{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:29:57Z","timestamp":1766449797217,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2120386"],"award-info":[{"award-number":["CNS-2120386"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["NCAE-C-002-2021"],"award-info":[{"award-number":["NCAE-C-002-2021"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616368","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"758-770","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["DeMinify: Neural Variable Name Recovery and Type Inference"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-0143-0677","authenticated-orcid":false,"given":"Yi","family":"Li","sequence":"first","affiliation":[{"name":"New Jersey Institute of Technology, Newark, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8785-6319","authenticated-orcid":false,"given":"Aashish","family":"Yadavally","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8031-661X","authenticated-orcid":false,"given":"Jiaxing","family":"Zhang","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology, Newark, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5777-7759","authenticated-orcid":false,"given":"Shaohua","family":"Wang","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology, Newark, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7962-6090","authenticated-orcid":false,"given":"Tien N.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2021. The NNI autoML tool. https:\/\/github.com\/microsoft\/nni"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635883"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786849"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385997"},{"volume-title":"Proceedings of the 10th IEEE Working Conference on Mining Software Repositories (MSR\u201913)","author":"Allamanis M.","key":"e_1_3_2_2_5_1","unstructured":"M. Allamanis and C. Sutton. 2013. Mining source code repositories at massive scale using language modeling. In Proceedings of the 10th IEEE Working Conference on Mining Software Repositories (MSR\u201913). IEEE CS, 207\u2013216."},{"key":"e_1_3_2_2_6_1","volume-title":"Label-GCN: An Effective Method for Adding Label Propagation to Graph Convolutional Networks. CoRR, abs\/2104.02153","author":"Bellei Claudio","year":"2021","unstructured":"Claudio Bellei, Hussain Alattas, and Nesrine Kaaniche. 2021. Label-GCN: An Effective Method for Adding Label Propagation to Graph Convolutional Networks. CoRR, abs\/2104.02153 (2021), arXiv:2104.02153. arxiv:2104.02153"},{"key":"e_1_3_2_2_7_1","volume-title":"Proceedings of the 12th Conference on USENIX Security Symposium -","volume":"12","author":"Christodorescu Mihai","year":"2003","unstructured":"Mihai Christodorescu and Somesh Jha. 2003. Static Analysis of Executables to Detect Malicious Patterns. In Proceedings of the 12th Conference on USENIX Security Symposium - Volume 12 (SSYM\u201903). USENIX Association, 12\u201312. http:\/\/dl.acm.org\/citation.cfm?id=1251353.1251365"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_2_9_1","unstructured":"[n. d.]. DeMinify. https:\/\/github.com\/variable-name-type-prediction\/variable-name-type-prediction\/."},{"key":"e_1_3_2_2_10_1","volume-title":"Sutton","author":"Fowkes Jaroslav M.","year":"2015","unstructured":"Jaroslav M. Fowkes and Charles A. Sutton. 2015. Parameter-Free Probabilistic API Mining at GitHub Scale. CoRR, abs\/1512.05558 (2015), arxiv:1512.05558"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950334"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814295"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236051"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227135"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.5220\/0010500305480556"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473135"},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition. 7482\u20137491","author":"Kendall Alex","year":"2018","unstructured":"Alex Kendall, Yarin Gal, and Roberto Cipolla. 2018. Multi-task learning using uncertainty to weigh losses for scene geometry and semantics. In Proceedings of the IEEE conference on computer vision and pattern recognition. 7482\u20137491."},{"key":"e_1_3_2_2_18_1","volume-title":"DYLA","author":"Maia Eva","year":"2011","unstructured":"Eva Maia, Nelma Moreira, and Rogerio Reis. 2011. A Static Type Inference for Python. In DYLA 2011."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00045"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR52588.2021.00079"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510124"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.17"},{"key":"e_1_3_2_2_23_1","volume-title":"TBCNN: A Tree-Based Convolutional Neural Network for Programming Language Processing. CoRR, abs\/1409.5718","author":"Mou Lili","year":"2014","unstructured":"Lili Mou, Ge Li, Zhi Jin, Lu Zhang, and Tao Wang. 2014. TBCNN: A Tree-Based Convolutional Neural Network for Programming Language Processing. CoRR, abs\/1409.5718 (2014), arxiv:1409.5718"},{"key":"e_1_3_2_2_24_1","volume-title":"OptTyper: Probabilistic Type Inference by Optimising Logical and Natural Constraints. CoRR, abs\/2004.00348","author":"Pandi Irene Vlassi","year":"2020","unstructured":"Irene Vlassi Pandi, Earl T. Barr, Andrew D. Gordon, and Charles Sutton. 2020. OptTyper: Probabilistic Type Inference by Optimising Logical and Natural Constraints. CoRR, abs\/2004.00348 (2020), arXiv:2004.00348. arxiv:2004.00348"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510038"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"volume-title":"Proceedings of the 40th International Conference on Software Engineering (ICSE \u201918)","author":"Phan Hung","key":"e_1_3_2_2_27_1","unstructured":"Hung Phan, Hoan Anh Nguyen, Ngoc M. Tran, Linh H. Truong, Anh Tuan Nguyen, and Tien N. Nguyen. 2018. Statistical Learning of API Fully Qualified Names in Code Snippets of Online Forums. In Proceedings of the 40th International Conference on Software Engineering (ICSE \u201918). ACM, 632\u2013642."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409715"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276517"},{"key":"e_1_3_2_2_30_1","unstructured":"[n. d.]. pyminifier. https:\/\/github.com\/liftoff\/pyminifier."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884808"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677009"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594321"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.11.016"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00119"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2005.13"},{"key":"e_1_3_2_2_37_1","unstructured":"[n. d.]. Uglify. https:\/\/github.com\/mishoo\/UglifyJS."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106289"},{"key":"e_1_3_2_2_39_1","volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=Hkx6hANtwH","author":"Wei Jiayi","year":"2020","unstructured":"Jiayi Wei, Maruth Goyal, Greg Durrett, and Isil Dillig. 2020. LambdaNet: Probabilistic Type Inference using Graph Neural Networks. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=Hkx6hANtwH"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950343"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"San Francisco CA USA","acronym":"ESEC\/FSE '23"},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616368","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616368","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:11Z","timestamp":1750178171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616368"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":41,"alternative-id":["10.1145\/3611643.3616368","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616368","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}