{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,18]],"date-time":"2026-05-18T03:35:06Z","timestamp":1779075306232,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["62332001"],"award-info":[{"award-number":["62332001"]}]},{"name":"National Natural Science Foundation of China","award":["62272445"],"award-info":[{"award-number":["62272445"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3691620.3695508","type":"proceedings-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T15:39:19Z","timestamp":1729265959000},"page":"1345-1357","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["iSMELL: Assembling LLMs with Expert Toolsets for Code Smell Detection and Refactoring"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-2138-0741","authenticated-orcid":false,"given":"Di","family":"Wu","sequence":"first","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8577-7932","authenticated-orcid":false,"given":"Fangwen","family":"Mu","sequence":"additional","affiliation":[{"name":"Institute of Software , Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1476-7213","authenticated-orcid":false,"given":"Lin","family":"Shi","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8971-5755","authenticated-orcid":false,"given":"Zhaoqiang","family":"Guo","sequence":"additional","affiliation":[{"name":"Software Engineering Application Technology Lab, Huawei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0145-615X","authenticated-orcid":false,"given":"Kui","family":"Liu","sequence":"additional","affiliation":[{"name":"Software Engineering Application Technology Lab, Huawei, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1139-2508","authenticated-orcid":false,"given":"Weiguang","family":"Zhuang","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0308-5609","authenticated-orcid":false,"given":"Yuqi","family":"Zhong","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2258-5893","authenticated-orcid":false,"given":"Li","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Refactoring: improving the design of existing code","author":"Fowler Martin","unstructured":"Martin Fowler. 2018. Refactoring: improving the design of existing code. Addison-Wesley Professional."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-021-09566-x"},{"key":"e_1_3_2_1_3_1","volume-title":"Codebert: A pre-trained model for programming and natural languages. arXiv preprint arXiv:2002.08155","author":"Feng Zhangyin","year":"2020","unstructured":"Zhangyin Feng, Daya Guo, Duyu Tang, Nan Duan, Xiaocheng Feng, Ming Gong, Linjun Shou, Bing Qin, Ting Liu, Daxin Jiang, et al. 2020. Codebert: A pre-trained model for programming and natural languages. arXiv preprint arXiv:2002.08155 (2020)."},{"key":"e_1_3_2_1_4_1","volume-title":"Diogo Almeida, Janko Altenschmidt, Sam Altman, Shyamal Anadkat, et al.","author":"Achiam Josh","year":"2023","unstructured":"Josh Achiam, Steven Adler, Sandhini Agarwal, Lama Ahmad, Ilge Akkaya, Florencia Leoni Aleman, Diogo Almeida, Janko Altenschmidt, Sam Altman, Shyamal Anadkat, et al. 2023. Gpt-4 technical report. arXiv preprint arXiv:2303.08774 (2023)."},{"key":"e_1_3_2_1_5_1","unstructured":"2023. An overview of Bard: an early experiment with generative AI. https:\/\/ai.google\/static\/documents\/google-about-bard.pdf."},{"key":"e_1_3_2_1_6_1","first-page":"4818","article-title":"An empirical study on the usage of transformer models for code completion","volume":"48","author":"Ciniselli Matteo","year":"2021","unstructured":"Matteo Ciniselli, Nathan Cooper, Luca Pascarella, Antonio Mastropaolo, Emad Aghajani, Denys Poshyvanyk, Massimiliano Di Penta, and Gabriele Bavota. 2021. An empirical study on the usage of transformer models for code completion. IEEE Transactions on Software Engineering 48, 12 (2021), 4818--4837.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00078"},{"key":"e_1_3_2_1_8_1","volume-title":"Unprecedented Code Change Automation: The Fusion of LLMs and Transformation by Example. arXiv preprint arXiv:2402.07138","author":"Dilhara Malinda","year":"2024","unstructured":"Malinda Dilhara, Abhiram Bellur, Timofey Bryksin, and Danny Dig. 2024. Unprecedented Code Change Automation: The Fusion of LLMs and Transformation by Example. arXiv preprint arXiv:2402.07138 (2024)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3608137"},{"key":"e_1_3_2_1_10_1","volume-title":"Naveed Akhtar, Jia Wu, Seyedali Mirjalili, et al.","author":"Hadi Muhammad Usman","year":"2023","unstructured":"Muhammad Usman Hadi, Rizwan Qureshi, Abbas Shah, Muhammad Irfan, Anas Zafar, Muhammad Bilal Shaikh, Naveed Akhtar, Jia Wu, Seyedali Mirjalili, et al. 2023. Large language models: a comprehensive survey of its applications, challenges, limitations, and future prospects. Authorea Preprints (2023)."