{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T04:09:38Z","timestamp":1726114178214},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030675363"},{"type":"electronic","value":"9783030675370"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-67537-0_26","type":"book-chapter","created":{"date-parts":[[2021,1,21]],"date-time":"2021-01-21T13:12:57Z","timestamp":1611234777000},"page":"421-438","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["API Misuse Detection Based on Stacked LSTM"],"prefix":"10.1007","author":[{"given":"Shuyin","family":"OuYang","sequence":"first","affiliation":[]},{"given":"Fan","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Li","family":"Kuang","sequence":"additional","affiliation":[]},{"given":"Yuyu","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,22]]},"reference":[{"issue":"4","key":"26_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3212695","volume":"51","author":"M Allamanis","year":"2018","unstructured":"Allamanis, M., et al.: A survey of machine learning for big code and naturalness. ACM Comput. Surv. (CSUR) 51(4), 1\u201337 (2018). Author, F., Author, S.: Title of a proceedings paper. In: Editor, F., Editor, S. (eds.) CONFERENCE 2016, LNCS, vol. 9999, pp.\u00a01\u201313. Springer, Heidelberg (2016)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Nguyen, S., et al.: Combining program analysis and statistical language model for code statement completion. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE (2019)","DOI":"10.1109\/ASE.2019.00072"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Allamanis, M., et al.: Learning natural coding conventions. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering (2014)","DOI":"10.1145\/2635868.2635883"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"White, C., Vendome, M., Linares-V\u00e1squez, M., Poshyvanyk, D.: Toward deep learning software repositories. In: MSR 2015, pp. 334\u2013345 (2015)","DOI":"10.1109\/MSR.2015.38"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Ray, B., Hellendoorn, V., Godhane, S., Tu, Z., Bacchelli, A., Devanbu, P.: On the naturalness of buggy code. In: Proceedings of the International Conference on Software Engineering (ICSE) (2016)","DOI":"10.1145\/2884781.2884848"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Oh, H., Yang, H., Yi, K.: Learning a strategy for adapting a program analysis via Bayesian optimisation. In: Proceedings of the Conference on Object-Oriented Programming, Systems, Languages & Applications (OOPSLA) (2015)","DOI":"10.1145\/2814270.2814309"},{"key":"26_CR7","unstructured":"Piech, C., Huang, J., Nguyen, A., Phulsuksombati, M., Sahami, M., Guibas, L.J.: Learning program embeddings to propagate feedback on student code. In: Proceedings of the International Conference on Machine Learning (ICML) (2015)"},{"key":"26_CR8","unstructured":"Pradel, M., Sen, K.: Deep learning to find bugs (2017)"},{"key":"26_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2744200","volume":"25","author":"S Proksch","year":"2015","unstructured":"Proksch, S., Lerch, J., Mezini, M.: Intelligent code completion with Bayesian networks. ACM Trans. Softw. Eng. Methodol. (TOSEM) 25, 1\u201331 (2015)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Rabinovich, M., Stern, M., Klein, D.: Abstract syntax networks for code generation and semantic parsing. In: Proceedings of the Annual Meeting of the Association for Computational Linguistics (ACL) (2017)","DOI":"10.18653\/v1\/P17-1105"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Raychev, V., Vechev, M., Krause, A.: Predicting program properties from \u201cbig code\u201d. In: Proceedings of the Symposium on Principles of Programming Languages (POPL) (2015)","DOI":"10.1145\/2676726.2677009"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Wang, S., Chollak, D., Movshovitz-Attias, D., Tan, L.: Bugram: bug detection with n-gram language models. In: Proceedings of the International Conference on Automated Software Engineering (ASE) (2016a)","DOI":"10.1145\/2970276.2970341"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Pu, Y., Narasimhan, K., Solar-Lezama, A., Barzilay, R.: sk_p: a neural program corrector for MOOCs. In: Proceedings of the Conference on Systems, Programming, Languages and Applications: Software for Humanity (SPLASH) (2016)","DOI":"10.1145\/2984043.2989222"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Xue, Y., Wang, J., Liu, Y., Xiao, H., Sun, J., Chandramohan, M.: Detection and classification of malicious javascript via attack behavior modelling. In: ISSTA 2015, pp. 48\u201359 (2015)","DOI":"10.1145\/2771783.2771814"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Raychev, V., Vechev, M., Yahav, E.: Code completion with statistical language models. In: Proceedings of the Symposium on Programming Language Design and Implementation (PLDI) (2014)","DOI":"10.1145\/2594291.2594321"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Xie, K., Wen, Y.: LSTM-MA: a LSTM method with multi-modality and adjacency constraint for brain image segmentation. In: 2019 IEEE International Conference on Image Processing (ICIP). IEEE (2019)","DOI":"10.1109\/ICIP.2019.8802959"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Xue, H., Huynh, D.Q., Reynolds, M.: SS-LSTM: a hierarchical LSTM model for pedestrian trajectory prediction. In: 2018 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE (2018)","DOI":"10.1109\/WACV.2018.00135"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Tu, Z., Su, Z., Devanbu, P.: On the localness of software. In: Proceedings of the International Symposium on Foundations of Software Engineering (FSE) (2014)","DOI":"10.1145\/2635868.2635875"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Kersten, M., Murphy, G.C.: Using task context to improve programmer productivity. In: FSE, pp. 1\u201311. ACM (2006)","DOI":"10.1145\/1181775.1181777"},{"issue":"3","key":"26_CR20","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.infsof.2006.10.017","volume":"49","author":"A Kuhn","year":"2007","unstructured":"Kuhn, A., Ducasse, S., G\u00edrba, T.: Semantic clustering: identifying topics in source code. Inf. Softw. Technol. 