{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T06:02:53Z","timestamp":1763445773266,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"EFRE\/FESR","award":["EFRE1039"],"award-info":[{"award-number":["EFRE1039"]}]},{"name":"PNRR"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3691620.3695348","type":"proceedings-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T15:39:19Z","timestamp":1729265959000},"page":"2346-2349","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["MADE-WIC: Multiple Annotated Datasets for Exploring Weaknesses In Code"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-3156-6211","authenticated-orcid":false,"given":"Moritz","family":"Mock","sequence":"first","affiliation":[{"name":"Free University of Bozen-Bolzano, Bolzano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1303-4173","authenticated-orcid":false,"given":"Jorge","family":"Melegati","sequence":"additional","affiliation":[{"name":"Free University of Bozen-Bolzano, Bolzano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5171-8085","authenticated-orcid":false,"given":"Max","family":"Kretschmann","sequence":"additional","affiliation":[{"name":"Hamburg University of Technology, Hamburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6304-771X","authenticated-orcid":false,"given":"Nicolas E.","family":"Diaz Ferreyra","sequence":"additional","affiliation":[{"name":"Hamburg University of Technology, Hamburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3737-9264","authenticated-orcid":false,"given":"Barbara","family":"Russo","sequence":"additional","affiliation":[{"name":"Free University of Bozen-Bolzano, Bolzano, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Article 1 (jan","author":"Bleiholder Jens","year":"2009","unstructured":"Jens Bleiholder and Felix Naumann. 2009. Data fusion. ACM Comput. Surv. 41, 1, Article 1 (jan 2009), 41 pages."},{"key":"e_1_3_2_1_2_1","volume-title":"Michael John Decker, and Jonathan I. Maletic","author":"Collard Michael L.","year":"2013","unstructured":"Michael L. Collard, Michael John Decker, and Jonathan I. Maletic. 2013. srcML: An Infrastructure for the Exploration, Analysis, and Manipulation of Source Code: A Tool Demonstration (ICSME). 516--519."},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"An empirical study of developers' discussions about security challenges of different programming languages","volume":"27","author":"Roland Croft","year":"2022","unstructured":"Roland Croft et al. 2022. An empirical study of developers' discussions about security challenges of different programming languages. Empirical Software Engineering 27 (2022), 1--52.","journal-title":"Empirical Software Engineering"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Roland Croft M. Ali Babar and M. Mehdi Kholoosi. 2023. Data Quality for Software Vulnerability Datasets (ICSE). 121--133.","DOI":"10.1109\/ICSE48619.2023.00022"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3171202"},{"key":"e_1_3_2_1_6_1","volume-title":"Nguyen","author":"Fan Jiahao","year":"2020","unstructured":"Jiahao Fan, Yi Li, Shaohua Wang, and Tien N. Nguyen. 2020. A C\/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries (MSR '20). Association for Computing Machinery, New York, NY, USA, 508--512."},{"key":"e_1_3_2_1_7_1","volume-title":"EMNLP 2020","author":"Zhangyin","year":"2020","unstructured":"Zhangyin Feng et al. 2020. CodeBERT: A pre-trained model for programming and natural languages. EMNLP 2020 (2020), 1536--1547."},{"key":"e_1_3_2_1_8_1","volume-title":"Measuring nominal scale agreement among many raters. Psychological bulletin 76, 5","author":"Fleiss Joseph L","year":"1971","unstructured":"Joseph L Fleiss. 1971. Measuring nominal scale agreement among many raters. Psychological bulletin 76, 5 (1971), 378."},{"key":"e_1_3_2_1_9_1","unstructured":"Zhaoqiang Guo et al. 2021. How Far Have We Progressed in Identifying Self-Admitted Technical Debts? A Comprehensive Empirical Study."},{"volume-title":"The impact of tangled code changes (MSR)","author":"Herzig Kim","key":"e_1_3_2_1_10_1","unstructured":"Kim Herzig and Andreas Zeller. 2013. The impact of tangled code changes (MSR). IEEE, 121--130."},{"volume-title":"Information and Communications Security","author":"Lin Guanjun","key":"e_1_3_2_1_11_1","unstructured":"Guanjun Lin, Wei Xiao, Jun Zhang, and Yang Xiang. 2020. Deep Learning-Based Vulnerable Function Detection: A Benchmark. In Information and Communications Security, Jianying Zhou, Xiapu Luo, Qingni Shen, and Zhen Xu (Eds.). Springer International Publishing, Cham, 219--232."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2654244"},{"key":"e_1_3_2_1_13_1","unstructured":"MIRTE. 2006. Common Weakness Enumaration. https:\/\/cwe.mitre.org"},{"key":"e_1_3_2_1_14_1","unstructured":"MITRE. 1999. Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Moritz Mock Jorge Melegati Max Kretschmann Nicol\u00e1s E. D\u00edaz Ferreyra and Barbara Russo. 2024. Replication package. 10.5281\/zenodo.13370805","DOI":"10.5281\/zenodo.13370805"},{"key":"e_1_3_2_1_16_1","volume-title":"HERMES: Using Commit-Issue Linking to Detect Vulnerability-Fixing Commits (SANER). 51--62.","author":"Nguyen-Truong Giang","year":"2022","unstructured":"Giang Nguyen-Truong et al. 2022. HERMES: Using Commit-Issue Linking to Detect Vulnerability-Fixing Commits (SANER). 51--62."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3207149"},{"key":"e_1_3_2_1_18_1","unstructured":"PMD 2024. PMD-CPD. https:\/\/pmd.github.io\/pmd\/pmd_userdocs_cpd.html"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Aniket Potdar and Emad Shihab. 2014. An Exploratory Study on Self-Admitted Technical Debt (ICSME). 91--100.","DOI":"10.1109\/ICSME.2014.31"},{"key":"e_1_3_2_1_20_1","article-title":"Neural Network-Based Detection of Self-Admitted Technical Debt: From Performance to Explainability","volume":"28","author":"Xiaoxue Ren","year":"2019","unstructured":"Xiaoxue Ren et al. 2019. Neural Network-Based Detection of Self-Admitted Technical Debt: From Performance to Explainability. ACM Trans. Softw. Eng. Methodol. 28, 3, Article 15 (jul 2019), 45 pages.","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Barbara Russo Matteo Camilli and Moritz Mock. 2022. WeakSATD: Detecting Weak Self-admitted Technical Debt (MSR). 448--453.","DOI":"10.1145\/3524842.3528469"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Yunhui Zheng et al. 2021. D2a: A dataset built for ai-based vulnerability detection methods using differential analysis (ICSE-SEIP). IEEE 111--120.","DOI":"10.1109\/ICSE-SEIP52600.2021.00020"},{"key":"e_1_3_2_1_23_1","volume-title":"Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks. Curran Associates.","author":"Yaqin Zhou","year":"2019","unstructured":"Yaqin Zhou et al. 2019. Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks. Curran Associates."}],"event":{"name":"ASE '24: 39th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Sacramento CA USA","acronym":"ASE '24"},"container-title":["Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695348","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3691620.3695348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:18Z","timestamp":1750291578000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695348"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":23,"alternative-id":["10.1145\/3691620.3695348","10.1145\/3691620"],"URL":"https:\/\/doi.org\/10.1145\/3691620.3695348","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2024-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}