Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

A survey on machine learning techniques applied to source code

Published: 14 March 2024 Publication History

Abstract

The advancements in machine learning techniques have encouraged researchers to apply these techniques to a myriad of software engineering tasks that use source code analysis, such as testing and vulnerability detection. Such a large number of studies hinders the community from understanding the current research landscape. This paper aims to summarize the current knowledge in applied machine learning for source code analysis. We review studies belonging to twelve categories of software engineering tasks and corresponding machine learning techniques, tools, and datasets that have been applied to solve them. To do so, we conducted an extensive literature search and identified 494 studies. We summarize our observations and findings with the help of the identified studies. Our findings suggest that the use of machine learning techniques for source code analysis tasks is consistently increasing. We synthesize commonly used steps and the overall workflow for each task and summarize machine learning techniques employed. We identify a comprehensive list of available datasets and tools useable in this context. Finally, the paper discusses perceived challenges in this area, including the availability of standard datasets, reproducibility and replicability, and hardware resources.
Editor’s note: Open Science material was validated by the Journal of Systems and Software Open Science Board.

Highlights

The use of ML techniques is constantly increasing for source code analysis.
A wide range SE tasks involving source code analysis use ML.
The study identifies challenges in the field and potential mitigations.
We identify commonly used datasets and tools used in the field.