},{"key":"e_1_3_2_1_11_1","volume-title":"Challenges and applications of large language models. arXiv preprint arXiv:2307.10169","author":"Kaddour Jean","year":"2023","unstructured":"Jean Kaddour, Joshua Harris, Maximilian Mozes, Herbie Bradley, Roberta Raileanu, and Robert McHardy. 2023. Challenges and applications of large language models. arXiv preprint arXiv:2307.10169 (2023)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2936376"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616353"},{"key":"e_1_3_2_1_14_1","volume-title":"Jdeodorant: Identification and removal of feature envy bad smells. In 2007 ieee international conference on software maintenance","author":"Fokaefs Marios","year":"2007","unstructured":"Marios Fokaefs, Nikolaos Tsantalis, and Alexander Chatzigeorgiou. 2007. Jdeodorant: Identification and removal of feature envy bad smells. In 2007 ieee international conference on software maintenance. IEEE, 519--520."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985989"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.50"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.12.009"},{"key":"e_1_3_2_1_18_1","volume-title":"Adaptive mixtures of local experts. Neural computation 3, 1","author":"Jacobs Robert A","year":"1991","unstructured":"Robert A Jacobs, Michael I Jordan, Steven J Nowlan, and Geoffrey E Hinton. 1991. Adaptive mixtures of local experts. Neural computation 3, 1 (1991), 79--87."},{"key":"e_1_3_2_1_19_1","unstructured":"2024. https:\/\/github.com\/iSMELL2024\/iSMELL."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110610"},{"key":"e_1_3_2_1_21_1","volume-title":"CCFinder: A multilinguistic token-based code clone detection system for large scale source code","author":"Kamiya Toshihiro","year":"2002","unstructured":"Toshihiro Kamiya, Shinji Kusumoto, and Katsuro Inoue. 2002. CCFinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE transactions on software engineering 28, 7 (2002), 654--670."},{"key":"e_1_3_2_1_22_1","unstructured":"2024. PMD - source code analyzer. https:\/\/github.com\/pmd\/pmd."},{"key":"e_1_3_2_1_23_1","unstructured":"2024. A code segment having Feature Envy. https:\/\/github.com\/apache\/hbase\/blob\/34487ecc6f90f486325b625a6909de888008f4b2\/src\/main\/java\/org\/apache\/hadoop\/hbase\/master\/AssignmentManager.java#L527-L641."},{"key":"e_1_3_2_1_24_1","unstructured":"2024. A code segment without Feature Envy. https:\/\/github.com\/ArtOfIllusion\/ArtOfIllusion\/blob\/2d66694e95fec8d8d0c38c01505c24ad1df821b1\/ArtOfIllusion\/src\/artofillusion\/object\/SplineMesh.java#L486-L587."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613892"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598135"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i3.27999"},{"key":"e_1_3_2_1_28_1","volume-title":"Attention is all you need. Advances in neural information processing systems 30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3561165"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639188"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME52107.2021.00044"},{"key":"e_1_3_2_1_32_1","unstructured":"2023. Java Code Metrics Collection Tool. https:\/\/github.com\/mauricioaniche\/ck."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/117954.117970"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"e_1_3_2_1_35_1","volume-title":"Exploring representation-level augmentation for code search. arXiv preprint arXiv:2210.12285","author":"Li Haochen","year":"2022","unstructured":"Haochen Li, Chunyan Miao, Cyril Leung, Yanxian Huang, Yuan Huang, Hongyu Zhang, and Yanlin Wang. 2022. Exploring representation-level augmentation for code search. arXiv preprint arXiv:2210.12285 (2022)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.826093"},{"key":"e_1_3_2_1_37_1","volume-title":"A Survey of Deep Learning Based Software Refactoring. arXiv preprint arXiv:2404.19226","author":"Nyirongo Bridget","year":"2024","unstructured":"Bridget Nyirongo, Yanjie Jiang, He Jiang, and Hui Liu. 2024. A Survey of Deep Learning Based Software Refactoring. arXiv preprint arXiv:2404.19226 (2024)."},{"key":"e_1_3_2_1_38_1","unstructured":"2024. code-smells-detector. https:\/\/github.com\/opus-research\/organic."},{"key":"e_1_3_2_1_39_1","unstructured":"2024. code quality assessment tool. https:\/\/www.designite-tools.com\/products-dj."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671298"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCCC.2015.7416572"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3182532"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2938006.2938019"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9171-y"},{"key":"e_1_3_2_1_45_1","volume-title":"https:\/\/platform.openai.com\/docs\/models\/gpt-3-5, note = Accessed","author":"Turbo AI.","year":"2024","unstructured":"OpenAI. 