{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T12:01:55Z","timestamp":1725883315198},"publisher-location":"New York, NY, USA","reference-count":81,"publisher":"ACM","funder":[{"name":"National Science Foundation of China","award":["No. U20A20173, No. 6190234 and No. 62141222"]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["No. 226-2022-00064"],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Zhejiang Province","award":["No.2021C01105"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3540250.3549156","type":"proceedings-article","created":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T20:46:22Z","timestamp":1668026782000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Automated unearthing of dangerous issue reports"],"prefix":"10.1145","author":[{"given":"Shengyi","family":"Pan","sequence":"first","affiliation":[{"name":"Zhejiang University, China"}]},{"given":"Jiayuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Huawei, Canada"}]},{"given":"Filipe Roseiro","family":"Cogo","sequence":"additional","affiliation":[{"name":"Huawei, Canada"}]},{"given":"Xin","family":"Xia","sequence":"additional","affiliation":[{"name":"Huawei, China"}]},{"given":"Lingfeng","family":"Bao","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"given":"Xing","family":"Hu","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"given":"Shanping","family":"Li","sequence":"additional","affiliation":[{"name":"Zhejiang University, China"}]},{"given":"Ahmed E.","family":"Hassan","sequence":"additional","affiliation":[{"name":"Queen\u2019s University, Canada"}]}],"member":"320","published-online":{"date-parts":[[2022,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Mining Challenge of MSR 2011","year":"2011","unstructured":"2011. Mining Challenge of MSR 2011 . http:\/\/ 2011 .msrconf.org\/msr-challenge.html 2011. Mining Challenge of MSR 2011. http:\/\/2011.msrconf.org\/msr-challenge.html"},{"key":"e_1_3_2_1_2_1","unstructured":"2018. ISO\/IEC 29147:2018: Security techniques - Vulnerability disclosure. https:\/\/www.iso.org\/standard\/72311.html \t\t\t\t 2018. ISO\/IEC 29147:2018: Security techniques - Vulnerability disclosure. https:\/\/www.iso.org\/standard\/72311.html"},{"key":"e_1_3_2_1_3_1","unstructured":"2019. Malicious remote code execution backdoor discovered in the popular bootstrap-sass Ruby gem. https:\/\/snyk.io\/blog\/malicious-remote-code-execution-backdoor-discovered-in-the-popular-bootstrap-sass-ruby-gem\/ \t\t\t\t 2019. Malicious remote code execution backdoor discovered in the popular bootstrap-sass Ruby gem. https:\/\/snyk.io\/blog\/malicious-remote-code-execution-backdoor-discovered-in-the-popular-bootstrap-sass-ruby-gem\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2022. About Coordinated Disclosure of Security Vulnerabilities - GitHub Docs. https:\/\/docs.github.com\/en\/code-security\/repository-security-advisories\/about-coordinated-disclosure-of-security-vulnerabilities \t\t\t\t 2022. About Coordinated Disclosure of Security Vulnerabilities - GitHub Docs. https:\/\/docs.github.com\/en\/code-security\/repository-security-advisories\/about-coordinated-disclosure-of-security-vulnerabilities"},{"key":"e_1_3_2_1_5_1","unstructured":"2022. Anchor-cms\/Issue-1328. https:\/\/github.com\/anchorcms\/anchor-cms\/issues\/1328 \t\t\t\t 2022. Anchor-cms\/Issue-1328. https:\/\/github.com\/anchorcms\/anchor-cms\/issues\/1328"},{"key":"e_1_3_2_1_6_1","unstructured":"2022. Anchore-engine\/Issue-36. https:\/\/github.com\/anchore\/anchore-engine\/issues\/36 \t\t\t\t 2022. Anchore-engine\/Issue-36. https:\/\/github.com\/anchore\/anchore-engine\/issues\/36"},{"key":"e_1_3_2_1_7_1","unstructured":"2022. ASF Project Security for Committers (apache.org). https:\/\/www.apache.org\/security\/committers.html \t\t\t\t 2022. ASF Project Security for Committers (apache.org). https:\/\/www.apache.org\/security\/committers.html"},{"key":"e_1_3_2_1_8_1","unstructured":"2022. bert-base-uncased \u00b7 Hugging Face. https:\/\/huggingface.co\/bert-base-uncased \t\t\t\t 2022. bert-base-uncased \u00b7 Hugging Face. https:\/\/huggingface.co\/bert-base-uncased"},{"key":"e_1_3_2_1_9_1","unstructured":"2022. Common Vulnerabilities and Exposure. https:\/\/www.cve.org\/ \t\t\t\t 2022. Common Vulnerabilities and Exposure. https:\/\/www.cve.org\/"},{"key":"e_1_3_2_1_10_1","unstructured":"2022. Common