References

[1]
Abbas Raja, Albalooshi Fawzi Abdulaziz, Hammad Mustafa, Software change proneness prediction using machine learning, in: 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), IEEE, 2020, pp. 1–7.
[2]
Abdalkareem Rabe, Mujahid Suhaib, Shihab Emad, A machine learning approach to improve the detection of ci skip commits, IEEE Trans. Softw. Eng. (2020).
[3]
Abdeljaber Osama, Avci Onur, Kiranyaz Serkan, Gabbouj Moncef, Inman Daniel J., Real-time vibration-based structural damage detection using one-dimensional convolutional neural networks, J. Sound Vib. 388 (2017) 154–170.
[4]
Abuhamad Mohammed, AbuHmed Tamer, Mohaisen Aziz, Nyang DaeHun, Large-scale and language-oblivious code authorship identification, in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS ’18, ISBN 9781450356930, 2018, pp. 101–114,.
[5]
Abunadi Ibrahim, Alenezi Mamdouh, Towards cross project vulnerability prediction in open source web applications, in: Proceedings of the the International Conference on Engineering & MIS 2015, ICEMIS ’15, Association for Computing Machinery, New York, NY, USA, ISBN 9781450334181, 2015,.
[6]
Aggarwal Simran, Software code analysis using ensemble learning techniques, in: Proceedings of the International Conference on Advanced Information Science and System, AISS ’19, ISBN 9781450372916, 2019,.
[7]
Agnihotri Mansi, Chug Anuradha, Application of machine learning algorithms for code smell prediction using object-oriented software metrics, J. Stat. Manag. Syst. 23 (7) (2020) 1159–1171,.
[8]
Ahmad Wasi, Chakraborty Saikat, Ray Baishakhi, Chang Kai-Wei, A transformer-based approach for source code summarization, in: Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020, pp. 4998–5007,.
[9]
Ahmed Umair Z., Kumar Pawan, Karkare Amey, Kar Purushottam, Gulwani Sumit, Compilation error repair: For the student programs, from the student programs, in: Proceedings of the 40th International Conference on Software Engineering: Software Engineering Education and Training, in: ICSE-SEET ’18, ISBN 9781450356602, 2018, pp. 78–87,.
[10]
Al-Jamimi H.A., Ahmed M., Machine learning-based software quality prediction models: State of the art, in: 2013 International Conference on Information Science and Applications (ICISA), 2013, pp. 1–4,.
[11]
Al Qasem Osama, Akour Mohammed, Alenezi Mamdouh, The influence of deep learning algorithms factors in software fault prediction, IEEE Access 8 (2020) 63945–63960.
[12]
AL-Shaaby A., Aljamaan Hamoud I., Alshayeb M., Bad smell detection using machine learning techniques: A systematic literature review, Arab. J. Sci. Eng. 45 (2020) 2341–2369.
[13]
Alazba Amal, Aljamaan Hamoud, Code smell detection using feature selection and stacking ensemble: An empirical investigation, Inf. Softw. Technol. 138 (2021).
[14]
Aleem Saiqa, Capretz Luiz Fernando, Ahmed Faheem, et al., Comparative performance analysis of machine learning techniques for software bug detection, in: Proceedings of the 4th International Conference on Software Engineering and Applications, number 1, AIRCC Press, Chennai, Tamil Nadu, India, 2015, pp. 71–79.
[15]
Aleti Aldeida, Martinez Matias, E-APR: mapping the effectiveness of automated program repair techniques, Empir. Softw. Eng. 26 (5) (2021) 1–30.
[16]
Alhusain Sultan, Coupland Simon, John Robert, Kavanagh Maria, Towards machine learning based design pattern recognition, in: 2013 13th UK Workshop on Computational Intelligence (UKCI), IEEE, 2013, pp. 244–251.
[17]
Ali Nasir, Sharafi Zohreh, Guéhéneuc Yann-Ga”̈el, Antoniol Giuliano, An empirical study on the importance of source code entities for requirements traceability, Empir. Softw. Eng. 20 (2) (2015) 442–478.
[18]
Ali Alatwi Huda, Oh Tae, Fokoue Ernest, Stackpole Bill, Android malware detection using category-based machine learning classifiers, in: Proceedings of the 17th Annual Conference on Information Technology Education, SIGITE ’16, ISBN 9781450344524, 2016, pp. 54–59,.
[19]
Alikhashashneh E.A., Raje R.R., Hill J.H., Using machine learning techniques to classify and predict static code analysis tool warnings, in: 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), 2018, pp. 1–8,.
[20]
Aljamaan Hamoud, Alazba Amal, Software defect prediction using tree-based ensembles, in: Proceedings of the 16th ACM International Conference on Predictive Models and Data Analytics in Software Engineering, 2020, pp. 1–10.
[21]
Allamanis Miltiadis, Barr Earl T., Bird Christian, Sutton Charles, Suggesting accurate method and class names, in: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, in: ESEC/FSE 2015, ISBN 9781450336758, 2015, pp. 38–49,.
[22]
Allamanis Miltiadis, Barr Earl T., Devanbu Premkumar, Sutton Charles, A survey of machine learning for big code and naturalness, ACM Comput. Surv. (ISSN ) 51 (4) (2018),.
[23]
Allamanis Miltiadis, Brockschmidt Marc, Khademi Mahmoud, Learning to represent programs with graphs, in: International Conference on Learning Representations, 2018.
[24]
Allamanis Miltiadis, Peng Hao, Sutton Charles, A convolutional attention network for extreme summarization of source code, 2016.
[25]
Allamanis M., Sutton C., Mining source code repositories at massive scale using language modeling, in: 2013 10th Working Conference on Mining Software Repositories (MSR), 2013, pp. 207–216,.
[26]
Allamanis Miltiadis, Sutton Charles, Mining source code repositories at massive scale using language modeling, in: 10th Working Conference on Mining Software Repositories (MSR), 2013, pp. 207–216,.
[27]
Allamanis Miltiadis, Tarlow Daniel, Gordon Andrew D., Wei Yi, Bimodal modelling of source code and natural language, in: Proceedings of the 32nd International Conference on International Conference on Machine Learning - Volume 37, ICML ’15, 2015, pp. 2123–2132.
[28]
Allix Kevin, Bissyandé Tegawendé F., Klein Jacques, Le Traon Yves, AndroZoo: Collecting millions of android apps for the research community, in: Proceedings of the 13th International Conference on Mining Software Repositories, MSR ’16, ISBN 978-1-4503-4186-8, 2016, pp. 468–471,.
[29]
Alon Uri, Brody Shaked, Levy Omer, Yahav Eran, code2seq: Generating sequences from structured representations of code, 2019.
[30]
Alon Uri, Zilberstein Meital, Levy Omer, Yahav Eran, A general path-based representation for predicting program properties, SIGPLAN Not. (ISSN ) 53 (4) (2018) 404–419,.
[31]
Alon Uri, Zilberstein Meital, Levy Omer, Yahav Eran, Code2vec: Learning distributed representations of code, Proc. ACM Program. Lang. 3 (POPL) (2019),.
[32]
Alrajeh Dalal, Kramer Jeff, Russo Alessandra, Uchitel Sebastian, Automated support for diagnosis and repair, Commun. ACM (ISSN ) 58 (2) (2015) 65–72,.
[33]
Alsolai Hadeel, Roper Marc, A systematic literature review of machine learning techniques for software maintainability prediction, Inf. Softw. Technol. (ISSN ) 119 (2020),.
[34]
Altarawy Doaa, Shahin Hossameldin, Mohammed Ayat, Meng Na, Lascad: Language-agnostic software categorization and similar application detection, J. Syst. Softw. 142 (2018) 21–34.
[35]
Alves H., Fonseca B., Antunes N., Experimenting machine learning techniques to predict vulnerabilities, in: 2016 Seventh Latin-American Symposium on Dependable Computing (LADC), 2016, pp. 151–156,.
[36]
Amal Boukhdhir, Kessentini Marouane, Bechikh Slim, Dea Josselin, Said Lamjed Ben, On the use of machine learning and search-based software engineering for ill-defined fitness function: A case study on software refactoring, in: Le Goues Claire, Yoo Shin (Eds.), Search-Based Software Engineering, ISBN 978-3-319-09940-8, 2014, pp. 31–45.
[37]
Amorim L., Costa E., Antunes N., Fonseca B., Ribeiro M., Experience report: Evaluating the effectiveness of decision trees for detecting code smells, in: 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE), 2015, pp. 261–269,.
[38]
Amorim L.A., Freitas M.F., Dantas A., de Souza E.F., Camilo-Junior C.G., Martins W.S., A new word embedding approach to evaluate potential fixes for automated program repair, in: 2018 International Joint Conference on Neural Networks (IJCNN), 2018, pp. 1–8,.
[39]
Aniche M., Maziero E., Durelli R., Durelli V., The effectiveness of supervised machine learning algorithms in predicting software refactoring, IEEE Trans. Softw. Eng. (2020) 1,.
[40]
Arar ”̈Omer Faruk, Ayan K”̈urşat, Software defect prediction using cost-sensitive neural network, Appl. Soft Comput. 33 (2015) 263–277.
[41]
Arcelli Fontana Francesca, Zanoni Marco, Code smell severity classification using machine learning techniques, Knowl.-Based Syst. (ISSN ) 128 (2017) 43–58,.
[42]
Aribandi Vamsi Krishna, Kumar Lov, Bhanu Murthy Neti Lalita, Krishna Aneesh, Prediction of refactoring-prone classes using ensemble learning, in: Gedeon Tom, Wong Kok Wai, Lee Minho (Eds.), Neural Information Processing, ISBN 978-3-030-36802-9, 2019, pp. 242–250.
[43]
Azcona David, Arora Piyush, Hsiao I-Han, Smeaton Alan, User2code2vec: Embeddings for profiling students based on distributional representations of source code, in: Proceedings of the 9th International Conference on Learning Analytics & Knowledge, in: LAK19, ISBN 9781450362566, 2019, pp. 86–95,.
[44]
Azeem Muhammad Ilyas, Palomba Fabio, Shi Lin, Wang Qing, Machine learning techniques for code smell detection: A systematic literature review and meta-analysis, Inf. Softw. Technol. (ISSN ) 108 (2019) 115–138,.
[45]
Bader Johannes, Scott Andrew, Pradel Michael, Chandra Satish, Getafix: Learning to fix bugs automatically, Proc. ACM Program. Lang. 3 (OOPSLA) (2019),.
[46]
Balog Matej, Gaunt Alexander L., Brockschmidt Marc, Nowozin Sebastian, Tarlow Daniel, DeepCoder: Learning to write programs, 2016, CoRR, abs/1611.01989.
[47]
Ban Xinbo, Liu Shigang, Chen Chao, Chua Caslon, A performance evaluation of deep-learnt features for software vulnerability detection, Concurr. Comput.: Pract. Exper. (ISSN ) 31 (19) (2019),. URL https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.5103. _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1002/cpe.5103.
[48]
Bandara U., Wijayarathna G., A machine learning based tool for source code plagiarism detection, Int. J. Mach. Learn. Comput. (2011) 337–343.
[49]
Banna Vishnu, Chinnakotla Akhil, Yan Zhengxin, Vegesana Anirudh, Vivek Naveen, Krishnappa Kruthi, Jiang Wenxin, Lu Yung-Hsiang, Thiruvathukal George K., Davis James C., An experience report on machine learning reproducibility: Guidance for practitioners and TensorFlow model garden contributors, 2021, CoRR, abs/2107.00821. URL https://arxiv.org/abs/2107.00821.
[50]
Bansal A., Haque S., McMillan C., Project-level encoding for neural source code summarization of subroutines, in: 2021 2021 IEEE/ACM 29th International Conference on Program Comprehension (ICPC) (ICPC), IEEE Computer Society, 2021, pp. 253–264,.
[51]
Barbez Antoine, Khomh Foutse, Guéhéneuc Yann-Gaël, A machine-learning based ensemble method for anti-patterns detection, J. Syst. Softw. (ISSN ) 161 (2020),.
[52]
Barone Antonio Valerio Miceli, Sennrich Rico, A parallel corpus of python functions and documentation strings for automated code documentation and code generation, 2017.
[53]
Batur Şahin Canan, Abualigah Laith, A novel deep learning-based feature selection model for improving the static analysis of vulnerability detection, Neural Comput. Appl. (ISSN ) 33 (20) (2021) 14049–14067,.
[54]
Bavota Gabriele, Gethers Malcom, Oliveto Rocco, Poshyvanyk Denys, Lucia Andrea de, Improving software modularization via automated analysis of latent topics and dependencies, ACM Trans. Softw. Eng. Methodol. (TOSEM) 23 (1) (2014) 1–33.
[55]
Bavota Gabriele, Oliveto Rocco, Gethers Malcom, Poshyvanyk Denys, De Lucia Andrea, Methodbook: Recommending move method refactorings via relational topic models, IEEE Trans. Softw. Eng. 40 (7) (2013) 671–694.
[56]
Ben-Nun Tal, Jakobovits Alice Shoshana, Hoefler Torsten, Neural code comprehension: A learnable representation of code semantics, in: Proceedings of the 32nd International Conference on Neural Information Processing Systems, NIPS ’18, 2018, pp. 3589–3601.
[57]
Bhandari G.P., Gupta R., Machine learning based software fault prediction utilizing source code metrics, in: 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS), 2018, pp. 40–45,.
[58]
Bhatia Sahil, Kohli Pushmeet, Singh Rishabh, Neuro-symbolic program corrector for introductory programming assignments, in: Proceedings of the 40th International Conference on Software Engineering, ICSE ’18, ISBN 9781450356381, 2018, pp. 60–70,.
[59]
Bielik Pavol, Raychev Veselin, Vechev Martin T., Program synthesis for character level language modeling, in: ICLR, 2017.
[60]
Bilgin Z., Ersoy M.A., Soykan E.U., Tomur E., Çomak P., Karaçay L., Vulnerability prediction from source code using machine learning, IEEE Access 8 (2020) 150672–150684,.
[61]
Black Paul E., Software assurance with SAMATE reference dataset, tool standards, and studies, 2007.
[62]
Boland Frederick, Black Paul, The Juliet 1.1 C/C++ and Java test suite, 2012,. (45).
[63]
Bowes David, Hall Tracy, Harman Mark, Jia Yue, Sarro Federica, Wu Fan, Mutation-aware fault prediction, in: Proceedings of the 25th International Symposium on Software Testing and Analysis, in: ISSTA 2016, Association for Computing Machinery, New York, NY, USA, ISBN 9781450343909, 2016, pp. 330–341,.
[64]
Braga Ronyérison, Neto Pedro Santos, Rabêlo Ricardo, Santiago José, Souza Matheus, A machine learning approach to generate test oracles, in: Proceedings of the XXXII Brazilian Symposium on Software Engineering, SBES ’18, ISBN 9781450365031, 2018, pp. 142–151,.
[65]
Brauckmann Alexander, Goens Andrés, Ertel Sebastian, Castrillon Jeronimo, Compiler-based graph representations for deep learning models of code, in: Proceedings of the 29th International Conference on Compiler Construction, in: CC 2020, ISBN 9781450371209, 2020, pp. 201–211.
[66]
Brockschmidt Marc, Allamanis Miltiadis, Gaunt Alexander L., Polozov Oleksandr, Generative code modeling with graphs, in: International Conference on Learning Representations, 2019.
[67]
Brown Tom B., Mann Benjamin, Ryder Nick, Subbiah Melanie, Kaplan Jared, Dhariwal Prafulla, Neelakantan Arvind, Shyam Pranav, Sastry Girish, Askell Amanda, Agarwal Sandhini, Herbert-Voss Ariel, Krueger Gretchen, Henighan Tom, Child Rewon, Ramesh Aditya, Ziegler Daniel M., Wu Jeffrey, Winter Clemens, Hesse Christopher, Chen Mark, Sigler Eric, Litwin Mateusz, Gray Scott, Chess Benjamin, Clark Jack, Berner Christopher, McCandlish Sam, Radford Alec, Sutskever Ilya, Amodei Dario, Language models are few-shot learners, 2020, URL https://arxiv.org/abs/2005.14165.
[68]
Bruch Marcel, Monperrus Martin, Mezini Mira, Learning from examples to improve code completion systems, in: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, in: ESEC/FSE ’09, ISBN 9781605580012, 2009, pp. 213–222,.
[69]
Brun Yuriy, Meliou Alexandra, Software fairness, in: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, in: ESEC/FSE 2018, Association for Computing Machinery, New York, NY, USA, ISBN 9781450355735, 2018, pp. 754–759,.
[70]
Bui Nghi D.Q., Jiang Lingixao, Yu Y., Cross-language learning for program classification using bilateral tree-based convolutional neural networks, in: AAAI Workshops, 2018.
[71]
Bui N.D.Q., Yu Y., Jiang L., Bilateral dependency neural networks for cross-language algorithm classification, in: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2019, pp. 422–433,.
[72]
Butgereit L., Using machine learning to prioritize automated testing in an agile environment, in: 2019 Conference on Information Communications Technology and Society (ICTAS), 2019, pp. 1–6,.
[73]
Cai Jonathon, Shin Richard, Song Dawn, Making neural programming architectures generalize via recursion, 2017, CoRR, abs/1704.06611.
[74]
Cai Cheng-Hao, Sun Jing, Dobbie Gillian, Automatic B-model repair using model checking and machine learning, Autom. Softw. Eng. (ISSN ) 26 (3) (2019),.
[75]
Cambronero José P., Rinard Martin C., AL: autogenerating supervised learning programs, Proc. ACM Program. Lang. 3 (OOPSLA) (2019) 1–28.
[76]
Caram Frederico Luiz, Rodrigues Bruno Rafael De Oliveira, Campanelli Amadeu Silveira, Parreiras Fernando Silva, Machine learning techniques for code smells detection: a systematic mapping study, Int. J. Softw. Eng. Knowl. Eng. 29 (02) (2019) 285–316.
[77]
Caram Frederico Luiz, Rodrigues Bruno Rafael De Oliveira, Campanelli Amadeu Silveira, Parreiras Fernando Silva, Machine learning techniques for code smells detection: A systematic mapping study, Int. J. Softw. Eng. Knowl. Eng. 29 (02) (2019) 285–316,.
[78]
Cesare Silvio, Xiang Yang, Zhang Jun, Clonewise – detecting package-level clones using machine learning, in: Zia Tanveer, Zomaya Albert, Varadharajan Vijay, Mao Morley (Eds.), Security and Privacy in Communication Networks, ISBN 978-3-319-04283-1, 2013, pp. 197–215.
[79]
Cetiner M., Sahingoz O.K., A comparative analysis for machine learning based software defect prediction systems, in: 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2020, pp. 1–7,.
[80]
Ceylan E., Kutlubay F.O., Bener A.B., Software defect identification using machine learning techniques, in: 32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO’06), 2006, pp. 240–247,.
[81]
Chakraborty S., Ding Y., Allamanis M., Ray B., CODIT: Code editing with tree-based neural models, IEEE Trans. Softw. Eng. (2020) 1,.
[82]
Chakraborty Saikat, Ding Yangruibo, Allamanis Miltiadis, Ray Baishakhi, CODIT: Code editing with tree-based neural models, IEEE Trans. Softw. Eng. 48 (4) (2022) 1385–1399,.
[83]
Chakraborty Saikat, Ray Baishakhi, On multi-modal learning of editing source code, in: 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2021, pp. 443–455,.
[84]
Challagulla Venkata Udaya B., Bastani Farokh B., Yen I-Ling, Paul Raymond A., Empirical assessment of machine learning based software defect prediction techniques, Int. J. Artif. Intell. Tools 17 (02) (2008) 389–400,.
[85]
Chappelly T., Cifuentes C., Krishnan P., Gevay S., Machine learning for finding bugs: An initial report, in: 2017 IEEE Workshop on Machine Learning Techniques for Software Quality Evaluation (MaLTeSQuE), 2017, pp. 21–26,.
[86]
Chaturvedi Shivam, Chaturvedi Amrita, Tiwari Anurag, Agarwal Shalini, Design pattern detection using machine learning techniques, in: 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), IEEE, 2018, pp. 1–6.
[87]
Chen Deyu, Chen Xiang, Li Hao, Xie Junfeng, Mu Yanzhou, Deepcpdp: Deep learning based cross-project defect prediction, IEEE Access 7 (2019) 184832–184848.
[88]
Chen Qiuyuan, Hu Han, Liu Zhaoyi, Code summarization with abstract syntax tree, in: Gedeon Tom, Wong Kok Wai, Lee Minho (Eds.), Neural Information Processing, ISBN 978-3-030-36802-9, 2019, pp. 652–660.
