{"id":"https://openalex.org/W4391094734","doi":"https://doi.org/10.1109/bigdata59044.2023.10386406","title":"Analyzing Code Text Strings for Code Evaluation","display_name":"Analyzing Code Text Strings for Code Evaluation","publication_year":2023,"publication_date":"2023-12-15","ids":{"openalex":"https://openalex.org/W4391094734","doi":"https://doi.org/10.1109/bigdata59044.2023.10386406"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata59044.2023.10386406","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/bigdata59044.2023.10386406","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100417442","display_name":"Tianyu Wang","orcid":"https://orcid.org/0000-0003-3944-6395"},"institutions":[{"id":"https://openalex.org/I125924841","display_name":"Mercy University","ror":"https://ror.org/02s99ck98","country_code":"US","type":"education","lineage":["https://openalex.org/I125924841"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tianyu Wang","raw_affiliation_strings":["Mercy University,Department of Math &#x0026; CS,Dobbs Ferry,NY"],"affiliations":[{"raw_affiliation_string":"Mercy University,Department of Math &#x0026; CS,Dobbs Ferry,NY","institution_ids":["https://openalex.org/I125924841"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090876459","display_name":"Zhixiong Chen","orcid":"https://orcid.org/0000-0003-4228-0023"},"institutions":[{"id":"https://openalex.org/I125924841","display_name":"Mercy University","ror":"https://ror.org/02s99ck98","country_code":"US","type":"education","lineage":["https://openalex.org/I125924841"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhixiong Chen","raw_affiliation_strings":["Mercy University,Department of Math &#x0026; CS,Dobbs Ferry,NY"],"affiliations":[{"raw_affiliation_string":"Mercy University,Department of Math &#x0026; CS,Dobbs Ferry,NY","institution_ids":["https://openalex.org/I125924841"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100417442"],"corresponding_institution_ids":["https://openalex.org/I125924841"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33676687,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"35","issue":null,"first_page":"5619","last_page":"5628"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7910694479942322},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.637486457824707},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6279298067092896},{"id":"https://openalex.org/keywords/code-review","display_name":"Code review","score":0.41141754388809204},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3651086688041687},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.29990851879119873},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.11676114797592163},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.07775545120239258}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7910694479942322},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.637486457824707},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6279298067092896},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.41141754388809204},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3651086688041687},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.29990851879119873},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.11676114797592163},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.07775545120239258},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata59044.2023.10386406","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/bigdata59044.2023.10386406","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1485912969","https://openalex.org/W2593765440","https://openalex.org/W2619331983","https://openalex.org/W2796404405","https://openalex.org/W2896457183","https://openalex.org/W2900633536","https://openalex.org/W2909087604","https://openalex.org/W2964150020","https://openalex.org/W2971474967","https://openalex.org/W2973751923","https://openalex.org/W3005951744","https://openalex.org/W3030030185","https://openalex.org/W3089307846","https://openalex.org/W3093591484","https://openalex.org/W3127782461","https://openalex.org/W3161457214","https://openalex.org/W3176740355","https://openalex.org/W3177813494","https://openalex.org/W4221143046","https://openalex.org/W4241437391","https://openalex.org/W4254188649","https://openalex.org/W4287024925","https://openalex.org/W4297819591","https://openalex.org/W4311887664","https://openalex.org/W4322718191","https://openalex.org/W4386081308","https://openalex.org/W6679775712","https://openalex.org/W6753527320","https://openalex.org/W6755207826","https://openalex.org/W6783958930","https://openalex.org/W6794686226","https://openalex.org/W6798182279","https://openalex.org/W6800166007","https://openalex.org/W6803068904","https://openalex.org/W6809646742","https://openalex.org/W6850625674","https://openalex.org/W6856169706"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4226317003","https://openalex.org/W2149635184","https://openalex.org/W3161903544","https://openalex.org/W4391835699","https://openalex.org/W3017183837","https://openalex.org/W4323034249","https://openalex.org/W3025557260"],"abstract_inverted_index":{"This":[0,113],"paper":[1],"presents":[2],"a":[3,20,43,79,102,106,169],"comprehensive":[4,107],"investigation":[5],"into":[6,117],"the":[7,12,48,95,130,133,148,182],"collection":[8],"and":[9,29,39,61,93,120,142,166,174,192],"organization":[10],"of":[11,50,132,162,185],"LeetCode":[13],"70K":[14],"human-submitted":[15],"dataset,":[16],"aimed":[17],"at":[18],"providing":[19],"valuable":[21],"resource":[22],"for":[23,35,68,82,109],"assessing":[24],"code":[25,37,83,103,111,118,134,139,144,149,164],"quality,":[26],"encompassing":[27],"correctness":[28],"performance":[30,49],"considerations.":[31],"We":[32,46],"introduce":[33],"methods":[34],"effective":[36],"evaluation":[38],"annotation,":[40],"resulting":[41],"in":[42,188],"labeled":[44],"dataset.":[45],"compare":[47],"two":[51],"widely":[52],"used":[53],"deep":[54],"learning":[55],"models,":[56],"Long":[57],"Short-Term":[58],"Memory":[59],"(LSTM)":[60],"Bidirectional":[62],"Encoder":[63],"Representations":[64],"from":[65],"Transformers":[66],"(BERT),":[67],"classification.":[69],"The":[70,160],"BERT":[71],"model":[72],"demonstrates":[73],"exceptional":[74],"performance,":[75],"positioning":[76],"it":[77],"as":[78],"reliable":[80],"classifier":[81],"quality":[84,104,119,135,150],"assessment.":[85,112],"Beyond":[86],"classification,":[87],"our":[88],"research":[89,180],"advances":[90],"by":[91],"constructing":[92],"evaluating":[94],"dataset":[96],"using":[97],"regression":[98],"models":[99],"to":[100],"establish":[101],"score,":[105],"metric":[108],"intrinsic":[110],"score":[114,136,151],"offers":[115],"insights":[116],"efficiency,":[121],"informing":[122],"coding":[123],"practices":[124],"without":[125],"even":[126],"executing":[127],"code.":[128],"Importantly,":[129],"implications":[131],"extend":[137],"beyond":[138],"evaluation,":[140],"identifying":[141],"addressing":[143],"security":[145],"issues.":[146],"Leveraging":[147],"enhances":[152],"vulnerability":[153],"detection,":[154],"fortifying":[155],"software":[156,176,189],"against":[157],"cyber":[158],"threats.":[159],"amalgamation":[161],"AI-driven":[163],"assessment":[165],"cybersecurity":[167,193],"marks":[168],"pivotal":[170,183],"advancement,":[171],"shaping":[172],"robust":[173],"secure":[175],"development":[177],"practices.":[178],"Our":[179],"underscores":[181],"role":[184],"AI-human":[186],"cooperation":[187],"development\u2019s":[190],"future":[191],"landscape.":[194]},"counts_by_year":[],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