49(3), 230\u2013243 (2007)","journal-title":"Inf. Softw. Technol."},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Allamanis, M., Barr, E.T., Bird, C., Sutton, C.: Suggesting accurate method and class names. In: Proceedings of the Joint Meeting of the European Software Engineering Conference and the Symposium on the Foundations of Software Engineering (ESEC\/FSE) (2015)","DOI":"10.1145\/2786805.2786849"},{"key":"26_CR22","unstructured":"Allamanis, M., Tarlow, D., Gordon, A., Wei, Y.: Bimodal modelling of source code and natural language. In: Proceedings of the International Conference on Machine Learning (ICML) (2015)"},{"key":"26_CR23","unstructured":"Allamanis, M., Peng, H., Sutton, C.: A convolutional attention network for extreme summarization of source code. In: Proceedings of the International Conference on Machine Learning (ICML) (2016)"},{"key":"26_CR24","unstructured":"Allamanis, M., Brockschmidt, M., Khademi, M.: Learning to represent programs with graphs. In: Proceedings of the International Conference on Learning Representations (ICLR) (2018)"},{"key":"26_CR25","unstructured":"Wang, X., Chen, C., Zhao, Y.F., Peng, X., Zhao, W.Y.: API misuse bug detection based on deep learning. Ruan Jian Xue Bao\/J. Softw. 30(5), 1342\u20131358 (2019). (in Chinese). http:\/\/www.jos.org.cn\/1000-9825\/5722.htm"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Hindle, A., Barr, E.T., Su, Z., Gabel, M., Devanbu, P.: On the naturalness of software. In: Proceedings of the International Conference on Software Engineering (ICSE) (2012)","DOI":"10.1109\/ICSE.2012.6227135"},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"Nguyen, A.T., Nguyen, T.N.: Graph-based statistical language model for code. In: Proceedings of the International Conference on Software Engineering (ICSE) (2015)","DOI":"10.1109\/ICSE.2015.336"},{"key":"26_CR28","doi-asserted-by":"crossref","unstructured":"Nguyen, T.T., Nguyen, A.T., Nguyen, H.A., Nguyen, T.N.: A statistical semantic language model for source code. In: Proceedings of the Joint Meeting of the European Software Engineering Conference and the Symposium on the Foundations of Software Engineering (ESEC\/FSE) (2013)","DOI":"10.1145\/2491411.2491458"},{"key":"26_CR29","doi-asserted-by":"crossref","unstructured":"Fowkes, J., Sutton, C.: Parameter-free probabilistic API mining across GitHub. In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering (2016)","DOI":"10.1145\/2950290.2950319"},{"key":"26_CR30","doi-asserted-by":"crossref","unstructured":"Nguyen, P.T., et al.: FOCUS: a recommender system for mining API function calls and usage patterns. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). IEEE (2019)","DOI":"10.1109\/ICSE.2019.00109"},{"key":"26_CR31","unstructured":"Chen, C., et al.: Mining likely analogical apis across third-party libraries via large-scale unsupervised API semantics embedding. IEEE Trans. Softw. Eng. (2019)"},{"key":"26_CR32","doi-asserted-by":"crossref","unstructured":"Sven, A., Nguyen, H.A., Nadi, S., et al.: Investigating next steps in static API-misuse detection. In: 2019 IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR), pp. 265\u2013275. IEEE (2019)","DOI":"10.1109\/MSR.2019.00053"},{"key":"26_CR33","doi-asserted-by":"crossref","unstructured":"Lilleberg, J., Zhu, Y., Zhang, Y.: Support vector machines and word2vec for text classification with semantic features. In: 2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI* CC). IEEE (2015)","DOI":"10.1109\/ICCI-CC.2015.7259377"},{"issue":"4","key":"26_CR34","doi-asserted-by":"publisher","first-page":"1857","DOI":"10.1016\/j.eswa.2014.09.011","volume":"42","author":"D Zhang","year":"2015","unstructured":"Zhang, D., et al.: Chinese comments sentiment classification based on word2vec and SVMperf. Expert Syst. Appl. 42(4), 1857\u20131863 (2015)","journal-title":"Expert Syst. Appl."},{"key":"26_CR35","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.compstruc.2019.05.006","volume":"220","author":"R Zhang","year":"2019","unstructured":"Zhang, R., et al.: Deep long short-term memory networks for nonlinear structural seismic response prediction. Comput. Struct. 220, 55\u201368 (2019)","journal-title":"Comput. Struct."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-67537-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T19:22:16Z","timestamp":1619292136000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-67537-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030675363","9783030675370"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-67537-0_26","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"22 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CollaborateCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Collaborative Computing: Networking, Applications and Worksharing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"colcom2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/collaboratecom.eai-conferences.org\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy+","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"211","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}