[89]
Chen Jinyin, Hu Keke, Yu Yue, Chen Zhuangzhi, Xuan Qi, Liu Yi, Filkov Vladimir, Software visualization and deep transfer learning for effective software defect prediction, in: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, ICSE ’20, ISBN 9781450371216, 2020, pp. 578–589,.
[90]
Chen Fuxiang, Kim Mijung, Choo Jaegul, Novel natural language summarization of program code via leveraging multiple input representations, in: Findings of the Association for Computational Linguistics: EMNLP 2021, Association for Computational Linguistics, Punta Cana, Dominican Republic, 2021, pp. 2510–2520,. URL https://aclanthology.org/2021.findings-emnlp.214.
[91]
Chen Z., Kommrusch S.J., Tufano M., Pouchet L., Poshyvanyk D., Monperrus M., SEQUENCER: Sequence-to-sequence learning for end-to-end program repair, IEEE Trans. Softw. Eng. (2019) 1,.
[92]
Chen Xinyun, Liu Chang, Shin Richard, Song Dawn, Chen Mingcheng, Latent attention for if-then program synthesis, in: Proceedings of the 30th International Conference on Neural Information Processing Systems, NIPS ’16, ISBN 9781510838819, 2016, pp. 4581–4589.
[93]
Chen Xinyun, Liu Chang, Song Dawn, Towards synthesizing complex programs from input-output examples, 2018.
[94]
Chen Xinyun, Liu Chang, Song Dawn, Execution-guided neural program synthesis, in: International Conference on Learning Representations, 2019.
[95]
Chen Yang, Santosa Andrew E., Yi Ang Ming, Sharma Abhishek, Sharma Asankhaya, Lo David, A machine learning approach for vulnerability curation, in: Proceedings of the 17th International Conference on Mining Software Repositories, Association for Computing Machinery, New York, NY, USA, ISBN 9781450375177, 2020, pp. 32–42. URL https://doi.org/10.1145/3379597.3387461.
[96]
Chen Mark, Tworek Jerry, Jun Heewoo, Yuan Qiming, Pinto Henrique Ponde de Oliveira, Kaplan Jared, Edwards Harri, Burda Yuri, Joseph Nicholas, Brockman Greg, et al., Evaluating large language models trained on code, 2021, arXiv preprint arXiv:2107.03374.
[97]
Chen M., Wan X., Neural comment generation for source code with auxiliary code classification task, in: 2019 26th Asia-Pacific Software Engineering Conference (APSEC), 2019, pp. 522–529,.
[98]
Chen Qiuyuan, Xia Xin, Hu Han, Lo David, Li Shanping, Why my code summarization model does not work: Code comment improvement with category prediction, ACM Trans. Softw. Eng. Methodol. (TOSEM) 30 (2) (2021) 1–29.
[99]
Chen Long, Ye Wei, Zhang Shikun, Capturing source code semantics via tree-based convolution over API-enhanced AST, in: Proceedings of the 16th ACM International Conference on Computing Frontiers, CF ’19, ISBN 9781450366854, 2019, pp. 174–182,.
[100]
Chen Q., Zhou M., A neural framework for retrieval and summarization of source code, in: 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2018, pp. 826–831,.
[101]
Chernis Boris, Verma Rakesh, Machine learning methods for software vulnerability detection, in: Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, IWSPA ’18, ISBN 9781450356343, 2018, pp. 31–39,.
[102]
Chidamber S.R., Kemerer C.F., A metrics suite for object oriented design, IEEE Trans. Softw. Eng. (ISSN ) 20 (6) (1994) 476–493,.
[103]
Choi Y., Kim S., Lee J., Source code summarization using attention-based keyword memory networks, in: 2020 IEEE International Conference on Big Data and Smart Computing (BigComp), 2020, pp. 564–570,.
[104]
Choudhary Garvit Rajesh, Kumar Sandeep, Kumar Kuldeep, Mishra Alok, Catal Cagatay, Empirical analysis of change metrics for software fault prediction, Comput. Electr. Eng. 67 (2018) 15–24.
[105]
Chug A., Dhall S., Software defect prediction using supervised learning algorithm and unsupervised learning algorithm, in: Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), 2013, pp. 173–179,.
[106]
Clemente C.J., Jaafar F., Malik Y., Is predicting software security bugs using deep learning better than the traditional machine learning algorithms?, in: 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), 2018, pp. 95–102,.
[107]
Compton Rhys, Frank Eibe, Patros Panos, Koay Abigail, Embedding java classes with code2vec: Improvements from variable obfuscation, in: Proceedings of the 17th International Conference on Mining Software Repositories, MSR ’20, ISBN 9781450375177, 2020, pp. 243–253,.
[108]
Cortes-Coy Luis Fernando, Vásquez M., Aponte Jairo, Poshyvanyk D., On automatically generating commit messages via summarization of source code changes, in: 2014 IEEE 14th International Working Conference on Source Code Analysis and Manipulation, 2014, pp. 275–284.
[109]
Cruz Daniel, Santana Amanda, Figueiredo Eduardo, Detecting bad smells with machine learning algorithms: an empirical study, in: Proceedings of the 3rd International Conference on Technical Debt, 2020, pp. 31–40.
[110]
Cruz Daniel, Santana Amanda, Figueiredo Eduardo, Detecting bad smells with machine learning algorithms: An empirical study, in: Proceedings of the 3rd International Conference on Technical Debt, TechDebt ’20, ISBN 9781450379601, 2020, pp. 31–40,.
[111]
Cui Jianfeng, Wang Lixin, Zhao Xin, Zhang Hongyi, Towards predictive analysis of android vulnerability using statistical codes and machine learning for IoT applications, Comput. Commun. (ISSN ) 155 (2020) 125–131,.
[112]
Cummins C., Petoumenos P., Wang Z., Leather H., Synthesizing benchmarks for predictive modeling, in: 2017 IEEE/ACM International Symposium on Code Generation and Optimization (CGO), 2017, pp. 86–99,.
[113]
Cunha Warteruzannan Soyer, Armijo Guisella Angulo, de Camargo Valter Vieira, Investigating non-usually employed features in the identification of architectural smells: A machine learning-based approach, in: Proceedings of the 14th Brazilian Symposium on Software Components, Architectures, and Reuse, ISBN 9781450387545, 2020, pp. 21–30.
[114]
Cvitkovic Milan, Singh Badal, Anandkumar Animashree, Open vocabulary learning on source code with a graph-structured cache, Chaudhuri Kamalika, Salakhutdinov Ruslan (Eds.), Proceedings of Machine Learning Research, vol. 97, 2019, pp. 1475–1485.
[115]
Dam Hoa Khanh, Pham Trang, Ng Shien Wee, Tran Truyen, Grundy John, Ghose Aditya, Kim Taeksu, Kim Chul-Joo, Lessons learned from using a deep tree-based model for software defect prediction in practice, in: Proceedings of the 16th International Conference on Mining Software Repositories, MSR ’19, 2019, pp. 46–57,.
[116]
D’Ambros Marco, Lanza Michele, Robbes Romain, Evaluating defect prediction approaches: A benchmark and an extensive comparison, Empir. Softw. Eng. (ISSN ) 17 (4–5) (2012) 531–577,.
[117]
Dantas Altino, de Souza Eduardo F., Souza Jerffeson, Camilo-Junior Celso G., Code naturalness to assist search space exploration in search-based program repair methods, in: Nejati Shiva, Gay Gregory (Eds.), Search-Based Software Engineering, ISBN 978-3-030-27455-9, 2019, pp. 164–170.
[118]
De Lucia Andrea, Di Penta Massimiliano, Oliveto Rocco, Panichella Annibale, Panichella Sebastiano, Labeling source code with information retrieval methods: an empirical study, Empir. Softw. Eng. 19 (5) (2014) 1383–1420.
[119]
Dejaeger Karel, Verbraken Thomas, Baesens Bart, Toward comprehensible software fault prediction models using bayesian network classifiers, IEEE Trans. Softw. Eng. 39 (2) (2012) 237–257.
[120]
Devlin Jacob, Bunel Rudy, Singh Rishabh, Hausknecht Matthew, Kohli Pushmeet, Neural program meta-induction, in: Proceedings of the 31st International Conference on Neural Information Processing Systems, NIPS ’17, ISBN 9781510860964, 2017, pp. 2077–2085.
[121]
Devlin Jacob, Chang Ming-Wei, Lee Kenton, Toutanova Kristina, Bert: Pre-training of deep bidirectional transformers for language understanding, 2018, arXiv preprint arXiv:1810.04805.
[122]
Devlin Jacob, Uesato Jonathan, Bhupatiraju Surya, Singh Rishabh, Mohamed Abdel-rahman, Kohli Pushmeet, RobustFill: Neural program learning under noisy I/O, in: Proceedings of the 34th International Conference on Machine Learning - Volume 70, ICML ’17, 2017, pp. 990–998.
[123]
Dewangan Seema, Rao Rajwant Singh, Mishra Alok, Gupta Manjari, A novel approach for code smell detection: An empirical study, IEEE Access 9 (2021) 162869–162883.
[124]
Dhamayanthi N., Lavanya B., Improvement in software defect prediction outcome using principal component analysis and ensemble machine learning algorithms, in: Hemanth Jude, Fernando Xavier, Lafata Pavel, Baig Zubair (Eds.), International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018, ISBN 978-3-030-03146-6, 2019, pp. 397–406.
[125]
Di Martino Sergio, Ferrucci Filomena, Gravino Carmine, Sarro Federica, A genetic algorithm to configure support vector machines for predicting fault-prone components, in: Caivano Danilo, Oivo Markku, Baldassarre Maria Teresa, Visaggio Giuseppe (Eds.), Product-Focused Software Process Improvement, Springer Berlin Heidelberg, Berlin, Heidelberg, ISBN 978-3-642-21843-9, 2011, pp. 247–261.
[126]
Di Nucci D., Palomba F., Tamburri D.A., Serebrenik A., De Lucia A., Detecting code smells using machine learning techniques: Are we there yet?, in: 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2018, pp. 612–621,.
[127]
Dong Li, Lapata Mirella, Language to logical form with neural attention, in: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Association for Computational Linguistics, Berlin, Germany, 2016, pp. 33–43,. URL https://aclanthology.org/P16-1004.
[128]
Dos Santos Geanderson Esteves, Figueiredo E., Veloso Adriano, Viggiato Markos, Ziviani N., Understanding machine learning software defect predictions, Autom. Softw. Eng. 27 (2020) 369–392.
[129]
Du Xiaoning, Chen Bihuan, Li Yuekang, Guo Jianmin, Zhou Yaqin, Liu Yang, Jiang Yu, LEOPARD: Identifying vulnerable code for vulnerability assessment through program metrics, in: 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE), 2019, pp. 60–71,.
[130]
Du Yao, Wang Xiaoqing, Wang Junfeng, A static android malicious code detection method based on multi-source fusion, Secur. Commun. Netw. (ISSN ) 8 (17) (2015) 3238–3246,.
[131]
Durelli V.H.S., Durelli R.S., Borges S.S., Endo A.T., Eler M.M., Dias D.R.C., Guimarães M.P., Machine learning applied to software testing: A systematic mapping study, IEEE Trans. Reliab. 68 (3) (2019) 1189–1212,.
[132]
Dwivedi Ashish Kumar, Tirkey Anand, Ray Ransingh Biswajit, Rath Santanu Kumar, Software design pattern recognition using machine learning techniques, in: 2016 Ieee Region 10 Conference (Tencon), IEEE, 2016, pp. 222–227.
[133]
Efstathiou Vasiliki, Spinellis Diomidis, Semantic source code models using identifier embeddings, in: 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), 2019, pp. 29–33,.
[134]
Elovici Yuval, Shabtai Asaf, Moskovitch Robert, Tahan Gil, Glezer Chanan, Applying machine learning techniques for detection of malicious code in network traffic, in: Hertzberg Joachim, Beetz Michael, Englert Roman (Eds.), KI 2007: Advances in Artificial Intelligence, ISBN 978-3-540-74565-5, 2007, pp. 44–50.
[135]
Eniser Hasan Ferit, Gerasimou Simos, Sen Alper, DeepFault: Fault localization for deep neural networks, in: Hähnle Reiner, van der Aalst Wil (Eds.), Fundamental Approaches to Software Engineering, Springer International Publishing, Cham, ISBN 978-3-030-16722-6, 2019, pp. 171–191.
[136]
Erturk Ezgi, Sezer Ebru Akcapinar, A comparison of some soft computing methods for software fault prediction, Expert Syst. Appl. 42 (4) (2015) 1872–1879.
[137]
Etemadi Khashayar, Monperrus Martin, On the relevance of cross-project learning with nearest neighbours for commit message generation, in: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, 2020, pp. 470–475.
[138]
Fakhoury S., Arnaoudova V., Noiseux C., Khomh F., Antoniol G., Keep it simple: Is deep learning good for linguistic smell detection?, in: 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2018, pp. 602–611,.
[139]
Falleri Jean-Rémy, Morandat Floréal, Blanc Xavier, Martinez Matias, Monperrus Martin, Fine-grained and accurate source code differencing, in: Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, ASE ’14, ISBN 9781450330138, 2014, pp. 313–324,.
[140]
Fan Guisheng, Diao Xuyang, Yu Huiqun, Yang Kang, Chen Liqiong, Deep semantic feature learning with embedded static metrics for software defect prediction, in: 2019 26th Asia-Pacific Software Engineering Conference (APSEC), IEEE, 2019, pp. 244–251.
[141]
Fang Yong, Liu Yongcheng, Huang Cheng, Liu Liang, FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm, PLoS ONE 15 (2020),. URL https://ui.adsabs.harvard.edu/abs/2020PLoSO.1528439F. ADS Bibcode: 2020PLoSO.1528439F.
[142]
Fang Chunrong, Liu Zixi, Shi Yangyang, Huang Jeff, Shi Qingkai, Functional code clone detection with syntax and semantics fusion learning, in: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, in: ISSTA 2020, ISBN 9781450380089, 2020, pp. 516–527,.
[143]
Felix Ebubeogu Amarachukwu, Lee Sai Peck, Integrated approach to software defect prediction, IEEE Access 5 (2017) 21524–21547.
[144]
Feng Zhangyin, Guo Daya, Tang Duyu, Duan Nan, Feng Xiaocheng, Gong Ming, Shou Linjun, Qin Bing, Liu Ting, Jiang Daxin, Zhou Ming, CodeBERT: A pre-trained model for programming and natural languages, in: Findings of the Association for Computational Linguistics: EMNLP 2020, Association for Computational Linguistics, Online, 2020, pp. 1536–1547,. URL https://aclanthology.org/2020.findings-emnlp.139.
[145]
Ferenc Rudolf, Hegedundefineds Péter, Gyimesi Péter, Antal Gábor, Bán Dénes, Gyimóthy Tibor, Challenging machine learning algorithms in predicting vulnerable JavaScript functions, in: Proceedings of the 7th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering, RAISE ’19, 2019, pp. 8–14,.
[146]
Ferreira Fabio, Silva Luciana Lourdes, Valente Marco Tulio, Software engineering meets deep learning: A mapping study, in: Proceedings of the 36th Annual ACM Symposium on Applied Computing, SAC ’21, Association for Computing Machinery, New York, NY, USA, ISBN 9781450381048, 2021, pp. 1542–1549,.
[147]
Fontana F., Mäntylä M., Zanoni Marco, Marino Alessandro, Comparing and experimenting machine learning techniques for code smell detection, Empir. Softw. Eng. 21 (2015) 1143–1191.
[148]
Fontana F.A., Zanoni M., Marino A., Mäntylä M.V., Code smell detection: Towards a machine learning-based approach, in: 2013 IEEE International Conference on Software Maintenance, 2013, pp. 396–399.
[149]
Gamma Erich, Helm Richard, Johnson Ralph, Vlissides John, Design Patterns: Elements of Reusable Object-Oriented Software, first ed., Addison-Wesley Professional. Part of the Addison-Wesley Professional Computing Series series, ISBN 978-0-201-63361-0, 1994, URL https://www.informit.com/store/design-patterns-elements-of-reusable-object-oriented-9780201633610?w_ptgrevartcl=Grady+Booch+on+Design+Patterns%2c+OOP%2c+and+Coffee_1405569.
[150]
Gao Zhipeng, Xia Xin, Grundy John, Lo David, Li Yuan-Fang, Generating question titles for stack overflow from mined code snippets, ACM Trans. Softw. Eng. Methodol. (ISSN ) 29 (4) (2020),.
[151]
Ghadhab Lobna, Jenhani Ilyes, Mkaouer Mohamed Wiem, Messaoud Montassar Ben, Augmenting commit classification by using fine-grained source code changes and a pre-trained deep neural language model, Inf. Softw. Technol. 135 (2021).
[152]
Ghaffarian Seyed Mohammad, Shahriari Hamid Reza, Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey, ACM Comput. Surv. (ISSN ) 50 (4) (2017),.
[153]
Gharbi Sirine, Mkaouer Mohamed Wiem, Jenhani Ilyes, Messaoud Montassar Ben, On the classification of software change messages using multi-label active learning, in: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019, pp. 1760–1767.
[154]
Giray Görkem, A software engineering perspective on engineering machine learning systems: State of the art and challenges, J. Syst. Softw. (ISSN ) 180 (2021),. URL https://www.sciencedirect.com/science/article/pii/S016412122100128X.
[155]
GitHub archive, 2020, URL https://www.gharchive.org/.
[156]
Godefroid P., Peleg H., Singh R., Learn fuzz: Machine learning for input fuzzing, in: 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2017, pp. 50–59,.
[157]
Gondra Iker, Applying machine learning to software fault-proneness prediction, J. Syst. Softw. (ISSN ) 81 (2) (2008) 186–195,. Model-Based Software Testing.
[158]
Gopalakrishnan R., Sharma P., Mirakhorli M., Galster M., Can latent topics in source code predict missing architectural tactics?, in: 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), 2017, pp. 15–26,.
[159]
Gopalakrishnan Raghuram, Sharma Palak, Mirakhorli Mehdi, Galster Matthias, Can latent topics in source code predict missing architectural tactics?, in: 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), IEEE, 2017, pp. 15–26.
[160]
Gopinath Divya, Khurshid Sarfraz, Saha Diptikalyan, Chandra Satish, Data-guided repair of selection statements, in: Proceedings of the 36th International Conference on Software Engineering, in: ICSE 2014, ISBN 9781450327565, 2014, pp. 243–253,.
[161]
Gopinath D., Wang K., Hua J., Khurshid S., Repairing intricate faults in code using machine learning and path exploration, in: 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME), 2016, pp. 453–457,.
[162]
Goues Claire Le, Pradel Michael, Roychoudhury Abhik, Automated program repair, Commun. ACM (ISSN ) 62 (12) (2019) 56–65,.
[163]
Gousios Georgios, The GHTorrent dataset and tool suite, in: Proceedings of the 10th Working Conference on Mining Software Repositories, MSR ’13, IEEE Press, Piscataway, NJ, USA, ISBN 978-1-4673-2936-1, 2013, pp. 233–236. URL http://dl.acm.org/citation.cfm?id=2487085.2487132.
[164]
Grano G., Titov T.V., Panichella S., Gall H.C., How high will it be? Using machine learning models to predict branch coverage in automated testing, in: 2018 IEEE Workshop on Machine Learning Techniques for Software Quality Evaluation (MaLTeSQuE), 2018, pp. 19–24,.
[165]
Graves Alex, Jaitly Navdeep, Mohamed Abdel-rahman, Hybrid speech recognition with deep bidirectional LSTM, in: Automatic Speech Recognition and Understanding (ASRU), 2013 IEEE Workshop on, IEEE, 2013, pp. 273–278.
[166]
Greff Klaus, Srivastava Rupesh K, Koutník Jan, Steunebrink Bas R., Schmidhuber Jürgen, LSTM: A search space odyssey, IEEE Trans. Neural Netw. Learn. Syst. 28 (10) (2017) 2222–2232.
[167]
Grodzicka Hanna, Ziobrowski Arkadiusz, Łakomiak Zofia, Kawa Michał, Madeyski Lech, Code smell prediction employing machine learning meets emerging java language constructs, in: Poniszewska-Marańda Aneta, Kryvinska Natalia, Jarząbek Stanisław, Madeyski Lech (Eds.), Data-Centric Business and Applications: Towards Software Development (Volume 4), ISBN 978-3-030-34706-2, 2020, pp. 137–167,.
[168]
