, International Convention Centre, 2043\u20132051. Retrieved from http:\/\/proceedings.mlr.press\/v70\/levy17a.html."},{"key":"e_1_3_3_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433204"},{"key":"e_1_3_3_100_2","first-page":"249","article-title":"CCLearner: A deep learning-based clone detection approach","author":"Li Liuqing","year":"2017","unstructured":"Liuqing Li, He Feng, Wenjie Zhuang, Na Meng, and Barbara G. Ryder. 2017. CCLearner: A deep learning-based clone detection approach. In Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME\u201917). 249\u2013260.","journal-title":"I"},{"key":"e_1_3_3_101_2","article-title":"Deep learning in software engineering","volume":"1805","author":"Li Xiaochen","year":"2018","unstructured":"Xiaochen Li, He Jiang, Zhilei Ren, Ge Li, and Jingxuan Zhang. 2018. Deep learning in software engineering. CoRR abs\/1805.04825 (2018).","journal-title":"CoRR"},{"key":"e_1_3_3_102_2","doi-asserted-by":"publisher","DOI":"10.1145\/3360588"},{"key":"e_1_3_3_103_2","first-page":"9994","volume-title":"Proceedings of the International Conference on Advances in Neural Information Processing Systems","author":"Liang Chen","year":"2018","unstructured":"Chen Liang, Mohammad Norouzi, Jonathan Berant, Quoc V. Le, and Ni Lao. 2018. Memory augmented policy optimization for program synthesis and semantic parsing. In Proceedings of the International Conference on Advances in Neural Information Processing Systems, S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and R. Garnett (Eds.). Curran Associates, Inc., 9994\u201310006. Retrieved from http:\/\/papers.nips.cc\/paper\/8204-memory-augmented-policy-optimization-for-program-synthesis-and-semantic-parsing.pdf."},{"key":"e_1_3_3_104_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180195"},{"key":"e_1_3_3_105_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238199"},{"key":"e_1_3_3_106_2","first-page":"4574","volume-title":"Proceedings of the International Conference on Advances in Neural Information Processing Systems","author":"Liu Chang","year":"2016","unstructured":"Chang Liu, Xinyun Chen, Richard Shin, Mingcheng Chen, and Dawn Song. 2016. Latent attention for if-then program synthesis. In Proceedings of the International Conference on Advances in Neural Information Processing Systems, D. D. Lee, M. Sugiyama, U. V. Luxburg, I. Guyon, and R. Garnett (Eds.). Curran Associates, Inc., 4574\u20134582. Retrieved from http:\/\/papers.nips.cc\/paper\/6284-latent-attention-for-if-then-program-synthesis.pdf."},{"key":"e_1_3_3_107_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238166"},{"key":"e_1_3_3_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2884955"},{"key":"e_1_3_3_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00019"},{"key":"e_1_3_3_110_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.65"},{"key":"e_1_3_3_111_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011044"},{"key":"e_1_3_3_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330212"},{"key":"e_1_3_3_113_2","unstructured":"Shuai Lu Daya Guo Shuo Ren Junjie Huang Alexey Svyatkovskiy Ambrosio Blanco Colin Clement Dawn Drain Daxin Jiang Duyu Tang Ge Li Lidong Zhou Linjun Shou Long Zhou Michele Tufano Ming Gong Ming Zhou Nan Duan Neel Sundaresan Shao Kun Deng Shengyu Fu and Shujie Liu. 2021. CodeXGLUE: A machine learning benchmark dataset for code understanding and generation. arxiv:2102.04664 [cs.SE]"},{"key":"e_1_3_3_114_2","article-title":"DeepGauge: Comprehensive and multi-granularity testing criteria for gauging the robustness of deep learning systems","volume":"1803","author":"Ma Lei","year":"2018","unstructured":"Lei Ma, Felix Juefei-Xu, Jiyuan Sun, Chunyang Chen, Ting Su, Fuyuan Zhang, Minhui Xue, Bo Li, Li Li, Yang Liu, Jianjun Zhao, and Yadong Wang. 2018. DeepGauge: Comprehensive and multi-granularity testing criteria for gauging the robustness of deep learning systems. CoRR abs\/1803.07519 (2018).","journal-title":"CoRR"},{"key":"e_1_3_3_115_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"e_1_3_3_116_2","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236082"},{"key":"e_1_3_3_117_2","doi-asserted-by":"publisher","DOI":"10.5555\/971143"},{"key":"e_1_3_3_118_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00045"},{"key":"e_1_3_3_119_2","first-page":"3578","volume-title":"Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research)","volume":"80","author":"Mirman Matthew","year":"2018","unstructured":"Matthew Mirman, Timon Gehr, and Martin Vechev. 