-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
e812605
commit b47c022
Showing
3 changed files
with
3 additions
and
3 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1 @@ | ||
[{"authors":["admin"],"categories":null,"content":"I am a PhD Student at Zhejiang University, China, under the supervision of my incredible advisor Prof. Dr. ZhipengGao and Prof. Dr. Shanping Li. I did my master studies at National University of Defense Technology under the supervision of Prof. Dr. Shanshan Li.\nMy research interests include static analysis, code understanding and mining software repositories.\n","date":1654041600,"expirydate":-62135596800,"kind":"taxonomy","lang":"en","lastmod":1654041600,"objectID":"2525497d367e79493fd32b198b28f040","permalink":"https://zhipengxue97.github.io/authors/admin/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/authors/admin/","section":"authors","summary":"I am a PhD Student at Zhejiang University, China, under the supervision of my incredible advisor Prof. Dr. ZhipengGao and Prof. Dr. Shanping Li. I did my master studies at National University of Defense Technology under the supervision of Prof.","tags":null,"title":"Zhipeng Xue","type":"authors"},{"authors":["Zhipeng Xue","Zhijie Jiang","Chenlin Huang","Rulin Xu","Xiangbing Huang","Liumin Hu"],"categories":null,"content":"","date":1654041600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1654041600,"objectID":"7c90ad6b354615f1cad50153cf0bc97d","permalink":"https://zhipengxue97.github.io/publication/seed-semantic-graph-based-deep-detection-for-type-4-clone/","publishdate":"2022-06-01T00:00:00Z","relpermalink":"/publication/seed-semantic-graph-based-deep-detection-for-type-4-clone/","section":"publication","summary":"Type-4 clones refer to a pair of code snippets with similar semantics but written in different syntax, which challenges the existing code clone detection techniques. Previous studies, however, highly rely on syntactic structures and textual tokens, which cannot precisely represent the semantic information of code and might introduce non-negligible noise into the detection models. To overcome these limitations, we design a novel semantic graph-based deep detection approach, called SEED. For a pair of code snippets, SEED constructs a semantic graph of each code snippet based on intermediate representation to represent the code semantic more precisely compared to the representations based on lexical and syntactic analysis. To accommodate the characteristics of Type-4 clones, a semantic graph is constructed focusing on the operators and API calls instead of all tokens. Then, SEED generates the feature vectors by using the graph match network and performs clone detection based on the similarity among the vectors. Extensive experiments show that our approach significantly outperforms two baseline approaches over two public datasets and one customized dataset. Especially, SEED outperforms other baseline methods by an average of 25.2% in the form of F1-Score. Our experiments demonstrate that SEED can reach state-of-the-art and be useful for Type-4 clone detection in practice.","tags":["Code Clone","Code Understanding","Deep Learning"],"title":"SEED: Semantic Graph Based Deep Detection for Type-4 Clone","type":"publication"},{"authors":["Zhipeng Xue","Yuanliang Zhang","Rulin Xu"],"categories":null,"content":"","date":1652659200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1652659200,"objectID":"6a3d4207439854507b58e3b461ed8629","permalink":"https://zhipengxue97.github.io/publication/clone-based-usage-pattern-mining/","publishdate":"2022-05-16T00:00:00Z","relpermalink":"/publication/clone-based-usage-pattern-mining/","section":"publication","summary":"When programmers retrieve a code method and want to reuse it, they need to understand the usage patterns of the retrieved method. However, it is difficult to obtain usage information of the retrieved method since this method may only have a brief comment and few available usage examples. In this paper, we propose an approach, called LUPIN (cLone-based Usage Pattern mIniNg), to mine the usage patterns of these methods, which do not widely appeared in the code repository. The key idea of LUPIN is that the cloned code of the target method may have a similar usage pattern, and we can collect more usage information of the target method from cloned code usage examples. From the amplified usage examples, we mine the usage pattern of the target method by frequent subsequence mining after program slicing and code normalization. Our evaluation shows that LUPIN can mine four categories of usage patterns with an average precision of 0.65.","tags":["Code Clone","Usage Pattern Mining","Software Repositories Mining"],"title":"Clone-based Code Method Usage Pattern Mining","type":"publication"},{"authors":["Chenglong Zhou","Haoran Liu","Yuanliang Zhang","Zhipeng Xue","Qing Liao","JinJing Zhao","Ji Wang"],"categories":null,"content":"","date":1622505600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1622505600,"objectID":"3bd6da95770c09f71d23cc3b68402856","permalink":"https://zhipengxue97.github.io/publication/deep-understanding-of-runtime-configuration-intention/","publishdate":"2021-06-01T00:00:00Z","relpermalink":"/publication/deep-understanding-of-runtime-configuration-intention/","section":"publication","summary":"The runtime environment and workload of software are constantly changing, requiring users to make appropriate adjustments to accommodate these changes. The runtime configuration, however, as the interface for users to manipulate software behavior often requires domain-specific knowledge to understand. This usually results in users spending a considerable amount of time wading through document and user manuals trying to understand the runtime configuration. In this paper, we study the possibility of understanding the intention of runtime configuration options through their documents, even sometimes it is difficult for users to understand. Based on these studies, we classify the runtime configuration option’s intention into six categories. Accordingly, we design runtime Configuration Intention Classifier (CIC), a supervised approach based on CNN to classify the runtime configuration option’s intention according to its document. CIC integrates the features of runtime configuration names and descriptions according to different levels of granularity and predicts the intention of runtime configuration options accordingly. Extensive experiments show that our approach can achieve an accuracy of 85.6% and outperform nine comparative approaches by up to 16.6% over the dataset we customized.","tags":["Configuration","Deep Learning"],"title":"Deep Understanding of Runtime Configuration Intention","type":"publication"}] | ||