Gu Xiaodong, Zhang Hongyu, Kim Sunghun, Deep code search, in: 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE), 2018, pp. 933–944,.
[169]
Guggulothu Thirupathi, Moiz S.A., Code smell detection using multi-label classification approach, Softw. Qual. J. (2020) 1–24.
[170]
Gulwani Sumit, Harris William R., Singh Rishabh, Spreadsheet data manipulation using examples, Commun. ACM (ISSN ) 55 (8) (2012) 97–105,.
[171]
Guo Daya, Ren Shuo, Lu Shuai, Feng Zhangyin, Tang Duyu, Liu Shujie, Zhou Long, Duan Nan, Svyatkovskiy Alexey, Fu Shengyu, et al., Graphcodebert: Pre-training code representations with data flow, 2020, arXiv preprint arXiv:2009.08366.
[172]
Gupta Himanshu, Gulanikar Abhiram Anand, Kumar Lov, Neti Lalita Bhanu Murthy, Empirical analysis on effectiveness of NLP methods for predicting code smell, in: International Conference on Computational Science and Its Applications, Springer, 2021, pp. 43–53.
[173]
Gupta Rahul, Kanade Aditya, Shevade Shirish, Deep reinforcement learning for syntactic error repair in student programs, in: Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 33, 2019, pp. 930–937,.
[174]
Gupta Himanshu, Kulkarni Tanmay Girish, Kumar Lov, Neti Lalita Bhanu Murthy, Krishna Aneesh, An empirical study on predictability of software code smell using deep learning models, in: International Conference on Advanced Information Networking and Applications, Springer, 2021, pp. 120–132.
[175]
Gupta H., Kumar L., Neti L.B.M., An empirical framework for code smell prediction using extreme learning machine, in: 2019 9th Annual Information Technology, Electromechanical Engineering and Microelectronics Conference (IEMECON), 2019, pp. 189–195,.
[176]
Gupta Rahul, Pal Soham, Kanade Aditya, Shevade Shirish, DeepFix: Fixing common C language errors by deep learning, in: AAAI, 2017, pp. 1345–1351.
[177]
Gupta Aakanshi, Suri Bharti, Kumar Vijay, Jain Pragyashree, Extracting rules for vulnerabilities detection with static metrics using machine learning, Int. J. Syst. Assur. Eng. Manag. 12 (2021) 65–76.
[178]
Gupta Aakanshi, Suri Bharti, Lamba Lakshay, Tracing bad code smells behavior using machine learning with software metrics, in: Smart and Sustainable Intelligent Systems, Wiley Online Library, 2021, pp. 245–257.
[179]
Hadj-Kacem Mouna, Bouassida Nadia, A hybrid approach to detect code smells using deep learning, in: ENASE, 2018, pp. 137–146.
[180]
Hadj-Kacem Mouna, Bouassida Nadia, Deep representation learning for code smells detection using variational auto-encoder, in: 2019 International Joint Conference on Neural Networks (IJCNN), IEEE, 2019, pp. 1–8.
[181]
Hall T., Bowes D., The state of machine learning methodology in software fault prediction, in: 2012 11th International Conference on Machine Learning and Applications, Vol. 2, 2012, pp. 308–313,.
[182]
Halstead, Maurice H., 1977. Elements of Software Science (Operating and Programming Systems Series). USA, ISBN: 0444002057.
[183]
Hammad Muhammad, Babur ”̈Onder, Basit Hamid Abdul, van den Brand Mark, Clone-advisor: recommending code tokens and clone methods with deep learning and information retrieval, PeerJ Comput. Sci. 7 (2021).
[184]
Hammouri Awni, Hammad Mustafa, Alnabhan Mohammad, Alsarayrah Fatima, Software bug prediction using machine learning approach, Int. J. Adv. Comput. Sci. Appl. 9 (2018),.
[185]
Han S., Wallace D.R., Miller R.C., Code completion from abbreviated input, in: 2009 IEEE/ACM International Conference on Automated Software Engineering, 2009, pp. 332–343,.
[186]
Han Sangmok, Wallace David R., Miller Robert C., Code completion of multiple keywords from abbreviated input, Autom. Softw. Eng. (ISSN ) 18 (3–4) (2011) 363–398,.
[187]
Hanif Hazim, Md Nasir Mohd Hairul Nizam, Ab Razak Mohd Faizal, Firdaus Ahmad, Anuar Nor Badrul, The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches, J. Netw. Comput. Appl. (ISSN ) 179 (2021),. URL https://www.sciencedirect.com/science/article/pii/S1084804521000369.
[188]
Haque Sakib, Bansal Aakash, Wu Lingfei, McMillan Collin, Action word prediction for neural source code summarization, in: 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), IEEE, 2021, pp. 330–341.
[189]
Haque Sakib, LeClair Alexander, Wu Lingfei, McMillan Collin, Improved automatic summarization of subroutines via attention to file context, in: Proceedings of the 17th International Conference on Mining Software Repositories, 2020, pp. 300–310.
[190]
Harman Mark, Islam Syed, Jia Yue, Minku Leandro L., Sarro Federica, Srivisut Komsan, Less is more: Temporal fault predictive performance over multiple hadoop releases, in: Le Goues Claire, Yoo Shin (Eds.), Search-Based Software Engineering, Springer International Publishing, Cham, ISBN 978-3-319-09940-8, 2014, pp. 240–246.
[191]
Hellendoorn Vincent J., Bird Christian, Barr Earl T., Allamanis Miltiadis, Deep learning type inference, ESEC/FSE 2018, ISBN 9781450355735, 2018, pp. 152–162,.
[192]
Hellendoorn Vincent J., Devanbu Premkumar, Are deep neural networks the best choice for modeling source code?, in: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, in: ESEC/FSE 2017, ISBN 9781450351058, 2017, pp. 763–773,.
[193]
Heo Kihong, Oh Hakjoo, Yi Kwangkeun, Machine-learning-guided selectively unsound static analysis, in: Proceedings of the 39th International Conference on Software Engineering, ICSE ’17, ISBN 9781538638682, 2017, pp. 519–529,.
[194]
Hoang Thong, Kang Hong Jin, Lo David, Lawall Julia, CC2vec: Distributed representations of code changes, in: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, ICSE ’20, ISBN 9781450371216, 2020, pp. 518–529,.
[195]
Hort Max, Kechagia Maria, Sarro Federica, Harman Mark, A survey of performance optimization for mobile applications, IEEE Trans. Softw. Eng. (TSE) (2021).
[196]
Hou Yung-Tsung, Chang Yimeng, Chen Tsuhan, Laih Chi-Sung, Chen Chia-Mei, Malicious web content detection by machine learning, Expert Syst. Appl. (ISSN ) 37 (1) (2010) 55–60,.
[197]
Hu X., Li G., Xia X., Lo D., Jin Z., Deep code comment generation, in: 2018 IEEE/ACM 26th International Conference on Program Comprehension (ICPC), 2018, pp. 200–20010.
[198]
Hu Xing, Li Ge, Xia Xin, Lo David, Lu Shuai, Jin Zhi, Summarizing source code with transferred API knowledge, in: Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, IJCAI-18, International Joint Conferences on Artificial Intelligence Organization, 2018, pp. 2269–2275,.
[199]
Hu Gang, Zhu Linjie, Yang Junfeng, AppFlow: Using machine learning to synthesize robust, reusable UI tests, in: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, in: ESEC/FSE 2018, ISBN 9781450355735, 2018, pp. 269–282,.
[200]
Huang Yuan, Hu Xinyu, Jia Nan, Chen Xiangping, Zheng Zibin, Luo Xiapu, CommtPst: Deep learning source code for commenting positions prediction, J. Syst. Softw. (ISSN ) 170 (2020),.
[201]
Huang Yuan, Huang Shaohao, Chen Huanchao, Chen Xiangping, Zheng Zibin, Luo Xiapu, Jia Nan, Hu Xinyu, Zhou Xiaocong, Towards automatically generating block comments for code snippets, Inf. Softw. Technol. 127 (2020).
[202]
Hussain Yasir, Huang Zhiqiu, Zhou Yu, Wang Senzhang, CodeGRU: Context-aware deep learning with gated recurrent unit for source code modeling, Inf. Softw. Technol. (ISSN ) 125 (2020),.
[203]
Ivers J., Ozkaya I., Nord R.L., Can AI close the design-code abstraction gap?, in: 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW), 2019, pp. 122–125,.
[204]
Iyer Srinivasan, Konstas Ioannis, Cheung Alvin, Zettlemoyer Luke, Summarizing source code using a neural attention model, in: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2016, pp. 2073–2083,.
[205]
Jain Paras, Jain Ajay, Zhang Tianjun, Abbeel Pieter, Gonzalez Joseph, Stoica Ion, Contrastive code representation learning, in: Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, Association for Computational Linguistics, 2021,.
[206]
Jain Shivani, Saha Anju, Improving performance with hybrid feature selection and ensemble machine learning techniques for code smell detection, Sci. Comput. Program. 212 (2021).
[207]
Ji T., Pan J., Chen L., Mao X., Identifying supplementary bug-fix commits, in: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Vol. 01, 2018, pp. 184–193,.
[208]
Jiang Shuyao, Boosting neural commit message generation with code semantic analysis, in: 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), IEEE, 2019, pp. 1280–1282.
[209]
Jiang S., Armaly A., McMillan C., Automatically generating commit messages from diffs using neural machine translation, in: 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2017, pp. 135–146,.
[210]
Jiang Lin, Liu Hui, Jiang He, Machine learning based recommendation of method names: How far are we, in: Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, ASE ’19, ISBN 9781728125084, 2019, pp. 602–614,.
[211]
Jiang Nan, Lutellier Thibaud, Tan Lin, CURE: Code-aware neural machine translation for automatic program repair, in: 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), IEEE, 2021, pp. 1161–1173.
[212]
Jiang Siyuan, McMillan Collin, Towards automatic generation of short summaries of commits, in: 2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC), IEEE, 2017, pp. 320–323.
[213]
Jiang Jiajun, Xiong Yingfei, Zhang Hongyu, Gao Qing, Chen Xiangqun, Shaping program repair space with existing patches and similar code, in: Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, in: ISSTA 2018, ISBN 9781450356992, 2018, pp. 298–309,.
[214]
Jiang He, Zhang Jingxuan, Ren Zhilei, Zhang Tao, An unsupervised approach for discovering relevant tutorial fragments for APIs, in: 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), IEEE, 2017, pp. 38–48.
[215]
Jie Gong, Xiao-Hui Kuang, Qiang Liu, Survey on software vulnerability analysis method based on machine learning, in: 2016 IEEE First International Conference on Data Science in Cyberspace (DSC), 2016, pp. 642–647,.
[216]
Jimenez Matthieu, Rwemalika Renaud, Papadakis Mike, Sarro Federica, Le Traon Yves, Harman Mark, The importance of accounting for real-world labelling when predicting software vulnerabilities, in: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, in: ESEC/FSE 2019, Association for Computing Machinery, New York, NY, USA, ISBN 9781450355728, 2019, pp. 695–705,.
[217]
Jing Xiao-Yuan, Ying Shi, Zhang Zhi-Wu, Wu Shan-Shan, Liu Jin, Dictionary learning based software defect prediction, in: Proceedings of the 36th International Conference on Software Engineering, 2014, pp. 414–423.
[218]
Just René, Jalali Darioush, Ernst Michael D., Defects4J: A database of existing faults to enable controlled testing studies for Java programs, in: Proceedings of the 2014 International Symposium on Software Testing and Analysis, in: ISSTA 2014, Association for Computing Machinery, New York, NY, USA, ISBN 9781450326452, 2014, pp. 437–440,.
[219]
Kanade Aditya, Maniatis Petros, Balakrishnan Gogul, Shi Kensen, Learning and evaluating contextual embedding of source code, in: III Hal Daumé, Singh Aarti (Eds.), Proceedings of the 37th International Conference on Machine Learning, in: Proceedings of Machine Learning Research, vol. 119, PMLR, 2020, pp. 5110–5121. URL https://proceedings.mlr.press/v119/kanade20a.html.
[220]
Kang Hong Jin, Bissyandé Tegawendé F., Lo David, Assessing the generalizability of code2vec token embeddings, in: 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2019, pp. 1–12,.
[221]
Karampatsis Rafael-Michael, Babii Hlib, Robbes Romain, Sutton Charles, Janes Andrea, Big code !=big vocabulary: Open-vocabulary models for source code, in: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, ICSE ’20, ISBN 9781450371216, 2020, pp. 1073–1085,.
[222]
Karpathy Andrej, Johnson Justin, Fei-Fei Li, Visualizing and understanding recurrent networks, 2015, arXiv preprint arXiv:1506.02078.
[223]
Kaur A., Jain S., Goel S., A support vector machine based approach for code smell detection, in: 2017 International Conference on Machine Learning and Data Science (MLDS), 2017, pp. 9–14,.
[224]
Kaur Arvinder, Kaur Kamaldeep, An empirical study of robustness and stability of machine learning classifiers in software defect prediction, in: Advances in Intelligent Informatics, Springer, 2015, pp. 383–397.
[225]
Kaur Inderpreet, Kaur Arvinder, A novel four-way approach designed with ensemble feature selection for code smell detection, IEEE Access 9 (2021) 8695–8707.
[226]
Kaur Arvinder, Kaur Kamaldeep, Chopra Deepti, An empirical study of software entropy based bug prediction using machine learning, Int. J. Syst. Assur. Eng. Manag. (ISSN ) 8 (2) (2017) 599–616,.
[227]
Keller Patrick, Kaboré Abdoul Kader, Plein Laura, Klein Jacques, Le Traon Yves, Bissyandé Tegawendé F., What you see is what it means! semantic representation learning of code based on visualization and transfer learning, ACM Trans. Softw. Eng. Methodol. (ISSN ) 31 (2) (2021),.
[228]
Khalid Muhammad Noman, Farooq Humera, Iqbal Muhammad, Alam Muhammad Talha, Rasheed Kamran, Predicting web vulnerabilities in web applications based on machine learning, in: Bajwa Imran Sarwar, Kamareddine Fairouz, Costa Anna (Eds.), Intelligent Technologies and Applications, in: Communications in Computer and Information Science, Springer, Singapore, ISBN 9789811360527, 2019, pp. 473–484,.
[229]
Khan Bilal, Iqbal Danish, Badshah Sher, Cross-project software fault prediction using data leveraging technique to improve software quality, in: Proceedings of the Evaluation and Assessment in Software Engineering, EASE ’20, ISBN 9781450377317, 2020, pp. 434–438,.
[230]
Kim Sangwoo, Hong Seokmyung, Oh Jaesang, Lee Heejo, Obfuscated VBA macro detection using machine learning, in: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2018, pp. 490–501,.
[231]
Kim Junae, Hubczenko David, Montague Paul, Towards attention based vulnerability discovery using source code representation, in: Tetko Igor V., Kůrková Věra, Karpov Pavel, Theis Fabian (Eds.), Artificial Neural Networks and Machine Learning – ICANN 2019: Text and Time Series, ISBN 978-3-030-30490-4, 2019, pp. 731–746.
[232]
Kim J., Kwon M., Yoo S., Generating test input with deep reinforcement learning, in: 2018 IEEE/ACM 11th International Workshop on Search-Based Software Testing (SBST), 2018, pp. 51–58.
[233]
Knab Patrick, Pinzger Martin, Bernstein Abraham, Predicting defect densities in source code files with decision tree learners, in: Proceedings of the 2006 International Workshop on Mining Software Repositories, MSR ’06, ISBN 1595933972, 2006, pp. 119–125,.
[234]
Kosker Yasemin, Turhan Burak, Bener Ayse, An expert system for determining candidate software classes for refactoring, Expert Syst. Appl. (ISSN ) 36 (6) (2009) 10000–10003,.
[235]
Kovalenko Vladimir, Bogomolov Egor, Bryksin Timofey, Bacchelli Alberto, Building implicit vector representations of individual coding style, in: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, ICSEW ’20, ISBN 9781450379632, 2020, pp. 117–124,.
[236]
Krasniqi Rrezarta, Cleland-Huang Jane, Enhancing source code refactoring detection with explanations from commit messages, in: 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2020, pp. 512–516,.
[237]
Krizhevsky Alex, Sutskever Ilya, Hinton Geoffrey E., ImageNet classification with deep convolutional neural networks, in: Advances in Neural Information Processing Systems, 2012, pp. 1097–1105.
[238]
Kronjee Jorrit, Hommersom Arjen, Vranken Harald, Discovering software vulnerabilities using data-flow analysis and machine learning, in: Proceedings of the 13th International Conference on Availability, Reliability and Security, in: ARES 2018, ISBN 9781450364485, 2018,.
[239]
Kumar Lov, Rath Santanu Kumar, Sureka Ashish, Using source code metrics to predict change-prone web services: A case-study on ebay services, in: 2017 IEEE Workshop on Machine Learning Techniques for Software Quality Evaluation (MaLTeSQuE), IEEE, 2017, pp. 1–7.
[240]
Kumar Lov, Satapathy Shashank Mouli, Murthy Lalita Bhanu, Method level refactoring prediction on five open source java projects using machine learning techniques, in: Proceedings of the 12th Innovations on Software Engineering Conference (Formerly Known as India Software Engineering Conference), ISEC ’19, ISBN 9781450362153, 2019,.
[241]
Kumar Pradeep, Singh Yogesh, Assessment of software testing time using soft computing techniques, SIGSOFT Softw. Eng. Notes (ISSN ) 37 (1) (2012) 1–6,.
[242]
Kumar L., Sureka A., Application of LSSVM and SMOTE on seven open source projects for predicting refactoring at class level, in: 2017 24th Asia-Pacific Software Engineering Conference (APSEC), 2017, pp. 90–99,.
[243]
Kumar L., Sureka A., An empirical analysis on web service anti-pattern detection using a machine learning framework, in: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Vol. 01, 2018, pp. 2–11,.
[244]
Kurbatova Zarina, Veselov Ivan, Golubev Yaroslav, Bryksin Timofey, Recommendation of move method refactoring using path-based representation of code, in: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, ICSEW ’20, ISBN 9781450379632, 2020, pp. 315–322,.
[245]
Lal H., Pahwa G., Code review analysis of software system using machine learning techniques, in: 2017 11th International Conference on Intelligent Systems and Control (ISCO), 2017, pp. 8–13,.
[246]
Laradji Issam H., Alshayeb Mohammad, Ghouti Lahouari, Software defect prediction using ensemble learning on selected features, Inf. Softw. Technol. 58 (2015) 388–402.
[247]
Law Michael R., Grépin Karen A., Is newer always better? Re-evaluating the benefits of newer pharmaceuticals, J. Health Econ. (ISSN ) 29 (5) (2010) 743–750,.
[248]
Le Triet H.M., Chen Hao, Babar Muhammad Ali, Deep learning for source code modeling and generation: Models, applications, and challenges, ACM Comput. Surv. (ISSN ) 53 (3) (2020),.
[249]
Le X.D., Le T.B., Lo D., Should fixing these failures be delegated to automated program repair?, in: 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE), 2015, pp. 427–437,.
[250]
Le Goues Claire, Holtschulte Neal, Smith Edward K., Brun Yuriy, Devanbu Premkumar, Forrest Stephanie, Weimer Westley, The ManyBugs and IntroClass benchmarks for automated repair of C programs, IEEE Trans. Softw. Eng. 41 (12) (2015) 1236–1256,.
[251]
LeClair Alexander, Bansal Aakash, McMillan Collin, Ensemble models for neural source code summarization of subroutines, in: 2021 IEEE International Conference on Software Maintenance and Evolution (ICSME), IEEE, 2021, pp. 286–297.
[252]
LeClair Alexander, Haque Sakib, Wu Lingfei, McMillan Collin, Improved code summarization via a graph neural network, in: Proceedings of the 28th International Conference on Program Comprehension, ICPC ’20, ISBN 9781450379588, 2020, pp. 184–195,.
[253]