2023. GPT-3.5-Turbo. https:\/\/platform.openai.com\/docs\/models\/gpt-3-5, note = Accessed: 2024.6."},{"key":"e_1_3_2_1_46_1","volume-title":"https:\/\/platform.openai.com\/docs\/models\/gpt-4-turbo-and-gpt-4, note = Accessed","author":"Turbo AI.","year":"2024","unstructured":"OpenAI. 2023. GPT-4.0-Turbo. https:\/\/platform.openai.com\/docs\/models\/gpt-4-turbo-and-gpt-4, note = Accessed: 2024.6."},{"key":"e_1_3_2_1_47_1","unstructured":"2024. Introducing meta llama 3: The most capa-ble openly available llm to date. https:\/\/ai.meta.com\/blog\/meta-llama-3\/.."},{"key":"e_1_3_2_1_48_1","volume-title":"Yossi Adi, Jingyu Liu, Tal Remez, J\u00e9r\u00e9my Rapin, et al.","author":"Roziere Baptiste","year":"2023","unstructured":"Baptiste Roziere, Jonas Gehring, Fabian Gloeckle, Sten Sootla, Itai Gat, Xiaoqing Ellen Tan, Yossi Adi, Jingyu Liu, Tal Remez, J\u00e9r\u00e9my Rapin, et al. 2023. Code llama: Open foundation models for code. arXiv preprint arXiv:2308.12950 (2023)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2009.03.002"},{"key":"e_1_3_2_1_50_1","unstructured":"2024. Vulnerability Detection Tool. https:\/\/github.com\/aquasecurity\/trivy."},{"key":"e_1_3_2_1_51_1","unstructured":"2024. Vulnerability Detection Tool. https:\/\/github.com\/greenbone\/openvas-scanner."},{"key":"e_1_3_2_1_52_1","unstructured":"2024. Vulnerability Detection Tool. https:\/\/github.com\/quay\/clair."},{"key":"e_1_3_2_1_53_1","first-page":"1","article-title":"Beyond tests: Program vulnerability repair via crash constraint extraction","volume":"30","author":"Gao Xiang","year":"2021","unstructured":"Xiang Gao, Bo Wang, Gregory J Duck, Ruyi Ji, Yingfei Xiong, and Abhik Roychoudhury. 2021. Beyond tests: Program vulnerability repair via crash constraint extraction. ACM Transactions on Software Engineering and Methodology (TOSEM) 30, 2 (2021), 1--27.","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549098"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534387"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3632746"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2255"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.50"},{"key":"e_1_3_2_1_59_1","unstructured":"Yichen Li and Xiaofang Zhang. 2022. Multi-Label Code Smell Detection with Hybrid Model based on Deep Learning.. In SEKE. 42--47."},{"key":"e_1_3_2_1_60_1","volume-title":"Detecting and Refactoring Feature Envy Based on Graph Neural Network. In 2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE). IEEE, 458--469","author":"Yu Dongjin","year":"2022","unstructured":"Dongjin Yu, Yihang Xu, Lehui Weng, Jie Chen, Xin Chen, and Quanxin Yang. 2022. Detecting and Refactoring Feature Envy Based on Graph Neural Network. In 2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE). IEEE, 458--469."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3021736"},{"key":"e_1_3_2_1_62_1","volume-title":"Pre-trained Model Based Feature Envy Detection. In 2023 IEEE\/ACM 20th International Conference on Mining Software Repositories (MSR). IEEE, 430--440","author":"Ma Wenhao","year":"2023","unstructured":"Wenhao Ma, Yaoxiang Yu, Xiaoming Ruan, and Bo Cai. 2023. Pre-trained Model Based Feature Envy Detection. In 2023 IEEE\/ACM 20th International Conference on Mining Software Repositories (MSR). IEEE, 430--440."},{"key":"e_1_3_2_1_63_1","volume-title":"Codet5: Identifier-aware unified pre-trained encoder-decoder models for code understanding and generation. arXiv preprint arXiv:2109.00859","author":"Wang Yue","year":"2021","unstructured":"Yue Wang, Weishi Wang, Shafiq Joty, and Steven CH Hoi. 2021. Codet5: Identifier-aware unified pre-trained encoder-decoder models for code understanding and generation. arXiv preprint arXiv:2109.00859 (2021)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.03.040"}],"event":{"name":"ASE '24: 39th IEEE\/ACM International Conference on Automated Software Engineering","location":"Sacramento CA USA","acronym":"ASE '24","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695508","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3691620.3695508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:19Z","timestamp":1750291579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695508"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":64,"alternative-id":["10.1145\/3691620.3695508","10.1145\/3691620"],"URL":"https:\/\/doi.org\/10.1145\/3691620.3695508","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2024-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}