2018. Differentiable abstract interpretation for provably robust neural networks. In Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research), Jennifer Dy and Andreas Krause (Eds.), Vol. 80. PMLR, 3578\u20133586. Retrieved from http:\/\/proceedings.mlr.press\/v80\/mirman18b.html."},{"key":"e_1_3_3_120_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00084"},{"key":"e_1_3_3_121_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2844788"},{"key":"e_1_3_3_122_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10139"},{"key":"e_1_3_3_123_2","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106284"},{"key":"e_1_3_3_124_2","volume-title":"Proceedings of the 6th International Conference on Learning Representations","author":"Murali Vijayaraghavan","year":"2018","unstructured":"Vijayaraghavan Murali, Letao Qi, Swarat Chaudhuri, and Chris Jermaine. 2018. Neural sketch learning for conditional program generation. In Proceedings of the 6th International Conference on Learning Representations. OpenReview.net. Retrieved from https:\/\/openreview.net\/forum?id=HkfXMz-Ab."},{"key":"e_1_3_3_125_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330220"},{"key":"e_1_3_3_126_2","first-page":"535","article-title":"A literature review on artificial intelligence","volume":"19","author":"Oke Sunday","year":"2008","unstructured":"Sunday Oke. 2008. A literature review on artificial intelligence. Int. J. Inf. Manag. Sci. 19 (12 2008), 535\u2013570.","journal-title":"Int. J. Inf. Manag. Sci."},{"key":"e_1_3_3_127_2","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196402"},{"key":"e_1_3_3_128_2","doi-asserted-by":"crossref","unstructured":"Stefano Panzeri Cesare Magri and Ludovico Carraro. 2008. Sampling bias. Scholarpedia 3(9):4258. Retrieved from http:\/\/www.scholarpedia.org\/article\/Sampling_bias.","DOI":"10.4249\/scholarpedia.4258"},{"key":"e_1_3_3_129_2","volume-title":"Proceedings of the 5th International Conference on Learning Representations","author":"Parisotto Emilio","year":"2017","unstructured":"Emilio Parisotto, Abdel-rahman Mohamed, Rishabh Singh, Lihong Li, Dengyong Zhou, and Pushmeet Kohli. 2017. Neuro-symbolic program synthesis. In Proceedings of the 5th International Conference on Learning Representations. OpenReview.net. Retrieved from https:\/\/openreview.net\/forum?id=rJ0JwFcex."},{"key":"e_1_3_3_130_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00078"},{"key":"e_1_3_3_131_2","first-page":"1093","volume-title":"Proceedings of the 32nd International Conference on Machine Learning (Proceedings of Machine Learning Research)","volume":"37","author":"Piech Chris","year":"2015","unstructured":"Chris Piech, Jonathan Huang, Andy Nguyen, Mike Phulsuksombati, Mehran Sahami, and Leonidas Guibas. 2015. Learning program embeddings to propagate feedback on student code. In Proceedings of the 32nd International Conference on Machine Learning (Proceedings of Machine Learning Research), Francis Bach and David Blei (Eds.), Vol. 37. PMLR, 1093\u20131102. Retrieved from http:\/\/proceedings.mlr.press\/v37\/piech15.html."},{"key":"e_1_3_3_132_2","doi-asserted-by":"publisher","DOI":"10.3389\/fninf.2017.00076"},{"key":"e_1_3_3_133_2","article-title":"TypeWriter: Neural type prediction with search-based validation","author":"Pradel M.","year":"2020","unstructured":"M. Pradel, Georgios Gousios, J. Liu, and S. Chandra. 2020. TypeWriter: Neural type prediction with search-based validation. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering.","journal-title":"I"},{"key":"e_1_3_3_134_2","doi-asserted-by":"publisher","DOI":"10.1145\/3276517"},{"key":"e_1_3_3_135_2","volume-title":"Proceedings of the NSF Workshop on Deep Learning and Software Engineering","author":"Prem Devanbu","year":"2019","unstructured":"Devanbu Prem, Matthew Dwyer, Sebastian Elbaum, Michael Lowry, Kevin Moran, Denys Poshyvanyk, Baishakhi Ray, Rishabh Singh, and Xiangyu Zhang. 2019. Deep learning & software engineering: State of research and future directions. In Proceedings of the NSF Workshop on Deep Learning and Software Engineering."