LeClair Alexander, Jiang Siyuan, McMillan Collin, A neural model for generating natural language summaries of program subroutines, in: Proceedings of the 41st International Conference on Software Engineering, ICSE ’19, 2019, pp. 795–806,.
[254]
LeClair Alexander, McMillan Collin, Recommendations for datasets for source code summarization, 2019.
[255]
Lee Woosuk, Heo Kihong, Alur Rajeev, Naik Mayur, Accelerating search-based program synthesis using learned probabilistic models, in: Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, in: PLDI 2018, ISBN 9781450356985, 2018, pp. 436–449,.
[256]
Lee Suin, Lee Youngseok, Lee Chan-Gun, Woo Honguk, Deep learning-based logging recommendation using merged code representation, in: Kim Hyuncheol, Kim Kuinam J. (Eds.), IT Convergence and Security, ISBN 978-981-15-9354-3, 2021, pp. 49–53.
[257]
Lee Song-Mi, Yoon Sang Min, Cho Heeryon, Human activity recognition from accelerometer data using Convolutional Neural Network, in: Big Data and Smart Computing (BigComp), 2017 IEEE International Conference on, IEEE, 2017, pp. 131–134.
[258]
Levin Stanislav, Yehudai Amiram, Boosting automatic commit classification into maintenance activities by utilizing source code changes, in: Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering, 2017, pp. 97–106.
[259]
Lewowski Tomasz, Madeyski Lech, Code smells detection using artificial intelligence techniques: A business-driven systematic review, in: Developments in Information I& Knowledge Management for Business Applications, Springer, 2022, pp. 285–319.
[260]
Li Yujia, Choi David, Chung Junyoung, Kushman Nate, Schrittwieser Julian, Leblond Rémi, Eccles Tom, Keeling James, Gimeno Felix, Dal Lago Agustin, et al., Competition-level code generation with alphacode, Science 378 (6624) (2022) 1092–1097.
[261]
Li Jian, He Pinjia, Zhu Jieming, Lyu Michael R., Software defect prediction via convolutional neural network, in: 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS), IEEE, 2017, pp. 318–328.
[262]
Li Daoyuan, Li Li, Kim Dongsun, Bissyandé Tegawendé F., Lo David, Le Traon Yves, Watch out for this commit! a study of influential software changes, J. Softw.: Evol. Process 31 (12) (2019).
[263]
Li Jia, Li Yongmin, Li Ge, Hu Xing, Xia Xin, Jin Zhi, EditSum: A retrieve-and-edit framework for source code summarization, in: 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE), IEEE, 2021, pp. 155–166.
[264]
Li Yuancheng, Ma Rong, Jiao Runhai, A hybrid malicious code detection method based on deep learning, Int. J. Secur. Appl. 9 (2015) 205–216.
[265]
Li Jian, Wang Yue, Lyu Michael R., King Irwin, Code completion with neural attention and pointer networks, in: Proceedings of the 27th International Joint Conference on Artificial Intelligence, IJCAI ’18, ISBN 9780999241127, 2018, 4159-25.
[266]
Li Yi, Wang Shaohua, Nguyen Tien N., DLFix: Context-based code transformation learning for automated program repair, in: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, ICSE ’20, ISBN 9781450371216, 2020, pp. 602–614,.
[267]
Li Yi, Wang Shaohua, Nguyen Tien N., A context-based automated approach for method name consistency checking and suggestion, in: 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), IEEE, 2021, pp. 574–586.
[268]
Li Yi, Wang Shaohua, Nguyen Tien N., Van Nguyen Son, Improving bug detection via context-based code representation learning and attention-based neural networks, Proc. ACM Program. Lang. 3 (OOPSLA) (2019),.
[269]
Li Boao, Yan Meng, Xia Xin, Hu Xing, Li Ge, Lo David, DeepCommenter: A deep code comment generation tool with hybrid lexical and syntactical information, in: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, in: ESEC/FSE 2020, ISBN 9781450370431, 2020, pp. 1571–1575,.
[270]
Li M., Zhang H., Wu Rongxin, Zhou Z., Sample-based software defect prediction with active and semi-supervised learning, Autom. Softw. Eng. 19 (2011) 201–230.
[271]
Li Z., Zou D., Tang J., Zhang Z., Sun M., Jin H., A comparative study of deep learning-based vulnerability detection system, IEEE Access 7 (2019) 103184–103197,.
[272]
Liang Chen, Berant Jonathan, Le Quoc V., Forbus Kenneth D., Lao N., Neural symbolic machines: Learning semantic parsers on freebase with weak supervision, in: ACL, 2017.
[273]
Liang Hongliang, Yu Yue, Jiang Lin, Xie Zhuosi, Seml: A semantic LSTM model for software defect prediction, IEEE Access 7 (2019) 83812–83824.
[274]
Lim H., Applying code vectors for presenting software features in machine learning, in: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Vol. 01, 2018, pp. 803–804,.
[275]
Lima R., da Cruz A.M.R., Ribeiro J., Artificial intelligence applied to software testing: A literature review, in: 2020 15th Iberian Conference on Information Systems and Technologies (CISTI), 2020, pp. 1–6,.
[276]
Lin Junhao, Lu Lu, Semantic feature learning via dual sequences for defect prediction, IEEE Access 9 (2021) 13112–13124.
[277]
Lin Chen, Ouyang Zhichao, Zhuang Junqing, Chen Jianqiang, Li Hui, Wu Rongxin, Improving code summarization with block-wise abstract syntax tree splitting, in: 2021 IEEE/ACM 29th International Conference on Program Comprehension (ICPC), IEEE, 2021, pp. 184–195.
[278]
Lin Bo, Wang Shangwen, Wen Ming, Mao Xiaoguang, Context-aware code change embedding for better patch correctness assessment, J. ACM 1 (1) (2021).
[279]
Lin Guanjun, Xiao Wei, Zhang Jun, Xiang Yang, Deep learning-based vulnerable function detection: A benchmark, in: Zhou Jianying, Luo Xiapu, Shen Qingni, Xu Zhen (Eds.), Information and Communications Security, in: Lecture Notes in Computer Science, Springer International Publishing, Cham, ISBN 978-3-030-41579-2, 2020, pp. 219–232,.
[280]
Lin Guanjun, Zhang Jun, Luo Wei, Pan Lei, Xiang Yang, De Vel Olivier, Montague Paul, Cross-project transfer representation learning for vulnerable function discovery, IEEE Trans. Ind. Inform. 14 (7) (2018) 3289–3297,.
[281]
Ling Wang, Grefenstette Edward, Hermann Karl Moritz, Kočiský Tomáš, Senior Andrew, Wang Fumin, Blunsom Phil, Latent predictor networks for code generation, 2016, URL https://arxiv.org/abs/1603.06744.
[282]
Ling Chunyang, Lin Zeqi, Zou Yanzhen, Xie Bing, Adaptive deep code search, in: Proceedings of the 28th International Conference on Program Comprehension, ICPC ’20, Association for Computing Machinery, ISBN 9781450379588, 2020, pp. 48–-59,.
[283]
Linstead E., Lopes C., Baldi P., An application of latent Dirichlet allocation to analyzing software evolution, in: 2008 Seventh International Conference on Machine Learning and Applications, 2008, pp. 813–818,.
[284]
Liu Yang, Fine-tune BERT for extractive summarization, 2019, URL https://arxiv.org/abs/1903.10318.
[285]
Liu Shangqing, Gao Cuiyun, Chen Sen, Yiu Nie Lun, Liu Yang, ATOM: Commit message generation based on abstract syntax tree and hybrid ranking, IEEE Trans. Softw. Eng. (2020).
[286]
Liu Chao, Gao Cuiyun, Xia Xin, Lo David, Grundy John, Yang Xiaohu, On the replicability and reproducibility of deep learning in software engineering, 2020.
[287]
Liu Hui, Jin Jiahao, Xu Zhifeng, Bu Yifan, Zou Yanzhen, Zhang Lu, Deep learning based code smell detection, IEEE Trans. Softw. Eng. (2019).
[288]
Liu Xiao, Li Xiaoting, Prajapati Rupesh, Wu Dinghao, DeepFuzz: Automatic generation of syntax valid C programs for fuzz testing, in: Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 33, 2019, pp. 1044–1051,. (01).
[289]
Liu Fang, Li Ge, Wei Bolin, Xia Xin, Fu Zhiyi, Jin Zhi, A self-attentional neural architecture for code completion with multi-task learning, in: Proceedings of the 28th International Conference on Program Comprehension, ICPC ’20, ISBN 9781450379588, 2020, pp. 37–47,.
[290]
Liu F., Li G., Zhao Y., Jin Z., Multi-task learning based pre-trained language model for code completion, in: 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2020, pp. 473–485.
[291]
Liu Kui, Wang Shangwen, Koyuncu Anil, Kim Kisub, Bissyandé Tegawendé F., Kim Dongsun, Wu Peng, Klein Jacques, Mao Xiaoguang, Traon Yves Le, On the efficiency of test suite based program repair: A systematic assessment of 16 automated repair systems for java programs, in: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, ICSE ’20, ISBN 9781450371216, 2020, pp. 615–627,.
[292]
Liu Bohong, Wang Tao, Zhang Xunhui, Fan Qiang, Yin Gang, Deng Jinsheng, A neural-network based code summarization approach by using source code and its call dependencies, in: Proceedings of the 11th Asia-Pacific Symposium on Internetware, Internetware ’19, ISBN 9781450377010, 2019,.
[293]
Liu Zhongxin, Xia Xin, Hassan Ahmed E., Lo David, Xing Zhenchang, Wang Xinyu, Neural-machine-translation-based commit message generation: How far are we?, in: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, in: ASE 2018, ISBN 9781450359375, 2018, pp. 373–384,.
[294]
Liu Zhongxin, Xia Xin, Treude Christoph, Lo David, Li Shanping, Automatic generation of pull request descriptions, in: 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), IEEE, 2019, pp. 176–188.
[295]
Liu Chen, Yang Jinqiu, Tan Lin, Hafiz Munawar, R2Fix: Automatically generating bug fixes from bug reports, in: 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, IEEE, 2013, pp. 282–291.
[296]
Long Fan, Rinard Martin, Automatic patch generation by learning correct code, in: Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL ’16, ISBN 9781450335492, 2016, pp. 298–312,.
[297]
Lopes C., Bajracharya S., Ossher J., Baldi P., UCI source code data sets, 2010, URL http://www.ics.uci.edu/~lopes/datasets/.
[298]
Lou Yiling, Ghanbari Ali, Li Xia, Zhang Lingming, Zhang Haotian, Hao Dan, Zhang Lu, Can automated program repair refine fault localization? a unified debugging approach, in: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020, pp. 75–87.
[299]
Lu Shuai, Guo Daya, Ren Shuo, Huang Junjie, Svyatkovskiy Alexey, Blanco Ambrosio, Clement Colin, Drain Dawn, Jiang Daxin, Tang Duyu, Li Ge, Zhou Lidong, Shou Linjun, Zhou Long, Tufano Michele, Gong Ming, Zhou Ming, Duan Nan, Sundaresan Neel, Deng Shao Kun, Fu Shengyu, Liu Shujie, CodeXGLUE: A machine learning benchmark dataset for code understanding and generation, 2021, URL https://arxiv.org/abs/2102.04664.
[300]
Lu Yangyang, Zhao Zelong, Li Ge, Jin Zhi, Learning to generate comments for api-based code snippets, in: Software Engineering and Methodology for Emerging Domains, Springer, 2017, pp. 3–14.
[301]
Luiz Frederico Caram, de Oliveira Rodrigues Bruno Rafael, Parreiras Fernando Silva, Machine learning techniques for code smells detection: An empirical experiment on a highly imbalanced setup, in: Proceedings of the XV Brazilian Symposium on Information Systems, SBSI ’19, ISBN 9781450372374, 2019,.
[302]
Lujan Savanna, Pecorelli Fabiano, Palomba Fabio, De Lucia Andrea, Lenarduzzi Valentina, A preliminary study on the adequacy of static analysis warnings with respect to code smell prediction, in: Proceedings of the 4th ACM SIGSOFT International Workshop on Machine-Learning Techniques for Software-Quality Evaluation, in: MaLTeSQuE 2020, ISBN 9781450381246, 2020, pp. 1–6,.
[303]
Luong Minh-Thang, Brevdo Eugene, Zhao Rui, Neural machine translation (seq2seq) tutorial, 2017, https://github.com/tensorflow/nmt.
[304]
Lutellier Thibaud, Pham Hung Viet, Pang Lawrence, Li Yitong, Wei Moshi, Tan Lin, CoCoNuT: Combining context-aware neural translation models using ensemble for program repair, in: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, in: ISSTA 2020, ISBN 9781450380089, 2020, pp. 101–114,.
[305]
Lyu Michael R. (Ed.), Handbook of Software Reliability Engineering, McGraw-Hill, Inc., USA, ISBN 0070394008, 1996.
[306]
Ma Yuzhan, Fakhoury Sarah, Christensen Michael, Arnaoudova Venera, Zogaan Waleed, Mirakhorli Mehdi, Automatic classification of software artifacts in open-source applications, in: Proceedings of the 15th International Conference on Mining Software Repositories, MSR ’18, ISBN 9781450357166, 2018, pp. 414–425,.
[307]
Ma Z., Ge H., Liu Y., Zhao M., Ma J., A combination method for android malware detection based on control flow graphs and machine learning algorithms, IEEE Access 7 (2019) 21235–21245,.
[308]
Ma Ying, Luo Guangchun, Zeng Xue, Chen Aiguo, Transfer learning for cross-company software defect prediction, Inf. Softw. Technol. (ISSN ) 54 (3) (2012) 248–256,.
[309]
Maddison Chris J., Tarlow Daniel, Structured generative models of natural source code, in: Proceedings of the 31st International Conference on International Conference on Machine Learning - Volume 32, ICML ’14, 2014, pp. II–649–II–657.
[310]
Madhavan Janaki T., Whitehead E. James, Predicting buggy changes inside an integrated development environment, in: Proceedings of the 2007 OOPSLA Workshop on Eclipse Technology EXchange, eclipse ’07, ISBN 9781605580159, 2007, pp. 36–40,.
[311]
Mahmoud Anas, Bradshaw Gary, Semantic topic models for source code analysis, Empir. Softw. Eng. 22 (4) (2017) 1965–2000.
[312]
Majd Amirabbas, Vahidi-Asl Mojtaba, Khalilian Alireza, Poorsarvi-Tehrani Pooria, Haghighi Hassan, SLDeep: Statement-level software defect prediction using deep-learning model on static code features, Expert Syst. Appl. (ISSN ) 147 (2020),.
[313]
Malhotra Ruchika, Comparative analysis of statistical and machine learning methods for predicting faulty modules, Appl. Soft Comput. (ISSN ) 21 (2014) 286–297,.
[314]
Malhotra R., Bahl L., Sehgal S., Priya P., Empirical comparison of machine learning algorithms for bug prediction in open source software, in: 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC), 2017, pp. 40–45,.
[315]
Malhotra Ruchika, Chug Anuradha, Software maintainability prediction using machine learning algorithms, Softw. Eng.: Int. J. (SeiJ) 2 (2) (2012).
[316]
Malhotra Ruchika, Jain Ankita, Fault prediction using statistical and machine learning methods for improving software quality, J. Inf. Process. Syst. 8 (2) (2012) 241–262.
[317]
Malhotra R., Jangra Rupender, Prediction & assessment of change prone classes using statistical & machine learning techniques, J. Inf. Process. Syst. 13 (2017) 778–804,.
[318]
Malhotra Ruchika, Kamal Shine, An empirical study to investigate oversampling methods for improving software defect prediction using imbalanced data, Neurocomputing 343 (2019) 120–140.
[319]
Malhotra Ruchika, Khanna Megha, Investigation of relationship between object-oriented metrics and change proneness, Int. J. Mach. Learn. Cybern. 4 (4) (2013) 273–286.
[320]
Malhotra Ruchika, Singh Yogesh, On the applicability of machine learning techniques for object-oriented software fault prediction, Softw. Eng.: Int. J. 1 (2011).
[321]
Malik R.S., Patra J., Pradel M., NL2type: Inferring JavaScript function types from natural language information, in: 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE), 2019, pp. 304–315,.
[322]
Manjula C., Florence Lilly, Deep neural network based hybrid approach for software defect prediction using software metrics, Cluster Comput. 22 (4) (2019) 9847–9863.
[323]
Mariano Richard VR, dos Santos Geanderson E, de Almeida Markos V, Brandão Wladmir C, Feature changes in source code for commit classification into maintenance activities, in: 2019 18th IEEE International Conference on Machine Learning and Applications (ICMLA), IEEE, 2019, pp. 515–518.
[324]
Mariano Richard VR, dos Santos Geanderson E, Brandao Wladmir Cardoso, Improve classification of commits maintenance activities with quantitative changes in source code, 2021.
[325]
Mashhadi Ehsan, Hemmati Hadi, Applying codebert for automated program repair of java simple bugs, in: 2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR), IEEE, 2021, pp. 505–509.
[326]
Mateless Roni, Rejabek Daniel, Margalit Oded, Moskovitch Robert, Decompiled APK based malicious code classification, Future Gener. Comput. Syst. (ISSN ) 110 (2020) 135–147,. URL https://www.sciencedirect.com/science/article/pii/S0167739X19325129.
[327]
McCabe Thomas J., A complexity measure, IEEE Trans. Softw. Eng. (4) (1976) 308–320.
[328]
McHugh Mary L., Interrater reliability: the kappa statistic, Biochem. Med. 22 (2012) 276–282.
[329]
Medeiros Iberia, Neves Nuno F., Correia Miguel, Securing energy metering software with automatic source code correction, in: 2013 11th IEEE International Conference on Industrial Informatics (INDIN), 2013,.
[330]
Medeiros Ibéria, Neves Nuno F., Correia Miguel, Automatic detection and correction of web application vulnerabilities using data mining to predict false positives, in: Proceedings of the 23rd International Conference on World Wide Web, WWW ’14, ISBN 9781450327442, 2014, pp. 63–74,.
[331]
Medeiros Ibéria, Neves Nuno, Correia Miguel, Detecting and removing web application vulnerabilities with static analysis and data mining, IEEE Trans. Reliab. 65 (1) (2016) 54–69,.
[332]
Meng Na, Jiang Zijian, Zhong Hao, Classifying code commits with convolutional neural networks, in: 2021 International Joint Conference on Neural Networks (IJCNN), IEEE, 2021, pp. 1–8.
[333]
Meqdadi Omar, Alhindawi Nouh, Alsakran Jamal, Saifan Ahmad, Migdadi Hatim, Mining software repositories for adaptive change commits using machine learning techniques, Inf. Softw. Technol. (ISSN ) 109 (2019) 80–91,.
[334]
Mesbah Ali, Rice Andrew, Johnston Emily, Glorioso Nick, Aftandilian Edward, Deep Delta: Learning to repair compilation errors, in: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, in: ESEC/FSE 2019, ISBN 9781450355728, 2019, pp. 925–936,.
[335]
Mhawish Mohammad Y., Gupta Manjari, Predicting code smells and analysis of predictions: Using machine learning techniques and software metrics, J. Comput. Sci. Tech. 35 (2020) 1428–1445.
[336]
Milosevic Nikola, Dehghantanha Ali, Choo Kim-Kwang Raymond, Machine learning aided android malware classification, Comput. Electr. Eng. (ISSN ) 61 (2017) 266–274,.
[337]
Moskovitch Robert, Nissim Nir, Elovici Yuval, Malicious code detection using active learning, in: Bonchi Francesco, Ferrari Elena, Jiang Wei, Malin Bradley (Eds.), Privacy, Security, and Trust in KDD, ISBN 978-3-642-01718-6, 2009, pp. 74–91.
[338]
Mostaeen Golam, Roy Banani, Roy Chanchal K., Schneider Kevin, Svajlenko Jeffrey, A machine learning based framework for code clone validation, J. Syst. Softw. (ISSN ) 169 (2020),.
[339]
Mostaeen G., Svajlenko J., Roy B., Roy C.K., Schneider K.A., [Research paper] on the use of machine learning techniques towards the design of cloud based automatic code clone validation tools, in: 2018 IEEE 18th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2018, pp. 155–164,.
[340]
Mostaeen Golam, Svajlenko Jeffrey, Roy Banani, Roy Chanchal K., Schneider Kevin A., CloneCognition: Machine learning based code clone validation tool, in: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, in: ESEC/FSE 2019, ISBN 9781450355728, 2019, pp. 1105–1109,.