Weakness Enumeration. https:\/\/cwe.mitre.org\/index.html \t\t\t\t 2022. Common Weakness Enumeration. https:\/\/cwe.mitre.org\/index.html"},{"key":"e_1_3_2_1_11_1","unstructured":"2022. Coordinated Vulnerability Disclosure for Open Source Projects. https:\/\/github.blog\/2022-02-09-coordinated-vulnerability-disclosure-cvd-open-source-projects\/ \t\t\t\t 2022. Coordinated Vulnerability Disclosure for Open Source Projects. https:\/\/github.blog\/2022-02-09-coordinated-vulnerability-disclosure-cvd-open-source-projects\/"},{"key":"e_1_3_2_1_12_1","unstructured":"2022. CWE-505. https:\/\/cwe.mitre.org\/data\/definitions\/505.html \t\t\t\t 2022. CWE-505. https:\/\/cwe.mitre.org\/data\/definitions\/505.html"},{"key":"e_1_3_2_1_13_1","unstructured":"2022. CWE-787. https:\/\/cwe.mitre.org\/data\/definitions\/787.html \t\t\t\t 2022. CWE-787. https:\/\/cwe.mitre.org\/data\/definitions\/787.html"},{"key":"e_1_3_2_1_14_1","unstructured":"2022. Dolibarr\/Issue-9079. https:\/\/github.com\/dolibarr\/dolibarr\/issues\/9079 \t\t\t\t 2022. Dolibarr\/Issue-9079. https:\/\/github.com\/dolibarr\/dolibarr\/issues\/9079"},{"key":"e_1_3_2_1_15_1","unstructured":"2022. GHArchive. https:\/\/www.gharchive.org\/ \t\t\t\t 2022. GHArchive. https:\/\/www.gharchive.org\/"},{"key":"e_1_3_2_1_16_1","unstructured":"2022. Graylog2-server\/Issue-5906. https:\/\/github.com\/Graylog2\/graylog2-server\/issues\/5906 \t\t\t\t 2022. Graylog2-server\/Issue-5906. https:\/\/github.com\/Graylog2\/graylog2-server\/issues\/5906"},{"key":"e_1_3_2_1_17_1","unstructured":"2022. How Google handles security vulnerabilities. https:\/\/about.google\/appsecurity\/ \t\t\t\t 2022. How Google handles security vulnerabilities. https:\/\/about.google\/appsecurity\/"},{"key":"e_1_3_2_1_18_1","unstructured":"2022. Leanote\/Issue-694. https:\/\/github.com\/leanote\/leanote\/issues\/694 \t\t\t\t 2022. Leanote\/Issue-694. https:\/\/github.com\/leanote\/leanote\/issues\/694"},{"key":"e_1_3_2_1_19_1","unstructured":"2022. Leanote\/Issue-695. https:\/\/github.com\/leanote\/leanote\/issues\/695 \t\t\t\t 2022. Leanote\/Issue-695. https:\/\/github.com\/leanote\/leanote\/issues\/695"},{"key":"e_1_3_2_1_20_1","unstructured":"2022. Libraw\/Issue-196. https:\/\/github.com\/libraw\/libraw\/issues\/196 \t\t\t\t 2022. Libraw\/Issue-196. https:\/\/github.com\/libraw\/libraw\/issues\/196"},{"key":"e_1_3_2_1_21_1","unstructured":"2022. Libraw\/Issue-3655. https:\/\/github.com\/mruby\/mruby\/issues\/3655 \t\t\t\t 2022. Libraw\/Issue-3655. https:\/\/github.com\/mruby\/mruby\/issues\/3655"},{"key":"e_1_3_2_1_22_1","unstructured":"2022. Microsoft\u2019s Approach to Coordinated Vulnerability Disclosure. https:\/\/www.microsoft.com\/en-us\/msrc\/cvd \t\t\t\t 2022. Microsoft\u2019s Approach to Coordinated Vulnerability Disclosure. https:\/\/www.microsoft.com\/en-us\/msrc\/cvd"},{"key":"e_1_3_2_1_23_1","unstructured":"2022. Mruby\/Issue-4928. https:\/\/github.com\/mruby\/mruby\/issues\/4928 \t\t\t\t 2022. Mruby\/Issue-4928. https:\/\/github.com\/mruby\/mruby\/issues\/4928"},{"key":"e_1_3_2_1_24_1","unstructured":"2022. National Vulnerability Database. https:\/\/nvd.nist.gov\/ \t\t\t\t 2022. National Vulnerability Database. https:\/\/nvd.nist.gov\/"},{"key":"e_1_3_2_1_25_1","unstructured":"2022. Our replication package. https:\/\/github.com\/panshengyi\/MemVul \t\t\t\t 2022. Our replication package. https:\/\/github.com\/panshengyi\/MemVul"},{"key":"e_1_3_2_1_26_1","unstructured":"2022. Riot\/Issue-10753. https:\/\/github.com\/riot-os\/riot\/issues\/10753 \t\t\t\t 2022. Riot\/Issue-10753. https:\/\/github.com\/riot-os\/riot\/issues\/10753"},{"key":"e_1_3_2_1_27_1","unstructured":"2022. Soycms Security Advisory. https:\/\/github.com\/inunosinsi\/soycms\/security\/advisories\/GHSA-33q6-4xmp-2f48 \t\t\t\t 2022. Soycms Security Advisory. https:\/\/github.com\/inunosinsi\/soycms\/security\/advisories\/GHSA-33q6-4xmp-2f48"},{"key":"e_1_3_2_1_28_1","unstructured":"2022. Soycms\/Issue-8. https:\/\/github.com\/inunosinsi\/soycms\/issues\/8 \t\t\t\t 2022. Soycms\/Issue-8. https:\/\/github.com\/inunosinsi\/soycms\/issues\/8"},{"key":"e_1_3_2_1_29_1","unstructured":"2022. Vuldb. https:\/\/vuldb.com\/?doc.sources \t\t\t\t 2022. Vuldb. https:\/\/vuldb.com\/?doc.sources"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134336"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"e_1_3_2_1_32_1","unstructured":"Asaf Biton. 