{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:40:12Z","timestamp":1750297212694,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T00:00:00Z","timestamp":1734048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,13]]},"DOI":"10.1145\/3711542.3711566","type":"proceedings-article","created":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:46:56Z","timestamp":1744606016000},"page":"173-178","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Cross-Language Code Matching with IR2Vec and Cross-Entropy Loss"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4785-0526","authenticated-orcid":false,"given":"Sagarika","family":"Ghosh","sequence":"first","affiliation":[{"name":"CSE, Indian Institute of Information Technology Kalyani, Kalyani, West Bengal, India and CSE, University of Engineering &amp; Management Jaipur, Jaipur, Rajasthan, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2569-2886","authenticated-orcid":false,"given":"Soma","family":"Das","sequence":"additional","affiliation":[{"name":"CSE, Indian Institute of Information Technology Kalyani, Kalyani, West Bengal, India and CSE, Institute of Engineering &amp; Management Kolkata, Kolkata, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1086-9987","authenticated-orcid":false,"given":"Sanjay","family":"Chatterji","sequence":"additional","affiliation":[{"name":"CSE, Indian Institute of Information Technology Kalyani, Kalyani, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0833-6989","authenticated-orcid":false,"given":"Sanjoy","family":"Pratihar","sequence":"additional","affiliation":[{"name":"CSE, Indian Institute of Information Technology Kalyani, Kalyani, West Bengal, India"}]}],"member":"320","published-online":{"date-parts":[[2025,4,13]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC60848.2023.00033"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Qurat\u00a0Ul Ain Wasi\u00a0Haider Butt Muhammad\u00a0Waseem Anwar Farooque Azam and Bilal Maqbool. 2019. A Systematic Review on Code Clone Detection. IEEE Access 7 (2019) 86121\u201386144. https:\/\/doi.org\/10.1109\/ACCESS.2019.2918202","DOI":"10.1109\/ACCESS.2019.2918202"},{"key":"e_1_3_3_1_4_2","first-page":"174 \u2013 182","volume-title":"2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA)","author":"Chen Long","year":"2019","unstructured":"Long Chen, Wei Ye, and Shikun Zhang. 2019. CCDLC Detection Framework-Combining Clustering with Deep Learning Classification for Semantic Clones. In 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA). 174 \u2013 182. https:\/\/doi.org\/10.1145\/3310273.3321560"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Xiao Cheng Zhiming Peng Lingxiao Jiang Hao Zhong Haibo Yu and Jianjun Zhao. 2017. CLCMiner: Detecting Cross-Language Clones without Intermediates. IEICE Transactions on Information and Systems E100D 2 (feb 2017) 273\u2013284. https:\/\/doi.org\/10.1587\/transinf.2016EDP7334 Publisher Copyright: \u00a9 2017 The Institute of Electronics Information and Communication Engineers..","DOI":"10.1587\/transinf.2016EDP7334"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Zhangyin Feng Daya Guo Duyu Tang Nan Duan Xiaocheng Feng Ming Gong Linjun Shou Bing Qin Ting Liu Daxin Jiang and Ming Zhou. 2020. CodeBERT: A Pre-Trained Model for Programming and Natural Languages. arxiv:https:\/\/arXiv.org\/abs\/2002.08155\u00a0[cs.CL] https:\/\/arxiv.org\/abs\/2002.08155","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Oscar Karnalim and Simon. 2021. Explanation in Code Similarity Investigation. IEEE Access 9 (2021) 59935\u201359948. https:\/\/doi.org\/10.1109\/ACCESS.2021.3073703","DOI":"10.1109\/ACCESS.2021.3073703"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"e_1_3_3_1_9_2","unstructured":"Jia Li Chongyang Tao Zhi Jin Fang Liu Jia Li and Ge Li. 2023. ZC3: Zero-Shot Cross-Language Code Clone Detection. arxiv:https:\/\/arXiv.org\/abs\/2308.13754\u00a0[cs.SE] https:\/\/arxiv.org\/abs\/2308.13754"},{"key":"e_1_3_3_1_10_2","unstructured":"Yinhan Liu Myle Ott Naman Goyal Jingfei Du Mandar Joshi Danqi Chen Omer Levy Mike Lewis Luke Zettlemoyer and Veselin Stoyanov. 2019. RoBERTa: A Robustly Optimized BERT Pretraining Approach. arxiv:https:\/\/arXiv.org\/abs\/1907.11692\u00a0[cs.CL] https:\/\/arxiv.org\/abs\/1907.11692"},{"key":"e_1_3_3_1_11_2","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space. arxiv:https:\/\/arXiv.org\/abs\/1301.3781\u00a0[cs.CL] https:\/\/arxiv.org\/abs\/1301.3781"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00099"},{"key":"e_1_3_3_1_13_2","unstructured":"Annamalai Narayanan Mahinthan Chandramohan Rajasekar Venkatesan Lihui Chen Yang Liu and Shantanu Jaiswal. 2017. graph2vec: Learning Distributed Representations of Graphs. arxiv:https:\/\/arXiv.org\/abs\/1707.05005\u00a0[cs.AI] https:\/\/arxiv.org\/abs\/1707.05005"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00078"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236026"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00111"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3561165"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3524610.3527911"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"S. VenkataKeerthy Rohit Aggarwal Shalini Jain Maunendra\u00a0Sankar Desarkar Ramakrishna Upadrasta and Y.\u00a0N. Srikant. 2020. IR2V <scp>EC<\/scp>: LLVM IR Based Scalable Program Embeddings. ACM Transactions on Architecture and Code Optimization 17 4 (Dec. 2020) 1\u201327. https:\/\/doi.org\/10.1145\/3418463","DOI":"10.1145\/3418463"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/423"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970326"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Mohammad\u00a0A. Yahya and Dae-Kyoo Kim. 2023. CLCD-I: Cross-Language Clone Detection by Using Deep Learning with InferCode. Computers 12 1 (2023). https:\/\/doi.org\/10.3390\/computers12010012","DOI":"10.3390\/computers12010012"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Long\u00a0Liu Yao\u00a0Meng. 2020. A Deep Learning Approach for a Source Code Detection Model Using Self-Attention. Wiley (2020). https:\/\/doi.org\/10.1155\/2020\/5027198","DOI":"10.1155\/2020\/5027198"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00021"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSA.2019.00012"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00086"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236068"},{"key":"e_1_3_3_1_28_2","unstructured":"Ming Zhu Aneesh Jain Karthik Suresh Roshan Ravindran Sindhu Tipirneni and Chandan\u00a0K. Reddy. 2022. XLCoST: A Benchmark Dataset for Cross-lingual Code Intelligence. arxiv:https:\/\/arXiv.org\/abs\/2206.08474\u00a0[cs.SE] https:\/\/arxiv.org\/abs\/2206.08474"}],"event":{"name":"NLPIR 2024: 2024 8th International Conference on Natural Language Processing and Information Retrieval","acronym":"NLPIR 2024","location":"Okayama Japan"},"container-title":["Proceedings of the 2024 8th International Conference on Natural Language Processing and Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711542.3711566","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711542.3711566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:29Z","timestamp":1750295909000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711542.3711566"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,13]]},"references-count":27,"alternative-id":["10.1145\/3711542.3711566","10.1145\/3711542"],"URL":"https:\/\/doi.org\/10.1145\/3711542.3711566","relation":{},"subject":[],"published":{"date-parts":[[2024,12,13]]},"assertion":[{"value":"2025-04-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}