[341]
Mou Lili, Li Ge, Zhang Lu, Wang Tao, Jin Zhi, Convolutional neural networks over tree structures for programming language processing, in: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, AAAI ’16, 2016, pp. 1287–1293.
[342]
Movshovitz-Attias Dana, Cohen William, Natural language models for predicting programming comments, in: ACL 2013 - 51st Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference, Vol. 2, 2013, pp. 35–40.
[343]
Murali Vijayaraghavan, Qi Letao, Chaudhuri S., Jermaine C., Neural sketch learning for conditional program generation, in: ICLR, 2018.
[344]
Nair Aravind, Meinke Karl, Eldh Sigrid, Leveraging mutants for automatic prediction of metamorphic relations using machine learning, in: Proceedings of the 3rd ACM SIGSOFT International Workshop on Machine Learning Techniques for Software Quality Evaluation, in: MaLTeSQuE 2019, ISBN 9781450368551, 2019, pp. 1–6,.
[345]
Narayanan Annamalai, Chandramohan Mahinthan, Chen Lihui, Liu Yang, A multi-view context-aware approach to android malware detection and malicious code localization, Empir. Softw. Eng. (ISSN ) 23 (3) (2018) 1222–1274,.
[346]
Nazar N., Hu Y., Jiang He, Summarizing software artifacts: A literature review, J. Comput. Sci. Tech. 31 (2016) 883–909.
[347]
Nazar N., Jiang He, Gao Guojun, Zhang Tao, Li Xiaochen, Ren Zhilei, Source code fragment summarization with small-scale crowdsourcing based features, Front. Comput. Sci. 10 (2015) 504–517.
[348]
Ndichu Samuel, Kim Sangwook, Ozawa Seiichi, Misu Takeshi, Makishima Kazuo, A machine learning approach to detection of JavaScript-based attacks using AST features and paragraph vectors, Appl. Soft Comput. (ISSN ) 84 (2019),.
[349]
Nguyen Duc-Man, Do Hoang-Nhat, Huynh Quyet-Thang, Vo Dinh-Thien, Ha Nhu-Hang, Shinobi: A novel approach for context-driven testing (CDT) using heuristics and machine learning for web applications, in: Duong Trung Q., Vo Nguyen-Son (Eds.), Industrial Networks and Intelligent Systems, ISBN 978-3-030-05873-9, 2019, pp. 86–102.
[350]
Nguyen Tung Thanh, Nguyen Anh Tuan, Nguyen Hoan Anh, Nguyen Tien N., A statistical semantic language model for source code, in: Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, in: ESEC/FSE 2013, Association for Computing Machinery, New York, NY, USA, ISBN 9781450322379, 2013, pp. 532–542,.
[351]
Nguyen A.T., Nguyen T.D., Phan H.D., Nguyen T.N., A deep neural network language model with contexts for source code, in: 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2018, pp. 323–334,.
[352]
Nie Lun Yiu, Gao Cuiyun, Zhong Zhicong, Lam Wai, Liu Yang, Xu Zenglin, CoreGen: Contextualized code representation learning for commit message generation, Neurocomputing 459 (2021) 97–107.
[353]
Nyamawe A.S., Liu H., Niu N., Umer Q., Niu Z., Automated recommendation of software refactorings based on feature requests, in: 2019 IEEE 27th International Requirements Engineering Conference (RE), 2019, pp. 187–198,.
[354]
Nyamawe Ally S., Liu Hui, Niu Nan, Umer Qasim, Niu Zhendong, Feature requests-based recommendation of software refactorings, Empir. Softw. Engg. (ISSN ) 25 (5) (2020) 4315–4347,.
[355]
Ochodek Miroslaw, Hebig Regina, Meding Wilhelm, Frost Gert, Staron Miroslaw, Recognizing lines of code violating company-specific coding guidelines using machine learning, Empir. Softw. Eng. 25 (2019) 220–265.
[356]
Oda Yusuke, Fudaba Hiroyuki, Neubig Graham, Hata Hideaki, Sakti Sakriani, Toda Tomoki, Nakamura Satoshi, Learning to generate pseudo-code from source code using statistical machine translation, in: 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2015, pp. 574–584,.
[357]
Oda Y., Fudaba H., Neubig G., Hata H., Sakti S., Toda T., Nakamura S., Learning to generate pseudo-code from source code using statistical machine translation, in: 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2015, pp. 574–584,.
[358]
Okutan Ahmet, Yıldız Olcay Taner, Software defect prediction using Bayesian networks, Empir. Softw. Eng. 19 (1) (2014) 154–181.
[359]
Oliveira Daniel, Assunção Wesley K.G., Souza Leonardo, Oizumi Willian, Garcia Alessandro, Fonseca Baldoino, Applying machine learning to customized smell detection: A multi-project study, in: SBES ’20, ISBN 9781450387538, 2020, pp. 233–242,.
[360]
Omri Safa, Sinz Carsten, Deep learning for software defect prediction: A survey, in: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, ICSEW ’20, ISBN 9781450379632, 2020, pp. 209–214,.
[361]
Padmanabhuni Bindu Madhavi, Tan Hee Beng Kuan, Buffer overflow vulnerability prediction from x86 executables using static analysis and machine learning, in: 2015 IEEE 39th Annual Computer Software and Applications Conference, Vol. 2, 2015, pp. 450–459,.
[362]
Palomba Fabio, Di Nucci Dario, Tufano Michele, Bavota Gabriele, Oliveto Rocco, Poshyvanyk Denys, De Lucia Andrea, Landfill: An open dataset of code smells with public evaluation, in: 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 2015, pp. 482–485,.
[363]
Palomba Fabio, Zanoni Marco, Fontana Francesca Arcelli, De Lucia Andrea, Oliveto Rocco, Smells like teen spirit: Improving bug prediction performance using the intensity of code smells, in: 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME), IEEE, 2016, pp. 244–255.
[364]
Palomba Fabio, Zanoni Marco, Fontana Francesca Arcelli, De Lucia Andrea, Oliveto Rocco, Toward a smell-aware bug prediction model, IEEE Trans. Softw. Eng. 45 (2) (2017) 194–218.
[365]
Pan Cong, Lu Minyan, Xu Biao, Gao Houleng, An improved CNN model for within-project software defect prediction, Appl. Sci. 9 (10) (2019) 2138.
[366]
Pandey A.K., Gupta Manjari, Software fault classification using extreme learning machine: a cognitive approach, Evol. Intell. (2018) 1–8.
[367]
Pandey Sushant Kumar, Mishra Ravi Bhushan, Tripathi Anil Kumar, Machine learning based methods for software fault prediction: A survey, Expert Syst. Appl. 172 (2021).
[368]
Pang Y., Xue X., Namin A.S., Early identification of vulnerable software components via ensemble learning, in: 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), 2016, pp. 476–481,.
[369]
Pang Yulei, Xue Xiaozhen, Wang Huaying, Predicting vulnerable software components through deep neural network, in: Proceedings of the 2017 International Conference on Deep Learning Technologies, ICDLT ’17, Association for Computing Machinery, New York, NY, USA, ISBN 9781450352321, 2017, pp. 6–10,.
[370]
Panichella Sebastiano, Aponte Jairo, Di Penta Massimiliano, Marcus Andrian, Canfora Gerardo, Mining source code descriptions from developer communications, in: 2012 20th IEEE International Conference on Program Comprehension (ICPC), 2012, pp. 63–72,.
[371]
Pascarella Luca, Palomba Fabio, Bacchelli Alberto, Re-evaluating method-level bug prediction, in: 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), IEEE, 2018, pp. 592–601.
[372]
Patel Kayur, Fogarty James, Landay James A., Harrison Beverly, Investigating statistical machine learning as a tool for software development, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’08, ISBN 9781605580111, 2008, pp. 667–676,.
[373]
Pecorelli Fabiano, Di Nucci Dario, De Roover Coen, De Lucia Andrea, On the role of data balancing for machine learning-based code smell detection, in: Proceedings of the 3rd ACM SIGSOFT International Workshop on Machine Learning Techniques for Software Quality Evaluation, in: MaLTeSQuE 2019, ISBN 9781450368551, 2019, pp. 19–24,.
[374]
Pecorelli F., Palomba F., Di Nucci D., De Lucia A., Comparing heuristic and machine learning approaches for metric-based code smell detection, in: 2019 IEEE/ACM 27th International Conference on Program Comprehension (ICPC), 2019, pp. 93–104.
[375]
Peng Han, Li Ge, Wang Wenhan, Zhao YunFei, Jin Zhi, Integrating tree path in transformer for code representation, in: Ranzato M., Beygelzimer A., Dauphin Y., Liang P.S., Vaughan J. Wortman (Eds.), Advances in Neural Information Processing Systems, Vol. 34, Curran Associates, Inc., 2021, pp. 9343–9354. URL https://proceedings.neurips.cc/paper/2021/file/4e0223a87610176ef0d24ef6d2dcde3a-Paper.pdf.
[376]
Peng Hao, Mou Lili, Li Ge, Liu Yuxuan, Zhang Lu, Jin Zhi, Building program vector representations for deep learning, in: International Conference on Knowledge Science, Engineering and Management, Springer, 2015, pp. 547–553.
[377]
Pereira J.D., Campos J.R., Vieira M., An exploratory study on machine learning to combine security vulnerability alerts from static analysis tools, in: 2019 9th Latin-American Symposium on Dependable Computing (LADC), 2019, pp. 1–10,.
[378]
Perl Henning, Dechand Sergej, Smith Matthew, Arp Daniel, Yamaguchi Fabian, Rieck Konrad, Fahl Sascha, Acar Yasemin, VCCFinder: Finding potential vulnerabilities in open-source projects to assist code audits, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS ’15, ISBN 9781450338325, 2015, pp. 426–437,.
[379]
Phan Hung, Jannesari Ali, Statistical machine translation outperforms neural machine translation in software engineering: Why and how, in: Proceedings of the 1st ACM SIGSOFT International Workshop on Representation Learning for Software Engineering and Program Languages, in: RL+SE&PL 2020, ISBN 9781450381253, 2020, pp. 3–12,.
[380]
Phan Long, Tran Hieu, Le Daniel, Nguyen Hieu, Anibal James, Peltekian Alec, Ye Yanfang, Cotext: Multi-task learning with code-text transformer, 2021, URL https://arxiv.org/abs/2105.08645.
[381]
Pinconschi Eduard, Abreu Rui, Adão Pedro, A comparative study of automatic program repair techniques for security vulnerabilities, in: 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE), IEEE, 2021, pp. 196–207.
[382]
Piskachev Goran, Do Lisa Nguyen Quang, Bodden Eric, Codebase-adaptive detection of security-relevant methods, in: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, in: ISSTA 2019, ISBN 9781450362245, 2019, pp. 181–191,.
[383]
Ponta Serena E., Plate Henrik, Sabetta Antonino, Bezzi Michele, Dangremont Cédric, A manually-curated dataset of fixes to vulnerabilities of open-source software, in: Proceedings of the 16th International Conference on Mining Software Repositories, MSR ’19, 2019, pp. 383–387,.
[384]
Pour Maryam Vahdat, Li Zhuo, Ma Lei, Hemmati Hadi, A search-based testing framework for deep neural networks of source code embedding, in: 2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST), IEEE, 2021, pp. 36–46.
[385]
Prabha C.L., Shivakumar N., Software defect prediction using machine learning techniques, in: 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), 2020, pp. 728–733,.
[386]
Pradel Michael, Sen Koushik, DeepBugs: A learning approach to name-based bug detection, Proc. ACM Prog. Lang. 2 (OOPSLA) (2018),.
[387]
Premalatha Hosahalli Mahalingappa, Srikrishna Chimanahalli Venkateshavittalachar, Software fault prediction and classification using cost based random forest in spiral life cycle model, System 11 (2017).
[388]
Prince Michael, Does active learning work? A review of the research, J. Eng. Educ. 93 (3) (2004) 223–231.
[389]
Pritam N., Khari M., Hoang Son L., Kumar R., Jha S., Priyadarshini I., Abdel-Basset M., Viet Long H., Assessment of code smell for predicting class change proneness using machine learning, IEEE Access 7 (2019) 37414–37425,.
[390]
Proksch Sebastian, Lerch Johannes, Mezini Mira, Intelligent code completion with Bayesian networks, ACM Trans. Softw. Eng. Methodol. (ISSN ) 25 (1) (2015),.
[391]
Psarras Christos, Diamantopoulos Themistoklis, Symeonidis Andreas, A mechanism for automatically summarizing software functionality from source code, in: 2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS), IEEE, 2019, pp. 121–130.
[392]
Qiao Lei, Li Xuesong, Umer Qasim, Guo Ping, Deep learning based software defect prediction, Neurocomputing 385 (2020) 100–110.
[393]
Rabin Md Rafiqul Islam, Mukherjee Arjun, Gnawali Omprakash, Alipour Mohammad Amin, Towards demystifying dimensions of source code embeddings, in: Proceedings of the 1st ACM SIGSOFT International Workshop on Representation Learning for Software Engineering and Program Languages, in: RL+SE&PL 2020, ISBN 9781450381253, 2020, pp. 29–38,.
[394]
Rabinovich Maxim, Stern Mitchell, Klein Dan, Abstract syntax networks for code generation and semantic parsing, in: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2017, pp. 1139–1149,.
[395]
Radford Alec, Narasimhan Karthik, Improving language understanding by generative pre-training, 2018.
[396]
Rahman Akond, Pradhan Priysha, Partho Asif, Williams Laurie, Predicting android application security and privacy risk with static code metrics, in: Proceedings of the 4th International Conference on Mobile Software Engineering and Systems, MOBILESoft ’17, ISBN 9781538626696, 2017, pp. 149–153,.
[397]
Rahman M.M., Roy C.K., Keivanloo I., Recommending insightful comments for source code using crowdsourced knowledge, in: Proc. SCAM, 2015, pp. 81–90.
[398]
Rahman M., Watanobe Yutaka, Nakamura K., A neural network based intelligent support model for program code completion, Sci. Prog. 2020 (2020) 7426461:1–7426461:18,.
[399]
Rathore Santosh S., Kumar Sandeep, Software fault prediction based on the dynamic selection of learning technique: findings from the eclipse project study, Appl. Intell. 51 (12) (2021) 8945–8960.
[400]
Raychev Veselin, Bielik Pavol, Vechev Martin, Probabilistic model for code with decision trees, SIGPLAN Not. (ISSN ) 51 (10) (2016) 731–747,.
[401]
Reddivari Sandeep, Raman Jayalakshmi, Software quality prediction: an investigation based on machine learning, in: 2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI), IEEE, 2019, pp. 115–122.
[402]
Ren Jinsheng, Qin Ke, Ma Ying, Luo Guangchun, On software defect prediction using machine learning, J. Appl. Math. 2014 (2014).
[403]
Ren Pengzhen, Xiao Yun, Chang Xiaojun, Huang Po-Yao, Li Zhihui, Chen Xiaojiang, Wang Xin, A survey of deep active learning, 2020, arXiv preprint arXiv:2009.00236.
[404]
Ren Jiadong, Zheng Zhangqi, Liu Qian, Wei Zhiyao, Yan Huaizhi, A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning, Secur. Commun. Netw. (ISSN ) 2019 (2019),. URL https://www.hindawi.com/journals/scn/2019/8391425/. Publisher: Hindawi.
[405]
Renzullo Joseph, Weimer Westley, Forrest Stephanie, Multiplicative weights algorithms for parallel automated software repair, in: 2021 IEEE International Parallel and Distributed Processing Symposium (IPDPS), IEEE, 2021, pp. 984–993.
[406]
Rodriguez Guillermo, Mateos Cristian, Listorti Luciano, Hammer Brian, Misra Sanjay, A novel unsupervised learning approach for assessing web services refactoring, in: Damaševičius Robertas, Vasiljevienė Giedrė (Eds.), Information and Software Technologies, ISBN 978-3-030-30275-7, 2019, pp. 273–284.
[407]
Roziere Baptiste, Lachaux Marie-Anne, Chanussot Lowik, Lample Guillaume, Unsupervised translation of programming languages, Adv. Neural Inf. Process. Syst. 33 (2020) 20601–20611.
[408]
Russell R., Kim L., Hamilton L., Lazovich T., Harer J., Ozdemir O., Ellingwood P., McConley M., Automated vulnerability detection in source code using deep representation learning, in: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), 2018, pp. 757–762,.
[409]
Russell Rebecca, Kim Louis, Hamilton Lei, Lazovich Tomo, Harer Jacob, Ozdemir Onur, Ellingwood Paul, McConley Marc, Automated vulnerability detection in source code using deep representation learning, in: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), 2018, pp. 757–762,.
[410]
Sabetta Antonino, Bezzi Michele, A practical approach to the automatic classification of security-relevant commits, in: 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME), IEEE, 2018, pp. 579–582.
[411]
Saccente N., Dehlinger J., Deng L., Chakraborty S., Xiong Y., Project achilles: A prototype tool for static method-level vulnerability detection of java source code using a recurrent neural network, in: 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW), 2019, pp. 114–121,.
[412]
Sachdev Saksham, Li Hongyu, Luan Sifei, Kim Seohyun, Sen Koushik, Chandra Satish, Retrieval on source code: A neural code search, in: Proceedings of the 2nd ACM SIGPLAN International Workshop on Machine Learning and Programming Languages, in: MAPL 2018, ISBN 9781450358347, 2018, pp. 31–41,.
[413]
Sagar Priyadarshni Suresh, AlOmar Eman Abdulah, Mkaouer Mohamed Wiem, Ouni Ali, Newman Christian D., Comparing commit messages and source code metrics for the prediction refactoring activities, Algorithms (ISSN ) 14 (10) (2021),. URL https://www.mdpi.com/1999-4893/14/10/289.
[414]
Saha R.K., Lyu Y., Yoshida H., Prasad M.R., Elixir: Effective object-oriented program repair, in: 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2017, pp. 648–659,.
[415]
Saha S., k. Saha R., r. Prasad M., Harnessing evolution for multi-hunk program repair, in: 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE), 2019, pp. 13–24,.
[416]
Saidani Islem, Ouni Ali, Mkaouer Mohamed Wiem, Web service API anti-patterns detection as a multi-label learning problem, in: International Conference on Web Services, Springer, 2020, pp. 114–132.
[417]
Sainath Tara N, Kingsbury Brian, Saon George, Soltau Hagen, Mohamed Abdel-rahman, Dahl George, Ramabhadran Bhuvana, Deep convolutional neural networks for large-scale speech tasks, Neural Netw. 64 (2015) 39–48.
[418]
Sakkas Georgios, Endres Madeline, Cosman Benjamin, Weimer Westley, Jhala Ranjit, Type error feedback via analytic program repair, in: Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation, in: PLDI 2020, ISBN 9781450376136, 2020, pp. 16–30,.
[419]
Sankaran Anush, Aralikatte Rahul, Mani Senthil, Khare Shreya, Panwar Naveen, Gantayat Neelamadhav, DARVIZ: deep abstract representation, visualization, and verification of deep learning models, 2017, CoRR abs/1708.04915. URL http://arxiv.org/abs/1708.04915.
[420]
Santos E.A., Campbell J.C., Patel D., Hindle A., Amaral J.N., Syntax and sensibility: Using language models to detect and correct syntax errors, in: 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2018, pp. 311–322,.
[421]
Santos Igor, Devesa Jaime, Brezo Félix, Nieves Javier, Bringas Pablo Garcia, OPEM: A static-dynamic approach for machine-learning-based malware detection, in: Herrero Álvaro, Snášel Václav, Abraham Ajith, Zelinka Ivan, Baruque Bruno, Quintián Héctor, Calvo José Luis, Sedano Javier, Corchado Emilio (Eds.), International Joint Conference CISIS’12-ICEUTE’12-SOCO’12 Special Sessions, ISBN 978-3-642-33018-6, 2013, pp. 271–280.
[422]
Sarro F., Di Martino S., Ferrucci F., Gravino C., A further analysis on the use of genetic algorithm to configure support vector machines for inter-release fault prediction, in: Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC ’12, Association for Computing Machinery, New York, NY, USA, ISBN 9781450308571, 2012, pp. 1215–1220,.