},{"key":"e_1_3_3_136_2","first-page":"294","volume-title":"Proceedings of the International Conference on Advances in Neural Information Processing Systems","author":"Rasmussen Carl Edward","year":"2001","unstructured":"Carl Edward Rasmussen and Zoubin Ghahramani. 2001. Occam\u2019s razor. In Proceedings of the International Conference on Advances in Neural Information Processing Systems, T. K. Leen, T. G. Dietterich, and V. Tresp (Eds.). The MIT Press, 294\u2013300. Retrieved from http:\/\/papers.nips.cc\/paper\/1925-occams-razor.pdf."},{"key":"e_1_3_3_137_2","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594321"},{"key":"e_1_3_3_138_2","volume-title":"Proceedings of the 4th International Conference on Learning Representations","author":"Reed Scott E.","year":"2016","unstructured":"Scott E. Reed and Nando de Freitas. 2016. Neural programmer-interpreters. In Proceedings of the 4th International Conference on Learning Representations, Yoshua Bengio and Yann LeCun (Eds.). Retrieved from http:\/\/arxiv.org\/abs\/1511.06279."},{"key":"e_1_3_3_139_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.442"},{"key":"e_1_3_3_140_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.79"},{"key":"e_1_3_3_141_2","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236026"},{"key":"e_1_3_3_142_2","article-title":"Encyclopedia of research design","volume":"10","author":"Salkind Neil","year":"2010","unstructured":"Neil Salkind. 2010. Encyclopedia of research design. CoRR 10.4135\/9781412961288 (2010).","journal-title":"CoRR"},{"key":"e_1_3_3_143_2","article-title":"The PROMISE repository of software engineering databases.","author":"Shirabad J. Sayyad","year":"2005","unstructured":"J. Sayyad Shirabad and T. J. Menzies. 2005. The PROMISE repository of software engineering databases.School of Information Technology and Engineering, University of Ottawa, Canada. Retrieved from http:\/\/promise.site.uottawa.ca\/SERepository.","journal-title":"School of Information Technology and Engineering, University of Ottawa, Canada"},{"key":"e_1_3_3_144_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.41"},{"key":"e_1_3_3_145_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014910"},{"key":"e_1_3_3_146_2","first-page":"8917","volume-title":"Proceedings of the International Conference on Advances in Neural Information Processing Systems","author":"Shin Richard","year":"2018","unstructured":"Richard Shin, Illia Polosukhin, and Dawn Song. 2018. Improving neural program synthesis with inferred execution traces. In Proceedings of the International Conference on Advances in Neural Information Processing Systems, S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and R. Garnett (Eds.). Curran Associates, Inc., 8917\u20138926. Retrieved from http:\/\/papers.nips.cc\/paper\/8107-improving-neural-program-synthesis-with-inferred-execution-traces.pdf."},{"key":"e_1_3_3_147_2","first-page":"7751","volume-title":"Proceedings of the International Conference on Advances in Neural Information Processing Systems","author":"Si Xujie","year":"2018","unstructured":"Xujie Si, Hanjun Dai, Mukund Raghothaman, Mayur Naik, and Le Song. 2018. Learning loop invariants for program verification. In Proceedings of the International Conference on Advances in Neural Information Processing Systems, S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and R. Garnett (Eds.). Curran Associates, Inc., 7751\u20137762. Retrieved from http:\/\/papers.nips.cc\/paper\/8001-learning-loop-invariants-for-program-verification.pdf."},{"issue":"56","key":"e_1_3_3_148_2","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"Srivastava Nitish","year":"2014","unstructured":"Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: A simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15, 56 (2014), 1929\u20131958. Retrieved from http:\/\/jmlr.org\/papers\/v15\/srivastava14a.html.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_3_149_2","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884833"},{"key":"e_1_3_3_150_2","first-page":"4790","volume-title":"Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research)","volume":"80","author":"Sun Shao-Hua","year":"2018","unstructured":"Shao-Hua Sun, Hyeonwoo Noh, Sriram Somasundaram, and Joseph Lim. 2018. Neural program synthesis from diverse demonstration videos. In Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research), Jennifer Dy and Andreas Krause (Eds.), Vol. 80. PMLR, 4790\u20134799. Retrieved from http:\/\/proceedings.mlr.press\/v80\/sun18a.html."