2020. Responsible disclosure: the impact of vulnerability disclosure on open source security. SNYK. \t\t\t\t Asaf Biton. 2020. Responsible disclosure: the impact of vulnerability disclosure on open source security. SNYK."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835821"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1142\/9789812797926_0003"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"The Black Duck by Synopsys. 2018. Open Source Security and Risk Analysis. \t\t\t\t The Black Duck by Synopsys. 2018. Open Source Security and Risk Analysis.","DOI":"10.1016\/S1353-4858(18)30051-5"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2014.6897203"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of 38th International conference on machine learning (ICML). 1597\u20131607","author":"Chen Ting","year":"2020","unstructured":"Ting Chen , Simon Kornblith , Mohammad Norouzi , and Geoffrey Hinton . 2020 . A simple framework for contrastive learning of visual representations . In Proceedings of 38th International conference on machine learning (ICML). 1597\u20131607 . Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In Proceedings of 38th International conference on machine learning (ICML). 1597\u20131607."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 17th Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (HLT-NAACL). 4171\u20134186","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2019 . BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding . In Proceedings of the 17th Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (HLT-NAACL). 4171\u20134186 . Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proceedings of the 17th Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (HLT-NAACL). 4171\u20134186."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134048"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463340"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2018.00047"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.9"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2770124"},{"key":"e_1_3_2_1_46_1","volume-title":"Art Manion, and Chris King","author":"Householder Allen D","year":"2017","unstructured":"Allen D Householder , Garret Wassermann , Art Manion, and Chris King . 2017 . The cert guide to coordinated vulnerability disclosure. Carnegie-Mellon Univ Pittsburgh Pa Pittsburgh United States . Allen D Householder, Garret Wassermann, Art Manion, and Chris King. 2017. The cert guide to coordinated vulnerability disclosure. Carnegie-Mellon Univ Pittsburgh Pa Pittsburgh United States."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2876340"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2019.00041"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134072"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00040"},{"key":"e_1_3_2_1_52_1","unstructured":"Ilya Loshchilov and Frank Hutter. 2017. Decoupled weight decay regularization. arXiv preprint arXiv:1711.05101. \t\t\t\t Ilya Loshchilov and Frank Hutter. 2017. Decoupled weight decay regularization. arXiv preprint arXiv:1711.05101."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635892"},{"key":"e_1_3_2_1_54_1","unstructured":"MITRE. 2022. CVE-2020-15183. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-15183 \t\t\t\t MITRE. 2022. CVE-2020-15183. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-15183"},{"key":"e_1_3_2_1_55_1","unstructured":"MITRE. 2022. CVE-2020-15813. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-15813 \t\t\t\t MITRE. 2022. CVE-2020-15813. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-15813"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3195040"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-1617"},{"key":"e_1_3_2_1_58_1","article-title":"Revisiting supervised and unsupervised methods for effort-aware cross-project defect prediction","author":"Ni Chao","year":"2020","unstructured":"Chao Ni , Xin Xia , David Lo , Xiang Chen , and Qing Gu . 2020 . Revisiting supervised and unsupervised methods for effort-aware cross-project defect prediction . IEEE Transactions on Software Engineering. Chao Ni, Xin Xia, David Lo, Xiang Chen, and Qing Gu. 2020. Revisiting supervised and unsupervised methods for effort-aware cross-project defect prediction. IEEE Transactions on Software Engineering.","journal-title":"IEEE Transactions on Software Engineering."