[423]
Sayyad Shirabad J., Menzies T.J., The PROMISE Repository of Software Engineering Databases, School of Information Technology and Engineering, University of Ottawa, Canada, 2005, URL http://promise.site.uottawa.ca/SERepository.
[424]
Schumacher Max Eric Henry, Le Kim Tuyen, Andrzejak Artur, Improving code recommendations by combining neural and classical machine learning approaches, in: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, ICSEW ’20, ISBN 9781450379632, 2020, pp. 476–482,.
[425]
Schuster R., Song Congzheng, Tromer Eran, Shmatikov Vitaly, You autocomplete me: Poisoning vulnerabilities in neural code completion, in: 30th USENIX Security Symposium (USENIX Security 21), 2021.
[426]
Sethi T., Gagandeep, Improved approach for software defect prediction using artificial neural networks, in: 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2016, pp. 480–485,.
[427]
Settles Burr, Active learning literature survey, 2009.
[428]
Shabtai Asaf, Moskovitch Robert, Elovici Yuval, Glezer Chanan, Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey, Inf. Secur. Tech. Rep. (ISSN ) 14 (1) (2009) 16–29,. Malware.
[429]
Shar L.K., Briand L.C., Tan H.B.K., Web application vulnerability prediction using hybrid program analysis and machine learning, IEEE Trans. Dependable Secure Comput. 12 (6) (2015) 688–707,.
[431]
Sharma Tushar, CodeSplit for C#, 2019, URL https://doi.org/10.5281/zenodo.2566905.
[433]
Sharma Tushar, Efstathiou Vasiliki, Louridas Panos, Spinellis Diomidis, Code smell detection by deep direct-learning and transfer-learning, J. Syst. Softw. (ISSN ) 176 (2021),.
[434]
Sharma Tushar, Kechagia Maria, Georgiou Stefanos, Tiwari Rohit, Vats Indira, Moazen Hadi, Sarro Federica, Replication package for machine learning for source code analysis survey paper, 2022, URL https://github.com/tushartushar/ML4SCA.
[435]
Sharma T., Kessentini M., Qscored: A large dataset of code smells and quality metrics, in: 2021 2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR) (MSR), IEEE Computer Society, Los Alamitos, CA, USA, 2021, pp. 590–594,. URL https://doi.ieeecomputersociety.org/10.1109/MSR52588.2021.00080.
[436]
Sharma Tushar, Mishra Pratibha, Tiwari Rohit, Designite — A software design quality assessment tool, in: Proceedings of the First International Workshop on Bringing Architecture Design Thinking Into Developers’ Daily Activities, BRIDGE ’16, 2016,.
[437]
Sharma Tushar, Spinellis Diomidis, A survey on software smells, J. Syst. Softw. (ISSN ) 138 (2018) 158–173,. URL https://www.sciencedirect.com/science/article/pii/S0164121217303114.
[438]
Shedko Andrey, Palachev Ilya, Kvochko Andrey, Semenov Aleksandr, Sun Kwangwon, Applying probabilistic models to c++ code on an industrial scale, in: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, ICSEW ’20, ISBN 9781450379632, 2020, pp. 595–602,.
[439]
Shen Zhidong, Chen S., A survey of automatic software vulnerability detection, program repair, and defect prediction techniques, Secur. Commun. Netw. 2020 (2020) 8858010:1–8858010:16.
[440]
Sheneamer A., Kalita J., Semantic clone detection using machine learning, in: 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), 2016, pp. 1024–1028,.
[441]
Shi Ke, Lu Yang, Chang Jingfei, Wei Zhen, PathPair2Vec: An AST path pair-based code representation method for defect prediction, J. Comput. Lang. (ISSN ) 59 (2020),.
[442]
Shido Y., Kobayashi Y., Yamamoto A., Miyamoto A., Matsumura T., Automatic source code summarization with extended tree-LSTM, in: 2019 International Joint Conference on Neural Networks (IJCNN), 2019, pp. 1–8,.
[443]
Shim S., Patil P., Yadav R.R., Shinde A., Devale V., DeeperCoder: Code generation using machine learning, in: 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), 2020, pp. 0194–0199,.
[444]
Shimonaka K., Sumi S., Higo Y., Kusumoto S., Identifying auto-generated code by using machine learning techniques, in: 2016 7th International Workshop on Empirical Software Engineering in Practice (IWESEP), 2016, pp. 18–23,.
[445]
Shin Eui Chul, Allamanis Miltiadis, Brockschmidt Marc, Polozov Alex, Program synthesis and semantic parsing with learned code idioms, in: Advances in Neural Information Processing Systems, 2019, pp. 10825–10835.
[446]
Shin Richard, Kant Neel, Gupta Kavi, Bender Chris, Trabucco Brandon, Singh Rishabh, Song Dawn, Synthetic datasets for neural program synthesis, in: International Conference on Learning Representations, 2019.
[447]
Shiqi L., Shengwei T., Long Y., Jiong Y., Hua S., Android malicious code Classification using Deep Belief Network, KSII Trans. Internet Inf. Syst. 12 (2018) 454–475,.
[448]
Shu Chengxun, Zhang Hongyu, Neural programming by example, 2017, CoRR abs/1703.04990.
[449]
Shuai Jianhang, Xu Ling, Liu Chao, Yan Meng, Xia Xin, Lei Yan, Improving code search with co-attentive representation learning, in: Proceedings of the 28th International Conference on Program Comprehension, ICPC ’20, ISBN 9781450379588, 2020, pp. 196–207,.
[450]
Sidhu Brahmaleen Kaur, Singh Kawaljeet, Sharma Neeraj, A machine learning approach to software model refactoring, Int. J. Comput. Appl. 44 (2) (2022) 166–177,.
[451]
Singh Ajmer, Bhatia Rajesh, Singhrova Anita, Taxonomy of machine learning algorithms in software fault prediction using object oriented metrics, Procedia Comput. Sci. 132 (2018) 993–1001.
[452]
Singh P., Chug A., Software defect prediction analysis using machine learning algorithms, in: 2017 7th International Conference on Cloud Computing, Data Science Engineering - Confluence, 2017, pp. 775–781,.
[453]
Singh P., Malhotra R., Assessment of machine learning algorithms for determining defective classes in an object-oriented software, in: 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2017, pp. 204–209,.
[454]
Singh R., Singh J., Gill M.S., Malhotra R., Garima, Transfer learning code vectorizer based machine learning models for software defect prediction, in: 2020 International Conference on Computational Performance Evaluation (ComPE), 2020, pp. 497–502,.
[455]
Soltanifar Behjat, Akbarinasaji Shirin, Caglayan Bora, Bener Ayse Basar, Filiz Asli, Kramer Bryan M, Software analytics in practice: a defect prediction model using code smells, in: Proceedings of the 20th International Database Engineering & Applications Symposium, 2016, pp. 148–155.
[456]
Song Qinbao, Guo Yuchen, Shepperd Martin, A comprehensive investigation of the role of imbalanced learning for software defect prediction, IEEE Trans. Softw. Eng. 45 (12) (2019) 1253–1269,.
[457]
Song Xiaotao, Sun Hailong, Wang Xu, Yan Jiafei, A survey of automatic generation of source code comments: Algorithms and techniques, IEEE Access 7 (2019) 111411–111428.
[458]
Soto M., Le Goues C., Common statement kind changes to inform automatic program repair, in: 2018 IEEE/ACM 15th International Conference on Mining Software Repositories (MSR), 2018, pp. 102–105.
[459]
Sotto-Mayor Bruno, Kalech Meir, Cross-project smell-based defect prediction, Soft Comput. 25 (22) (2021) 14171–14181.
[460]
Spreitzenbarth Michael, Schreck Thomas, Echtler F., Arp D., Hoffmann Johannes, Mobile-sandbox: combining static and dynamic analysis with machine-learning techniques, Int. J. Inf. Secur. 14 (2014) 141–153.
[461]
Stapleton Sean, Gambhir Yashmeet, LeClair Alexander, Eberhart Zachary, Weimer Westley, Leach Kevin, Huang Yu, A human study of comprehension and code summarization, in: Proceedings of the 28th International Conference on Program Comprehension, ICPC ’20, ISBN 9781450379588, 2020, pp. 2–13,.
[462]
Storey M.-A., Theories, methods and tools in program comprehension: past, present and future, in: 13th International Workshop on Program Comprehension (IWPC’05), 2005, pp. 181–191,.
[463]
Sui Yulei, Cheng Xiao, Zhang Guanqin, Wang Haoyu, Flow2Vec: Value-flow-based precise code embedding, in: Proc. ACM Program. Lang., Vol. 4, 2020,. (OOPSLA).
[464]
Sui Yulei, Xue Jingling, SVF: interprocedural static value-flow analysis in LLVM, in: Proceedings of the 25th International Conference on Compiler Construction, ACM, 2016, pp. 265–266.
[465]
Sultana Kazi Zakia, Towards a software vulnerability prediction model using traceable code patterns and software metrics, in: 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2017, pp. 1022–1025,.
[466]
Sultana Kazi Zakia, Anu Vaibhav, Chong Tai-Yin, Using software metrics for predicting vulnerable classes and methods in Java projects: A machine learning approach, J. Softw.: Evol. and Process (ISSN ) 33 (3) (2021),. URL https://onlinelibrary.wiley.com/doi/abs/10.1002/smr.2303.
[467]
Sun Zhongbin, Song Qinbao, Zhu Xiaoyan, Using coding-based ensemble learning to improve software defect prediction, IEEE Trans. Syst. Man Cybern. C (Appl. Rev.) 42 (6) (2012) 1806–1817.
[468]
Sun Zeyu, Zhu Qihao, Xiong Yingfei, Sun Yican, Mou Lili, Zhang Lu, Treegen: A tree-based transformer architecture for code generation, in: Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 34, 2020, pp. 8984–8991.
[469]
Suresh Yeresime, Kumar Lov, Rath Santanu Ku, Statistical and machine learning methods for software fault prediction using CK metric suite: a comparative analysis, Int. Sch. Res. Not. 2014 (2014).
[470]
Suryanarayana Girish, Samarthyam Ganesh, Sharma Tushar, Refactoring for Software Design Smells: Managing Technical Debt, first ed., Morgan Kaufmann, ISBN 0128013974, 2014.
[471]
Svajlenko Jeffrey, Islam Judith F., Keivanloo Iman, Roy Chanchal K., Mia Mohammad Mamun, Towards a big data curated benchmark of inter-project code clones, in: 2014 IEEE International Conference on Software Maintenance and Evolution, 2014, pp. 476–480,.
[472]
Svyatkovskiy Alexey, Deng Shao Kun, Fu Shengyu, Sundaresan Neel, IntelliCode compose: Code generation using transformer, in: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, in: ESEC/FSE 2020, ISBN 9781450370431, 2020, pp. 1433–1443,.
[473]
Svyatkovskiy Alexey, Lee Sebastian, Hadjitofi Anna, Riechert Maik, Franco Juliana Vicente, Allamanis Miltiadis, Fast and memory-efficient neural code completion, in: 2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR), IEEE, 2021, pp. 329–340.
[474]
Svyatkovskiy Alexey, Zhao Ying, Fu Shengyu, Sundaresan Neel, Pythia: AI-assisted code completion system, in: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, KDD ’19, ISBN 9781450362016, 2019, pp. 2727–2735,.
[475]
Szegedy Christian, Liu Wei, Jia Yangqing, Sermanet Pierre, Reed Scott, Anguelov Dragomir, Erhan Dumitru, Vanhoucke Vincent, Rabinovich Andrew, Going deeper with convolutions, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 1–9.
[476]
Szydlo Tomasz, Sendorek Joanna, Brzoza-Woch Robert, Enabling machine learning on resource constrained devices by source code generation of the learned models, in: Shi Yong, Fu Haohuan, Tian Yingjie, Krzhizhanovskaya Valeria V., Lees Michael Harold, Dongarra Jack, Sloot Peter M.A. (Eds.), Computational Science – ICCS 2018, ISBN 978-3-319-93701-4, 2018, pp. 682–694.
[477]
Takahashi Akiyoshi, Shiina Hiromitsu, Kobayashi Nobuyuki, Automatic generation of program comments based on problem statements for computational thinking, in: 2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI), IEEE, 2019, pp. 629–634.
[478]
Terada K., Watanobe Y., Code completion for programming education based on recurrent neural network, in: 2019 IEEE 11th International Workshop on Computational Intelligence and Applications (IWCIA), 2019, pp. 109–114,.
[479]
Thaller H., Linsbauer L., Egyed A., Feature maps: A comprehensible software representation for design pattern detection, in: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), 2019, pp. 207–217,.
[480]
Thongkum P., Mekruksavanich S., Design flaws prediction for impact on software maintainability using extreme learning machine, in: 2020 Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI DAMT NCON), 2020, pp. 79–82,.
[481]
Thongtanunam Patanamon, Pornprasit Chanathip, Tantithamthavorn Chakkrit, AutoTransform: Automated code transformation to support modern code review process, 2022.
[482]
Tian H., Liu K., Kaboré A.K., Koyuncu A., Li L., Klein J., Bissyandé T.F., Evaluating representation learning of code changes for predicting patch correctness in program repair, in: 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2020, pp. 981–992.
[483]
Tollin Irene, Fontana Francesca Arcelli, Zanoni Marco, Roveda Riccardo, Change prediction through coding rules violations, in: Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering, EASE ’17, ISBN 9781450348041, 2017, pp. 61–64,.
[484]
Touvron Hugo, Martin Louis, Stone Kevin, Albert Peter, Almahairi Amjad, Babaei Yasmine, Bashlykov Nikolay, Batra Soumya, Bhargava Prajjwal, Bhosale Shruti, Bikel Dan, Blecher Lukas, Ferrer Cristian Canton, Chen Moya, Cucurull Guillem, Esiobu David, Fernandes Jude, Fu Jeremy, Fu Wenyin, Fuller Brian, Gao Cynthia, Goswami Vedanuj, Goyal Naman, Hartshorn Anthony, Hosseini Saghar, Hou Rui, Inan Hakan, Kardas Marcin, Kerkez Viktor, Khabsa Madian, Kloumann Isabel, Korenev Artem, Koura Punit Singh, Lachaux Marie-Anne, Lavril Thibaut, Lee Jenya, Liskovich Diana, Lu Yinghai, Mao Yuning, Martinet Xavier, Mihaylov Todor, Mishra Pushkar, Molybog Igor, Nie Yixin, Poulton Andrew, Reizenstein Jeremy, Rungta Rashi, Saladi Kalyan, Schelten Alan, Silva Ruan, Smith Eric Michael, Subramanian Ranjan, Tan Xiaoqing Ellen, Tang Binh, Taylor Ross, Williams Adina, Kuan Jian Xiang, Xu Puxin, Yan Zheng, Zarov Iliyan, Zhang Yuchen, Fan Angela, Kambadur Melanie, Narang Sharan, Rodriguez Aurelien, Stojnic Robert, Edunov Sergey, Scialom Thomas, Llama 2: Open foundation and fine-tuned chat models, 2023.
[485]
Tsantalis Nikolaos, Ketkar Ameya, Dig Danny, RefactoringMiner 2.0, IEEE Trans. Softw. Eng. (2020),.
[486]
Tsintzira Angeliki-Agathi, Arvanitou Elvira-Maria, Ampatzoglou Apostolos, Chatzigeorgiou Alexander, Applying machine learning in technical debt management: Future opportunities and challenges, in: Shepperd Martin, Brito e Abreu Fernando, Rodrigues da Silva Alberto, Pérez-Castillo Ricardo (Eds.), Quality of Information and Communications Technology, ISBN 978-3-030-58793-2, 2020, pp. 53–67.
[487]
Tsuda Naohiko, Washizaki Hironori, Fukazawa Yoshiaki, Yasuda Yuichiro, Sugimura Shunsuke, Machine learning to evaluate evolvability defects: Code metrics thresholds for a given context, in: 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), 2018, pp. 83–94,.
[488]
Tufano Rosalia, Masiero Simone, Mastropaolo Antonio, Pascarella Luca, Poshyvanyk Denys, Bavota Gabriele, Using pre-trained models to boost code review automation, 2022, arXiv preprint arXiv:2201.06850.
[489]
Tufano M., Pantiuchina J., Watson C., Bavota G., Poshyvanyk D., On learning meaningful code changes via neural machine translation, in: 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE), 2019, pp. 25–36,.
[490]
Tufano Rosalia, Pascarella Luca, Tufano Michele, Poshyvanyk Denys, Bavota Gabriele, Towards automating code review activities, in: 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), IEEE, 2021, pp. 163–174.
[491]
Tufano Michele, Watson Cody, Bavota Gabriele, Di Penta Massimiliano, White Martin, Poshyvanyk Denys, Deep learning similarities from different representations of source code, in: MSR ’18, ISBN 9781450357166, 2018, pp. 542–553,.
[492]
Tufano Michele, Watson Cody, Bavota Gabriele, Di Penta Massimiliano, White Martin, Poshyvanyk Denys, Learning how to mutate source code from bug-fixes, in: 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME), IEEE, 2019, pp. 301–312.
[493]
Tufano Michele, Watson Cody, Bavota Gabriele, Penta Massimiliano Di, White Martin, Poshyvanyk Denys, An empirical study on learning bug-fixing patches in the wild via neural machine translation, ACM Trans. Softw. Eng. Methodol. (ISSN ) 28 (4) (2019),.
[494]
Tummalapalli Sahithi, Kumar Lov, Murthy N. L. Bhanu, Prediction of web service anti-patterns using aggregate software metrics and machine learning techniques, in: Proceedings of the 13th Innovations in Software Engineering Conference on Formerly Known As India Software Engineering Conference, in: ISEC 2020, ISBN 9781450375948, 2020,.
[495]
Tummalapalli Sahithi, Kumar Lov, Murthy NL Bhanu, Krishna Aneesh, Detection of web service anti-patterns using weighted extreme learning machine, Comput. Stand. Interfaces (2022).
[496]
Tummalapalli Sahithi, Kumar Lov, Murthy Neti Lalitha Bhanu, Kocher Vipul, Padmanabhuni Srinivas, A novel approach for the detection of web service anti-patterns using word embedding techniques, in: International Conference on Computational Science and Its Applications, Springer, 2021, pp. 217–230.
[497]
Tummalapalli Sahithi, Kumar Lov, Neti Lalita Bhanu Murthy, An empirical framework for web service anti-pattern prediction using machine learning techniques, in: 2019 9th Annual Information Technology, Electromechanical Engineering and Microelectronics Conference (IEMECON), IEEE, 2019, pp. 137–143.
[498]
Tummalapalli Sahithi, Mittal Juhi, Kumar Lov, Murthy Neti Lalitha Bhanu, Rath Santanu Kumar, An empirical analysis on the prediction of web service anti-patterns using source code metrics and ensemble techniques, in: International Conference on Computational Science and Its Applications, Springer, 2021, pp. 263–276.
[499]
Tummalapalli Sahithi, Murthy N.L., Krishna Aneesh, et al., Detection of web service anti-patterns using neural networks with multiple layers, in: International Conference on Neural Information Processing, Springer, 2020, pp. 571–579.
[500]
Ucci Daniele, Aniello Leonardo, Baldoni Roberto, Survey of machine learning techniques for malware analysis, Comput. Secur. (ISSN ) 81 (2019) 123–147,.
[501]
Uchiyama S., Kubo A., Washizaki H., Fukazawa Y., Detecting design patterns in object-oriented program source code by using metrics and machine learning, J. Softw. Eng. Appl. 07 (2014) 983–998.
[502]
Uchôa Anderson, Barbosa Caio, Coutinho Daniel, Oizumi Willian, Assunçao Wesley KG, Vergilio Silvia Regina, Pereira Juliana Alves, Oliveira Anderson, Garcia Alessandro, Predicting design impactful changes in modern code review: A large-scale empirical study, in: 2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR), IEEE, 2021, pp. 471–482.
[503]
Ugurel Secil, Krovetz Robert, Giles C. Lee, What’s the code? Automatic classification of source code archives, in: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’02, ISBN 158113567X, 2002, pp. 632–638,.
[504]
Utting M., Legeard B., Dadeau F., Tamagnan F., Bouquet F., Identifying and generating missing tests using machine learning on execution traces, in: 2020 IEEE International Conference on Artificial Intelligence Testing (AITest), 2020, pp. 83–90,.