},{"key":"e_1_3_3_151_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238172"},{"key":"e_1_3_3_152_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33017055"},{"key":"e_1_3_3_153_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.77"},{"key":"e_1_3_3_154_2","article-title":"Learning to fix build errors with Graph2Diff neural networks","author":"Tarlow Daniel","year":"2020","unstructured":"Daniel Tarlow, Subhodeep Moitra, A. Rice, Zimin Chen, Pierre-Antoine Manzagol, Charles Sutton, and E. Aftandilian. 2020. Learning to fix build errors with Graph2Diff neural networks. In Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering Workshops.","journal-title":"I"},{"key":"e_1_3_3_155_2","doi-asserted-by":"publisher","DOI":"10.1021\/ci00027a006"},{"key":"e_1_3_3_156_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667978"},{"key":"e_1_3_3_157_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180220"},{"key":"e_1_3_3_158_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00021"},{"key":"e_1_3_3_159_2","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196431"},{"key":"e_1_3_3_160_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240732"},{"key":"e_1_3_3_161_2","article-title":"An empirical study on learning bug-fixing patches in the wild via neural machine translation","volume":"1812","author":"Tufano Michele","year":"2018","unstructured":"Michele Tufano, Cody Watson, Gabriele Bavota, Massimiliano Di Penta, Martin White, and Denys Poshyvanyk. 2018. An empirical study on learning bug-fixing patches in the wild via neural machine translation. CoRR abs\/1812.08693 (2018).","journal-title":"CoRR"},{"key":"e_1_3_3_162_2","unstructured":"Anne-Wil Harzing \u201cPublish or Perish.\u201d Publish or Perish 5 Sept. 2019 https:\/\/harzing.com\/resources\/publish-or-perish."},{"key":"e_1_3_3_163_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238206"},{"key":"e_1_3_3_164_2","volume-title":"Proceedings of the 6th International Conference on Learning Representations","author":"Wang Ke","year":"2018","unstructured":"Ke Wang, Rishabh Singh, and Zhendong Su. 2018. Dynamic neural program embeddings for program repair. In Proceedings of the 6th International Conference on Learning Representations. OpenReview.net. Retrieved from https:\/\/openreview.net\/forum?id=BJuWrGW0Z."},{"key":"e_1_3_3_165_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2877612"},{"key":"e_1_3_3_166_2","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"e_1_3_3_167_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00058"},{"key":"e_1_3_3_168_2","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.4768587"},{"key":"e_1_3_3_169_2","unstructured":"Cody Watson David Palacio Nathan Cooper Kevin Moran and Denys Poshyvanyk. 2021. Data analysis for the systematic literature review of DL4SE. Retrieved from https:\/\/wm-semeru.github.io\/dl4se\/."},{"key":"e_1_3_3_170_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.09.002"},{"key":"e_1_3_3_171_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2876256"},{"key":"e_1_3_3_172_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668043"},{"key":"e_1_3_3_173_2","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970326"},{"key":"e_1_3_3_174_2","doi-asserted-by":"publisher","DOI":"10.5555\/2820518.2820559"},{"key":"e_1_3_3_175_2","unstructured":"Ning Xie Gabrielle Ras Marcel van Gerven and Derek Doran. 2020. Explainable deep learning: A field guide for the uninitiated. arxiv:2004.14545 [cs.LG]"},{"key":"e_1_3_3_176_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667969"},{"key":"e_1_3_3_177_2","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970357"},{"key":"e_1_3_3_178_2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.14"},{"key":"e_1_3_3_179_2","unstructured":"Zebin Yang Aijun Zhang and Agus Sudjianto. 2019. Enhancing explainability of neural networks through architecture constraints. arxiv:1901.03838 [stat.ML]"},{"key":"e_1_3_3_180_2","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196408"},{"key":"e_1_3_3_181_2","volume-title":"Proceedings of the 7th International Conference on Learning Representations","author":"Yin Pengcheng","year":"2019","unstructured":"Pengcheng Yin, Graham Neubig, Miltiadis Allamanis, Marc Brockschmidt, and Alexander L. Gaunt. 