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.78"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52683-2_2"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-020-09546-7"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2787653"},{"key":"e_1_3_2_1_63_1","volume-title":"Sentence-bert: Sentence embeddings using siamese bert-networks. arXiv preprint arXiv:1908.10084.","author":"Reimers Nils","year":"2019","unstructured":"Nils Reimers and Iryna Gurevych . 2019 . Sentence-bert: Sentence embeddings using siamese bert-networks. arXiv preprint arXiv:1908.10084. Nils Reimers and Iryna Gurevych. 2019. Sentence-bert: Sentence embeddings using siamese bert-networks. arXiv preprint arXiv:1908.10084."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.1259227"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0118432"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380356"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09906-8"},{"key":"e_1_3_2_1_68_1","volume-title":"Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research, 15, 1","author":"Srivastava Nitish","year":"2014","unstructured":"Nitish Srivastava , Geoffrey Hinton , Alex Krizhevsky , Ilya Sutskever , and Ruslan Salakhutdinov . 2014. Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research, 15, 1 ( 2014 ), 1929\u20131958. Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research, 15, 1 (2014), 1929\u20131958."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380353"},{"key":"e_1_3_2_1_70_1","volume-title":"Matching networks for one shot learning. Advances in neural information processing systems, 29","author":"Vinyals Oriol","year":"2016","unstructured":"Oriol Vinyals , Charles Blundell , Timothy Lillicrap , and Daan Wierstra . 2016. Matching networks for one shot learning. Advances in neural information processing systems, 29 ( 2016 ). Oriol Vinyals, Charles Blundell, Timothy Lillicrap, and Daan Wierstra. 2016. Matching networks for one shot learning. Advances in neural information processing systems, 29 (2016)."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00074"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386252"},{"key":"e_1_3_2_1_73_1","unstructured":"David Wehr Halley Fede Eleanor Pence Bo Zhang Guilherme Ferreira John Walczyk and Joseph Hughes. 2019. Learning Semantic Vector Representations of Source Code via a Siamese Neural Network. arXiv preprint arXiv:1904.11968. \t\t\t\t David Wehr Halley Fede Eleanor Pence Bo Zhang Guilherme Ferreira John Walczyk and Joseph Hughes. 2019. Learning Semantic Vector Representations of Source Code via a Siamese Neural Network. arXiv preprint arXiv:1904.11968."},{"key":"e_1_3_2_1_74_1","volume-title":"3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings. 1\u20131.","author":"Weston Jason","year":"2015","unstructured":"Jason Weston , Sumit Chopra , and Antoine Bordes . 2015 . Memory networks . In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings. 1\u20131. Jason Weston, Sumit Chopra, and Antoine Bordes. 2015. Memory networks. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings. 1\u20131."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380921"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2014.7049035"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2012.22"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3063727"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416562"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-014-0162-2"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3117771"}],"event":{"name":"ESEC\/FSE '22: 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Singapore Singapore","acronym":"ESEC\/FSE '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","NUS NUS"]},"container-title":["Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3540250.3549156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T19:52:16Z","timestamp":1686081136000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3540250.3549156"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":81,"alternative-id":["10.1145\/3540250.3549156","10.1145\/3540250"],"URL":"https:\/\/doi.org\/10.1145\/3540250.3549156","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}