[{"authors":["admin"],"categories":null,"content":"I am a PhD Student at Zhejiang University, China, under the supervision of my incredible advisor Prof. Dr. Zhipeng Gao and Prof. Dr. Shanping Li. I did my master studies at National University of Defense Technology under the supervision of Prof. Dr. Shanshan Li.\nMy research interests include static analysis, code understanding and mining software repositories.\n","date":1654041600,"expirydate":-62135596800,"kind":"taxonomy","lang":"en","lastmod":1654041600,"objectID":"2525497d367e79493fd32b198b28f040","permalink":"https://zhipengxue97.github.io/authors/admin/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/authors/admin/","section":"authors","summary":"I am a PhD Student at Zhejiang University, China, under the supervision of my incredible advisor Prof. Dr. Zhipeng Gao and Prof. Dr. Shanping Li. I did my master studies at National University of Defense Technology under the supervision of Prof.","tags":null,"title":"Zhipeng Xue","type":"authors"},{"authors":["Zhipeng Xue","Zhijie Jiang","Chenlin Huang","Rulin Xu","Xiangbing Huang","Liumin Hu"],"categories":null,"content":"","date":1654041600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1654041600,"objectID":"7c90ad6b354615f1cad50153cf0bc97d","permalink":"https://zhipengxue97.github.io/publication/seed-semantic-graph-based-deep-detection-for-type-4-clone/","publishdate":"2022-06-01T00:00:00Z","relpermalink":"/publication/seed-semantic-graph-based-deep-detection-for-type-4-clone/","section":"publication","summary":"Type-4 clones refer to a pair of code snippets with similar semantics but written in different syntax, which challenges the existing code clone detection techniques. Previous studies, however, highly rely on syntactic structures and textual tokens, which cannot precisely represent the semantic information of code and might introduce non-negligible noise into the detection models. To overcome these limitations, we design a novel semantic graph-based deep detection approach, called SEED. For a pair of code snippets, SEED constructs a semantic graph of each code snippet based on intermediate representation to represent the code semantic more precisely compared to the representations based on lexical and syntactic analysis. To accommodate the characteristics of Type-4 clones, a semantic graph is constructed focusing on the operators and API calls instead of all tokens. Then, SEED generates the feature vectors by using the graph match network and performs clone detection based on the similarity among the vectors. Extensive experiments show that our approach significantly outperforms two baseline approaches over two public datasets and one customized dataset. Especially, SEED outperforms other baseline methods by an average of 25.2% in the form of F1-Score. Our experiments demonstrate that SEED can reach state-of-the-art and be useful for Type-4 clone detection in practice.","tags":["Code Clone","Code Understanding","Deep Learning"],"title":"SEED: Semantic Graph Based Deep Detection for Type-4 Clone","type":"publication"},{"authors":["Zhipeng Xue","Yuanliang Zhang","Rulin Xu"],"categories":null,"content":"","date":1652659200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1652659200,"objectID":"6a3d4207439854507b58e3b461ed8629","permalink":"https://zhipengxue97.github.io/publication/clone-based-usage-pattern-mining/","publishdate":"2022-05-16T00:00:00Z","relpermalink":"/publication/clone-based-usage-pattern-mining/","section":"publication","summary":"When programmers retrieve a code method and want to reuse it, they need to understand the usage patterns of the retrieved method. However, it is difficult to obtain usage information of the retrieved method since this method may only have a brief comment and few available usage examples. In this paper, we propose an approach, called LUPIN (cLone-based Usage Pattern mIniNg), to mine the usage patterns of these methods, which do not widely appeared in the code repository. The key idea of LUPIN is that the cloned code of the target method may have a similar usage pattern, and we can collect more usage information of the target method from cloned code usage examples. From the amplified usage examples, we mine the usage pattern of the target method by frequent subsequence mining after program slicing and code normalization. Our evaluation shows that LUPIN can mine four categories of usage patterns with an average precision of 0.65.","tags":["Code Clone","Usage Pattern Mining","Software Repositories Mining"],"title":"Clone-based Code Method Usage Pattern Mining","type":"publication"},{"authors":["Chenglong Zhou","Haoran Liu","Yuanliang Zhang","Zhipeng Xue","Qing Liao","JinJing Zhao","Ji Wang"],"categories":null,"content":"","date":1622505600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1622505600,"objectID":"3bd6da95770c09f71d23cc3b68402856","permalink":"https://zhipengxue97.github.io/publication/deep-understanding-of-runtime-configuration-intention/","publishdate":"2021-06-01T00:00:00Z","relpermalink":"/publication/deep-understanding-of-runtime-configuration-intention/","section":"publication","summary":"The runtime environment and workload of software are constantly changing, requiring users to make appropriate adjustments to accommodate these changes. The runtime configuration, however, as the interface for users to manipulate software behavior often requires domain-specific knowledge to understand. This usually results in users spending a considerable amount of time wading through document and user manuals trying to understand the runtime configuration. In this paper, we study the possibility of understanding the intention of runtime configuration options through their documents, even sometimes it is difficult for users to understand. Based on these studies, we classify the runtime configuration option’s intention into six categories. Accordingly, we design runtime Configuration Intention Classifier (CIC), a supervised approach based on CNN to classify the runtime configuration option’s intention according to its document. CIC integrates the features of runtime configuration names and descriptions according to different levels of granularity and predicts the intention of runtime configuration options accordingly. Extensive experiments show that our approach can achieve an accuracy of 85.6% and outperform nine comparative approaches by up to 16.6% over the dataset we customized.","tags":["Configuration","Deep Learning"],"title":"Deep Understanding of Runtime Configuration Intention","type":"publication"}] |