2019. Learning to represent edits. In Proceedings of the 7th International Conference on Learning Representations. OpenReview.net. Retrieved from https:\/\/openreview.net\/forum?id=BJl6AjC5F7."},{"key":"e_1_3_3_182_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00021"},{"key":"e_1_3_3_183_2","unstructured":"Hao Yuan Haiyang Yu Shurui Gui and Shuiwang Ji. 2021. Explainability in graph neural networks: A taxonomic survey. arxiv:2012.15445 [cs.LG]"},{"key":"e_1_3_3_184_2","article-title":"Graying the black box: Understanding DQNs","volume":"1602","author":"Zahavy Tom","year":"2016","unstructured":"Tom Zahavy, Nir Ben-Zrihem, and Shie Mannor. 2016. Graying the black box: Understanding DQNs. CoRR abs\/1602.02658 (2016).","journal-title":"CoRR"},{"key":"e_1_3_3_185_2","unstructured":"Matthew D. Zeiler. 2012. ADADELTA: An adaptive learning rate method. arxiv:1212.5701 [cs.LG]"},{"key":"e_1_3_3_186_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00086"},{"key":"e_1_3_3_187_2","first-page":"1737","volume-title":"Proceedings of the International Conference on Advances in Neural Information Processing Systems","author":"Zhang Lisa","year":"2018","unstructured":"Lisa Zhang, Gregory Rosenblatt, Ethan Fetaya, Renjie Liao, William Byrd, Matthew Might, Raquel Urtasun, and Richard Zemel. 2018. Neural guided constraint logic programming for program synthesis. In Proceedings of the International Conference on Advances in Neural Information Processing Systems, S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and R. Garnett (Eds.). Curran Associates, Inc., 1737\u20131746. Retrieved from http:\/\/papers.nips.cc\/paper\/7445-neural-guided-constraint-logic-programming-for-program-synthesis.pdf."},{"key":"e_1_3_3_188_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238187"},{"key":"e_1_3_3_189_2","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213866"},{"key":"e_1_3_3_190_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668002"},{"key":"e_1_3_3_191_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00049"},{"key":"e_1_3_3_192_2","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236068"},{"key":"e_1_3_3_193_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00016"},{"key":"e_1_3_3_194_2","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236066"},{"key":"e_1_3_3_195_2","article-title":"Visualizing deep neural network decisions: Prediction difference analysis","volume":"1702","author":"Zintgraf Luisa M.","year":"2017","unstructured":"Luisa M. Zintgraf, Taco S. Cohen, Tameem Adel, and Max Welling. 2017. Visualizing deep neural network decisions: Prediction difference analysis. CoRR abs\/1702.04595 (2017).","journal-title":"CoRR"},{"key":"e_1_3_3_196_2","first-page":"2094","volume-title":"Proceedings of the International Conference on Advances in Neural Information Processing Systems","author":"Zohar Amit","year":"2018","unstructured":"Amit Zohar and Lior Wolf. 2018. Automatic program synthesis of long programs with a learned garbage collector. In Proceedings of the International Conference on Advances in Neural Information Processing Systems, S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and R. Garnett (Eds.). Curran Associates, Inc., 2094\u20132103. Retrieved from http:\/\/papers.nips.cc\/paper\/7479-automatic-program-synthesis-of-long-programs-with-a-learned-garbage-collector.pdf."},{"key":"e_1_3_3_197_2","unstructured":"Tijmen Tieleman and Geoffrey Hinton. 2012. Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude. COURSERA: Neural Networks for Machine Learning ."}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485275","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485275","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:36Z","timestamp":1750191516000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,4]]},"references-count":196,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4,30]]}},"alternative-id":["10.1145\/3485275"],"URL":"https:\/\/doi.org\/10.1145\/3485275","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,4]]},"assertion":[{"value":"2020-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}