{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T06:43:53Z","timestamp":1773557033782,"version":"3.50.1"},"publisher-location":"California","reference-count":0,"publisher":"International Joint Conferences on Artificial Intelligence Organization","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"abstract":"<jats:p>As modern social coding platforms such as GitHub and Stack Overflow become increasingly popular, their potential security risks increase as well (e.g., risky or malicious codes could be easily embedded and distributed). To enhance the social coding security, in this paper, we propose to automate cross-platform user identification between GitHub and Stack Overflow to combat the attackers who attempt to poison the modern software programming ecosystem. To solve this problem, an important insight brought by this work is to leverage social coding properties in addition to user attributes for cross-platform user identification. To depict users in GitHub and Stack Overflow (attached with attributed information), projects, questions and answers as well as the rich semantic relations among them, we first introduce an attributed heterogeneous information network (AHIN) for modeling. Then, we propose a novel AHIN representation learning model AHIN2Vec to efficiently learn node (i.e., user) representations in AHIN for cross-platform user identification. Comprehensive experiments on the data collections from GitHub and Stack Overflow are conducted to validate the effectiveness of our developed system iDev integrating our proposed method in cross-platform user identification by comparisons with other baselines.<\/jats:p>","DOI":"10.24963\/ijcai.2019\/315","type":"proceedings-article","created":{"date-parts":[[2019,7,28]],"date-time":"2019-07-28T07:46:05Z","timestamp":1564299965000},"page":"2272-2278","source":"Crossref","is-referenced-by-count":19,"title":["iDev: Enhancing Social Coding Security by Cross-platform User Identification Between GitHub and Stack Overflow"],"prefix":"10.24963","author":[{"given":"Yujie","family":"Fan","sequence":"first","affiliation":[{"name":"Department of CDS, Case Western Reserve University, OH, USA"},{"name":"Department of CSEE, West Virginia University, WV, USA"}]},{"given":"Yiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of CDS, Case Western Reserve University, OH, USA"},{"name":"Department of CSEE, West Virginia University, WV, USA"}]},{"given":"Shifu","family":"Hou","sequence":"additional","affiliation":[{"name":"Department of CDS, Case Western Reserve University, OH, USA"},{"name":"Department of CSEE, West Virginia University, WV, USA"}]},{"given":"Lingwei","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of CSEE, West Virginia University, WV, USA"}]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[{"name":"Department of CDS, Case Western Reserve University, OH, USA"},{"name":"Department of CSEE, West Virginia University, WV, USA"}]},{"given":"Chuan","family":"Shi","sequence":"additional","affiliation":[{"name":"School of CS, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Liang","family":"Zhao","sequence":"additional","affiliation":[{"name":"Department of IST, George Mason University, VA, USA"}]},{"given":"Shouhuai","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of CS, University of Texas at San Antonio, TX, USA"}]}],"member":"10584","event":{"name":"Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}","theme":"Artificial Intelligence","location":"Macao, China","acronym":"IJCAI-2019","number":"28","sponsor":["International Joint Conferences on Artificial Intelligence Organization (IJCAI)"],"start":{"date-parts":[[2019,8,10]]},"end":{"date-parts":[[2019,8,16]]}},"container-title":["Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence"],"original-title":[],"deposited":{"date-parts":[[2019,7,28]],"date-time":"2019-07-28T07:48:29Z","timestamp":1564300109000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.ijcai.org\/proceedings\/2019\/315"}},"subtitle":[],"proceedings-subject":"Artificial Intelligence Research Articles","short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":0,"URL":"https:\/\/doi.org\/10.24963\/ijcai.2019\/315","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}