{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T19:09:40Z","timestamp":1773774580694,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62232003 and 62172037"],"award-info":[{"award-number":["62232003 and 62172037"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616353","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"908-920","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Deep Learning Based Feature Envy Detection Boosted by Real-World Examples"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5055-2837","authenticated-orcid":false,"given":"Bo","family":"Liu","sequence":"first","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3267-6801","authenticated-orcid":false,"given":"Hui","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6820-1946","authenticated-orcid":false,"given":"Guangjie","family":"Li","sequence":"additional","affiliation":[{"name":"National Innovation Institute of Defense Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5566-2368","authenticated-orcid":false,"given":"Nan","family":"Niu","sequence":"additional","affiliation":[{"name":"University of Cincinnati, Cincinnati, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2657-6518","authenticated-orcid":false,"given":"Zimao","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8649-9681","authenticated-orcid":false,"given":"Yifan","family":"Wang","sequence":"additional","affiliation":[{"name":"Huawei Cloud, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9024-732X","authenticated-orcid":false,"given":"Yunni","family":"Xia","sequence":"additional","affiliation":[{"name":"Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9371-5931","authenticated-orcid":false,"given":"Yuxia","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6404-9143","authenticated-orcid":false,"given":"Yanjie","family":"Jiang","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China \/ Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290353"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381819"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.12.009"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110486"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.60"},{"key":"e_1_3_2_2_6_1","volume-title":"Classification and Regression Trees","author":"Breiman Leo","unstructured":"Leo Breiman. 1984. Classification and Regression Trees. Wadsworth, Belmont, CA, USA."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEQUEN.1997.666900"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973075.25"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME55016.2022.00033"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2010.58"},{"key":"e_1_3_2_2_11_1","unstructured":"Kris De Volder. 1998. Type-Oriented Logic Meta Programming. Ph. D. Dissertation. Vrije Universiteit Brussel Programming Technology Laboratory."},{"key":"e_1_3_2_2_12_1","unstructured":"Chris Dennis. 2023. Quartz. https:\/\/github.com\/quartz-scheduler\/quartz\/blob\/ff348f62ece41275555b45dba5a4073c910fbeab\/quartz-core\/src\/main\/java\/org\/quartz\/impl\/StdSchedulerFactory.java\/#L1404"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330266"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_24"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2915970.2915984"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0031619"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362679"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2012.11.2.a5"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9378-4"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.12"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.04.014"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.56"},{"key":"e_1_3_2_2_23_1","volume-title":"Refactoring: Improving the Design of Existing Code","author":"Fowler Martin","year":"1999","unstructured":"Martin Fowler. 1999. Refactoring: Improving the Design of Existing Code. Addison-Wesley, Boston, MA, USA."},{"key":"e_1_3_2_2_24_1","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software. Pearson Deutschland GmbH","author":"Gamma Erich","year":"1995","unstructured":"Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides. 1995. Design Patterns: Elements of Reusable Object-Oriented Software. Pearson Deutschland GmbH, Munich, Germany."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-015-9271-9"},{"key":"e_1_3_2_2_26_1","unstructured":"Gary Gregory. 2023. Commons-CSV. https:\/\/github.com\/apache\/commons-csv\/blob\/db374369aeeb1f3ace8efcbd7155fcff20354504\/src\/main\/java\/org\/apache\/commons\/csv\/Lexer.java#L128"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851854"},{"key":"e_1_3_2_2_28_1","unstructured":"Eclipse JDT. 2023. The Preconditions for Move Instance Method Refactorings. https:\/\/github.com\/eclipse-jdt\/eclipse.jdt.ui\/blob\/master\/org.eclipse.jdt.core.manipulation\/core%20extension\/org\/eclipse\/jdt\/internal\/corext\/refactoring\/structure\/MoveInstanceMethodProcessor.java"},{"key":"e_1_3_2_2_29_1","unstructured":"Eclipse JDT. 2023. The Preconditions for Move Static Method Refactorings. https:\/\/github.com\/eclipse-jdt\/eclipse.jdt.ui\/blob\/master\/org.eclipse.jdt.core.manipulation\/core%20extension\/org\/eclipse\/jdt\/internal\/corext\/refactoring\/structure\/MoveStaticMembersProcessor.java"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0168-9002(99)00498-2"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MLDS.2017.8"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2008.11.012"},{"key":"e_1_3_2_2_34_1","unstructured":"Keras. 2023. Activation Functions. https:\/\/github.com\/keras-team\/keras\/blob\/master\/keras\/activations.py"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882353"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.02.059"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3392191"},{"key":"e_1_3_2_2_38_1","unstructured":"Bo Liu. 2023. feTruth. https:\/\/github.com\/lyoubo\/feTruth"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","unstructured":"Bo Liu. 2023. Replication Package. https:\/\/doi.org\/10.5281\/zenodo.8267775 10.5281\/zenodo.8267775","DOI":"10.5281\/zenodo.8267775"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","unstructured":"Hui Liu Jiahao Jin Zhifeng Xu and Yifan Bu. 2023. Pre-Trained Word2Vec Model. https:\/\/doi.org\/10.5281\/zenodo.5749111 10.5281\/zenodo.5749111","DOI":"10.5281\/zenodo.5749111"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2936376"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.14"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238166"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.2007853"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2255"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265817"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1301.3781"},{"key":"e_1_3_2_2_48_1","volume-title":"Proceedings of the 27th Annual Conference on Neural Information Processing Systems (NIPS \u201913)","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. 2013. Distributed Representations of Words and Phrases and Their Compositionality. In Proceedings of the 27th Annual Conference on Neural Information Processing Systems (NIPS \u201913). Curran Associates, Inc., Lake Tahoe, NV, USA. 3111\u20133119."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.11.010"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693086"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2372760"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503704"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00023"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25159-2_49"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609577"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671298"},{"key":"e_1_3_2_2_57_1","volume-title":"Introduction to Modern Information Retrieval","author":"Salton Gerard","unstructured":"Gerard Salton and Michael J McGill. 1984. Introduction to Modern Information Retrieval. McGraw-Hill, New York, NY, USA."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.110936"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2968072"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.14"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2001.914965"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2372251.2372269"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.11919\/j.issn.1002-0829.215044"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.11.073"},{"key":"e_1_3_2_2_65_1","unstructured":"Martin Thompson. 2023. Aeron. https:\/\/github.com\/real-logic\/aeron\/commit\/305c060d424fdea13b1b7f2979d545ac7da5f7a5#diff-07eb841a7b48861016496075f986f4c6b330e72f8246e3270be31d9305cbd2bcR104"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.1"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3007722"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180206"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671299"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985362.1985366"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616353","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:11Z","timestamp":1750178171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616353"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":70,"alternative-id":["10.1145\/3611643.3616353","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616353","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}