[505]
Van Thuy Hoang, Anh Phan Viet, Hoai Nguyen Xuan, Automated large program repair based on big code, in: Proceedings of the Ninth International Symposium on Information and Communication Technology, in: SoICT 2018, ISBN 9781450365390, 2018, pp. 375–381,.
[506]
Vasic Marko, Kanade Aditya, Maniatis Petros, Bieber David, Singh Rishabh, Neural program repair by jointly learning to localize and repair, 2019.
[507]
Vaswani Ashish, Shazeer Noam, Parmar Niki, Uszkoreit Jakob, Jones Llion, Gomez Aidan N, Kaiser Ł ukasz, Polosukhin Illia, Attention is all you need, in: Guyon I., Luxburg U.V., Bengio S., Wallach H., Fergus R., Vishwanathan S., Garnett R. (Eds.), Advances in Neural Information Processing Systems, Vol. 30, Curran Associates, Inc., 2017, URL https://proceedings.neurips.cc/paper/2017/file/3f5ee243547dee91fbd053c1c4a845aa-Paper.pdf.
[508]
Vishnu B.A., Jevitha K.P., Prediction of cross-site scripting attack using machine learning algorithms, in: Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing, ICONIAAC ’14, Association for Computing Machinery, New York, NY, USA, ISBN 9781450329088, 2014,.
[509]
Viuginov Nickolay, Filchenkov Andrey, A machine learning based automatic folding of dynamically typed languages, in: Proceedings of the 3rd ACM SIGSOFT International Workshop on Machine Learning Techniques for Software Quality Evaluation, in: MaLTeSQuE 2019, ISBN 9781450368551, 2019, pp. 31–36,.
[510]
Wan Yao, Shu Jingdong, Sui Yulei, Xu Guandong, Zhao Zhou, Wu Jian, Yu Philip S., Multi-modal attention network learning for semantic source code retrieval, in: Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, ASE ’19, ISBN 9781728125084, 2019, pp. 13–25,.
[511]
Wan Z., Xia X., Lo D., Murphy G.C., How does machine learning change software development practices?, IEEE Trans. Softw. Eng. (2019) 1,.
[512]
Wan Yao, Zhao Zhou, Yang Min, Xu Guandong, Ying Haochao, Wu Jian, Yu Philip S., Improving automatic source code summarization via deep reinforcement learning, in: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, in: ASE 2018, ISBN 9781450359375, 2018, pp. 397–407,.
[513]
Wang Deze, Dong Wei, Li Shanshan, A multi-task representation learning approach for source code, in: Proceedings of the 1st ACM SIGSOFT International Workshop on Representation Learning for Software Engineering and Program Languages, in: RL+SE&PL 2020, ISBN 9781450381253, 2020, pp. 1–2,.
[514]
Wang Wei, Godfrey Michael W., Recommending clones for refactoring using design, context, and history, in: 2014 IEEE International Conference on Software Maintenance and Evolution, 2014, pp. 331–340,.
[515]
Wang Wenhan, Li Ge, Shen Sijie, Xia Xin, Jin Zhi, Modular tree network for source code representation learning, ACM Trans. Softw. Eng. Methodol. (ISSN ) 29 (4) (2020),.
[516]
Wang Song, Liu Taiyue, Nam Jaechang, Tan Lin, Deep semantic feature learning for software defect prediction, IEEE Trans. Softw. Eng. 46 (12) (2018) 1267–1293.
[517]
Wang Shuai, Liu Jinyang, Qiu Ye, Ma Zhiyi, Liu Junfei, Wu Zhonghai, Deep learning based code completion models for programming codes, in: Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control, in: ISCSIC 2019, ISBN 9781450376617, 2019,.
[518]
Wang Song, Liu Taiyue, Tan Lin, Automatically learning semantic features for defect prediction, in: Proceedings of the 38th International Conference on Software Engineering, ICSE ’16, ISBN 9781450339001, 2016, pp. 297–308,.
[519]
Wang Yu, Wang Ke, Gao Fengjuan, Wang Linzhang, Learning semantic program embeddings with graph interval neural network, Proc. ACM Program. Lang. 4 (OOPSLA) (2020),.
[520]
Wang Yue, Wang Weishi, Joty Shafiq, Hoi Steven C.H., CodeT5: Identifier-aware unified pre-trained encoder-decoder models for code understanding and generation, in: Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, Association for Computational Linguistics, Online and Punta Cana, Dominican Republic, 2021, pp. 8696–8708,. URL https://aclanthology.org/2021.emnlp-main.685.
[521]
Wang Xinda, Wang Shu, Sun Kun, Batcheller Archer, Jajodia Sushil, A machine learning approach to classify security patches into vulnerability types, in: 2020 IEEE Conference on Communications and Network Security (CNS), 2020, pp. 1–9,.
[522]
Wang S., Wen M., Chen L., Yi X., Mao X., How different is it between machine-generated and developer-provided patches? : An empirical study on the correct patches generated by automated program repair techniques, in: 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), 2019, pp. 1–12,.
[523]
Wang Haoye, Xia Xin, Lo David, He Qiang, Wang Xinyu, Grundy John, Context-aware retrieval-based deep commit message generation, ACM Trans. Softw. Eng. Methodol. (TOSEM) 30 (4) (2021) 1–30.
[524]
Wang S., Yao X., Using class imbalance learning for software defect prediction, IEEE Trans. Reliab. 62 (2) (2013) 434–443,.
[525]
Wang Tiejian, Zhang Zhiwu, Jing Xiaoyuan, Zhang Liqiang, Multiple kernel ensemble learning for software defect prediction, Autom. Softw. Eng. 23 (4) (2016) 569–590.
[526]
Wang R., Zhang H., Lu G., Lyu L., Lyu C., Fret: Functional reinforced transformer with BERT for code summarization, IEEE Access 8 (2020) 135591–135604,.
[527]
Wang Wenhua, Zhang Yuqun, Sui Yulei, Wan Yao, Zhao Zhou, Wu Jian, Yu Philip, Xu Guandong, Reinforcement-learning-guided source code summarization via hierarchical attention, IEEE Trans. Softw. Eng. (2020).
[528]
Wang W., Zhang Y., Sui Y., Wan Y., Zhao Z., Wu J., Yu P., Xu G., Reinforcement-learning-guided source code summarization via hierarchical attention, IEEE Trans. Softw. Eng. (2020) 1,.
[529]
Wei Bolin, Li Ge, Xia Xin, Fu Zhiyi, Jin Zhi, Code generation as a dual task of code summarization, Adv. Neural Inf. Process. Syst. 32 (2019).
[530]
Wei Linfeng, Luo Weiqi, Weng Jian, Zhong Yanjun, Zhang Xiaoqian, Yan Zheng, Machine learning-based malicious application detection of android, IEEE Access 5 (2017) 25591–25601,.
[531]
White Martin, Tufano Michele, Martinez Matias, Monperrus Martin, Poshyvanyk Denys, Sorting and transforming program repair ingredients via deep learning code similarities, in: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), IEEE, 2019, pp. 479–490.
[532]
White Martin, Tufano Michele, Vendome Christopher, Poshyvanyk Denys, Deep learning code fragments for code clone detection, in: Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, in: ASE 2016, ISBN 9781450338455, 2016, pp. 87–98,.
[533]
Wu Liwei, Li Fei, Wu Youhua, Zheng Tao, GGF: A graph-based method for programming language syntax error correction, in: Proceedings of the 28th International Conference on Program Comprehension, ICPC ’20, Association for Computing Machinery, ISBN 9781450379588, 2020, pp. 139–-148,.
[534]
Xiao L., Miao HuaiKou, Shi Tingting, Hong Y., LSTM-based deep learning for spatial–temporal software testing, Distrib. Parallel Databases (2020) 1–26.
[535]
Xie R., Ye W., Sun J., Zhang S., Exploiting method names to improve code summarization: A deliberation multi-task learning approach, in: 2021 2021 IEEE/ACM 29th International Conference on Program Comprehension (ICPC) (ICPC), 2021, pp. 138–148,.
[536]
Xiong Yingfei, Wang Bo, Fu Guirong, Zang Linfei, Learning to synthesize, in: Proceedings of the 4th International Workshop on Genetic Improvement Workshop, GI ’18, ISBN 9781450357531, 2018, pp. 37–44,.
[537]
Xu Sihan, Sivaraman Aishwarya, Khoo Siau-Cheng, Xu Jing, GEMS: An extract method refactoring recommender, in: 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE), 2017, pp. 24–34,.
[538]
Xu Sihan, Zhang Sen, Wang Weijing, Cao Xinya, Guo Chenkai, Xu Jing, Method name suggestion with hierarchical attention networks, in: Proceedings of the 2019 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, in: PEPM 2019, ISBN 9781450362269, 2019, pp. 10–21,.
[539]
Yahav Eran, From programs to interpretable deep models and back, in: Chockler Hana, Weissenbacher Georg (Eds.), Computer Aided Verification, ISBN 978-3-319-96145-3, 2018, pp. 27–37.
[540]
Yang Yixiao, Chen Xiang, Sun Jiaguang, Improve language modeling for code completion through learning general token repetition of source code with optimized memory, Int. J. Softw. Eng. Knowl. Eng. 29 (11n12) (2019) 1801–1818,.
[541]
Yang Jiachen, Hotta K., Higo Yoshiki, Igaki H., Kusumoto S., Classification model for code clones based on machine learning, Empir. Softw. Eng. 20 (2014) 1095–1125.
[542]
Yang Z., Keung J., Yu X., Gu X., Wei Z., Ma X., Zhang M., A multi-modal transformer-based code summarization approach for smart contracts, in: 2021 2021 IEEE/ACM 29th International Conference on Program Comprehension (ICPC) (ICPC), 2021, pp. 1–12,.
[543]
Yang Hangfeng, Li Shudong, Wu Xiaobo, Lu Hui, Han Weihong, A novel solutions for malicious code detection and family clustering based on machine learning, IEEE Access 7 (2019) 148853–148860,.
[544]
Yang Mutian, Wu Jingzheng, Ji Shouling, Luo Tianyue, Wu Yanjun, Pre-patch: Find hidden threats in open software based on machine learning method, in: Yang Alvin, Kantamneni Siva, Li Ying, Dico Awel, Chen Xiangang, Subramanyan Rajesh, Zhang Liang-Jie (Eds.), Services – SERVICES 2018, ISBN 978-3-319-94472-2, 2018, pp. 48–65.
[545]
Yang Yanming, Xia Xin, Lo David, Grundy John, A survey on deep learning for software engineering, ACM Comput. Surv. (ISSN ) 54 (10s) (2022),.
[546]
Yao Ziyu, Peddamail Jayavardhan Reddy, Sun Huan, CoaCor: Code annotation for code retrieval with reinforcement learning, in: The World Wide Web Conference, WWW ’19, ISBN 9781450366748, 2019, pp. 2203–2214,.
[547]
Yao Ziyu, Weld Daniel S., Chen Wei-Peng, Sun Huan, Staqc: A systematically mined question-code dataset from stack overflow, in: Proceedings of the 2018 World Wide Web Conference, WWW ’18, International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, ISBN 9781450356398, 2018, pp. 1693–1703,.
[548]
Ye Wei, Xie Rui, Zhang Jinglei, Hu Tianxiang, Wang Xiaoyin, Zhang Shikun, Leveraging code generation to improve code retrieval and summarization via dual learning, in: Proceedings of the Web Conference 2020, WWW ’20, ISBN 9781450370233, 2020, pp. 2309–2319,.
[549]
Yih Wen-tau, Richardson Matthew, Meek Chris, Chang Ming-Wei, Suh Jina, The value of semantic parse labeling for knowledge base question answering, in: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), Association for Computational Linguistics, Berlin, Germany, 2016, pp. 201–206,.
[550]
Yin Pengcheng, Deng Bowen, Chen Edgar, Vasilescu Bogdan, Neubig Graham, Learning to mine aligned code and natural language pairs from Stack Overflow, in: Proceedings of the 15th International Conference on Mining Software Repositories, MSR ’18, Association for Computing Machinery, New York, NY, USA, ISBN 9781450357166, 2018, pp. 476–486,.
[551]
Yin Pengcheng, Neubig Graham, A syntactic neural model for general-purpose code generation, in: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2017, pp. 440–450,.
[552]
Yin Pengcheng, Neubig Graham, TRANX: A transition-based neural abstract syntax parser for semantic parsing and code generation, 2018, arXiv preprint arXiv:1810.02720.
[553]
Yohannese Chubato Wondaferaw, Li Tianrui, A combined-learning based framework for improved software fault prediction, Int. J. Comput. Intell. Syst. 10 (1) (2017) 647.
[554]
Yosifova Veneta, Tasheva Antoniya, Trifonov Roumen, Predicting vulnerability type in common vulnerabilities and exposures (CVE) database with machine learning classifiers, in: 2021 12th National Conference with International Participation (ELECTRONICA), 2021, pp. 1–6,.
[555]
Younis Awad A., Malaiya Yashwant K., Using software structure to predict vulnerability exploitation potential, in: 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion, 2014, pp. 13–18,.
[556]
Yu Tao, Zhang Rui, Yang Kai, Yasunaga Michihiro, Wang Dongxu, Li Zifan, Ma James, Li Irene, Yao Qingning, Roman Shanelle, Zhang Zilin, Radev Dragomir, Spider: A large-scale human-labeled dataset for complex and cross-domain semantic parsing and text-to-SQL task, in: Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Association for Computational Linguistics, Brussels, Belgium, 2018, pp. 3911–3921,. URL https://aclanthology.org/D18-1425.
[557]
Yue R., Gao Z., Meng N., Xiong Y., Wang X., Morgenthaler J.D., Automatic clone recommendation for refactoring based on the present and the past, in: 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME), 2018, pp. 115–126,.
[558]
Zanoni Marco, Fontana Francesca Arcelli, Stella Fabio, On applying machine learning techniques for design pattern detection, J. Syst. Softw. 103 (2015) 102–117.
[559]
Zhang Yang, Dong Chunhao, MARS: Detecting brain class/method code smell based on metric–attention mechanism and residual network, J. Softw.: Evol. Process (2021).
[560]
Zhang Jie M., Harman Mark, “Ignorance and prejudice” in software fairness, in: 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 2021, pp. 1436–1447,.
[561]
Zhang J.M., Harman M., Ma L., Liu Y., Machine learning testing: Survey, landscapes and horizons, IEEE Trans. Softw. Eng. (2020) 1,.
[562]
Zhang Fanlong, Khoo Siau-cheng, An empirical study on clone consistency prediction based on machine learning, Inf. Softw. Technol. 136 (2021).
[563]
Zhang Yu, Li Binglong, Malicious code detection based on code semantic features, IEEE Access 8 (2020) 176728–176737,.
[564]
Zhang Du, Tsai Jeffrey J.P., Machine learning and software engineering, Softw. Qual. J. (ISSN ) 11 (2) (2003) 87–119,.
[565]
Zhang Jian, Wang Xu, Zhang Hongyu, Sun Hailong, Liu Xudong, Retrieval-based neural source code summarization, in: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, ICSE ’20, ISBN 9781450371216, 2020, pp. 1385–1397,.
[566]
Zhang J., Wang X., Zhang H., Sun H., Wang K., Liu X., A novel neural source code representation based on abstract syntax tree, in: 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE), 2019, pp. 783–794,.
[567]
Zhang Chunyan, Wang Junchao, Zhou Qinglei, Xu Ting, Tang Ke, Gui Hairen, Liu Fudong, A survey of automatic source code summarization, Symmetry 14 (3) (2022) 471.
[568]
Zhang Q., Wu B., Software defect prediction via transformer, in: 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Vol. 1, 2020, pp. 874–879,.
[569]
Zhang Jinglei, Xie Rui, Ye Wei, Zhang Yuhan, Zhang Shikun, Exploiting code knowledge graph for bug localization via bi-directional attention, in: Proceedings of the 28th International Conference on Program Comprehension, ICPC ’20, Association for Computing Machinery, ISBN 9781450379588, 2020, pp. 219–-229,.
[570]
Zhao Gang, Huang Jeff, DeepSim: Deep learning code functional similarity, in: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, in: ESEC/FSE 2018, ISBN 9781450355735, 2018, pp. 141–151,.
[571]
Zhao Wayne Xin, Zhou Kun, Li Junyi, Tang Tianyi, Wang Xiaolei, Hou Yupeng, Min Yingqian, Zhang Beichen, Zhang Junjie, Dong Zican, Du Yifan, Yang Chen, Chen Yushuo, Chen Zhipeng, Jiang Jinhao, Ren Ruiyang, Li Yifan, Tang Xinyu, Liu Zikang, Liu Peiyu, Nie Jian-Yun, Wen Ji-Rong, A survey of large language models, 2023.
[572]
Zheng Wei, Gao Jialiang, Wu Xiaoxue, Liu Fengyu, Xun Yuxing, Liu Guoliang, Chen Xiang, The impact factors on the performance of machine learning-based vulnerability detection: A comparative study, J. Syst. Softw. (ISSN ) 168 (2020),.
[573]
Zheng Wenhao, Zhou Hongyu, Li Ming, Wu Jianxin, CodeAttention: translating source code to comments by exploiting the code constructs, Front. Comput. Sci. 13 (3) (2019) 565–578.
[574]
Zhong Victor, Xiong Caiming, Socher Richard, Seq2SQL: Generating structured queries from natural language using reinforcement learning, 2017, URL https://arxiv.org/abs/1709.00103.
[575]
Zhong Chaoliang, Yang Ming, Sun Jun, JavaScript code suggestion based on deep learning, in: Proceedings of the 2019 3rd International Conference on Innovation in Artificial Intelligence, in: ICIAI 2019, ISBN 9781450361286, 2019, pp. 145–149,.
[576]
Zhou Yajin, Jiang Xuxian, Dissecting android malware: Characterization and evolution, in: Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP ’12, ISBN 9780769546810, 2012, pp. 95–109,.
[577]
Zhou Yu, Shen Juanjuan, Zhang Xiaoqing, Yang Wenhua, Han Tingting, Chen Taolue, Automatic source code summarization with graph attention networks, J. Syst. Softw. 188 (2022).
[578]
Zhou Yu, Yan Xin, Yang Wenhua, Chen Taolue, Huang Zhiqiu, Augmenting java method comments generation with context information based on neural networks, J. Syst. Softw. (ISSN ) 156 (2019) 328–340,. URL https://www.sciencedirect.com/science/article/pii/S0164121219301529.
[579]
Zhou Yu, Yan Xin, Yang Wenhua, Chen Taolue, Huang Zhiqiu, Augmenting java method comments generation with context information based on neural networks, J. Syst. Softw. 156 (2019) 328–340.
[580]
Zhou Ziyi, Yu Huiqun, Fan Guisheng, Adversarial training and ensemble learning for automatic code summarization, Neural Comput. Appl. 33 (19) (2021) 12571–12589.
[581]
Zhu Qihao, Sun Zeyu, Xiao Yuan-an, Zhang Wenjie, Yuan Kang, Xiong Yingfei, Zhang Lu, A syntax-guided edit decoder for neural program repair, in: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021, pp. 341–353.
[582]
Zimmermann Thomas, Premraj Rahul, Zeller Andreas, Predicting defects for eclipse, in: Third International Workshop on Predictor Models in Software Engineering (PROMISE’07: ICSE Workshops 2007), 2007, p. 9,.

Cited By

View all
  • (2024)ModelMate: A recommender for textual modeling languages based on pre-trained language modelsProceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems10.1145/3640310.3674089(183-194)Online publication date: 22-Sep-2024
  • (2024)A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road aheadInternational Journal of Information Security10.1007/s10207-024-00888-y23:5(3311-3327)Online publication date: 1-Oct-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of Systems and Software
Journal of Systems and Software  Volume 209, Issue C
Mar 2024
313 pages

Publisher

Elsevier Science Inc.

United States

Publication History

Published: 14 March 2024

Author Tags

  1. Machine learning for software engineering
  2. Source code analysis
  3. Deep learning
  4. Datasets
  5. Tools

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)ModelMate: A recommender for textual modeling languages based on pre-trained language modelsProceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems10.1145/3640310.3674089(183-194)Online publication date: 22-Sep-2024
  • (2024)A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road aheadInternational Journal of Information Security10.1007/s10207-024-00888-y23:5(3311-3327)Online publication date: 1-Oct-2024

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media